Software Gratis

Mau Uang ?

Sabtu, 28 November 2009

Google Reader

A quick tour of Google Reader

Keep track of your favorite websites

Stay up to date
Google Reader constantly checks your favorite news sites and blogs for new content. Whether a site updates daily or monthly, you can be sure that you won't miss a thing.

Simplify your reading experience
Google Reader shows you all of your favorite sites in one convenient place. It's like a personalized inbox for the entire web.

Discover new content
Millions of sites publish feeds with their latest updates, and our integrated feed search makes it easy to find new content that interests you.


Share with your friends

Recommend articles to your friends
With your Google Reader public page, you can share your favorite items with your friends, simply by sending them to relevant links.

Share with just one click
Click the sharing icon on any item and it will instantly appear on your public page.

Spice up your site
Do you have a website or a blog? Add a customizable clip that displays your latest shared items in your site's sidebar.


Read anywhere, anytime

Add Google Reader to iGoogle
Add a Google Reader gadget to iGoogle to see updates at a glance.

Read on the go
Google Reader works on any mobile phone browser. Whether you're waiting in line or riding the train, Google Reader keeps you connected.

Use Google Reader on any computer
You can access your Google Reader account from any computer with online access. Whether you're at home, at work or abroad, your subscriptions stay with you.



Google Adsense

What is Adsense ?

Google AdSense is the program that can give you advertising revenue from each page on your website—with a minimal investment in time and no additional resources.

AdSense delivers relevant text and image ads that are precisely targeted to your site and your site content. And when you add a Google search box to your site, AdSense delivers relevant text ads that are targeted to the Google search results pages generated by your visitors’ search request.

Page 1

You can maximize your revenue potential by displaying Google ads on your website. Google puts relevant CPC (cost-per-click) and CPM (cost per thousand impressions) ads through the same auction, and lets them compete against one another. The auction takes place instantaneously, and, when it’s over, AdSense automatically displays the text or image ad(s) that will generate the maximum revenue for a page -- and the maximum revenue for you.

Becoming an AdSense publisher is simple. All it takes is a single online application. Once you're approved, AdSense takes only minutes to set-up. Just copy and paste a block of HTML and targeted ads start showing up on your website.



Senin, 23 November 2009

Google Scholar

What is Google Scholar?
Google Scholar provides a simple way to broadly search for scholarly literature. From one place, you can search across many disciplines and sources: articles, theses, books, abstracts and court opinions, from academic publishers, professional societies, online repositories, universities and other web sites. Google Scholar helps you find relevant work across the world of scholarly research.

Features of Google Scholar

  • Search diverse sources from one convenient place
  • Find articles, theses, books, abstracts or court opinions
  • Locate the complete document through your library or on the web
  • Learn about key scholarly literature in any area of research

How are documents ranked?
Google Scholar aims to rank documents the way researchers do, weighing the full text of each document, where it was published, who it was written by, as well as how often and how recently it has been cited in other scholarly literature.

A note from the Google Scholar team
Please let us know if you have suggestions, questions or comments about Google Scholar. We recognize the debt we owe to scholars everywhere whose work has made Google itself a reality and we hope to make Google Scholar as useful to this community as possible. We believe everyone should have a chance to stand on the shoulders of giants.


Senin, 02 November 2009

Comcast Cable TV Deals

Comcast Cable is a proven provider for the Cable TV viewing needs and programming for thousands of people. They offer more than just cable, and give their customers proven results for cable TV programs, On Demand movies and shows, Pay Per View new movie releases and sports events. Comcast Cable also provides Parental Controls for the impressionable minds in the house, and additional features like HDTV programming and DVR functions that can be used for rewinding, recording, fast forwarding or pausing live TV events or old favorites. Comcast Cable offers their services in cable programming packages that differ in monthly rate and channels so that everyone can afford to get what they want without paying for what they do not need.

They take their digital services even further by providing their customers with digital phone and digital internet connections that are reliable, fast and efficient. Comcast Cable customers enjoy these benefits without paying costly rates that can raise the monthly budget or cause people to go without.

Analog phone service provided a necessary means of communication for families and loved ones, but the service could be unreliable and the connection could include static or lost calls. With digital phone services, the connection is always clear and reliable. Comcast Cable offers their phone service at a low monthly price for local and long distance calls. They do not charge per minute, negating the need for counting the minutes you can spend with precious friends and family. They offer this service for the United States and Canada, any time of the day or night. They also offer other digital services that include call forwarding, call waiting, three-way calling for up to 12 features total that are already included in the monthly price. Comcast Cable makes it simple and affordable to have an in-house phone line without the added cost and expense of paying overages or waiting for “off-peak” hours to make important calls.

Comcast Cable also uses digital technology to increase bandwidth on their internet services. This decreases wait times for downloads and games, giving downloads an increased speed that surpasses DSL by up to two to three times more. They have done away with the need for dial-up connections altogether since broadband is always on. Now anybody with this service can get movies, games, music and videos to download, no matter how big the file, all at faster speeds. Comcast Cable also provides free security software that allows the surfer more protection while banking online, chatting, doing homework, or anything else. The security software adds protection to aid against unwanted spyware, viruses and popups. Comcast Cable customers have the security of knowing that they have the benefit of added protection.

For the money conscious customers that need or want it all without breaking the monthly budget, Comcast Cable also offers their bundled services. This provides the household with the two or three services it needs, while simplifying the monthly time and expense of paying additional providers.

Comcast Cable provides everything a household needs for entertainment and communication needs.


Senin, 05 Oktober 2009

Just a Touch Away, the Elusive Tablet PC

SAN FRANCISCO — The high-tech industry has been working itself into paroxysms of excitement lately over an idea that is not exactly new: tablet computers.

Steve Payne for The New York Times

Bill Buxton, a researcher at Microsoft, has a collection of tablets and touch screens that he keeps in his office in Toronto.


Steve Payne for The New York Times

Apple's Newton was withdrawn by Steve Jobs in 1997.

Quietly, several high-tech companies are lining up to deliver versions of these keyboard-free, touch-screen portable machines in the next few months. Industry watchers have their eye on Apple in particular to sell such a device by early next year.

Tablets have been around in various forms for two decades, thus far delivering little other than memorable failure. Nonetheless, the new batch of devices has gripped the imagination of tech executives, bloggers and gadget hounds, who are projecting their wildest dreams onto these literal blank slates.

In these visions, tablets will save the newspaper and book publishing industries, present another way to watch television and movies, play video games, and offer a visually rich way to enjoy the Web and the expanding world of mobile applications.

“Desktops, laptops — we already know how those work,” said Brian Lam, editorial director of the popular gadget site Gizmodo, which reports and hypothesizes almost daily about these devices. Tablets, he said, “are one of the last few mysteries left.”

Tablet computers were first conceived as a way to supplant plain old paper, in the same way that PCs replaced the typewriter.

In 1993, Apple’s Newton MessagePad, with its expansive screen and stylus pen, became known less for its innovative features than for being lampooned in “Doonesbury,” which ridiculed the device for its flawed handwriting recognition. Steven P. Jobs killed the Newton when he returned to Apple in 1997.

Then in 2001, at Comdex, the industry trade show, Bill Gates introduced new Windows software for tablets with a bold prediction: within five years, he said, tablets “will be the most popular form of PC sold in America.” It didn’t happen, of course. Tablets running Windows sell only a few hundred thousand units a year, mostly in business fields like health care and financial services.

There were basic problems with these early tablets: they cost too much and did not do enough.

“Software engineers got ahead of the hardware capabilities,” said Paul Jackson, a consumer product analyst at Forrester Research. “But we may be finally getting to the point where the dreams and aspirations of those designers are actually meeting capable and reasonably priced technology.”

You can thank Moore’s Law and the immutable advance of technology for that. Integrated microchips now combine wireless connectivity and support for features like multimedia, GPS functions and rich graphics. They are also more energy-efficient.

At the same time, the iPhone and its imitators have demonstrated that new tactile touch screens work and that people are comfortable with them, in a way they never got accustomed to using earlier tablets and stylus pens.

“We darn well should be about ready to take advantage of this stuff. It’s time,” said Bill Buxton, a researcher at Microsoft who has been working on multitouch systems for 20 years, and has a comprehensive collection of tablets and touch screens he keeps in his office in Toronto.

The drumbeat of tablet product introductions has already begun. In June, Archos, a French consumer electronics company, began selling a small touch-screen tablet running Google’s Android software. Later this month, it will introduce another tablet that runs on Microsoft’s Windows 7, which has built-in support for touch screens.

“A road warrior doesn’t want to take a big clamshell netbook with him,” said Frédéric Balaÿ, vice president for marketing at Archos.

The industry blog TechCrunch has also commissioned its own Web tablet, called the CrunchPad, which it has said it will start selling later this year.

Despite its past bruises in the tablet business, Microsoft appears ready to try again. In September, images of a booklike Microsoft device called Courier, with two 7-inch color screens, surfaced on Gizmodo.

In an interview, Steven A. Ballmer, Microsoft’s chief executive, would not discuss that product in particular, but said the company devises such prototypes all the time, so it can take them to its hardware partners. Still, rumors of a Microsoft tablet computer sparked interest. “I got an e-mail from some customer who said, ‘I want that,’ ” Mr. Ballmer said.

Apple’s rumored tablet is the most highly anticipated of the lot. Analysts expect Apple to introduce it early next year — a sort of expanded, souped-up version of the iPod Touch, priced at around $700.

Last week, Apple rehired the original chief marketer of its old Newton, Michael Tchao, who was working at Nike. Mr. Tchao’s former Apple colleagues believe he will help market this new device.

Colin Smith, an Apple spokesman, declined to comment on the company’s recruitment or product plans. But Apple’s tablet will most likely have little in common with the Newton, which was essentially a personal digital assistant. The new crop of tablets is being viewed as more flexible — gadgets that combine elements of the iPhone, e-book readers like the Kindle and laptops.

Apple has been working on such a Swiss Army knife tablet since at least 2003, according to several former employees. One prototype, developed in 2003, used PowerPC microchips made by I.B.M., which were so power-hungry that they quickly drained the battery.

“It couldn’t be built. The battery life wasn’t long enough, the graphics performance was not enough to do anything and the components themselves cost more than $500,” said Joshua A. Strickon, a former Apple engineer whose name is on several of the company’s patents for multitouch technology.

Another former Apple executive who was there at the time said the tablets kept getting shelved at Apple because Mr. Jobs, whose incisive critiques are often memorable, asked, in essence, what they were good for besides surfing the Web in the bathroom.

The success of the iPhone may have partially helped to answer that question. As of last month, developers had created 85,000 applications for the iPhone and iPod Touch — video games, social networking software, restaurant finders and more. Analysts believe that all those programs will immediately work on the new tablet while developers begin to tailor new software for the larger screen.

Despite the preponderance of apps, there is still the persistent question of whether regular people will really find a use for tablet computers. Smaller cellphones are increasingly multipurpose and fit nicely in a jacket pocket. And low-end laptops are inexpensive, run a full-fledged operating system and offer the luxury of a keyboard.

“I can imagine something like the iPhone with a much bigger screen being a gorgeous device with great capacity, but I don’t know where I would fit that into my life,” said a former Apple executive, who declined to be named because of Apple’s secrecy policies, but who anticipates an Apple tablet next year. “Those are the debates that have been happening inside Apple for quite some time.”


Rabu, 16 September 2009

Social Bookmarking Plugins for Wordpress

Social Bookmarking is most important for your blogging activity, especially for blogger and wordpress. Well, there are various ways to allure visitors to your site, social bookmarking being one. It’s wise to spread your articles or blogs across the web. With the social bookmarking buttons on your blog visitors will be able to share and bookmark interesting articles or webpages on your site easily. Moreover, social bookmarking allows visitors to save interesting links. All this would not only add to your popularity, but also fillip your blog’s traffic. Here’s our top 10 social bookmarking plugins to share your post. Check it out :D

1. Share This

share-this-wordpress-plugin

Using this plugin your blog visitors can easily add your blog posts to multiple social bookmarking sites like del.icio.us, technoraty etc. They can also send a link to your post via email, AIM, Facebook, Twitter and many others. Share This can be customized for your site. For more, you can add a dashboard that would keep track of shared reporting and provide reporting. Link Download

2. Sociable

sociable-wordpress-plugin
It allows the websurfers to save, catalog, and share engrossing articles or web pages they find online. Sociable automatically add links to your favorite social bookmarking sites on your posts, pages and your RSS feed. You are spoiled for choices with 99 different social bookmarking sites to choose from. Link Download

3. Social Boormarks

social-bookmark
This WordPress plugin has been designed to add a list of XHTML compliant graphic links at the end of your posts that would enable the your visitors to easily submit them in different social bookmarking sites. It features adds a section in the WordPress Dashboard for customization. By uploading Site Packs you can also add additional sites to the plugin directory. Link Download

4. Gregarious

gregaious
This WordPress plugin for social bookmarking integrates Digg API, Alex King’s Share This plugin, as well as Reditt button and Feedburner’s Feedflare into one powerful package. The AJAX interface enables hassle free customization. Gregarious offers a module based system that allows you to add or neglect as many features you like. The modules offered by plugin include

  • Digg button
  • Digg extra (advanced template tags)
  • Share This
  • Reddit button
  • Feedburner FeedFlare
  • PostBadge

Link Download

5. Hei Social

heysocial
This is one of the coolest plugin to interact with the visitors of your blog. With Hey Social in your Wordpress blog visitors to your site can submit posts and pages to the top social services like Digg, Twitter, De.licio.us and so on. Link Download

6. Social Dropdown

socialdropdown
The plugin displays various social bookmarking options in a dropdown menu.This adds to your easy of use as there’s no cluttering of bookmarking displays. Link Download

7. Social Links

It’s a sidebar widget that highlights icon links to your profile pages on other social networking sites. Link Download

8. I Love Social Bookmarking

ilovesocialbookmarking

If you are looking for a clutter-free and easy-to-use WordPress plugin for social bookmarking. This might be one the perfect one for you. It offers you a drop down list of attractive icons. Link Download

9. Social Bookmarking Reloaded

This WordPress plugin includes social bookmarks service’s icons to the articles in your blog that can be submitted easily. The plugin is based on Apostolos Dountsis one. Link Download

10. Bookmark Me

This is a simple and lightweight plugin that adds social bookmarks buttons to post and pages. This is a unique social bookmark plugin that focuses on assembling non-english bookmarks site. Link Download


Microsoft Dynamics POS 2009

New West Technologies, Inc. has announced its new Windows Mobile Extension for Microsoft Dynamics POS 2009. MXP - Mobile X Platform.

Portland, OR July 15, 2009 - New West Technologies, Inc. has announced its new Windows


MXP startup screen

Mobile Extension for Microsoft Dynamics POS 2009. MXP startup screen "Our new Mobile X Platform will enhance Dynamics POS 2009 beyond the walls out into the new world of retail," said Dan King, Point of Sale Systems Consultant.

The new MXP is port-able and ready to take Dynamics POS 2009 retail to the next level with the ability to customize mobile according to POS experience and behavior. This easy, efficient and cost effective solution starts simple for the entrepreneur and scales, able to grow with the business need. It is opening doors to the future of retail by removing the barriers between retailer and the customer experience, taking the POS to the customer wherever they may be.

MXP is targeted towards industry needs and designed to be customizable according to your retail specifics and reporting needs.

  • MIP - The Mobile Individual Platform have been designed with the small startup and single entrepreneur in mind.
  • MRP - The Mobile Retail Platform has included many features for the specialty retail and event company.
  • MEP - The Mobile Enterprise Platform is developed for large companies in need of many lanes and reporting capabilities.
About New West: Founded in 1992 in Portland, Oregon, New West Technologies is a leading integrator of Mobile Retail POS software solutions and Microsoft Dynamics Retail products. As a full-service technology provider with extensive experience in small business computer networking and retail software development and installation, we deliver easy-to-use, practical solutions that dramatically improve your profitability and workflow management.


Selasa, 11 Agustus 2009

Computer Virus [ Malware, Trojan, etc ]

Malware, short for malicious software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.

Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U. S. states, including California and West Virginia.[2][3]

Malware is not the same as defective software, that is, software which has a legitimate purpose but contains harmful bugs.

Preliminary results from Symantec published in 2008 suggested that "the release rate of malicious code and other unwanted programs may be exceeding that of legitimate software applications."[4] According to F-Secure, "As much malware [was] produced in 2007 as in the previous 20 years altogether."[5] Malware's most common pathway from criminals to users is through the Internet: primarily by e-mail and the World Wide Web.[6]

The prevalence of malware as a vehicle for organized Internet crime, along with the general inability of traditional anti-malware protection platforms to protect against the continuous stream of unique and newly produced professional malware, has seen the adoption of a new mindset for businesses operating on the Internet - the acknowledgment that some sizable percentage of Internet customers will always be infected for some reason or other, and that they need to continue doing business with infected customers. The result is a greater emphasis on back-office systems designed to spot fraudulent activities associated with advanced malware operating on customers computers.[7]

Purposes

Many early infectious programs, including the first Internet Worm and a number of MS-DOS viruses, were written as experiments or pranks generally intended to be harmless or merely annoying rather than to cause serious damage to computers. In some cases the perpetrator did not realize how much harm their creations could do. Young programmers learning about viruses and the techniques wrote them for the sole purpose that they could or to see how far it could spread. As late as 1999, widespread viruses such as the Melissa virus appear to have been written chiefly as pranks.

Hostile intent related to vandalism can be found in programs designed to cause harm or data loss. Many DOS viruses, and the Windows ExploreZip worm, were designed to destroy files on a hard disk, or to corrupt the file system by writing invalid data. Network-borne worms such as the 2001 Code Red worm or the Ramen worm fall into the same category. Designed to vandalize web pages, these worms may seem like the online equivalent to graffiti tagging, with the author's alias or affinity group appearing everywhere the worm goes.

However, since the rise of widespread broadband Internet access, malicious software has come to be designed for a profit motive, either more or less legal (forced advertising) or criminal. For instance, since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for black-market exploitation.[citation needed] Infected "zombie computers" are used to send email spam, to host contraband data such as child pornography[8], or to engage in distributed denial-of-service attacks as a form of extortion.

Another strictly for-profit category of malware has emerged in spyware -- programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues to the spyware creator. Spyware programs do not spread like viruses; they are generally installed by exploiting security holes or are packaged with user-installed software, such as peer-to-peer applications.

Infectious malware: viruses and worms

The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program which has infected some executable software and which causes that software, when run, to spread the virus to other executable software. Viruses may also contain a payload which performs other actions, often malicious. A worm, on the other hand, is a program which actively transmits itself over a network to infect other computers. It too may carry a payload.

These definitions lead to the observation that a virus requires user intervention to spread, whereas a worm spreads automatically. Using this distinction, infections transmitted by email or Microsoft Word documents, which rely on the recipient opening a file or email to infect the system, would be classified as viruses rather than worms.

Some writers in the trade and popular press appear to misunderstand this distinction, and use the terms interchangeably.

Capsule history of viruses and worms

Before Internet access became widespread, viruses spread on personal computers by infecting programs or the executable boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these executables, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. Executable-infecting viruses are dependent on users exchanging software or boot floppies, so they spread heavily in computer hobbyist circles.

The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.

With the rise of the Microsoft Windows platform in the 1990s, and the flexible macro systems of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications, but rely on the fact that macros in a Word document are a form of executable code.

Today, worms are most commonly written for the Windows OS, although a small number are also written for Linux and Unix systems. Worms today work in the same basic way as 1988's Internet Worm: they scan the network and leverage vulnerable computers to replicate.

oncealment: Trojan horses, rootkits, and backdoors

Trojan horses

For a malicious program to accomplish its goals, it must be able to do so without being shut down, or deleted by the user or administrator of the computer via which it is running. Concealment can also help get the malware installed in the first place. When a malicious program is disguised as something innocuous or desirable, users may be tempted to install it without knowing what it does. This is the technique of the Trojan horse or trojan.

Broadly speaking, a Trojan horse is any program that invites the user to run it, concealing a harmful or malicious payload. The payload may take effect immediately and can lead to many undesirable effects, such as deleting the user's files or further installing malicious or undesirable software. Trojan horses known as droppers are used to start off a worm outbreak, by injecting the worm into users' local networks.

One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a piece of desirable software that the user downloads from the Internet. When the user installs the software, the spyware is installed alongside. Spyware authors who attempt to act in a legal fashion may include an end-user license agreement which states the behavior of the spyware in loose terms, and which the users are unlikely to read or understand.

Rootkits

Once a malicious program is installed on a system, it is essential that it stay concealed, to avoid detection and disinfection. The same is true when a human attacker breaks into a computer directly. Techniques known as rootkits allow this concealment, by modifying the host operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix system where the attacker had gained administrator (root) access. Today, the term is used more generally for concealment routines in a malicious program.

Some malicious programs contain routines to defend against removal: not merely to hide themselves; but to repel attempts to remove them. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V timesharing system:

Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently slain program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.[9]

Similar techniques are used by some modern malware, wherein the malware starts a number of processes which monitor and restore one another as needed.

Backdoors

A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised (by one of the above methods, or in some other way), one or more backdoors may be installed, in order. Backdoors may also be installed prior to malicious software, to allow attackers entry.

The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors crackers may use Trojan horses, worms, or other methods.

Malware for profit: spyware, botnets, keystroke loggers, and dialers

During the 1980s and 1990s, it was usually taken for granted that malicious programs were created as a form of vandalism or prank. More recently, the greater share of malware programs have been written with a financial or profit motive in mind. This can be taken as the malware authors' choice to monetize their control over infected systems: to turn that control into a source of revenue.

Spyware programs are commercially produced for the purpose of gathering information about computer users, showing them pop-up ads, or altering web-browser behavior for the financial benefit of the spyware creator. For instance, some spyware programs redirect search engine results to paid advertisements. Others, often called "stealware" by the media, overwrite affiliate marketing codes so that revenue is redirected to the spyware creator rather than the intended recipient.

Spyware programs are sometimes installed as Trojan horses of one sort or another. They differ in that their creators present themselves openly as businesses, for instance by selling advertising space on the pop-ups created by the malware. Most such programs present the user with an end-user license agreement which purportedly protects the creator from prosecution under computer contaminant laws. However, spyware EULAs have not yet been upheld in court.

Another way that financially-motivated malware creators can profit from their infections is to directly use the infected computers to do work for the creator. The infected computers are used as proxies to send out spam messages. The advantage to spammers of using infected computers is they provide anonymity, protecting the spammer from prosecution. Spammers have also used infected PCs to target anti-spam organizations with distributed denial-of-service attacks.

In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as botnets. In a botnet, the malware or malbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously. Botnets can also be used to push upgraded malware to the infected systems, keeping them resistant to anti-virus software or other security measures.

It is possible for a malware creator to profit by stealing sensitive information from a victim. Some malware programs install a key logger, which intercepts the user's keystrokes when entering a password, credit card number, or other information that may exploited. This is then transmitted to the malware creator automatically, enabling credit card fraud and other theft. Similarly, malware may copy the CD key or password for online games, allowing the creator to steal accounts or virtual items.

Another way of stealing money from the infected PC owner is to take control of a dial-up modem and dial an expensive toll call. Dialer (or porn dialer) software dials up a premium-rate telephone number such as a U.S. "900 number" and leave the line open, charging the toll to the infected user.

Data-stealing malware

Data-stealing malware is a web threat that divests victims of personal and proprietary information with the intent of monetizing stolen data through direct use or underground distribution. Content security threats that fall under this umbrella include keyloggers, screen scrapers, spyware, adware, backdoors, and bots. The term does not refer to activities such as spam, phishing, DNS poisoning, SEO abuse, etc. However, when these threats result in file download or direct installation, as most hybrid attacks do, files that act as agents to proxy information will fall into the data-stealing malware category.

Characteristics of data-stealing malware

Does not leave traces of the event

  • The malware is typically stored in a cache which is routinely flushed
  • The malware may be installed via a drive-by-download process
  • The website hosting the malware as well as the malware is generally temporary or rogue

Frequently changes and extends its functions

  • It is difficult for antivirus software to detect final payload attributes due to the combinations of malware components
  • The malware uses multiple file encryption levels

Thwarts Intrusion Detection Systems (IDS) after successful installation

  • There are no perceivable network anomalies
  • The malware hides in web traffic
  • The malware is stealthier in terms of traffic and resource use

Thwarts disk encryption

  • Data is stolen during decryption and display
  • The malware can record keystrokes, passwords, and screenshots

Thwarts Data Loss Prevention (DLP)

  • Leakage protection hinges on metadata tagging, not everything is tagged
  • Miscreants can use encryption to port data

Examples of data-stealing malware

  • Bancos, an info stealer that waits for the user to access banking websites then spoofs pages of the bank website to steal sensitive information
  • Gator, spyware that covertly monitors web-surfing habits, uploads data to a server for analysis then serves targeted pop-up ads
  • LegMir, spyware that steals personal information such as account names and passwords related to online games
  • Qhost, a Trojan that modifies the Hosts file to point to a different DNS server when banking sites are accessed then opens a spoofed login page to steal login credentials for those financial institutions

Data-stealing malware incidents

  • Eleven people were implicated in a massive identity theft and computer fraud scheme targeting nine U.S. retailers (BJ’s Wholesale Club, TJX, DSW Shoe, OfficeMax, Barnes & Noble, Boston Market, Sports Authority and Forever 21). Over 40 million credit and debit card numbers were stolen. [10]
  • A Trojan horse program stole more than 1.6 million records belonging to several hundred thousand people from Monster Worldwide Inc’s job search service. The data was used by cybercriminals to craft phishing emails targeted at Monster.com users to plant additional malware on users’ PCs. [11]
  • Customers of Hannaford Bros. Co, a supermarket chain based in Maine, were victims of a data security breach involving the potential compromise of 4.2 million debit and credit cards. The company was hit by several class-action law suits. [12]
  • The Torpig Trojan has compromised and stolen login credentials from approximately 250,000 online bank accounts as well as a similar number of credit and debit cards. Other information such as email, and FTP accounts from numerous websites, have also been compromised and stolen. [13]

Vulnerability to malware

In this context, as throughout, it should be borne in mind that the “system” under attack may be of various types, e.g. a single computer and operating system, a network or an application.

Various factors make a system more vulnerable to malware:

  • Homogeneity – e.g. when all computers in a network run the same OS, if you can exploit that OS, you can break into any computer running it.
  • Defects – malware leveraging defects in the OS design.
  • Unconfirmed code – code from a floppy disk, CD-ROM or USB device may be executed without the user’s agreement.
  • Over-privileged users – some systems allow all users to modify their internal structures.
  • Over-privileged code – most popular systems allow code executed by a user all rights of that user.

An often cited cause of vulnerability of networks is homogeneity or software monoculture. In particular, Microsoft Windows has such a large share of the market that concentrating on it will enable a cracker to subvert a large number of systems. Introducing inhomogeneity purely for the sake of robustness would however bring high costs in terms of training and maintenance.

Most systems contain bugs which may be exploited by malware. A typical example is the buffer overrun, in which an interface designed to store data in a small area of memory allows the caller to supply more data than will fit. This extra data then overwrites the interface's own structure. In this way malware can force the system to execute malicious code, by replacing legitimate code with its own payload.

Originally, PCs had to be booted from floppy disks, and until recently it was common for this to be the default boot device. This meant that a corrupt floppy disk could subvert the computer during booting, and the same applies to CDs. Although that is now less common, it is still possible to forget that one has changed the default, and rare that a BIOS makes one confirm a boot from removable media.

In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This is a primarily a configuration decision, but on Microsoft Windows systems the default configuration is to over-privilege the user. This situation exists due to decisions made by Microsoft to prioritize compatibility with older systems above security configuration in newer systems[citation needed] and because typical applications were developed without the under-privileged users in mind. As privilege escalation exploits have increased this priority is shifting for the release of Microsoft Windows Vista. As a result, many existing applications that require excess privilege (over-privileged code) may have compatibility problems with Vista. However, Vista's User Account Control feature attempts to remedy applications not designed for under-privileged users through virtualization, acting as a crutch to resolve the privileged access problem inherent in legacy applications.

Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user. This makes users vulnerable to malware in the form of e-mail attachments, which may or may not be disguised.

Given this state of affairs, users are warned only to open attachments they trust, and to be wary of code received from untrusted sources. It is also common for operating systems to be designed so that device drivers need escalated privileges, while they are supplied by more and more hardware manufacturers.

Eliminating over-privileged code

Over-privileged code dates from the time when most programs were either delivered with a computer or written in-house, and repairing it would at a stroke render most anti-virus software almost redundant. It would, however, have appreciable consequences for the user interface and system management.

The system would have to maintain privilege profiles, and know which to apply for each user and program. In the case of newly installed software, an administrator would need to set up default profiles for the new code.

Eliminating vulnerability to rogue device drivers is probably harder than for arbitrary rogue executables. Two techniques, used in VMS, that can help are memory mapping only the registers of the device in question and a system interface associating the driver with interrupts from the device.

Other approaches are:

  • Various forms of virtualization, allowing the code unlimited access only to virtual resources
  • Various forms of sandbox or jail
  • The security functions of Java, in java.security

Such approaches, however, if not fully integrated with the operating system, would reduplicate effort and not be universally applied, both of which would be detrimental to security.

Anti-malware programs

As malware attacks become more frequent, attention has begun to shift from viruses and spyware protection, to malware protection, and programs have been developed to specifically combat them.

Anti-malware programs can combat malware in two ways:

  1. They can provide real time protection against the installation of malware software on a computer. This type of spyware protection works the same way as that of anti-virus protection in that the anti-malware software scans all incoming network data for malware software and blocks any threats it comes across.
  2. Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of malware protection is normally much easier to use and more popular[citation needed]. This type of anti-malware software scans the contents of the windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.

Real-time protection from malware works identically to real-time anti-virus protection: the software scans disk files at download time, and blocks the activity of components known to represent malware. In some cases, it may also intercept attempts to install start-up items or to modify browser settings. Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially babysit the user and their browser) can also be effective in helping to restrict any damage done.

Senin, 10 Agustus 2009

BIOS / CMOS Setup

This is the BIOS setup for Award BIOS v6.00PG. If you have a different version of the Award BIOS their would be a lot of similarities. If your BIOS is AMI or Phoenix then the common BIOS features would have some similarities. Whatever BIOS you have, this setup guide should give you an idea about how to setup a BIOS. Please note that setting up BIOS incorrectly could cause system malfunction, therefore it is recommended that you also follow the BIOS guide provided on your motherboard manual. If you decide to make changes to certain options it is safer to make a note of what you have changed. Then restart the system to see how it performs. If the system behaves abnormally or becomes unstable you can revert back to your previous settings.

Softmenu III

Softmenu III is where you can setup up the CPU without setting jumpers on the motherboard. You can setup the CPU simply by selecting the speed i.e. Pentium III 750 from the list. This ensures that the CPU bus, multiplier, voltage etc, is correctly set for that particular CPU. However you can manually setup each feature if required. Once you have finished with the setup press ESC to return the previous menu. See figure 1.

Standard CMOS Features

Here you can setup the basic BIOS features such as date, time, type of floppy etc. Use the arrow keys to move around and press enter to select the required option. You can specify what IDE devices you have such as Hard drive, CD-ROM, ZIP drive etc. The easiest way to setup the IDE devices is by leaving it set to auto. This allows the BIOS to detect the devices automatically so you don't have to do it manually. At the bottom, it also displays the total memory in your system. See figure 2.

Advanced BIOS Features

As you can see from figure 3, there are numerous advance settings which you can select if required. For most cases leaving the default setting should be adequate. As you can see the first boot device is set to floppy. This ensures that the floppy disk is read first when the system boots, and therefore can boot from windows boot disk. The second boot device is the Hard disk and third is set to LS120. If you want to boot from a bootable CD then you can set the third boot device to CD/DVD-ROM. See Figure 3.

Advanced Chipset Features

Here you can setup the contents of the chipset buffers. It is closely related to the hardware and is therefore recommended that you leave the default setting unless you know what you are doing. Having an incorrect setting can make your system unstable. If you know that your SDRAM can handle CAS 2, then making changes can speed up the memory timing. If you have 128MB SDRAM then the maximum amount of memory the AGP card can use is 128MB. See Figure 4

Inegrated Peripherals

This menu allows you to change the various I/O devices such as IDE controllers, serial ports, parallel port, keyboard etc. You can make changes as necessary. See figure 5.

Power Management Setup

The power management allows you to setup various power saving features, when the PC is in standby or suspend mode. See figure 6.

PnP/PCI Configurations

This menu allows you to configure your PCI slots. You can assign IRQ's for various PCI slots. It is recommended that you leave the default settings as it can get a bit complicated messing around with IRQ's. See figure 7.

PC Health Status

This menu displays the current CPU temperature, the fan speeds, voltages etc. You can set the warning temperature which will trigger an alarm if the CPU exceeds the specified temperature. See figure 8.

Load Fail-Safe Defaults

If you made changes to the BIOS and your system becomes unstable as a result, you can change it back to default. However if you made many changes and don't know which one is causing the problem, your best bet is to choose the option "Load Fail Safe Mode Defaults" from the BIOS menu. This uses a minimal performance setting, but the system would run in a stable way. From the dialog box Choose "Y" followed by enter to load Fail-Safe Defaults.

Load Optimized Defaults

Like the Fail-Safe mode above, this option loads the BIOS default settings, but runs the system at optimal performance. From the dialog box Choose "Y" followed by enter to load Optimized Defaults.

Set Password

To password protect your BIOS you can specify a password. Make sure you don't forget the password or you can not access the BIOS. The only way you can access the BIOS is by resetting it using the reset jumper on the motherboard.

Save and Exit Setup

To save any changes you made to the BIOS you must choose this option. From the dialog box choose "Y".

Exit without Saving

If you don't want to save changes made to the BIOS, choose "N" from the dialog box.

Hard Disk Drive Setup - Partition and Format

This procedure explains how to setup a new hard disk. Warning - if you are setting up a hard disk which contains data, the following procedure would completely erase your hard disk and the data would be unrecoverable.

Before a new hard disk can be used it needs to be setup. This involves partitioning and formatting the hard disk. Windows 98 or ME boot disk contains the required software to perform this procedure. FDISK.EXE and FORMAT.COM are the files required in your bootable floppy disk. Start the partition and format procedure by booting your PC using a Windows boot disk. Make sure you set the BIOS so that the boot sequence is set to detect the floppy disk first. If your system has no problems booting you will be presented with a Windows boot disk menu. This gives you the option to start the system with or without CD-ROM support. At this stage you do not need the CD-ROM support, so choose the option to boot without CD-ROM support. You should end up in the MS DOS prompt A: (A drive). From A: command prompt type fdisk. You will be presented with following message:

Choose "Y" to enable large disk support.You will now be presented with the FDISK main menu as shown below.

From the menu, choose option 1 - Create DOS partition or Logical DOS drive. Another menu will present the following options.

Choose option 1 - Create primary DOS Partition. FDISK verifies the integrity of your drive and will ask you if want to use the maximum available size of your hard disk to create the primary partition and set it active. To keep things simple we will create one large partition. Choose "Y" to use maximum available space. When the partition has been created successfully you will be notified by the system. Your drive is now known as C: (C drive). Press "Esc" to return to the menu. Press "Esc" again to exit FDISK. You need to restart your system for the changes to take affect. Leave boot disk in the drive.When the system reboots, choose start without CD-ROM from the boot disk menu. While booting from floppy disk you might get error message like "Invalid media type reading drive C" this is OK for this stage as the hard disk is not formatted.

From A: command prompt type format c:You will get a message saying "WARNING, ALL DATA ON NON-REMOVABLE DISK DRIVE C: WILL BE LOST. Proceed with Format (Y/N)?".

Don't worry about the message as you do not have any data in the new hard disk. Choose "Y". The format will proceed and would show you a progress indicator. The time it takes to format a hard disk depends on the size and speed of the drive. This could be around 5-30 minutes. Once the format is complete you need to reset your system. You are now ready to install an operating system.


Finalizing Stage

Now that you have installed all the necessary hardware there are still few more things you need to do before switching on your PC for the first time. Your ATX case has a power switch which turns the PC on, a reset switch for resetting the system, a power LED which comes on when the PC is switched on and a hard drive LED which flashes when data is being written or read from your hard drive. You also have an internal speaker.

Power + Reset switch

Figure 1 - Power and Reset switch

The switches and LED's need to be connected to its corresponding connectors on the motherboard. Please refer to your motherboard manual to locate where the connectors are. Different motherboards place the connectors in different locations. The connectors for the switches and LED's are normally grouped together. They should look similar to the image below.

LED + Switch connectors

Figure 2 - Switch and LED connectors

Every cable is normally labeled, they are normally named as follows, but could be slightly different on your system.

Power switch
Power / PWR-SW
Reset switch Reset
Power LED Power LED / PWR-LED
Hard drive LED HDD-LED / IDE LED
Speaker SPK / Speaker

The connectors on the motherboard are also labeled but may be too small to see. Instead refer to your motherboard manual which would provide details on which pins you should connect the cables to. The image below shows how the pins may be organised on your motherboard.

Once you have connected all the cables to the correct pins on the motherboard, you are ready to switch the PC on. At this point you can close the cover of your ATX case but don't screw it on just yet as you might have possible problems that needs rectifying. Connect all the cables to back of ATX case. These includes the main power cable that connects to the power supply. PS/2 mouse and keyboard that connects to the PS/2 ports. Monitor cable that connects to the graphics card port, etc. Finally the moment has arrived. Switch on your monitor first. Your ATX power supply might have a main power switch at the back so make sure that is switched on. Now switch the PC on by pressing the power switch on the front of the ATX case. If you have performed all the tasks without any mistakes and providing that none of the main components are faulty, the PC should boot. When the PC boots you should see the name of the BIOS manufacturer, such as AWARD BIOS displayed on your monitor. Your CPU type, speed and the amount of memory should be displayed as shown on image below.

System boot

If your motherboard has a plug and play BIOS and is set to automatic device detection by default, then you would see your IDE devices being detected followed by a prompt complaining about missing operating system. If your motherboard does not detect the hardware, then you need to proceed to the BIOS setup screen by pressing DEL or F1 or F2 depending on your motherboard. Congratulations you have completed building your own PC. You now need to proceed to the software section which explains how to setup the BIOS, Hard disk and install an operating system.

If things did not go smoothly and your PC does not switch on then go to the troubleshooting section for possible solutions.

Install Modem

Find a free PCI slot on your motherboard (assuming your modem is a PCI modem). Place your modem card on top of the slot and gently push it down into position.

Push modem into slot

Once the card has seated correctly into position, screw the card to the case using the screws supplied with the case.

Now you have installed all the prerequisite hardware devices. You can either proceed to the finalising stage, or you may want to install optional devices like a ZIP drive, CD-RW drive or a TV-Card. If you do not want to install these devices you can now proceed to the finalising stage.

Install Sound Card

Most modern sound cards are designed with the PCI interface and connects to the PCI slot of your motherboard. A PCI slot looks like the slots on the following image.

PCI Slots

Place your sound card on top of a chosen slot. Gently push down the card so it sits into position. Once the card is seated correctly into position, screw the card on to the case.

Place sound card

Finally insert the audio cable into the CD-IN socket. The other end of the cable should be connected to Audio-out socket on your CD/DVD-ROM drive.

Connect Audio cable

Install Graphics Card

Most modern graphics cards are AGP based and connects to the AGP bus of the motherboard. An AGP bus (slot) looks like the following image. The brown slot is where you connect your AGP graphics card.

AGP BUS

Place your AGP card on top of the slot and gently push it down. The card should firmly sit into position.

Mount graphics card

All you need to do now is to screw the metal plate on the front of the card to the ATX case. Use the screws supplied with case and screw the card to the case.

Screw the graphics card

Install CD / DVD-ROM

If you look at the rear side of your CD / DVD-ROM it should look similar to image shown on figure 1.

On the right hand side you have the power connector. Next to power connector you have the IDE connector. On the left hand side near the IDE connector you have the jumper settings for the DVD-ROM. The jumper is set to Master by default. I am connecting the DVD-ROM on a separate IDE cable therefore I will leave the jumper setting to Master. However if you are sharing an IDE cable with another device like HDD, then you would have to set jumper to Slave, as your HDD would be set to Master. Next to the jumpers you have the CD Audio-Out socket. One side of your audio cable connects to this socket and other side connects to the sound card cd-in socket. This would allow you to listen to Audio CD's on your computer.

DVD Rom Drive Rear

Figure 1

Placing the DVD Rom Drive

Figure 2

Mount your CD/DVD-ROM drive into its mounting slot. Use the supplied screws to screw the drive into position.

Mounting the DVD Rom Drive

Figure 3

Connect the IDE cable to the drives IDE connector. Make sure the pin 1 on the cable is connected to pin 1 on the drives IDE connector. Pin 1 is the red or pink strip on the edge of an IDE cable. Connect the other end of the IDE cable to the IDE socket on your motherboard as shown in figure 4. Again, make sure you conncet the cable to pin 1. The IDE socket could be your primary or secondary socket depending which socket you choose. If your HDD is on the primary IDE socket and your secondary IDE socket is free, then it is better to use your secondary IDE socket for the CD/DVD-ROM.

Connect IDE Cable

Figure 4

Finally connect the power cable to power connector and connect the audio cable to the CD Audio-Out socket as shown on figure 3.


Install Floppy Disk Drive

The rear side of a floppy drive looks similar to the following image.

FDD Rear

The black connector on the left hand side is the floppy disk connector. It is different from the IDE connector and uses a different cable. The small white connector on the right hand side is the power connector for the floppy drive. Figure 1 and 2 below shows what a floppy drive cable and floppy drive power connector looks like.

FDD Cable

Figure 1 - Floppy drive cable.

FDD Power Cable

Figure 2 - Floppy drive power cable

Place the floppy drive into the FDD mounting slot as shown. Screw the drive securely into place.

Placing the FDD

Insert the floppy drive cable into the floppy drive connector. Make sure the pin 1 on the cable connects to the pin 1 on the floppy drive connector. As you already know by now that pin 1 is the red or pink strip on the edge of the floppy drive cable. Most floppy drive cables are designed so that it will only go in on way, so you can not connect it incorrectly.

Mounting the FDD

Push the floppy drive power cable to the power connector. This will only go in on way.

Connect FDD Cable

Finally connect the other end of the floppy drive cable to floppy drive connector on your motherboard. Make sure pin 1 on the cable connects to pin 1 on the connector.

Uang Cepat

 

Person by Punkers