AddDir.info Web link Directory A List Directory All Direct Links Web Directory - All Sites Sorted All The List Directory AZ Links Directory Add Your Link - Free Web Directory - Suggest URL BZZU Search Directory BZZU Search Directory BZZU Search Directory Internet Number One Directory Information Internet Number One Directory Information Directory Bin

Kabar Terbaru!!!

Latest News!!!

Your Ad Here

Sabtu, 30 Januari 2010

How to Know if You Have Spyware on Your Computer

Do you think someone is spying on your internet activity? Though Norton or McAfee might be able to locate spyware, some may be so well-written as to escape detection. In any case, downloading more software willy-nilly in an attempt to protect your computer is more likely to make things worse. Here are some steps a Microsoft Windows user can take to detect spyware activity; Macintosh OS/X, Linux, and users of other operating systems will have similar but different methods available.

1. Press Ctrl-Alt-Del (all 3 keys simultaneously, known as a "three-finger salute"). This should pop up the Task Manager, or whatever Microsoft is calling it lately. One of the tabs should be Processes; click that tab.

Ads by Google
Computer Monitoring Tests
Find software that fits your needs. Research made easy with our reviews
WellResearchedReviews.com/Monitor

1. Look up every process name on the Internet. Don't trust all the information that you find, but try to get a general consensus from the more reliable sites whether that process name is likely to be malevolent or not.
2. Even if a process name is normal and expected (like svchost.exe), it's still possible that a "hacker" was able to overwrite the normal system process with a tainted one.
3. If a process looks suspicious, for example u-r-0wn3d.exe, you will need to attempt removal. See Tips for ideas on that process.
2.
1. Open a command window, also known as a "DOS box", by clicking Start | Run | cmd, or Start | Run | command on older systems. Type in the command: netstat -an. This will show you a list of systems you have connected to, and systems connected to you, and all "listening" ports. Learn the port numbers: 80 and 443 are typical for the "web"; 135, 139, and 445 are for Microsoft networks; find out what they all mean. If you see something suspicious, netstat -anbv might show you what process is doing the communication.

Ads by Google
Waste water process
New Wastewater Treatment Technology At Higher Performance & Lower Cost!
All-About-Wastewater-Treatment.com
Remote Desktop Monitoring
Remote monitor any distant PC. Works through any Firewall.
www.TeamViewer.com
DDos protection service
5 days absolutely free, Pay by LR Both Normal and Offshore
center.theupcomings.com

edit Tips

* More important than any firewall or security software is your creation of a Limited account from which you do all your normal Internet activity. Only use an Administrative account to install specific software that you have downloaded from a trusted website from your Limited account.

Ads by Google
Patriot Systems
Alarm Monitoring Software for Central Station Automation
www.patriotsystems.com
* All software should be considered "guilty" until proven "innocent". Some so-called "hackers" manage to get their malware onto distribution CDs of commercial software. Don't install any software unless you absolutely need it, and then do some web searches to see what other people have reported about that software.
* Once your computer has been compromised, even after you have eliminated the spyware you will have to change all your passwords to every account you access via your computer; it's better to assume the spy has all your passwords.
* The firewall is an important defense, but in many cases it will not detect the spy's uploading of data, if it is sent as an email or uploaded to a web page, since in most cases you won't want to restrict your access to email or the web.
* If a suspicious process is found, and stopping the process from the Task Manager does not visibly affect your ability to use the computer, it may be wise to attempt to quarantine the file. Locate it using Start | Search, and create a folder like C:\evil in which to store it: right-click the suspicious file, select "cut", then right-click the "evil" folder, and select "paste". If you later find it's innocuous, or even vital to the use of your computer, you can put it back where it belongs; keep a record of what goes where.
* On some systems, msconfig will help with this process, by letting you change startup options and other system configurations. If a process in StartUp has no name, or is located in \Windows\temp, it is highly suspicious.

edit Warnings

* Sometimes your firewall will flag on things such as "Windows XP is trying to update" that's okay. But if you see something you are not familiar with or looks suspicious then you can go ahead and block it. In fact, you can temporarily block anything until you know for sure if it is okay or not.
* In many cases, malicious software writers will have several alternative means of starting and reinstalling their viruses and spyware. If you don't get them all, the "evil" software will return; and in some cases it will erase your hard drive in retaliation. It's best to back up all important data to CD-R, CD-RW, or DVD before attempting spyware removal.
* There is no surefire way of detecting a compromised system; some methods are diabolically well hidden. Also, your country's government very likely has ways of monitoring all network activity (like the NSA in the United States), so it's wise to always assume someone is watching.


Source: www.wikihow.com

Read more!

How to Block Spyware

Spyware refers to software that is installed on a computer, without knowledge of the user. It can be used to track and monitor computer use to send to third parties for marketing purposes. Spyware programs can be a nuisance, as they can take up computer processing capacity, collect personal information and send pop up advertisements without permission. Through key loggers or taking screen captures or scanning hard drives, spyware can maliciously take personal information for criminal gain. There are several steps you can take to block spyware from your computer.

1.Be careful when you download. Knowing what you are downloading and from what site is an important measure when it comes to blocking spyware. Many spyware programs are downloaded unknowingly when you download other software. You should always read the End User License Agreement as sometimes spyware programs are allowed access through third party advertisements when you click to accept the software you are downloading.

Ads by Google
Computer Monitoring Guide
Top surveillance software tested. Unbiased reviews. Full comparisons.
WellResearchedReviews.com/Monitor

2. Avoid peer-to-peer file sharing. This is another common way for spyware to enter your computer. Peer-to-peer file sharing is risky, as the content of the other person’s computer is unknown and viruses and spyware can be spread this way. The best way to block spyware is to prevent possibilities for it to get on your computer.

3. Use add-ons on your Internet browser. Internet browsers such as Firefox, Opera or Internet Explorer have add-ons that block pop up ads from appearing while you surf. This is also another important measure in preventing spyware, as clicking on pop up ads can inadvertently lead to spyware downloads on your computer.

4. Install anti-spyware software.

* Read reviews on anti-spyware software. Descriptions and user reviews are posted on many consumer reviews sites. One of the things you will want to consider in your search for an anti-spyware software is the scanning speed, which is how quickly it can scan through your entire hard drive to detect spyware and viruses. You will want to compare accuracy, which is the software’s ability to filter out legitimate programs versus actual spyware sites or programs. You will also want to know how frequently the software updates their software when there are known new spyware and virus attacks and consider the technical support offered with your anti-spyware software.
* Find freeware or shareware. There are a number of freeware and shareware sites that offer free anti-spyware. These will be more limited than commercial software programs, but can provide you with adequate protection from spyware. Make sure that the site that you downloading from is reputable.
* Buy commercial software. Alternatively, you can buy commercial anti-spyware software. Most commercial anti-spyware software is bundled with anti-virus software programs.
* Check for updates frequently. Even with anti-spyware software installed on your computer, you will want to check periodically for updates from the software manufacturer as new spyware and adware viruses are developed. These updates will protect you from the latest spyware programs.

5. Keep your operating system up to date. Keeping your computer’s operating system up-to-date is important in preventing spyware or viruses from your computer. Operating system security patches are released often from the manufacturers that can fix holes in your system that hackers and spyware can break through. Make sure that your operating system is the latest version released from the manufacturer. Most operating systems will automatically check for updates periodically.


Source: www.wikihow.com

Read more!

How to stop spam

In the Internet age, not only are you fighting junk mail in your mailbox, but you've also got exorbitant amounts of spam in your virtual inbox. Not only are they annoying, but these e-mails can introduce viruses and spyware into your computer. While there are several different ways to combat spam, here's a start.

1. Stop posting your e-mail address on a public forum or website. It is estimated that 95% of all junk e-mail is caused by a person publicly disclosing his or her e-mail address. There are many robots and scripts that automatically scan websites for e-mail addresses. Also, sometimes humans actually grab e-mails off websites to use them for sign-up offers in order to get free stuff (iPods, Ringtones,Televisions, etc.). If you must provide contact information, try writing it out in creative ways such as Me ~at~ yahoo ~dotcom~. There are alternative ways of displaying your email address while making it hard for spambots to harvest it. Such methods include using image picture of your email address or using Javascript to dynamic construct the display of your email.

Ads by Google
MS Exchange Spam Firewall
A simple plug in appliance that protects your Exchange Server
www.barracudanetworks.com

2. Avoid:

* Popular newsgroups - robots often scour these lists for addresses
* Software like BonzaiBuddy or similar programs - if these companies don’t immediately sell your information to a spam company, they are subsidiaries of spam companies themselves and the software is spyware
* Chat rooms like Yahoo Chat or IRC - spammers or spambots are actively mining in popular chat rooms like AOL and Yahoo chats, where e-mail addresses can be correctly guessed just by adding the proper@whatever.com to the username of a chat room visitor

3. Use spam blocking tools. Most webmail providers offer them, or you can download one.

* Use the "This is spam" button if your email provider has one. This submits the email to their spam-control people who can take care of business and improve their anti-spam filters.
* If you have a Yahoo! account you can use their discardable addresses method
* Use Spam Gourmet, or others like it, with any email account
* If you are using MS Outlook, try installing a spam filtering plugin, for example SpamAid
* Use the 'Block' list and add the spammer's domain name only. (However, this may not be that effective, since spammers normally only use temporary addresses.)
* Limit incoming e-mails to those in your address book and have all others put into a "Junk" folder, which you can skim through quickly and clear regularly.

4. Report spam. Before you delete your spam, forward your spam to: spam@uce.gov as this is the Spam box for FTC (Federal Trade Commission). Mail sent to this box is investigated. If it is indeed spam, the original sender can be charge $500 per email. The more mail they get from different users but same spammer, the more it's likely to be investigated.

5. Be crafty when filling out forms that ask for your e-mail address. Many web forms ask only for your name and email address. Put in a series of letters such as Swseqw for your name. Then set up a filter so emails from that newsletter or form will arrive in a separate folder if the email contains that fake name. If that e-mail turns out to be spam, set your mail program to delete all e-mails that come in with the fake name.

6. Use disposable addresses to identify and shake off sources of spam. Have one main account, and never, ever give this address to anyone, even your friends, who all they need to do is send you an innocent e-card to get you on a spam mailing list.

* Make a separate account for different purposes (one for friends, one for entertainment sites, one for your financial websites, etc.) If you use a lot, write down which is which so you don't forget.
* Set all those addresses to forward the mail to your main account so that you don't have to check multiple accounts.
* If you start receiving spam through one of your alternates, you can trace it to one of your disposable addresses and simply delete that account.
* Track which groups of recipients return the most spam and be more selective.


Source: www.wikihow.com

Read more!

How to Become a Hacker

There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’.

There is another group of people who loudly call themselves hackers, but aren't. These are people who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer.

There are people who apply the true hacker attitude to other things, like electronics or music — but in the rest of this article we will focus the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.

# Adopt the mindset of a hacker. Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude. So, if you want to be a hacker, repeat the following things until you believe them:

Ads by Google
Parallel Computer
The latest news & breakthroughs in parallel computing. Visit today!
www.ddj.com/Go-Parallel

* The world is full of fascinating problems waiting to be solved. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.
* No problem should ever have to be solved twice. The thinking time of other hackers is precious — so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.
* Boredom and drudgery are evil. When hackers are bored or have to drudge at stupid repetitive work, they aren't doing what only they can do — solve new problems. To behave like a hacker, you have to want to automate away the boring bits as much as possible.
* Freedom is good. The authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers. Not all authority figures are authoritarian, however; authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing.
* Attitude is no substitute for competence. Hackers won't let posers waste their time, but they worship competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.

#
2
Learn how to program. The best way to learn is to read some stuff written by masters of the form, write some things yourself, read a lot more, write a little more, read a lot more, write some more, and repeat until your writing begins to develop the kind of strength and economy you see in your models. To be a real hacker, however, you need to get to the point where you can learn a new language in days by relating what's in the manual to what you already know. This means you should learn several very different languages. Besides being the most important hacking languages, the following represent very different approaches to programming, and each will educate you in valuable ways.

* Python is a good language to start off with because it's cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well suited for large projects. Java is an alternative, but its value as a first programming language has been questioned.[1]
* If you get into serious programming, you will have to learn C, the core language of Unix (C++ is very closely related to C; if you know one, learning the other will not be difficult). C is very efficient with your machine's resources, but will soak up huge amounts of your time on debugging and is often avoided for that reason (unless machine efficiency is essential).
* Perl is worth learning for practical reasons; it's very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl to avoid C programming on jobs that don't require C's machine efficiency.
* LISP is worth learning for a different reason — the profound enlightenment experience you will have when you finally get it. That experience will make you a better programmer for the rest of your days, even if you never actually use LISP itself a lot. You can get some beginning experience with LISP fairly easily by writing and modifying editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.

#
3
Get one of the open-source Unixes and learn to use and run it. Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can't be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. So, bring up a Unix (like Linux but there are other ways and yes, you can run both Linux and Microsoft Windows on the same machine). Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code.

* There are other operating systems in the world besides Unix. But they're distributed in binary — you can't read the code, and you can't modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast. Under Mac OS X it's possible, but only part of the system is open source — you're likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple's proprietary code.
* Download Linux online[2] or (better idea) find a local Linux user group to help you with installation.
* While other distros have their own areas of strength, Ubuntu is far and away the most accessible to Linux newbies.
* A good way to dip your toes in the water is to boot up what Linux fans call a live CD, a distribution that runs entirely off a CD without having to modify your hard disk. This will be slow, because CDs are slow, but it's a way to get a look at the possibilities without having to do anything drastic.

#
4
Learn how to use the World Wide Web and write HTML. Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit has changed the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web. This doesn't just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web's markup language. If you don't know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML.
#
5
If you don't have functional English, learn it. English is the working language of the hacker culture and the Internet, and you will need to know it to function in the hacker community. Translations of technical books written in English are often unsatisfactory (when they get done at all). Being a native English-speaker does not guarantee that you have language skills good enough to function as a hacker. If your writing is semi-literate, ungrammatical, and riddled with misspellings, many hackers will tend to ignore you. While sloppy writing does not invariably mean sloppy thinking, the correlation is strong. If you can't yet write competently, learn to.
#
6
Earn respect as a hacker. Like most cultures without a money economy, hackerdom runs on reputation. You're trying to solve interesting problems, but how interesting they are, and whether your solutions are really good, is something that only your technical peers or superiors are normally equipped to judge. This is why you aren't really a hacker until other hackers consistently call you one. Specifically, hackerdom is what anthropologists call a gift culture. You gain status and reputation in it not by dominating other people, nor by being beautiful, nor by having things other people want, but rather by giving things away: your time, your creativity, and the results of your skill.

* Write open-source software. Write programs that other hackers think are fun or useful, and give the program sources away to the whole hacker culture to use. Hackerdom's most revered demigods are people who have written large, capable programs that met a widespread need and given them away, so that now everyone uses them.
* Help test and debug open-source software. Any open-source author who's thinking will tell you that good beta-testers (who know how to describe symptoms clearly, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies. Try to find a program under development that you're interested in and be a good beta-tester. There's a natural progression from helping test programs to helping debug them to helping modify them. You'll learn a lot this way, and generate good karma with people who will help you later on.
* Publish useful information. Another good thing is to collect and filter useful and interesting information into web pages or documents like Frequently Asked Questions (FAQ) lists, and make those generally available. Maintainers of major technical FAQs get almost as much respect as open-source authors.
* Help keep the infrastructure working. The hacker culture (and the engineering development of the Internet, for that matter) is run by volunteers. There's a lot of necessary but unglamorous work that needs done to keep it going — administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards. People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not as much fun as playing with code. Doing them shows dedication.
* Serve the hacker culture itself. This is not something you'll be positioned to do until you've been around for while and become well-known for one of the four previous items. The hacker culture doesn't have leaders, exactly, but it does have culture heroes and tribal elders and historians and spokespeople. When you've been in the trenches long enough, you may grow into one of these. Beware: hackers distrust blatant ego in their tribal elders, so visibly reaching for this kind of fame is dangerous. Rather than striving for it, you have to sort of position yourself so it drops in your lap, and then be modest and gracious about your status.



Source: www.wikihow.com

Read more!

Hello

Hi, this is a very useful website

Open this website everyday!

Read more!

www.allreview123.blogspot.com

Hi, starting from now this website will discuss lots of useful things for you!!!


So, open this website often!!!

Read more!

Jumat, 29 Januari 2010

GMail Drive 1.0.15 viksoe.dk - 156KB (Freeware)

GMail Drive creates a virtual filesystem around your Google Mail account, allowing you to use Gmail as a storage medium.

GMail Drive creates a virtual filesystem on top of your Google Gmail account and enables you to save and retrieve files stored on your Gmail account directly from inside Windows Explorer. GMail Drive literally adds a new drive to your computer under the My Computer folder, where you can create new folders, copy and drag'n'drop files to it.

Ever since Google started to offer users a Gmail e-mail account, which includes storage space of 6000 megabytes, you have had plenty of storage space but not a lot to fill it up with. With GMail Drive you can easily copy files to your Google Mail Account and retrieve them again.

When you create a new file using GMail Drive, it generates an e-mail and posts it to your account. The e-mail appears in your normal Inbox folder, and the file is attached as an e-mail attachment. GMail Drive periodically checks your mail account (using the Gmail search function) to see if new files have arrived and to rebuild the directory structures. But basically GMail Drive acts as any other hard-drive installed on your computer.

Read more!

How to Create a Google Profile

Steps

  1. 1
    Load the new Google Profile pagehttp://www.google.com/profiles and click "Create my profile".

    Ads by Google

    Ajax file upload

    Comprehensive support for testing Ajax / RIA / Web 2.0 applications
    www.parasoft.com
  2. 2
    Enter your Google user name and password if you are not already logged in.
  3. 3
    Fill out your first and last name. Remember that what you put here will change your full name on all Google services such as Gmail.
    • Use the name most likely to generate search results, such as the name on your resume.

  4. 4
    Upload a photo to your profile by clicking "Change photo" next to the last name.
  5. 5
    Define any alternative names in the "Other names" field.
  6. 6
    Complete the mini bio. This section includes where you grew up, what you do for a living and other basic information.
  7. 7
    Complete the section "A little personality" with as much detail as you wish to reveal.
  8. 8
    Select the links you would like to display on your profile. These are links to things such as your blog, Facebook, MySpace or any other site where you are active.
    • Google will automatically detect any sites that use your Google Account Credentials. Simply click "Add" to use these detected links.
  9. 9
    Click Create profile to save this initial information.
  10. 10
    Locate the blue notice at the top of your profile and click "Add more info to my profile".
  11. 11
    Select the contact information tab at the top of the edit screen.
  12. 12
    Complete all of the relevant contact information and save your changes.
  13. 13
    Verify your name to receive a verified icon.
  14. 14
    Search your name in Google. Scroll down to the bottom of the page and you should find the link to your Google profile. For example the "Nick James" example demonstrated in this article is visible at the bottom of this Google result.

Source: www.wikihow.com

Read more!

Jumat, 15 Januari 2010

The best free antivirus

There are many excellent antivirus software. However, all of those antivirus software must be have some cons. Now, I will discuss about the pros and the cons of 4 excellent antivirus.

1. AVIRA personal edition. This antivirus is my favourite and one of the lighest antivirus in the world. It has an excellent detection rate and has a simple GUI. However, some of the pros are: does not include anti-spyware, but when I checked in its official website it says that the latest AVIRA personal edition includes a standard anti-spyware. However, another good thing that I liek from AVIRA is the automatic removable media scan. All of you can try to plug in a flashdisk that full of virus in a PC that is AVIRA installed. Withing 1 minute there will be a notification that there are some viruses in the flashdisk.

2. AVAST home edition. This is also an excellent antivirus. It also has a high detection rate but still lower than AVIRA's. However, it has many pros such as anti-spyware, IM scanning, web shield, etc. This is also one of the best choices of free antivirus that you can use.

3. AVG free edition. This free antivirus includes all of AVAST's pros, but AVAST is overall better than AVG. AVG's detection rate is less than AVAST's and AVIRA's. However, many many people in the world use this. But, many people in the world say that AVG is bad, it uses too much system resources. I have tried the AVG 9.0 free edition. The GUI is really really simple, the 8.5 version has a better GUI. However, AVG still has lots and lots of fans in this world.

4. Panda Cloud Antivirus. This free antivirus is an excellent and new antivirus that is booming right now. The good thing of this software is the update is automatic. The editor of this sotware sends the virus definition every seconds. The official group finds and make the virus definition in every minutes. You can see the progress in the official website. This program also has a really excellent detection, many people say that the detection rate is above AVIRA's detection rate. However, the GUI is simple and small, however this software cannot be paired with another software, I've tried paired Panda cloud antivirus and windows defender and my laptop worked really slow and many times freezed.


Overall, I choose AVIRA as the best free antivirus, and right now I am using it.

But, it is up to you want to choose which one! All of free antivirus above are excellent to use. ^^

Read more!