Monday , 20 May 2024
Breaking News

Apple invites Windows users to Safari

The company is inviting Windows users to sample its Safari Web browser and urging third-party developers to try their hand at the iPhone. A beta version of Safari for Windows is available now, CEO Steve Jobs announced during his keynote speech at the company’s 2007 Worldwide Developers Conference. Safari will also allow Web developers to …

Read More »

Using VPN to Avoid Packet Sniffing

Last week on the free ware review, I wrote about the simplicity of packet sniffing and analyzing with Ethereal. I revealed how easy it was for anyone to tap sensitive data like login information, credit card numbers, social security number, and mission-critical emails traveling on the network. As promised, I will reveal how to actually prevent packet-sniffing software from reading your sensitive data. As I previously explained, packet analysis passively listens into a network and then extracts the important data, which is usually in plain text. The key to hampering packet analysis is encrypting that data sent on the network so that it is not read in plain text. The encrypted data that packet analyzers gather is pretty useless without an encryption key. While it is possible for crackers to obtain the key, encryption makes the process a lot longer (and sometimes nearly impossible). There are a couple common ways …

Read More »

Google analytics

I was so excited when Google Analytics was released to the public. At that time, I was a regular reader of ProBlogger.net – helping bloggers earn money. Darren Rowse broke the news to the blogging community that Google Analytics was offering free accounts on a first-come-first served basis. When I finally received my invitation from Google, I immediately added all of my websites to be tracked and painstakingly followed each and every instruction -that is, every instruction except for this one: “It [the source code] should be immediately before the [ending] body tag of your page, and should look exactly as it was provided to you.” Server Slowdowns Why was that important. When I learned JavaScript, I understood that most code belongs in the starting “head” tag so that you can be sure that the code is executed – and I wanted to make sure that this code was executed …

Read More »

Deleted Web Pages with the Google Cache and the Internet Archive

Has this situation ever happened to you? You enter search keywords in Google for a very specific topic. In the resulting screen, you see the title of that perfect article with exactly what you were seeking. Hopeful, you click the link and receive a 404-error message saying that the page does not exist. This scenario sadly happens to everyone countless times. Fortunately, there are two ways to view these once accessible pages. Google Cache One of the features that set Google apart from other search engines is the Google Cache. As the Googlebot indexes web pages into the central database, it also saves the HTML portion. The HTML portion is basically the text and layout without the pictures. When searching in Google, you’ve probably noticed the “Cached” link.

Read More »

The 666 sign

Sebelum Tidur: 6 minggu: selamat bobo sayang, mimpi indah ya, mmmuach. 6 bulan: tolong matiin lampunya, silau nih. 6 tahun : Kesana-an doong… kamu tidur dempet2an kayak mikrolet gini sih?! Pakai Toilet: 6 minggu: ngga apa-apa, kamu duluan deh, aku ngga buru2 koq. 6 bulan: masih lama ngga nih? 6 tahun: brug! brug! brug! (suara pintu digedor), kalo mau tapa di gunung kawi sono!

Read More »

Kisah Selembar Cek

Di sebuah keluarga, tinggallah seorang ayah dengan putra tunggalnya yang sebentar lagi lulus dari perguruan tinggi. Mereka berdua memiliki kesamaan minat yakni mengikuti perkembangan produk otomotif. Suatu hari, saat pameran otomotif berlangsung, mereka berdua pun ke sana.Melihat sambil berandai-andai. Seandainya tabungan si ayah mencukupi, kira-kira mobil apa yang sesuai budget yang akan di beli. Sambil bersenda gurau, sepertinya sungguh-sungguh akan membeli mobil impian mereka.

Read More »

Negeri Orang Bahagia

AKUlah penciptamu. Aku akan turut campur dalam segala permasalahan hidupmu. Ingat, Aku tidak membutuhkan bantuanmu. Jika engkau menghadapi situasi sulit yang tidak bisa engkau pecahkan, masukkan ke kotak SFGTD (something for God to do)-mu. Semua masalah akan terselesaikan, namun bukan menurut ukuran waktumu tapi waktuKU. Sekali engkau masukkan masalah ke dalam kotak SFGTD-mu, engkau tidak perlu lagi melanjutkan kekuatiranmu. Lebih baik engkau terjunkan dirimu melanjutkan peran hidupmu saat ini. Jika engkau terjebak kemacetan, jangan bringas. Karena ada orang-orang yang memang ditetapkan mendahuluimu untuk kepentingan yang mengungkapkannya saja dia sudah tidak mampu. Saat engkau merasa hari-hari di kantormu tidak begitu baik, pikirkanlah orang-orang lain yang keluar dari kantor beberapa tahun lalu

Read More »

Hacking Attacks – How and Why

In this age of prolific Internet use, a major concern that has emerged among webmasters and web hosts alike is the threat of hacking. Originally referring to the process of learning programming languages and computer systems, the term ‘hacking’ has now evolved to mean the practice of bypassing a computer system/network’s security (used interchangeably with the term ‘cracking,’ depending on the motivation). At any rate, hacking attacks have now become threats that system administrators and webmasters need to guard against. There are five forms of attacks commonly used against computers and networks, according to Aaron Turpen, in his article ‘Hacker Prevention Techniques.’

Read More »

Microsoft fixes 15 flaws with six patches; four considered critical

Microsoft has released its June 2007 security bulletin, which includes six updates: four are designated Critical by the software giant. Two of the patches affect Windows Vista, with one Critical patch specific to Internet Explorer. One of the Important patches affects Microsoft Office. To keep your Windows XP SP1 system secure, update to Windows XP SP2 today. All Microsoft security patches for Windows and Office software are available via Microsoft Update or via the individual bulletins detailed below. MS07-030: Important Entitled “Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (927051),” this bulletin affects users of Microsoft Visio 2002 and Microsoft Visio 2003 but does not affect Microsoft Office Visio 2007, and it addresses the vulnerabilities detailed in CVE-2007-0934 and CVE-2007-0936. Successful exploitation could lead to remote code execution. MS07-031: Critical Entitled “Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution (935840),” this bulletin affects users of …

Read More »