Thursday , 16 May 2024
Home 4 John Black (page 42)

John Black

A professional fast learner, with experience in the IT management, capable of technical troubleshooting to identify and solve problems.

The 666 sign

Sebelum Tidur: 6 minggu: selamat bobo sayang, mimpi indah ya, mmmuach. 6 bulan: tolong matiin lampunya, silau nih. 6 tahun : Kesana-an doong… kamu tidur dempet2an kayak mikrolet gini sih?! Pakai Toilet: 6 minggu: ngga apa-apa, kamu duluan deh, aku ngga buru2 koq. 6 bulan: masih lama ngga nih? 6 tahun: brug! brug! brug! (suara pintu digedor), kalo mau tapa di gunung kawi sono!

Read More »

Kisah Selembar Cek

Di sebuah keluarga, tinggallah seorang ayah dengan putra tunggalnya yang sebentar lagi lulus dari perguruan tinggi. Mereka berdua memiliki kesamaan minat yakni mengikuti perkembangan produk otomotif. Suatu hari, saat pameran otomotif berlangsung, mereka berdua pun ke sana.Melihat sambil berandai-andai. Seandainya tabungan si ayah mencukupi, kira-kira mobil apa yang sesuai budget yang akan di beli. Sambil bersenda gurau, sepertinya sungguh-sungguh akan membeli mobil impian mereka.

Read More »

Negeri Orang Bahagia

AKUlah penciptamu. Aku akan turut campur dalam segala permasalahan hidupmu. Ingat, Aku tidak membutuhkan bantuanmu. Jika engkau menghadapi situasi sulit yang tidak bisa engkau pecahkan, masukkan ke kotak SFGTD (something for God to do)-mu. Semua masalah akan terselesaikan, namun bukan menurut ukuran waktumu tapi waktuKU. Sekali engkau masukkan masalah ke dalam kotak SFGTD-mu, engkau tidak perlu lagi melanjutkan kekuatiranmu. Lebih baik engkau terjunkan dirimu melanjutkan peran hidupmu saat ini. Jika engkau terjebak kemacetan, jangan bringas. Karena ada orang-orang yang memang ditetapkan mendahuluimu untuk kepentingan yang mengungkapkannya saja dia sudah tidak mampu. Saat engkau merasa hari-hari di kantormu tidak begitu baik, pikirkanlah orang-orang lain yang keluar dari kantor beberapa tahun lalu

Read More »

Hacking Attacks – How and Why

In this age of prolific Internet use, a major concern that has emerged among webmasters and web hosts alike is the threat of hacking. Originally referring to the process of learning programming languages and computer systems, the term ‘hacking’ has now evolved to mean the practice of bypassing a computer system/network’s security (used interchangeably with the term ‘cracking,’ depending on the motivation). At any rate, hacking attacks have now become threats that system administrators and webmasters need to guard against. There are five forms of attacks commonly used against computers and networks, according to Aaron Turpen, in his article ‘Hacker Prevention Techniques.’

Read More »

Microsoft fixes 15 flaws with six patches; four considered critical

Microsoft has released its June 2007 security bulletin, which includes six updates: four are designated Critical by the software giant. Two of the patches affect Windows Vista, with one Critical patch specific to Internet Explorer. One of the Important patches affects Microsoft Office. To keep your Windows XP SP1 system secure, update to Windows XP SP2 today. All Microsoft security patches for Windows and Office software are available via Microsoft Update or via the individual bulletins detailed below. MS07-030: Important Entitled “Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (927051),” this bulletin affects users of Microsoft Visio 2002 and Microsoft Visio 2003 but does not affect Microsoft Office Visio 2007, and it addresses the vulnerabilities detailed in CVE-2007-0934 and CVE-2007-0936. Successful exploitation could lead to remote code execution. MS07-031: Critical Entitled “Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution (935840),” this bulletin affects users of …

Read More »

BackTrack – Comprehensive Security Penetration

The are a couple of things that are essential to any hacker’s walk of life. To name a few, there’s the ubiquitous flash drive for data transfer. You have the crossover cable for even faster data transfer. There’s the WiFi antenna for high gain and strong amplification.   Possibly, you might find a video capture card in the computer. Of course, there’s the ubiquitous laptop and desktop computer. But what software is on these computers? Undoubtedly, you will find at least two operating systems, most often Windows and Linux. But with Linux, there are several different distributions. Is there a specific one? With hackers and crackers, there is only one Linux distro out there. It is called Backtrack.

Read More »

Schannel zero-day exploit released

Only hours after Microsoft released a patch for the Windows Schannel Security Package, the researcher who discovered the vulnerability, Thomas Lim of COSEINC, released a public exploit for it. According to Microsoft, the Schannel security package implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page or used an application that makes use of SSL/TLS. In an e-mail to the Full Disclosure mailing list, Lim said that he discovered the vulnerability on August 28, 2006, and reported it to Microsoft on March 19, 2007. Researchers typically, although not always give a vendor time to patch a vulnerability. Once the vulnerability has been patched by the vendor, a researcher may make an exploit public to help system administrators test the patch and to minimize its value on the black market.

Read More »

Protecting Your Data

Introduction to Windows Firewall The introduction of high-speed Internet connectivity has created a powerful and extraordinary computer networking experience. This newfound burst of bandwidth has launched new innovations in information exchange, media access, and other advanced computing experiences. Unfortunately, this technology has also created a very accessible conduit to the internals of your computer. Using these open and available digital pipelines, it’s now easier than ever for hackers, worms, and viruses to attack your unprotected home and home office computers. These threats aren’t exaggerations thrown around by computer industry pundits or descriptions of theoretical worst-case scenarios. A test in my lab found that a computer added onto a previously unconnected cable-modem connection was found by automated hacker tools in three minutes, attacked by an Internet worm in eleven minutes, and it only took five hours before a hacker was running active scans against my computer in an attempt to find …

Read More »