Encryption is the “Defense Against the Dark Arts” for the digital world, said Snowden, referencing the class Harry Potter took during his Hogwarts years.
-=WELCOME IN MY BLOG=-
13/03/14
How to Use Edward Snowden’s Three Tips for Digital Privacy
Encryption is the “Defense Against the Dark Arts” for the digital world, said Snowden, referencing the class Harry Potter took during his Hogwarts years.
26/10/11
How to enable the Windows 7 administrator account
A number of Windows 7 users have contacted me about why they cannot access certain files and folders – asking me why they don’t appear to have the permission to delete files and folders is an example. The reason for this is very simple. You don’t have administrator access (which isn’t default on Windows 7 or Vista) as Windows 7 runs most apps with least privilege access (non-admin).You can enable the true or hidden administrator account access by doing the following elevated command prompt: WARNING – THIS DISABLES THE UAC- read more about Managing your Windows 7 User Account Control (UAC).
- Type ‘cmd’ without the quotes into the Start search programs and files box – you should now see ‘cmd’
- Right click ‘cmd’ with your mouse and select ‘Run as Administrator’ – you should now see the command console window
- Type the following command ‘net user administrator / active:yes’ (with spaces but without the quotes) and then press Enter*
- Type ‘net user administrator’ (with spaces but without the quotes) and then press Enter (see next bullet)
- You can check whether the Administrator account is active ‘Account active’ should say ‘Yes’
- Close the ‘cmd’ window by typing ‘exit’ then hit Enter
- You will now need to log off your PC for the change to be applied.
Once you’ve finished editing files and folders I’d suggest:
- You open the command prompt by typing ‘cmd’ into the Start search program and files box (as above)
- Disable the Administrator account using the following command: ‘net user administrator / active:no’ (with spaces but without the quotes)
- Type ‘net user administrator’ (with spaces but without the quotes) and then press Enter (see next bullet)
- You can check whether the Administrator account is active ‘Account active’ should say ‘No’
- Close the ‘cmd’ console window by typing ‘exit’ then hit Enter
- You will now need to log off your PC for the change to be applied.
Membuat psyBNC via shell
Askum n salam sejahtera untuk kita semua 
kali ini ane akan membuat tutor ttg membuat psyBNC
CEKIDOT !!!
1. siapin shell untuk pembuatan psyBNC, n langsung download file psyBNCnya
wget http://buto.webs.com/butopsy.tar.gzkalau sukses akan keluar pesan seperti ini
--2011-10-25 08:47:54-- http://buto.webs.com/butopsy.tar.gz Resolving buto.webs.com... 216.52.115.51 Connecting to buto.webs.com|216.52.115.51|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 142174 (139K) [application/x-tar] Saving to: `butopsy.tar.gz' 0K .......... .......... .......... .......... .......... 36% 254K 0s 50K .......... .......... .......... .......... .......... 72% 377K 0s 100K .......... .......... .......... ........ 100% 298K=0.5s 2011-10-25 08:47:55 (302 KB/s) - `butopsy.tar.gz' saved [142174/142174]![[Image: psy1.png]](http://i842.photobucket.com/albums/zz349/dzhenway/psy1.png)
2. extrak file psyBNCnya
tar -zxvf butopsy.tar.gz![[Image: psy2.png]](http://i842.photobucket.com/albums/zz349/dzhenway/psy2.png)
3. klik dir components, terus dan tulis script dibawah ini
./config 1999angka 1999 adalah port yang bisa diisi terserah saudara
![[Image: psy5.png]](http://i842.photobucket.com/albums/zz349/dzhenway/psy5.png)
jika sukses maka keluar pesan seperti ini
PSYBNC.SYSTEM.PORT1=1999 PSYBNC.SYSTEM.HOST1=* PSYBNC.HOSTALLOWS.ENTRY0=*;*4. selanjutnya kita jalankan dengan mengetik script dibawah ini
./run![[Image: psy7.png]](http://i842.photobucket.com/albums/zz349/dzhenway/psy7.png)
5. next kita buka MIRC dan ketikkan script dibawah ini
/s [hostname] [port psyBNC]catatan : hostname diisi mengikuti IP shell kita
![[Image: psy8.png]](http://i842.photobucket.com/albums/zz349/dzhenway/psy8.png)
6. terus kita masukkan password untuk psyBNC kita
/QUOTE PASS passwordcatatan : script tergantung dari command psyBNC sendiri
![[Image: psy9.png]](http://i842.photobucket.com/albums/zz349/dzhenway/psy9.png)
7. menambahkan server kepada psyBNC kita
/addserver irc.*****.org:6667![[Image: psy11.png]](http://i842.photobucket.com/albums/zz349/dzhenway/psy11.png)
jika sukses maka akan seperti gambar dibawah ini
![[Image: psy12.png]](http://i842.photobucket.com/albums/zz349/dzhenway/psy12.png)
8. dan pada akhirnya nick kita akan terus join 24 jam penuh dalam seminggu (itupun kalau shellnya or file psyBNC tidak dihapus)
sekian tutor pembuatan psyBNC via shell dari ane
akhir kata wassalam
Read More...
21/10/11
Metasploit 4.1 And Armitage: What's New? [video]
11/10/11
Panduan Lengkap Menginstal Ubuntu 10.10 Maverick Meerkat

Ubuntu – Telah kita ketahui bahwa pada 10 Oktober lalu Canonical secara resmi meluncurkan sistem operasi terbaru mereka Ubuntu 10.10 Maverick Meerkat.
Update dan fitur-fitur baru telah disertakan bersamanya. Installer yang telah diperbarui, penggantian default font dengan font baru yang dikenal dengan Ubuntu Font Familly, pembaruan dan penyempurnaan Unity pada Ubuntu 10.10 netbook remix merupakan sedikit contoh fitur yang disertakan pada rilis Maverick Meerkat tersebut.
Tutorial berikut ditujukan bagi mereka yang baru mengenal atau ingin mengenal dan mencoba merasakan Ubuntu 10.10 sebagai sistem pada komputer yang digunakan atau bahkan bagi mereka yang belum pernah menginstal Ubuntu sebelumnya.
Hal-hal yang perlu Anda persiapkan sebelum proses instalasi adalah memastikan bahwa komputer yang akan digunakan dapat melakukan booting dari CD/DVD drive. Hidupkan komputer Anda lalu tekan F8, F11 atau tombol F12 (bergantung pada BIOS Anda) untuk mengatur CD/DVD-ROM sebagai media booting pertama kali.
Anda juga memerlukan sebuah CD/DVD installer Ubuntu 10.10 yang sesuai dengan arsitektur yang digunakan (i386 atau amd64), jika belum memilikinya, Anda dapat mendownload terlebih dahulu melalui link download Ubuntu 10.10 yang kami sediakan pada artikel ini. Setelah installer berhasil di-download, silahkan bakar file ISO yang didapatkan dengan aplikasi pembakar CD/DVD seperti Nero, CDBurnerXP, Roxio atau aplikasi lain yang Anda sukai pada CD kosong dengan kecepatan 8x.
Setelah semua perangkat yang dibutuhkan siap dan Anda telah memahami risiko yang mungkin terjadi jika ada kesalahan, langsung saja kita mulai peroses instalasi Ubuntu 10.10 Maverick Meerkat.
Masukkan CD/DVD installer Ubuntu 10.10 kedalam CD/DVD drive lalu restart komputer Anda. Tunggulah beberapa saat hingga installer Ubuntu selesai diload…

Catatan: Bagi Anda yang belum ingin mengistal Ubuntu 10.10 namun ingin mencoba merasakan sistem operasi ini, klik tombol “Try Ubuntu” untuk menjalankan Ubuntu 10.10 sebagai Live CD.


Mengalokasikan drive space

Catatan: Ingat bahwa, setelah proses instalasi, boot loader Windows akan ditimpa oleh boot loader Ubuntu!!!.
2. Erase and use the entire disk – Menghapus dan menggunakan seluruh hardisk
Pilih opsi ini jika Anda ingin menghapus sistem operasi yang telah ada atau hardisk masih kosong dan Anda ingin membiarkan installer secara otomatis mempartisi hardisk. Ini adalah opsi yang disarankan untuk semua pengguna, khususnya bagi mereka yang ingin sistem operasi tunggal pada komputernya.
3. Specify partitions manually (advanced) – Menentukan partisi secara manual (untuk tingkat mahir).
Pilihan ini direkomendasikan HANYA untuk pengguna tingkat lanjut untuk membuat partisi khusus atau memformat hardisk dengan file system lain dari yang telah ditentukan. Cara ini juga dapat digunakan untuk membuat partisi /home secara terpisah yang sangat berguna jika kelak Anda menginstal ulang seluruh sistem.
Berikut adalah cara mempartisi manual:
- Pilih “Specify partitions manually (advanced)” lalu klik tombol “Forward”;
- Pastikan bahwa hardisk yang dipilih telah benar. “/dev/sda” adalah hardisk pertama. “/dev/sdb” adalah hardisk kedua pada komputer Anda. Jadi, pastikan bahwa Anda tahu mana yang ingin Anda format! Jika tidak, Anda akan kehilangan SEMUA DATA yang ada didalamnya!!!;
- Kami asumsikan hardisk yang Anda pilih adalah kosong (tidak ada sistem operasi lain atau data penting didalamnya) tetapi telah memiliki beberapa partisi. Pilih salah satu partisi tersebut lalu klik tombol “Delete”. Lakukan langkah ini untuk partisi lain pada hardisk yang telah dipilih hingga semua partisi dihapus dan Anda memiliki sebuah “free space” tunggal;
- Pilih pada ruang kosong tersebut, klik tombol “Add”. Pada jendela baru, masukkan nilai 2048 dalam kotak “New partition size in megabytes” lalu pilih opsi “swap area” pada menu dropdown “Use as”. Klik tombol OK, dalam beberapa detik Anda akan melihat sebuah partisi “swap” sesuai dengan ukuran yang telah ditetapkan;
- Pilih pada ruang kosong yang masih ada, klik tombol “Add”. Pada jendela baru, pilih opsi “Primary”, masukkan nilai antara 10.000 sampai 50.000 dalam kotak “New partition size in megabytes” lalu pilih “/” pada menu dropdown “Mount point”. Klik tombol OK, dalam beberapa detik Anda akan melihat sebuah partisi “ext4 /” sesuai dengan ukuran yang telah ditentukan;
- Pilih pada ruang kosong yang masih ada, klik tombol “Add”. Pada jendela baru, pilih opsi “Primary”, masukkan nilai antara 30.000 sampai 50.000 (atau seberapapun sisa ruang hardisk yang masih ada) dalam kotak “New partition size in megabytes” lalu pilih “/home” pada menu dropdown “Mount point”. Klik tombol OK, dalam beberapa detik Anda akan melihat sebuah partisi “ext4 /home” sesuai dengan ukuran yang telah Anda tentukan.


Layar ini akan menampilkan peta bumi. Setelah memilih lokasi tempat tinggal Anda, waktu sistem akan disesuaikan secara otomatis. Anda dapat menentukan lokasi Anda dengan meng-klik pada peta atau cukup ketik nama kota dalam kotak dibawahnya. Klik tombol “Forward” setelah Anda menentukan lokasi yang diinginkan…


Masih pada langkah ini, ada sebuah opsi bernama “Log in automatically”. Jika Anda memilih opsi itu, Anda akan secara otomatis login ke desktop Ubuntu.
Opsi lainnya, “Encrypt my home folder”, ini akan mengenkripsi instalasi Ubuntu (jika Anda tidak tahu manfaatnya, sebaiknya jangan aktifkan opsi ini). Klik tombol “Forward” untuk melanjutkan…






How to access your BIOS set up
Depending on your computer model, the way you will access your BIOS set up menu will differ. Here is a list of the most common models used and the access key used for this process.
ACER
You can make use of the DEL or F2 keys after switching on your system.
When using Acer Altos 600 server, the BIOS set up can be accessed by pressing the CTRL+ALT+ESC keys.
COMPAQ
Ensure that the cursor in the upper right corner of your screen is blinking before pressing the F10 key.
Previous versions of Compaq will make use of the F1, F2, F10 or DEL keys to grant access to your BIOS set up menu. DELL
After switching on your computer, let the DELL logo appear before pressing the F2 key until Entering Setup is displayed on the screen.
Previous versions of DELL might require to press CTRL+ALT+ENTER to access the BIOS set up menu.
The DELL laptops will use the Fn+ESC or Fn+F1 keys to access the BIOS set up.
GATEWAY
When switching on your computer, press the F1 key until the BIOS screen shows up.
Previous versions of Gateway will make use of the F2 key to display the BIOS set up screen.
HEWLETT-PACKARD
When switching on your computer system, press the F1 key to access the BIOS set up screen
For those using an HP Tablet PC, you can press the F10 or F12 keys.
You can also access the BIOS set up menu by pressing the F2 or ESC keys.
IBM
When your system restarting, press the F1 key to access the BIOS set up.
Previous IBM models will require the use of the F2 key to access the BIOS set up utility.
NEC
NEC will only use the F2 key to access the BIOS set up menu
PACKARD BELL
Packard Bell users, you can access the BIOS set up by pressing the F1, F2 or DEL keys
SHARP
For the Sharp model, when your computer is loading, press the F2 key
For previous Sharp models, you will need to use a Setup Diagnostics Disk.
SONY
Sony users will have to press the F1, F2 or F3 key after switching on their computer.
TOSHIBA
The Toshiba model will require its users to press the F1 or ESC key after switching on their computer to be able to access BIOS set up menu.
Read More...
05/10/11
17/09/11
Massive Code Change for New DroidDreamLight Variant
We saw several key developments in the new variant of DroidDreamLight, which we were able to analyze earlier this month. This new variant, found in a China-based 3rd party application store, comes off as applications such as a battery monitoring tool, task listing tool, and an application that lists the permissions used by installed applications. Please note though that the apps are in English, so potential victims are not limited to users who understand Chinese.
For one, there were major changes in its code:

Another important update is the addition of information theft routines. Based on our analysis, this new variant can steal certain information from the device, such as:
- SMS messages (inbox and outbox)
- Call log (incoming and outgoing)
- Contacts list
- Information related to Google accounts stored in the device

Stolen information is stored and compressed in the /data/data/%package name%/files directory, and then uploaded to another URL, that is also contained in a configuration file.
Just like with previous variants, it also connects to a URL in the configuration file and then uploads other information about the infected device:
- Phone model
- Language setting
- Country
- IMEI
- IMSI
- SDK version
- Package name of the malicious application
- Information about installed applications

Also, based on its code, this malware has the ability to insert messages in the inbox of the affected device, with the sender and message body specified by the attacker, as well as the ability to send messages to numbers in the contacts list.
Furthermore, this new variant also has codes that can check if the affected device has been rooted by checking for certain files. We found that this malware can install and uninstall packages if the device is rooted, although there is currently no code in the body that calls these methods.
Users can check their phone if they are infected by going to Settings>Applications>Running Services and look for the service called “CelebrateService”

This Android malware is now detected as AndroidOS_DORDRAE.N.
For more information on Android threats, users check our Android threats infograph as well as our ebook “5 Simple Steps to Secure Your Android-Based Smartphones.”
nb : trendmicro Read More...
SpyEye targeting Android users - just a copy of Zeus's strategy?
In the world of Windows malware, SpyEye is a widely spread malicious toolkit for creating and managing botnets designed primarily for stealing banking credentials and other confidential information from infected systems.SpyEye is a major competitor of infamous Zeus toolkit. Zeus (also known as ZBot) generated a lot of interest in the mobile security community a couple of months ago when an Android version was discovered.
Of course, we did not have to wait for too long before a version of SpyEye targeting Android was also developed, and sure enough a malicious SpyEye Android app was discovered a few days ago.
The functionality of Zeus and SpyEye on Windows is quite similar, so I was curious as to how similar their respective Android versions would be.
Zeus for Android purports to be a version of Trusteer Rapport security software. This social engineering trick is used in an attempt to convince the user that the application they are installing is legitimate.
SpyEye for Android, now detected by Sophos products as Andr/Spitmo-A, uses a slightly different but similar social engineering technique.
When the user of a PC infected by the Windows version of SpyEye visits a targeted banking website, and when the site is using mobile transaction authorization numbers, the SpyEye Trojan may inject HTML content which will instruct the user to download and install the Android program to be used for transaction authorisation.
The SpyEye application package does not include an icon which would be displayed in the "All apps" menu, and the user will only be able to find the package when the "Manage Applications" is launched from the mobile device's settings.
The application uses the display name "System" so that it seems like a standard Android system application.

When installed, Zeus for Android displayed a fake activation screen, and Spitmo is again very similar.
However, Spitmo uses different tactics to reinforce user's opinion that it is a legitimate application.
It applies for the following permissions Android permission:
<action name="android.provider.Telephony.SMS_RECEIVED" />
<action name="android.intent.action.NEW_OUTGOING_CALL" />
This allows the malware to intercept outgoing phone calls.When a number is dialed, the call is intercepted before the connection is made and the dialed phone number is matched to a special number specified by the attacker in the alleged helper application installation instructions.
If the number matches, Spitmo displays a fake activation number, which is always 251340.

Once installed, the functionality of Zeus and SpyEye are pretty much the same.
A broadcast receiver intercepts all received SMS text messages and sends them to a command and control server using an HTTP POST request. The submitted information includes the sender's number and the full content of the message.
So far, it does not seem that this attack is widespread, but it shows that the developers of major malicious toolkits are closely watching their competition and matching the latest features.
It also seems that support for Android is increasingly becoming an important part of their product strategy.
nb : nakedsecurity.sophos
15/09/11
Protect Yourself From Phishing
Most of us are familiar with the word Phishing.For those who are new to this term Phishing,i am going to first explain to you the concept of word phishing.
PHISHING:
Phishing is a technique that is used by some malicious hackers to acquire some sensitive information like Passwords,Bank Id’s and some very important login details of various accounts. This word sounds like the word “Fishing” and is quite similar to the technique of fishing,as in fishing the fisherman hooks a bait pretending to be a real food so that he can fool the fishes in the pond and as soon as the fish comes for the bait it gets hooked and gets caught.Same is the case with phishing that is used over internet by the users to trap people through fake login pages that are designed by them or are available on net.The attackers creates a fake or duplicate page of a genuine website like any social site or any bank account page,and then he will set the trap by sending a mail to the prey(user) and waits for the user to fall in that trap and as soon as the user enters his/her details they are caught i.e the login details are send to the attacker and he know has the access of their sensitive information,it may be an account of social networking site or any bank account details.Phishing technique is basically done through Email spoofing(means sending anonymous mail) and also through instant messaging.Phishing requires social engineering skills i.e how you can pretend to be a genuine person to the user whom you want to attack.This technique has caused a lot of problem for users who are easily trapped in these types of Phishing attacks,it has caused real big damages to the user’s.
After all the problems that were caused by the Phishing attacks,came the concept of Anti-Phishing i.e how you can protect yourself from getting caught in these types of attacks.These are some simple techniques that you can easily remember and save yourself from getting attacked by the malicious users.
ANTI-PHISHING TECHNIQUES:
1.Social Awareness:
One of the important technique is to create social awareness among the people about these types of phishing techniques so that the users browsing the internet can know about these types of attacks that are being carried by some users and thus they will become more cautious while browsing.This is quite necessary because most of the users do not even know about these types of attacks and thus they can easily fell into the traps set by the malicious users.2.Technical awareness:
Technical awareness includes the ability to identify between the fake website pages from the legit websites.If you are smart enough than you can easily differentiate between a legit and a fake website.The user can easily pick up the fake website page from the url itself,as most the urls that are used for phishing are different from the original url of a website,if you can recognize the legit page url ,than you will be easily able to differentiate between fake and legit pages.But these days attackers have developed some new techniques through which they make the url so much complicated that it’s quite difficult to differentiate between the fake an legit site,but nowadays many browsers like internet explorer has developed a new technique in which the domain name is highlighted with black color and all other details with light brown color so that the user will be easily able to look into the domain name of the page and identify the page.
3. E-mail authentication:
This is quite an important technique if you want to save yourself from phishing.Most of the phishing technique rely on email systems i.e the attacker will send you an email pretending to be a genuine company or a site administrator which will contain a link that will redirect you to a page that would look legit to you.Now how will you come to know that whether the email is secure or it’s fake.Some companies or websites have some special notations or signs that are not available to phishers and thus if you feel any difference in the email language then do not trust the email.There is always a contact information given in the email you can use it to authenticate the email,whether it’s legit or not.Now most of you might be thinking that the fake Email’s are automatically send into the spam folder in your mail system,but this is not true.Today the users have developed so many new techniques that email the best email system will not be able to differentiate between the spam and regular email.So do not get fooled by this thing that fake email’s are send to the Spam folder. I am telling this you from my own personal experience and it’s 100% true.
If you follow these techniques then there is no chance of you falling in such traps.Do tell me about your views on this topic.
nb : techbugs Read More...
![[+]d'ZheNwaY's Blog[+]](http://feeds.feedburner.com/blogspot/YRtWp.1.gif)





