Tuesday , 16 April 2024
Home 4 Internet (page 7)

Internet

American Customers To Get Free Domain Names

Dot TK, the only online service to offer free Web domain names, today announced one-of-a-kind service to customers in the United States. Dot TK will make its official debut at ad:tech San Francisco from April 25 to 26. Since its inception in 2005, Dot TK has added more than 1.6 million registered domain names and …

Read More »

Opera 9.2 Menampilkan Fitur “Speed Dial”

“Speed Dial”, sebuah fungsi yang awalnya hanya ada pada browser Opera untuk telepon genggam, sekarang juga dimasukkan kedalam browser Opera untuk PC, Opera 9.2. Speed Dial adalah fitur yang memungkinkan pengguna untuk melihat “snapshot” fungsional untuk situs – situs berlainan (maksimal 9 situs). Lebih jelasnya, dengan fitur speed dial user bisa melihat 9 situs berlainan dalam 1 layar secara bersamaan, sehingga user langsung bisa melihat apakah mereka sudah diupdate atau belum. Untuk meload situs tersebut secara penuh, user hanya perlu mengklik window dari situs tersebut atau memasukkan nomor windownya kedalam search bar. Browser Opera 9.2 bisa didownload secara gratis lewat situs resmi Opera

Read More »

Are Viruses, Malware Winning The Security Battle?

Virus programmers seem to know no limits when it comes to creative ways of make the internet unsafe. Rootkits, originally programs designed to help computer administrators, are the [more] current bugbear for security firms trying to prevent them from sneaking worms, trojans, and viruses past anti-virus programs. There is no stock recipe for detecting malware. Virus authors work hard to stay ahead ahead of their pursuers. To close that gap, most anti-virus programs perform what are known as heuristic scans to look for general virus behaviour patterns. Firewall software is recommended as an additional security measure. This allows the computer user to at least partially control what is being sent and received by his computer. At minimum, the Windows firewall function should be activated. “One in three computers is insufficiently protected,” says Christoph Fischer, general manager at VFK EDV-Consulting, a Karlsruhe-based IT security firm. Many users fail to perform regular …

Read More »

DDoS: the rise from obscurity

Six years ago, a flurry of high-profile news articles and research papers reported on the emergence of DDoS attacks. Research released by Arbor Networks at the end of September revealed that DDoS attacks are the most significant security threat facing ISPs today. Arbor’s Worldwide Infrastructure Security Report, a survey conducted in cooperation with the security operations community of the major ISPs, revealed that 46% of surveyed operators now dedicate more resources to addressing DDoS issues than any other security threat. Respondents also reported a continued growth in the frequency and magnitude of DDoS attacks. ISPs now regularly experience attacks beyond the capacity of core backbone circuits in the 10–20Gbps range. This trend has been driven globally by a proliferation of broadband Internet connectivity and network convergence. The rise in DDoS attacks reflects a change in the motivation of cyber criminals – Internet-based threats have taken on a more malevolent and …

Read More »

Microsoft Forefront Client Security Overview

Microsoft Forefront Client Security provides unified malware protection for business desktops, laptops and server operating systems that is easy to manage and control. Built on the same highly successful Microsoft protection technology already used by millions of people worldwide, Forefront Client Security helps guard against emerging threats such as spyware and rootkits, as well as traditional threats such as viruses, worms, and Trojan horses. By delivering simplified administration through central management and providing critical visibility into threats and vulnerabilities, Forefront Client Security helps you protect your business with confidence and efficiency. Forefront Client Security integrates with your existing infrastructure software, such as Active Directory , and complements other Microsoft security technologies for enhanced protection and greater control. Forefront Client Security is currently in public beta and can be downloaded from the Microsoft Forefront Client Security Web site. There are two parts to the Microsoft Forefront Client Security solution. The first …

Read More »

Garis besar model usaha di Internet

Untuk melihat berbagai kesempatan usaha yang ada di Internet ada baiknya kita melihat sebuah model sederhana dari bisnis / aplikasi Internet & telekomunikasi. Bagi pembaca yang masih pemula salah satu situs yang menerangkan secara sederhana tentang Internet adalah http://www.learnthenet.com. Prinsip dasar dari usaha Internet yang sering disebut sebagai dotcom company sebetulnya tidak rumit bahkan sederhana sekali; yaitu bagaimana caranya supaya kita (dotcom) dapat memberikan manfaat sebanyak / sebesar mungkin kepada masyarakat. Semakin banyak masyarakat yang merasakan manfaatnya maka akan kemungkinan untuk survive akan semakin tinggi. Dalam bahasa politiknya berusaha untuk memperoleh massa real sebanyak-banyak-nya untuk survive; massa mengambang tidak bisa menjamin kelanggengan kita dalam usaha di Internet. Massa orang Indonesia di Internet pada hari ini masih 1.5 juta orang oleh karena itu perlu usaha kerja keras sebuah dotcom untuk survive. Bayangkan jika kita bisa menyambungkan konsentrasi massa yang ada di Indonesia terutama di dunia pendidikan karena Internet sangat erat hubungannya …

Read More »

Penggunaan Cookie terhadap Privacy User

Inti utama dalam permasalahan keamanan privacy di Internet adalah adanya kegiatan-kegiatan gelap dalam suatu Web Site yang pada umumnya tidak diketahui oleh user dalam mengumpuli informasi secara personal untuk melakukan pencurian dengan menggunakan teknologi yang disebut dengan “Cookie ”. Ini merupakan suatu tindakan yang tidak merusak secara teknologi dimana memungkinkan sebuah web site dapat mengumpulkan informasi mengenai user dan semua kelakuan browsing-nya pada internet. Karena adanya Cookie maka user seharusnya dapat menghilangkan atau menolak semua Cookie yang akan ditempatkan pada browser, ini dapat dilakukan dengan mengetahui bagaimana kerja dari Cookie dan bagaimana kita dapat menjaga kinerja browser kita tanpa Cookie tersebut. Cookie diciptakan oleh Netscape pada tahun 1994 yang diharapkan dapat menjadi suatu desain mengenai solusi teknis untuk membuat user lebih tahu mengenai Web dengan baik. Cookie adalah sebuah text file dengan ukuran maksimum 4k yang diletakkan pada server dalam sebuah hard disk user. Cookie diletakkan pada informasi HTML yang …

Read More »

Look how easy setup is for Exchange Server 2007

Does this sound familiar? You decide to deploy Microsoft Exchange Server 2007 and you’re ready to get started. You think “A deployment guide would be helpful,” so you visit the Microsoft Exchange Server TechCenter. After searching for deployment content, you find a link to download a document called Deploying a Standard Exchange Server 2007 Organization. Sounds like just the thing to get you started! After downloading the document, you scroll through the table of contents. Sixteen pages later, ah, here it is: the opening paragraph. You glance toward the bottom of your screen and see that you are on page 17…of 552! What? It takes 552 pages to describe something that is called “standard”? Reading more here

Read More »

Kaspersky Reports First “Proof Of Concept” iPod Virus

According to a press statement posted on its website, Kaspersky Lab has discovered the first virus designed to infect iPod portable media players. The virus, which has been named Podloso, is a proof of concept program which does not pose a real threat. Security researchers use such malware to demonstrate vulnerabilities and potential attack vectors, but lack any payload. The virus is a file which can be launched and run on an iPod. It should be stressed that in order for the virus to function, Linux has to be installed on the iPod. If the virus is installed on the iPod by the user, the virus then installs itself to the folder which contains program demo versions. Podloso cannot be launched automatically without user involvement. Once launched, the virus scans the device’s hard disk and infects all executable .elf format files. Any attempt to launch these files will cause the …

Read More »