Tuesday, October 28, 2008

A Computer Virus Infection 2010

Dr Mark Gasson UK SCIENTISTS claim to have become the first person in the world are infected with computer viruses. Gasson, from the University of Reading, which is contaminated by a computer chip inserted into his hand.

The device, which allows him to pass through the security door and activate the phone, is a sophisticated version of the chip ID is used to tag pets and other animals. In some experiments, Dr. Gasson is able to show that the chip could carry computer viruses to the control system externally. If other implanted chip is then connected to the system, this chip will also be damaged.

Findings have important implications for the future when medical devices such as pacemakers and cochlear implants become more sophisticated. In the future they could take the risk of contamination by other human implants.

"With the benefit of this type of technology, there is a risk. We may succeed in improving themselves in some ways. But many other technological advances, such as cell phones, makes us vulnerable to risks, such as computer viruses and security issues," said Dr. Gasson.

"This type of technology has been commercialized in the United States such as the type of medical alert bracelet. If you are found unconscious, you can be scanned and your medical history is known."

Concerns raised by Dr Gasson also a concern for other scientists. Professor Rafael Capurro of Information Ethics, Steinbeis-Transfer-Institut, the German told the BBC, "If someone can get online access to your implants, this could be serious," he said.

Professor Capurro in a study of ethics in 2005 for the European Commission to see the development of digital implant and its misuse. "From an ethical standpoint, control the implant can be either positive and negative," he said. "Supervision can be a part of medical care, but if someone wants to do evil to you, can be a problem."

Dr. Gasson teaching in Systems Engineering University of Reading will present research results at the International Symposium on Technology and Society in Australia next month. Professor Capurro will also speak at the event. (Xinhua/OL-04)

Sunday, October 26, 2008

Nuclear Bomb to Destroy Asteroids

IF a large asteroid was gliding back to Earth and threatens civilization, a way that was done in the movie Armageddon does not seem groundless. Recent research proves that using nuclear bombs to destroy an asteroid could be used.

According to researchers from Lawrence Livermore National Laboratory in California, David Dearborn, when the asteroid crashed into Earth is estimated to occur within a period of 50 years, then use a nuclear bomb is the best solution. "Nuclear bomb is the most powerful bomb as far as we know it. The power that reaches three million times the chemical bombs may be hope. Only, the question now, how to use that energy?" said David.

He admitted it would produce fractional asteriod debris that remain potentially hit Earth. "However, the risk that we worry about the next course. The important thing is the main asteriod been successfully solved," he explained.

According to him, the risk remains tertabraknya earth by floating debris asteriod not absolute. Pascapeledakan asteroids, there is the possibility of changing the direction of the asteroid debris.

"The ability of nuclear bombs might also be used to change the orbit of asteroid debris that avoid collision with the Earth. But it all with the record we really memilki enough time," she said.

Added Director NASA Lunar Science Institute, David Morrison, NASA will send astronautnya to visit an asteroid in 2025. The astronauts will examine the possibility of an asteroid blasting experiment in order to see changes in direction that can occur.

"Our initial simulations do is blow up an asteroid measuring 270 meters by 300 kilotons of energy as 15 days before the predicted collision point will be able to successfully divert the asteroid, initially toward the Earth. Approximately 97 percent of the asteroid material will be diverted from the earth," explained Morrison. (Mar/space.com/OL-5)

Computer Virus 10 Most Cruel World

1. Storm Worm
Appeared in 2006, called "Storm Worm" because it spreads via email with the title "230 dead as storm batters Europe". Storm worm is a Trojan horse program. Some versions could make computers become bots. Or commonly used hackers to spam mail over the Internet.

2. Leap-A / Oompa-A
Mac had a concept of security through obscurity sure will not have a virus because of its closed system OS. But in 2006, Leap-A virus or commonly called Oompa-A emerged. Spreads through iChat on the Mac. Having a Mac attack, the virus will search for contacts via iChat and send messages to each contact. The message that contains the corrupted file in the form of JPEG. It's not dangerous, but this suggests that there may be some dangerous virus that attacks the MAC.

3. Sasser and Netsky
Creator German children aged 17 years, Sven Jaschan. Sasser attack Microsoft Windows. Sasser does not spread via email but if one computer connected to the computer that got the virus. This virus makes the computer can not be revoked without a power shutdown. Netsky spread via email with a 22 Kb file attachments and Windows network. DoS attacks can be made. Sven Jaschan imprisoned not only given probation 1 year 9 months, because of its age is still below 18 years.

4. MyDome (Novarg)
Began attacking dated February 1, 2004, make a backdoor virus on the OS. The first time it began to date a DDoS. Secondly, on the 12th of February, the virus stopped spreading and start creating backdoors. MyDoom spreads via email, in addition to always search on search engines, like Google began to receive millions of search queries and make slow until it crashes. Because MyDoom, U.S. Senator Chuck Schumer proposed the creation Virus National Response Center.

5. SQL Slammer / Sapphire
Appeared in January 2003, spread quickly via the Internet. It was a service U.S. Bank ATMs crash, the collapse of Seattle's 911 service, and Continental Airlines to cancel some flights because of the error checking in and ticketing. Create a loss of more than $ 1 billion before in-pacthed.

6. Nimda
This was also the year 2001, the opposite of the word "admin". Spread very quickly, according to TruSecure CTO Peter Tippett, Nimda only takes 22 minutes to make into the Top Ten at the time. His target Internet servers, spread over the Internet. Nimda will create a backdoor into the OS. So an attacker can access to the server and do anything. Nimda also a DDoS.

7. Code Red and Code Red II
Appear summer 2001, attacks Windows 2000 & NT OS. The virus will create a buffer memory is full so spent. The most exciting time at the White House in touch, all the taxable computer virus is going to be automatic access to a web server in the White House at the same time, so make overload, aka DDoS attacks. Microsoft finally releases patchnya time.

8. The Klez
Appeared in 2001, spreads via email, then sent to the replication of the people in your address book. Create a computer can not operate, the antivirus program can be fatal.

9. ILOVEYOU
After the "Melissa", he emerged from the Philippines, its for worms, a standalone program able to replicate itself. Spreads via email, titled "love letters" from a secret admirer. His original file LOVE-LETTER-FOR-YOU.TXT. vbs. VBS stands for Visual Basic Scripting. Onel de Guzman was the creator of the Philippines.

10. Melissa
Made in 1999 by David L. Smith, basicnya Microsoft Word macros. Spreads via email with the document "Here is That document you asked for, do not show it to anybodey else." If it is opened, the virus will replicate and automatically sent to the top 50 in the address book of an email. Smith was jailed 20 months and fined $ 5,000 and prohibited from accessing the computer without supervision

INTERNET FREE INDONESIA CARD

ntah ato road is still not fit but did not try yesterday there is still some way and have oyi. If anyone would try, mango atuh! SMS language if the language Maap J
Yes itung-for-itung for the theory of luck who knows you can step on the gas ngenet ampe dead, ampe confusing to browse. Even yesterday there are friends that are browsing the hours of 7 PM ampe 7am (which is obviously yes see website bokep, bugil ria, and aunt naked round ...) Just abis 1000 silver ...
Free StarOne
parameters used for connection with chip StarOne,
dial = # 777
username / login = wap
password = wap
if you use mozilla select Tools => options => advanced => network => settings => select manual proxy configuration, then enter the following proxy:
http proxy: 66.29.36.95 port: 554 or 1745
live list http://pps.nntime.com/
then check use this proxy for all protocols.
is a good proxy because it can open a 128-bit ssl halaman2 with like yahoomail, e-gold, gmail, internet banking and everything, of course could open a myspace page which is your favorite
Dial your cdma do, and then start browsing ....
good luck.

Free Esia
You can use the operator of Foreign Affairs. Fill in your proxy 129.82.12.187 / 216.165.109.82 and Port 3128/3124/3127 (choose one)
or
200.63.213.2 / 66.29.36.95 (username search in http://pps.nntime.com/)
with port 554
What you need to do is change the proxy settings in your browser.
Esia free (alternative)
Buy a package Esia card fortunately, continues internetan pake aja, so nah nah pulsanya certainly decreases it's fair, I'll already klo sampe pulse USD. 0 he'll be able to continue, but better the first abisin pulsanya aja klo dah USD for the telephone. 0 new this internetan pake deh.
do so by setting:
dial-up login
username: Esia / Wifone / Wimode
pass: Esia / Wifone / Wimode
username pasword ama aja ya pick one, it can be, well after the entry into the internet we have to use a proxy, enter proxynya through mozilla-click tools, then options, then advanced, network, and then the contents of the manual proxy settings by 200.63.213.2 with port 554 uda deh website and can stay open, weaknesses like the dashed connection and a bit longer, if ya want a little cepet must find another proxy in google, or if you use mozilla select Tools => options => advanced => network => settings => select manual proxy configuration, then enter the following proxy:
http proxy: 66.29.36.95 port: 554
then check use this proxy for all protocols.
at the beginning of your browsing will be asked for your username and password,
You make your own username here
or if you want the full can buy their own
Free Esia (Alternative 2)
Buy a prime Esia whistle
Download proxifier here http://rapidshare.com/files/66124802/Proxifier.zip
pass: xteamweb.com
Standard user and pass user and pass aja okay Wimode merrily merrily merrily could also happily
If already setting proxifier
Option ->> proxy settings ->> add -> enter proxy xteam port 554 ->> checklist HTTPS ->> enter user and password in each of the same love mimin
xteam proxy: 72.55.165.86 port 554, user name: Internet untuksemua, pass:'s fickle, it can be seen in http://internetuntuksemua.blogspot.c...ate-proxy.html updates. There is always updateable password if there is a change from the X-Team.
Options ->> Of Name Resolution ->> select a remotely on the checklist
Free Smart
Setting MyEnTunnel:
====================
SSH Server: 68.178.172.19 SSH Server: 72.55.165.86
SSH Port: 80 (this is already fixed) SSH Port: 8080
Username: dog Username: internetuntuksemua
Pass: Pass dirty: free4u
Check: - reconnect on failure
- Use the Private Key
- Verbose Logging
- Enable the Slow Polling
- Infinite Retry Attempts
- Enable SOCKS Dyanamic Port 80 (this we can be 20 foxes, etc.)
- Hide Port Connections
- Enable Compression
- Retry Delay 1
- Disable Notifications
Options other Port: 20, 443,554,3124,3127, 7999,8000,8088,8888 and 9201

Bayesian Methods for Multimedia Signal Processing


< there have been a significant growth of multimedia information processing applications that employ ideas from statistical machine learning and probabilistic modeling. In this paradigm, multimedia data (music, audio, video, images, text, ...) is viewed as realizations from highly structured stochastic processes. Once a model is constructed, several interesting problems such as transcription, coding, classification, restoration, tracking, source separation or resynthesis etc. can be formulated as Bayesian inference problems. In this context, graphical models provide a "language" to construct models for quantification of prior knowledge. Unknown parameters in this specification are estimated by probabilistic inference. Often, however, the problem size poses an important challenge and in order to render the approach feasible, specialized inference methods need to be tailored to improve the computational speed and efficiency.

The scope of the proposed tutorial is as follows: First, we will review the fundamentals of probabilistic models, with some focus on music, video and text data. Then, we will discuss the numerical techniques for inference in these models. In particular, we will review exact inference, approximate stochastic inference techniques such as Markov Chain Monte Carlo, Sequential Monte Carlo and deterministic (variational) inference techniques. Our ultimate aim is to provide a basic understanding of probabilistic modeling for multimedia processing, associated computational techniques and a roadmap such that information retrieval researchers new to the Bayesian approach can orient themselves in the relevant literature and understand the current state of the art.

Methods of Securing Wireless Networks

Methods of Securing Wireless Networks

After the previous tutorial, ie how to build a simple hotspot, of course, needed a system that can secure the existing WiFi hotspots to WiFi HotSpot access is not used by unauthorized parties besides you as the owner of the HotSpot.

* The fact is:

"At the end of 2002, 30% of all companies will experience a significant security risk because it has implemented 802.11b Wireless LANs (WLANs) without a good security system." ... Security Research and Advisory firm, Gartner Inc.

"Customers today's business objected to implement wireless technology because the fact is that Wireless is not secure," - Bill Rossi, vice president and general manager of Cisco's wireless networking operation.


"We went to a company with one of the wireless network is implemented. All Source Code, all available. Wireless network to broadcast, "Come over here" .... basically they have a Rolls-Royce was parked at the curb, motor running, with a "steal me." - Thubten Comberford of White Hat Technologies, a wireless security firm.

Well, hell How to secure Wifi network? The question is how important the security of your wireless network, whether at home, office, cafe, Campuses, Hospitals, Schools, and others. The answers to these questions will determine what kind of security system would you implement in your wifi network. Actually the standard in each of the Wireless Router / Access Point existing security methods, which do not need to install the software again. However, it only needed to be activated. All the same methodologies, but there are some new methods that are not owned by some of the Access Point / Wireless Router.

This security feature runs at 802.11, which is a standard for wireless communications / wireless at standardization by the IEEE (Institute of Electrical and Electronics Engineers) and has been used around the world.

*** Here's a security feature HotSpot sorted from the beginning are implemented as standard on Wifi networks:

* WEP (Wireless Equivalent Privacy).
Is a security feature on Wireless network / HotSpot who first implemented and used as international standards. Almost all wireless devices have this method. WEP uses RC4 encryption method to scramble / encrypt the data that will be spent in jaraingan Wireless.


* WPA (Wi-Fi Protected Access).
WPA is based on the IEEE 802.11i standard. There are two versions of WPA, which first version supports several encryption methods are:
~ TKIP (Temporal Key Integrity Protocol)
WPA was developed to feature as the development of the WEP which can be upgraded to firmware update 802.11melalui hardware. is part of 802.11i.
~ AES-CCMP
~ WPA Enterprise: using RADIUS-based authentication with 802.1x standard
~ WPA Personal: using PSK (Pre Shared Key) to encrypt data using a Passphrase 8 to 63 characters. Can also use 64 hexadecimal characters. Passpharase the weak can be penetrated using a dictionary attack (database passwords). But WPA is still secure, when used with Passpharase a "Good" or 64 hexadecimal characters that are not easy to remember a man.
~ WPA + EAP (Extensible Authentication Protocol).
Many descendants of development such as WPA + EAP EAP-MD5, PEAPv0, PEAPv1, EAP-MSCHAPv2, LEAP, EAP-FAST, EAP-TLS, EAP-TTLS, MSCHAv2, EAP-SIM, LEAP, PEAP, EAP-TLS.
LEAP (Lighweight Extensible Authentication Protocol) is more secure than EAP-MD5 EAP-MD5 but not safe from crackers.
PEAP (Protected Extensible Authenticatoin Protocol) allows for a secure wireless channels for data exchange, passwords and encryption keys without the need for a server certificate again. Features PEAP was developed by CISCO, MICROSOFT and RSA SECURITY.
EAP-TLS provides a very good security for authentication in both directions. Client and Network authentication using certificates and WEP-KEY per Session.EAP also uses a centralized authentication server.


WPA v2 is a version of the WiFi Alliance, the output of the final 802.11i standard.
Both WPA and WPA2 support EAP authentication using a radius server and PSK (Pre Shared Key).


All of these security systems have weaknesses and strengths of each of which may be tolerable in one condition but in other conditions can not be tolerated. Then from all the security features above, whichever is suitable for me? all depends on how important security for your wireless network.
If very important, then apply the most secure systems today, namely WPA + EAP using Radius, ie EAP-TLS. Of course different if the answer is a wireless security system is not too important. If so you can use the methods of WEP or WPA Personal.
And of course make it more difficult in the Hack / in the penetration by the cracker, use Passpharase complicated and do not form a sentence. if you can use the WPA Full64 hexadecimal characters.


Surely it does not mean not being transparent, but it complicates a cracker to break your wireless network. Wireless networks are usually easily penetrated because of weak passpharase used. With weak Passpharase used, a high school boy with a capital of a software cracker WEP / WPA, laptops, Wireless Device and a 15dBi antenna cans alone can penetrate the wireless network in a matter of Minutes.


Well, the conclusion is as follows:

~ Use existing security features in your Wireless hardware. The more expensive the price of the hardware, the more comprehensive security features. You get something with the price you pay.
~ Use Passpharase that are not easy to guess or use the full 64 hexadecimal characters for the WPA key.
~ As much as possible and activate the feature to use WPA.
~ If possible, use WPA security using EAP and RADIUS server.
~ More advanced again, use the Web Login HTTPS + Radius, such as 802.1x systems at large corporations.
Login to the web, and can use one indohotspot.net services provided at low cost without requiring a server investment. Software and provide our server, and you only use a wireless router that supports DDWRT Standard version. Thus to implement a reliable security system on your wireless network need not be expensive.
~ Give knowledge about wireless network security system for your users and store user and password properly when there is to prevent leakage from the user side.

Thus several ways to secure wireless network / hotspot you, both to be applied anywhere, whether the wireless network for schools, offices, cafes, hospitals, hotels, apartments, and others.
When applied to security systems, and is calculated before the wireless networks are implemented, then you can sleep more soundly knowing that your wireless network safe from intrusion and theft of business data.
Surely you do not want to sleep in while you sleep, without realizing someone's trying to infiltrate into your wireless network and perform data theft ato bandwidth from your wireless network is not it? (R0ch4)

way of security Werless

After the previous tutorial, ie how to build a simple hotspot, of course, needed a system that can secure the existing WiFi hotspots to WiFi HotSpot access is not used by unauthorized parties besides you as the owner of the HotSpot.

* The fact is:

"At the end of 2002, 30% of all companies will experience a significant security risk because it has implemented 802.11b Wireless LANs (WLANs) without a good security system." ... Security Research and Advisory firm, Gartner Inc.

"Customers today's business objected to implement wireless technology because the fact is that Wireless is not secure," - Bill Rossi, vice president and general manager of Cisco's wireless networking operation.


"We went to a company with one of the wireless network is implemented. All Source Code, all available. Wireless network to broadcast, "Come over here" .... basically they have a Rolls-Royce was parked at the curb, motor running, with a "steal me." - Thubten Comberford of White Hat Technologies, a wireless security firm.

Well, hell How to secure Wifi network? The question is how important the security of your wireless network, whether at home, office, cafe, Campuses, Hospitals, Schools, and others. The answers to these questions will determine what kind of security system would you implement in your wifi network. Actually the standard in each of the Wireless Router / Access Point existing security methods, which do not need to install the software again. However, it only needed to be activated. All the same methodologies, but there are some new methods that are not owned by some of the Access Point / Wireless Router.

This security feature runs at 802.11, which is a standard for wireless communications / wireless at standardization by the IEEE (Institute of Electrical and Electronics Engineers) and has been used around the world.

*** Here's a security feature HotSpot sorted from the beginning are implemented as standard on Wifi networks:

* WEP (Wireless Equivalent Privacy).
Is a security feature on Wireless network / HotSpot who first implemented and used as international standards. Almost all wireless devices have this method. WEP uses RC4 encryption method to scramble / encrypt the data that will be spent in jaraingan Wireless.


* WPA (Wi-Fi Protected Access).
WPA is based on the IEEE 802.11i standard. There are two versions of WPA, which first version supports several encryption methods are:
~ TKIP (Temporal Key Integrity Protocol)
WPA was developed to feature as the development of the WEP which can be upgraded to firmware update 802.11melalui hardware. is part of 802.11i.
~ AES-CCMP
~ WPA Enterprise: using RADIUS-based authentication with 802.1x standard
~ WPA Personal: using PSK (Pre Shared Key) to encrypt data using a Passphrase 8 to 63 characters. Can also use 64 hexadecimal characters. Passpharase the weak can be penetrated using a dictionary attack (database passwords). But WPA is still secure, when used with Passpharase a "Good" or 64 hexadecimal characters that are not easy to remember a man.
~ WPA + EAP (Extensible Authentication Protocol).
Many descendants of development such as WPA + EAP EAP-MD5, PEAPv0, PEAPv1, EAP-MSCHAPv2, LEAP, EAP-FAST, EAP-TLS, EAP-TTLS, MSCHAv2, EAP-SIM, LEAP, PEAP, EAP-TLS.
LEAP (Lighweight Extensible Authentication Protocol) is more secure than EAP-MD5 EAP-MD5 but not safe from crackers.
PEAP (Protected Extensible Authenticatoin Protocol) allows for a secure wireless channels for data exchange, passwords and encryption keys without the need for a server certificate again. Features PEAP was developed by CISCO, MICROSOFT and RSA SECURITY.
EAP-TLS provides a very good security for authentication in both directions. Client and Network authentication using certificates and WEP-KEY per Session.EAP also uses a centralized authentication server.


WPA v2 is a version of the WiFi Alliance, the output of the final 802.11i standard.
Both WPA and WPA2 support EAP authentication using a radius server and PSK (Pre Shared Key).


All of these security systems have weaknesses and strengths of each of which may be tolerable in one condition but in other conditions can not be tolerated. Then from all the security features above, whichever is suitable for me? all depends on how important security for your wireless network.
If very important, then apply the most secure systems today, namely WPA + EAP using Radius, ie EAP-TLS. Of course different if the answer is a wireless security system is not too important. If so you can use the methods of WEP or WPA Personal.
And of course make it more difficult in the Hack / in the penetration by the cracker, use Passpharase complicated and do not form a sentence. if you can use the WPA Full64 hexadecimal characters.


Surely it does not mean not being transparent, but it complicates a cracker to break your wireless network. Wireless networks are usually easily penetrated because of weak passpharase used. With weak Passpharase used, a high school boy with a capital of a software cracker WEP / WPA, laptops, Wireless Device and a 15dBi antenna cans alone can penetrate the wireless network in a matter of Minutes.


Well, the conclusion is as follows:

~ Use existing security features in your Wireless hardware. The more expensive the price of the hardware, the more comprehensive security features. You get something with the price you pay.
~ Use Passpharase that are not easy to guess or use the full 64 hexadecimal characters for the WPA key.
~ As much as possible and activate the feature to use WPA.
~ If possible, use WPA security using EAP and RADIUS server.
~ More advanced again, use the Web Login HTTPS + Radius, such as 802.1x systems at large corporations.
Login to the web, and can use one indohotspot.net services provided at low cost without requiring a server investment. Software and provide our server, and you only use a wireless router that supports DDWRT Standard version. Thus to implement a reliable security system on your wireless network need not be expensive.
~ Give knowledge about wireless network security system for your users and store user and password properly when there is to prevent leakage from the user side.

Thus several ways to secure wireless network / hotspot you, both to be applied anywhere, whether the wireless network for schools, offices, cafes, hospitals, hotels, apartments, and others.
When applied to security systems, and is calculated before the wireless networks are implemented, then you can sleep more soundly knowing that your wireless network safe from intrusion and theft of business data.
Surely you do not want to sleep in while you sleep, without realizing someone's trying to infiltrate into your wireless network and perform data theft ato bandwidth from your wireless network is not it? (R0ch4)