Saturday, September 27, 2008

Security warning over patient files || Wednesday, 23 July 2008 ||

A hacker who "tagged" medical centre websites, including one in Wellington, could have gone on to gain access to patients' records, a computer security expert says.

Aura Software Security managing director Andy Prow said the hacker, who called himself "Mister Saint", appeared to be a prankster and made no attempt to gain access to patient data.

"But this highlights the security risks ... general practice should really take this as a warning."

As repositories of highly sensitive information, medical clinics were prime targets for hackers looking for kudos, he said.

Karori Medical Centre was among several practices that had their websites emblazoned with the cheeky message: "Hacked by Mister Saint".

Centre manager Jo Douglas said the bogus links were removed as soon as they were discovered last week and patient confidentiality was never compromised.

"The website is an information site only and it is totally separate to our patient record database."

However, Mr Prow, whose company advises police and the TAB on Internet security, said medical professionals should realise that anything on their PC or laptop could be fair game to hackers.

Cross-site scripting (XSS) allows hackers to inject code into web pages viewed by others and create "a gateway" into their computers, allowing them to steal confidential information or make changes.

The real danger was not from graffiti artists like Mister Saint, but from hackers who did not leave any clues during an attack, he said.

"Doctors need to be aware of every click of the mouse and think about how they are handling patient records."

Security precautions, including passwords, firewalls and encryption, were basic requirements.

According to New Zealand Doctor magazine, all the websites attacked had obtained articles from the private online health information service Family Doctor, which is run by Auckland GP Dion Martley. Dr Martley was overseas and not available for comment.

Medical Association spokesman Mark Peterson, who chairs the GP Council, said there had been a huge push from the Health Ministry toward electronic patient records and for more sharing of that information among agencies.

"While the possibility of someone going in there with malicious intent to access individual patients' records is a remote possibility, we can't be complacent."

Most practices now employed IT managers to look after their computer systems at quite considerable expense, he said.

Privacy Commissioner Marie Shroff said businesses and government agencies were obliged to store personal information securely.

"That responsibility is higher where the information is sensitive or is given in a relationship of trust and confidence ... .

"If there are vulnerabilities that are highlighted by particular incidents, people should take note and assess the robustness of their systems in light of those incidents."

http://www.stuff.co.nz/4627267a23918.html


aya² wae mamang saint...
keep on fighting brother

VIVA INDONESIAN CODER TEAM

Tuesday, September 23, 2008

SAOSIN - Seven Years

Taking on seven years
the holy ghost had left alone
Test my arms, kick like crazy
I've been trying way too long
only push the way off to fight you
Now I'm sorry, I'm sorry, I'm not sure
Getting off my chest
the story ends

I would find a way without...
Tell him his eyes see too clear
I would find a way without you
Tell him his eyes see too clear
That mistake was gold
I know that without you
is something that I could never do
That was why staple the eyes and
seven dates for me to sell machines
and tear on

Seven years you assured me
that I'd be fine if I complied
only push the way off to fight you
(only push the way off to fight you)
Now I'm sorry, I'm sorry, I'm not sure
Getting off my chest
the story ends

I would find a way without...
Tell him his eyes see too clear
I would find a way without you
Tell him his eyes see too clear
That mistake was gold
I know that without you
is something that I could never do
That was why staple the eyes and
seven dates for me to sell machines
and tear on

Don't treat me, I'm to blame (sorry, I'm sorry, I'm not sure)
Don't treat me like I ever accused yo



Story of The Year - Until The Day I Die

Until the day I die
I'll spill my heart for you, for you
Until the day I die
I'll spill my heart for you

As years go by
I race the clock with you
But if you died right now
You know that I'd die too
I'd die too

You remind me of the times
When I knew who I was (I was)
But still the second hand will catch us
Like it always does

We'll make the same mistakes
I'll take the fall for you
I hope you need this now
Cause I know I still do

Until the day I die (Until the day I die)
I'll spill my heart for you
Until the day I die (Until the day I die)
I'll spill my heart for you

Should I bite my tongue?
Until blood soaks my shirt
We'll never fall apart
Tell me why this hurts so much

My hands are at your throat
And I think I hate you
But still we'll say, "remember when"
Just like we always do
Just like we always do

Until the day I die (Until the day I die)
I'll spill my heart for you
Until the day I die (Until the day I die)
I'll spill my heart for you

Yeah I'd spill my heart!!!
Yeah I'd spill my heart for you!!!

My hands are at your throat
And I think I hate you
We made the same mistakes
Mistakes like friends do

My hands are at your throat
And I think I hate you
We made the same mistakes
Made the same mistakes

Until the day I die
I'll spill my heart for you, for you

Until the day I die (Until the day I die)
I'll spill my heart for you, for you
Until the day I die (Until the day I die)
I'll spill my heart for you
Until the day I die (Until the day I die)
Until the day I die!!!


[Lyrics to early version are a bit different:]

As years go by
I race the clock with you
But if you died right now
You know that I'd die too
I'd die too

You remind me of the times
When I knew who I was (I was)
But still the second hand will catch us
Like it always does

Until the day I die (Until the day I die)
I'll spill my heart for you
Until the day I die (Until the day I die)
I'll spill my heart for you

Should I bite my tongue?
Until blood soaks my shirt
We'll never fall apart
Tell me why this hurts so much

My hands are at your throat
And I think I hate you
But still we'll say, "remember when"
Just like we always do

Until the day I die (Until the day I die)
I'll spill my heart for you
Until the day I die (Until the day I die)
I'll spill my heart for you

Yeah I'd spill my heart!!!
Yeah I'd spill my heart for you!!!

My hands are at your throat
And I think I hate you
We made the same mistakes
Mistakes like friends do

My hands are at your throat
And I think I hate you
We made the same mistakes

Do you need this as bad as I do? (Until the day I die)
And do you need this as bad as I do? (Until the day I die)
Yeah do you need this as bad as I do? (Until the day I die)
Yeah do you need this as bad as I do, as I do? (Until the day I die)
=================================================================

Goodbye All, U Will Found Me In Heaven

Breaking Benjamin - Diary of Jane

If I had to
I would put myself right beside you
So let me ask
Would you like that?
Would you like that?

And I don't mind
If you say this love is the last time
So now I'll ask
Do you like that?
Do you like that?

No!

Something's getting in the way
Something's just about to break
I will try to find my place in the diary of Jane
So tell me how it should be

Try to find out what makes you tick
As I lie down
Sore and sick
Do you like that?
Do you like that?

There's a fine line between love and hate
And I don't mind
Just let me say that I like that
I like that

Something's getting in the way
Something's just about to break
I will try to find my place in the diary of Jane
As I burn another page
As I look the other way
I still try to find my place in the diary of Jane
So tell me how it should be

Desperate, I will crawl
Waiting for so long
No love, there is no love
Die for anyone
What have I become

Something's getting in the way
Something's just about to break
I will try to find my place in the diary of Jane
As I burn another page
As I look the other way
I still try to find my place
In the diary of Jane
========================================================
Special from me for someone and all my best friends.

Tuesday, September 16, 2008

tukulesto.co.cc




This is my page rank @ www.alexa.com

Look at here for more details



VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Sunday, September 14, 2008

Gmail security hole found and fixed

A bug of Gmail has been found which, if being abused, could give you access to any account. The bug was discovered in 14 Oct, by Anelkaos of elhacker.net. Anelkaos reported it to Google, which then fixed the bug 4 days later.

I have a very quick look at the hacking procedure. If I understand that correctly, it involves using an victim’s partial "authentication string" - something like session ID or the long, seemingly random string sometimes you could see in URLs - to fake Gmail into believing that you were logged in as the victim. The procedure looks complicated, but can definitely be eased by a script or something.

Anyhow, it is glad that Google has fixed it rather quickily.



VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Google Analytics is watching YOU


I hosted this site on my own server before moving it to sourceforge. At that time, I used a free, lite version of WebLog Expert to generate site traffic information from the Apache log files. It was good.

Of course this method no longer works as I do not have access to the log files now. I did not track the traffic, until Google announced Google Analytics, a free traffic-analyzing service for everyone.

Oh, Google again! Those skeptics said, they are more and more like Microsoft, who keep acquiring and expanding and using "advanced" technology until there is no room (and money) for its competitors.

But according to Eric Peterson, a senior analyst on web site technology, Google does not seem to be forcing other analytics vendors out of business. There are still many websites, most of them blogs, that didn’t heard of or use any website analysis services until Google started providing a free one. The market still has plenty of room for everyone at the moment.

Actually I do not worry too much about Google being the Big Brother, as I think the chance is slim. But it is in general not a good idea to put all eggs in one basket. Given the fact that I have used too many Google’s products, this time I would really like to try software from other companies. However, most of them, for example those mentioned by Eric, are either not free or by invitation (e.g. Measure Map) only. If any one knows a good substitution, please let me know.

Before I found another solution, I would keep using Google Analytics. Nonetheless, I think my visitors here should have the right to know this: This site uses Google Analytics to track YOU.






VIVA INDONESIAN CODER TEAM

Filesystem for web app?

Ajax is hot. Some people even claimed that web applications, or web apps, based on this technology will one day dominate the market. Many people retold Sun’s motto some years ago: "Network is the computer." And suddenly, Google, with its rich "lab" of web apps, becomes the most threatening enemy of Microsoft.

For security reason, browsers, and hence web apps, cannot access to your local files. Some say this is a critical limitation of web apps. But who needs local files if most of your apps are web-based? Actually, web apps nowadays normally allow you to open/save files located in their own domain.

However, cross-domain file access is usually not supported. For example, the photos you saved in Flickr cannot be accessed from Writely. Well, Flickr is popular, so some web apps, mostly blog systems, do allow you to read or write from it. But this is in a rather ad hoc fashion. Why isn’t there a "web filesystem" that other web apps can access to easily?

Google is a company (if not the only company) that has the ability to provide such service globally. In fact, I am writing this blog because I have the feelings that Google Base is actually heading to this direction. Imagine there is an API such that data can be import/export from the Base in the format of, say, XML through the HTTPS protocol. Then other web apps can use it to read/write "files" to this universal "filesystem"! Moreover, the API would allow web apps to extract metadata instead of just the file itself. This is even more useful, I think! Not to mention the ability to search, efficiently.

Of course, security is a big issue that must be examined very, very carefully, because you are authorizing whatever web app to access to a pool of data owned by you. But this doesn’t stop me from getting excited about this very idea!

Let me make a bolder statement: the main battle of the war between Microsoft and Google is actually WinFS vs. Google Base! Microsoft, inherently favors local applications, invests heavily in this next generation, database-driven local filesystem; while Google, being the most powerful web company in the World, puts its bet on the data generated by rich web applications. Woo! I would really like to see the strategies they will use to win this war!





VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Gmail is not Gmail

Because of a new law suit, Gmail might not be able to keep using the name Gmail.

This is an old news, and Google have already done something to “unload” the name. The changes have been done quietly that the general public may not notice, but not to us developer. For example, because of its change in URL from gmail.google.com/gmail to mail.google.com/mail, gmail-lite and libgmailer failed to use immediately. Fortunately we discovered that and fixed it quickily. And now it seems that you cannot find any references to the word “Gmail” anywhere in its AJAX source code.

Google would probably rename Gmail back to “Google Mail”. Boring name, but safe. After this, I think Google will no longer “invent” new names for its new products. They will keep on using the pattern “Google xxxx”: Google Maps, Google Reader, Google Suggests, Google Desktop, Google OS (okay I faked this one), etc etc. You can see them in Google Labs.

What about all the “hacks” based on it, such as gmail-lite? Should we change to googlemail-lite and libgooglemailer also?

I think I will keep on using this name, unless they, uh, shoot sue me.





VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Finally, the official Gmail lite

Google has just launched Gmail Mobile, a simplified XHTML interface for mobile phone with browsers. According to their Help Center:

Gmail Mobile lets you access your Gmail account from your mobile phone. Just enter http://m.gmail.com in your phone’s web browser to log in to your account.

Gmail Mobile offers a number of cool features:

  • The interface is automatically optimized for the phone you’re using
  • You can access attachments, including photos, Microsoft Word documents, and .pdf files
  • If you enter phone numbers in your Gmail Contacts list, you can reply to messages by call

You can try it yourself by entering this URL: http://m.gmail.com

Does it mark an end to the gmail-lite/gmail-mobile projects? Not really.

  • We will continue our maintenance of libgmailer, the PHP API for accessing Gmail, until, of course, they provide an official one, which I think is unlikely.
  • Neerav’s gmail-mobile project sure won’t be stopped: its targets are WAP phones using WML, not HTML/XHTML.
  • Some people might already get used to gmail-lite’s interface? Anyway, I believe Google folks would agree that it’s better for users to have choices.
Now, honestly, I am kind of excited. Google is now our "competitor"! That would be quite a challenge to make people to think that ours is even better than the official one, which is from Google!





VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Yahoo! INVISIBLE CHECKER

Priview :




This is the answer, Check this out
tools[at]indonesiancoder.com



VIVA INDONESIA CODER TEAM
Get The Code and Feel The SOUL

Friday, September 12, 2008

Learn how to send your own fake email

So, you want to learn how to send your own fake mail? It's extraordinarily easy to do, and requires no extra software installed on your PC at all. It can be done with Windows, Macintosh, Linux - any modern PC that has an internet connection will do it.

There are a just a few simple steps. First, you'll need to decide on the FROM and the TO email addresses. If the FROM address that you're choosing isn't a real one, make sure that the domain name (the bit after the @ sign) is a real one. If it's not a real one, it almost certainly won't work.

For the purpose of this tutorial, we'll be sending from bush@whitehouse.gov to dummy@deadfake.com.

Second, you'll need to find out the mail server that your recipient is using.

Windows User :
Click Start, Run, enter "CMD", then presss OK. In the window that comes up, type nslookup -q=MX deadfake.com


MAC User :
Go to Applications, Utilities, and choose Terminal. In the window that comes up, type nslookup -q=MX deadfake.com


Linux User :
Bring up your favourite shell, and type nslookup -q=MX deadfake.com


There will be a lot of information on the screen - all you need to look for is a line that talks about a mail exchanger. If there are several, pick the one with the lowest "preference number".

deadfake.com MX preference = 10, mail exchanger = mail.deadfake.com

Now, you'll need to connect to this mail exchanger using telnet. This is the same for any PC, but Vista users may not have it installed by default - see this note about getting telnet on Vista before you continue. When you're ready, type:

telnet mail.deadfake.com 25


Press enter, and after a short pause, you should see a welcome message from the server.


Ok, so now you're connected. You need to enter the following information - press ENTER at each new line. You won't be able to press backspace to delete a mistake, so you'll need to type everything correctly first time!

HELO whitehouse.gov

This tells the mail server that we are "whitehouse.gov".

MAIL FROM:

This tells the server who is sending the mail.

RCPT TO:

This tells the server who to deliver the mail to. At this point, if the recipient doesn't exist, you may see a warning message (but not always).

DATA

This tells the server that we're ready to start writing our message. It should acknowledge, telling you to end your message with a full stop (period) on a single line. All we need to do now, is write our message and don't forget that full stop at the end.

Hello dummy@deadfake, I managed to send a fake mail all by myself!
.

Dont forget that last dot. When you've done that, and pressed enter, simply enter QUIT and your mail should be delivered.

There's a little bit more to it, of course. You'll need to enter proper "headers" if you want the mail to look more believable. After doing the DATA command, I'd recommend pasting in the following "headers" to make sure it looks realistic when viewed in Outlook, Hotmail, etc.

Example :

Date: Fri, 01 Apr 2007 01:10:13 +0700 (GMT)
From: tukulesto
To: tux
Subject: Test

Hello World, I managed to send a fake mail all by myself!
.

And that's all there is to it.



VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Thursday, September 11, 2008

Encrypt your Gmail Email!

If you want to be sure that your email can be read by no one but you, then it needs to be encrypted. You'd be surprised to find out who might want to read your email. I was.

One of the best encryption systems is called GPG encryption which is an open-source version of PGP encryption. PGP stand for Pretty Good Privacy and is actually an understatement made by a programmer who didn't want to be too optimistic about how secure it is. However, as it turns out, PGP is has actually proven itself to be extremely good. It's been around for many years, being maintained by the best coders in the world and it hasn't been cracked.


In this Instructable, I'll walk you through the simple process of setting up GPG and then installing a Firefox plugin that will make it easy to encrypt your Gmail.

The principle behind GPG encryption is easy. Anyone who wants to play creates a public key and a private key. Your public key is the part of the encryption that you make public. Your private key is the part of the encryption that you never share with anyone under any circumstance.

The two keys work together so that you need both to decrypt anything. To send an encrypted message to someone you lock the message with their public key and when they get it, they can unlock it with their private key. If they want to respond, then they encode the message with your public key and you can read it with your private key.

Of course, this only works so long as you can trust that you have been given the right public key and that you know who you are talking to. One of doing this is by having a key signing party with your close friends. You all show up at a given location at a given time and exchange public keys. Then you have a list of trusted public keys with which you can communicate. This is often referred to as a web of trust.

Like I said before, getting your email protected is a two-step process. First, we have to get GPG installed on our operating system. Getting Gmail set up is on the next step.

I got GPG working on Mac OS X without too much trouble. I used the instructions and downloads at http://macgpg.sourceforge.net/ and summarized the process below. If you're on OS X, open that link in another window and get ready. For other operating systems, you can check the links on http://www.gnupg.org/download/.

Now, start downloading and installing! I've adapted the information from the Mac GPG FAQ, so you can also go there for more details. Here are the things I downloaded (you should got to the downloads page and get the latest):

First, open the DMG for GPG that you downloaded and run the installer. I just used all the defaults. This is the actual encryption engine that everything else runs on.

Once the installation is complete, open a Terminal window and type gpg, then hit Return. My installation gave me a "Go ahead and type your message ..." which I think means that GPG was up and running, so I ctrl-C'd out of that and closed the Terminal window.

Next, I installed GPG Preferences. That put a GPG icon in my System Preferences pane; I didn't change anything.

Finally, I installed GPG Keychain Access. This was easy: just unzip the ZIP file and drag the application into your Applications folder.

By the way, you can also do all of this from the command line. Here's a great tutorial for that.

Next up: Set up Gmail and start sending seeekrit messages!



Then, I ran the app and it had me generate my two keys (one public, one private). I typed in my secret passphrases which, of course, I will never tell anyone.

The last step with my keys was to select my public key and export it to a text file. Once you do this, you can attach it or copy and paste the contents into an e-mail to send to you PGP/GPG wielding friends.











Before you can encrypt anything, you need to make sure that you open a Gmail account that by no means can be traced back to you. This means that you have to be liberal about giving them your real name and address when you sign up. You should also always use a TOR server.

Once you have done all that you need to install FireGPG into Firefox. Go to this link and click the link to download it to your computer. From here it should coach you through the process.

Restart Firefox, and now you have new buttons in your compose view for encrypting and signing messages. Now you can discuss your nefarious plans in private!



Encrypting your Gmail is just an example. Now that you have GPG installed, there are a whole bunch of programs you can use to encrypt and sign stuff. For example:

GPGDropThing - This is a simple program which lets you encrypt text to people whose public keys are on your keyring, and also allows you to decrypt messages that they have written. GPGDropThing is especially useful when writing encrypted mail to your friends as some clients don't have GPG support built in. So far only Apple Mail and Mulberry have GPG support. Your can encrypt text on your hard drive, this way, or even paste encrypted snippets into your IMs.

GPGMail - For encrypting your email going through Apple's Mail.app.



VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Boot and Run Ubuntu from a Flash Drive

Running an operating system, like Windows, off of your flash drive can be very useful sometimes. You can recover your data from a hard drive and copy it to an external hard drive if that computer won't boot up or scan that computer for viruses and so on... This Instructable will show you how to install, boot, and run the popular Linux distro, Ubuntu from your flash drive. You will be able to automatically save your changes and settings back to the flash drive and restore them on each boot using a second partition.

You can run Ubuntu will all your settings and files, even if you don't have your own computer with you. You will have a whole, powerful operating system in your pocket!

Sorry for the not very helpful pictures. It was to hard to document each little step for each step. Hopefully it is still easy to follow...

I'm not liable for any damage done to your computer and/or flash drive. However, I haven't ever had a problem. Just make sure to follow each step carefully.




Here are the materials needed:
  • USB 2.0 Flash drive (at least 1G) (You could use USB 1.1, but everything will take 5x longer)
  • Computer w/ CD Drive (Must be able to boot from USB. Newer motherboards will work. Motherboards older than 2 years old probably won't work. A BIOS update from your computer manufacturer might work.)
  • Ubuntu LiveCD (You don't need this if your computer already has Ubuntu installed on it)
  • You should also be somewhat computer-savvy and comfortable with command prompt/ terminal.

I used a 4GB Sandisk Cruzer Micro and Ubuntu 7.10 (current one at time of writing)

You can get the Ubuntu LiveCD at ubuntu.com. Download the Ubuntu Desktop LiveCD iso and burn it on a CD using Nero or another program. You could also request a free Ubuntu CD but that takes 6-10 weeks to ship.

We will need to change the boot order of your BIOS throughout this Instructable. Turn on your computer and while it turns on press the button to access the BIOS Setup Utility. Usually F2 or Delete. Navigate around the setup until you find something about the boot order. You can change it so if that first device is their, it will boot up from that device. If the device isn't their, it will keep going down the order/list until their is one with that device plugged in.

Also, when you boot up you might have an option to temporarily boot up from a certain device. You could use this if you want to only boot up from a device once.



Once you have Ubuntu, turn off your computer and stick the CD in it. Turn on you computer and setup the BIOS to boot from the CD. It will load and then you will see Ubuntu!

You can skip this if your computer has Ubuntu installed on it. Just turn it on and log in.

Now that you're in Ubuntu, it is time to format the flash drive. We will make two partitions, one for the actual Ubuntu OS, and another to automatically save your changes and settings back to the flash drive and restore them on each boot. You can also store personal data on the second partition.

Backup all your data on your flash drive before doing this. This will erase all your files on you flash drive

0. Backup the data on your flash drive.

1. Open Terminal, under Applications

2. Type in "sudo su"

3. Type in "fdisk -l", and identify which device is your flash drive. Mine was "sdb". Whenever I type "sdb", put in your flash drive identification. For example, if your flash drive was sda, and I typed "format sdb1" then you would type "format sda1".

4. Type "umount /dev/sdb1"

5. Type "fdisk /dev/sdb"
  • type p to show the existing partition and d to delete it
  • type p again to show any remaining partitions (if partitions exist, repeat the previous step)
  • type n to make a new partition
  • type p for primary partition
  • type 1 to make this the first partition
  • hit enter to use the default 1st cylinder
  • type +750M to set the partition size
  • type a to make this partition active
  • type 1 to select partition 1
  • type t to change the partition filesystem
  • type 6 to select the fat16 file system
  • type n to make another new partition
  • type p for primary partition
  • type 2 to make this the second partition
  • hit enter to use the default cylinder
  • hit enter again to use the default last cylinder
  • type w to write the new partition table

6. Type "umount /dev/sdb1", then "umount /dev/sdb2".

7. Type "mkfs.vfat -F 16 -n Ubuntu /dev/sdb1". This formats the first partition.

8. Next, type "mkfs.ext2 -b 4096 -L casper-rw /dev/sdb2", to format the second partition.

9. Exit terminal, then unplug your flash drive.


Now that you have finished formatting the drive, you can now install Ubuntu onto the flash drive partitions.

1. Insert flash drive.

2. Open Terminal.

3. Type "apt-get update".

4. Go to Ubuntu Packages and download Mtools and install. Afterward, download Syslinux and install.

5. In terminal, type "syslinux -sf /dev/sdb1".

6. Type "cd /cdrom"

7. Type "cp -rf casper disctree dists install pics pool preseed .disk isolinux/* md5sum.txt README.diskdefines ubuntu.ico casper/vmlinuz casper/initrd.gz /media/Ubuntu/".
  • Ignore any "cannot create symbolic link" errors.

8. Go to first partition of the first flash drive and rename "isolinux.cfg" to "syslinux.cfg".

9. Edit "syslinux.cfg" so that it looks like the attached text file.

Finally... You are done!



Syslinux Config :

DEFAULT persistent
GFXBOOT bootlogo
GFXBOOT-BACKGROUND 0xB6875A
APPEND file=preseed/ubuntu.seed boot=casper initrd=initrd.gz ramdisk_size=1048576 root=/dev/ram rw quiet splash --
LABEL persistent
menu label ^Start Ubuntu in persistent mode
kernel vmlinuz
append file=preseed/ubuntu.seed boot=casper persistent initrd=initrd.gz ramdisk_size=1048576 root=/dev/ram rw quiet splash --
LABEL live
menu label ^Start or install Ubuntu
kernel vmlinuz
append file=preseed/ubuntu.seed boot=casper initrd=initrd.gz ramdisk_size=1048576 root=/dev/ram rw quiet splash --
LABEL xforcevesa
menu label Start Ubuntu in safe ^graphics mode
kernel vmlinuz
append file=preseed/ubuntu.seed boot=casper xforcevesa initrd=initrd.gz ramdisk_size=1048576 root=/dev/ram rw quiet splash --
LABEL check
menu label ^Check CD for defects
kernel vmlinuz
append boot=casper integrity-check initrd=initrd.gz ramdisk_size=1048576 root=/dev/ram rw quiet splash --
LABEL memtest
menu label ^Memory test
kernel mt86plus
append -
LABEL hd
menu label ^Boot from first hard disk
localboot 0x80
append -
DISPLAY isolinux.txt
TIMEOUT 300
PROMPT 1
F1 f1.txt
F2 f2.txt
F3 f3.txt
F4 f4.txt
F5 f5.txt
F6 f6.txt
F7 f7.txt
F8 f8.txt
F9 f9.txt
F0 f10.txt

Now you're done! Just reboot the computer, set it to boot from the flash drive in the BIOS, and let it load!

If your can't get Ubuntu to boot, your flash drive may have a corrupted MBR. To repair the MBR of your USB device, at the terminal in Ubuntu type "sudo apt-get install lilo " followed by "lilo -M /dev/sdb".

You can now run Ubuntu anywhere and still have all your settings and files.






VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Sunday, September 7, 2008

Bring on the Browser Wars!

At the turn of the century, Microsoft vanquished Netscape in the browser wars. For a while, that victory looked permanent. The battle had been ugly: A federal court found that Microsoft illegally used its Windows monopoly to expand Internet Explorer's market share; Netscape never recovered from its loss. For most computer users, though, the browser wars were sublime: The Web browser was invented in 1992, and within five years, with hundreds of developers at both Microsoft and Netscape pumping out code, browsers became fast, stable, and capable of some very neat tricks.


These days, Web designers boast about all they can do with AJAX, the set of technologies that allow Web sites to emulate desktop-app behavior like drag-and-drop (think Google Maps or Yahoo Mail). AJAX runs on code that was created by Microsoft and Netscape as competitive weapons during the browser wars. Yes, today's glorious Web was made possible by yesterday's bruising business confrontation. All of us should rejoice, then, at the dawn of Browser War II. On Tuesday, Google released a Web browser called Chrome. This new piece of software enters a crowded field of browsers looking for your love. Microsoft will soon offer the final revision of Internet Explorer 8, which is currently in beta release. (Both Chrome and IE 8 run only on Windows, though Google says it's creating versions for other platforms.) In June, Mozilla put out Version 3 of its popular open-source, cross-platform Firefox browser, and Version 3.1 is available in alpha*. The Norwegian software company Opera also recently released its latest eponymous, innovative, cult-hit browser. And Apple is now working on Version 4 of Safari for Mac and Windows. All this competition is great news, because the world desperately needs a better Web browser. For at least four years, Firefox has been the gold standard among techies; I've been using it as my primary browser for at least that long. For a while, I loved it. I appreciated its smart, clean user interface, its tabs and keyboard shortcuts, and most of all—Firefox's killer feature—its ability to run a smorgasbord of useful third-party add-ons. But Firefox is hobbled by a couple of major flaws. It hogs system resources: Use it for a while, and it eats up huge swaths of your computer's memory, eventually becoming as slow as the Web browser on your iPhone. Firefox is also prone to crashing: Load up an errant Web page, and you risk bringing the program to a halt. (This problem makes session-recovery add-ons like Tabs Mix Plus essential. Admittedly, I'm not an ordinary Web user—I use my browser as a research tool, mail app, calendar, media player, and a tabbed to-do list. At any point during the day, I've got three or four browser windows open, each with 20 to 30 Web pages running in tabs. I understand that this bespeaks a kind of insanity, but with Web sites growing ever more useful and Web users growing ever more addicted, it's the sort of insanity that afflicts an increasing number people. The wonderful thing about Google's new browser, then, is that it's been built with the singular purpose of handling a hefty workload. While I'm not yet ready to switch to Chrome as my permanent browser—it's got some odd user interface quirks, lacks a few useful features, and doesn't have Firefox's hordes of plug-ins—I've found it to be delightfully fast and stable. So far, it's run everything that I've thrown at it without bringing my computer to a halt. For that alone, I think Google's on to something. If you're into comics about computer code, the 38-page book Google commissioned to unveil Chrome—illustrated by cartoonist Scott McCloud—does a fine job explaining what's new here. The gist is that most Web browsers do a lot of "single-threaded" work: Much of the processing is controlled by a few subroutines that can do only one thing at a time, which is why your entire Firefox session slows down when a single tab out of many encounters some kind of error. Chrome, on the other hand, runs each big bit of code in its own dedicated "process"—distinct computational threads that enjoy their own memory resources. Just as Windows runs Photoshop and iTunes at the same time without letting each bother the other, Chrome lets its processes do different tasks in parallel. If one Chrome tab is busy loading Google Reader, another Chrome tab won't be crimped while refreshing the New York Times site. Best of all, if one process crashes, your full browser session remains intact. I've inadvertently learned many different ways to make Firefox crash; none of these tricks worked on Chrome. The best I could do was crash a single process—this brought down an individual tab, but Chrome kept running. There are several more under-the-hood improvements. Google claims that Chrome beats other browsers at "garbage collection"— the computer-science term for how a program gets rid of memory it no longer needs. Better garbage collection significantly reduces how much of your computer's resources an application consumes. Google also wrote its own JavaScript virtual machine—the engine that runs all the fancy AJAX code that powers complex new Web apps—that it claims is faster and more stable than other browsers' scripting engines. Though I found Chrome speedy and less demanding on my system's resources than Firefox 3.0, its advantage isn't unsurpassable—Lifehacker's tests give the memory and speed edge to Firefox 3.1. You aren't likely to notice Chrome's tech improvements when you load it up for the first time. What you'll see is a minimalist app, one missing several features that you're used to in other browsers. For example, Chrome presents no good way to manage bookmarks. Still, there are some innovative features. Instead of an address bar and a search box, Chrome uses only one input bar in which you're free to type either something like "slate.com" or "slate article on sarah palin." Chrome is smart enough to figure out when to take you to a Web page and when to perform a Web search. It also lists other recently visited sites containing slate, palin, or other like terms. I found some of Google's other user-interface tweaks more annoying than useful. Chrome places its row of tabs in the title bar, an area that in most apps isn't used for anything other than displaying the name of the program. This saves space on your screen, but it also eradicates one of the main ways people have grown accustomed to using tabs in browsers—you can't double-click the tab bar to open a new tab, like you can on every other multi-tab browser. (Double-clicking the bar in Chrome resizes the window.)This is a quibble, obviously. Chrome is very much a work in progress, a beta program that I expect will improve dramatically in the months to come. It shares two advantages with Firefox: Chrome is open-source, meaning outside developers are free to extend and improve it. And Chrome includes a plug-in infrastructure that lets people create add-ons. Because it's new, neither of these features is very important yet. But if Chrome catches on, developers will likely build these and other great programs for it; theoretically, people could even take the best bits of Firefox and Chrome and build a single awesome browser. For Google, Microsoft, and Apple, the browser fight is a means to other ends. Microsoft, which holds more than three-quarters of the browser market, looks at the Web as an extension of its operating system. As more of our programs move online, Microsoft fears that we might have little reason to stick to Windows; it sees control of the browser as a way to control the future of software development. Google seems to want to be in the browser business to fight Microsoft. The company's revenue comes entirely from the Web, so it's got to be wary that most of its customers come through software created by its main rival. (Google substantially underwrites both Firefox and Opera, which both feature Google's search engine as the default.) Apple, meanwhile, needs a browser to beef up its own platform—not only on the Mac but also on its phones and iPods. Sure, these aims aren't entirely noble. But who cares? As the giants duke it out to come up with the best product, they'll copy and improve upon each other's innovations, bringing new features to all browsers. Chrome's immunity to crashing, for instance, is sure to push both Mozilla and Microsoft to improve their browsers' stability. Perhaps soon you'll be able to load up any browser you like and watch two dozen YouTube videos at once without fearing a crash—you know, just like the Web was always meant to be used.







VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

How To Speed-Read the Net

The invention of the Web browser added pictures to the Internet, but all those images still haven't made reading online a pleasant experience. If you're someone who uses the Web as your main source of news, you probably have 60 bookmarks that you never use, or you open 30 browser windows simultaneously to keep track of the articles you want to read—but you never get around to all of them. Never mind the killjoy, even on a fast connection, of waiting for some Web pages to load. Surfing within one well-designed site isn't so bad, but when you hop from site to site, there's nothing that replicates the appeal of scanning your local magazine rack or that pile of magazines splayed across your coffee table. But there's a way to keep track of the New York Times, the Washington Post, Talkingpointsmemo.com, Wonkette—most major newspapers and nearly all blogs—in a lightweight, speed-readable format that lets you scan dozens, even hundreds, of fresh headlines a day without the time-wasting tedium of opening one Web site after another. All you need to do is download and install an RSS reader, which is no harder than installing Netscape's browser was in 1994. You can then scroll through cleanly organized headlines and story summaries. The result is an executive summary of what's new on the Net today. When you see a story you want to read, you click on it.


RSS ("Really Simple Syndication" or "Rich Site Summary," depending on whom you ask) has three distinct advantages over Web browsing and e-mail, the two most popular ways to read news online. First, no ads or graphics clutter the headlines and article summaries. True, most news sites make you click through to the full Web page to read the whole story, but scanning an RSS reader is still more efficient than looking at, say, the front page of the New York Times online. And bloggers, who don't depend on ads for survival, usually stuff their entire posts into RSS.

Second, an RSS reader automatically updates itself with the latest items from the sites you tell it to watch, so it's always fresh. You don't have to hop from site to site, or constantly click "refresh," to know what's been published by the sites you frequent most. Lastly, you can include customized RSS "feeds" that cull material from multiple news sources into a single data stream. For example, John Kerry's staff provides an RSS feed on his blog to funnel the latest coverage and endorsements to RSS-using supporters.

How do you get started? The first step is to install an RSS reader (also known, somewhat clumsily, as an "RSS aggregator"). For PC users, my techie friends and the editors at PC World recommend SharpReader. It's free, although the developer welcomes donations from happy users. If you get error messages when you try to start it (such as, "The application failed to initialize properly" or, "The dynamic library mscoree.dll could not be found"), go to the Windows Update site. There, find and install the Microsoft.NET Framework. Reboot, and you should be able to launch SharpReader. (I'm on a Mac, so I use Shrook.) Once you've installed a reader, go back to your browser and open your favorite site. Most sites have a link that says "RSS" or an orange button that says "XML." Some sites have multiple links, one for each section of the publication. Cut and paste these URLs into your reader to read the site in RSS. Sorry, there's no one-click or "click here" method for this yet. After a few seconds, a list of headlines should appear. Click on SharpReader's "Subscribe" button if you want to add the feed to your reading list. There is a neat shortcut that often works in lieu of the above mouse dance. Just type the site's main URL into SharpReader's URL window (e.g., "www.wonkette.com"). SharpReader will go to the site and look for an RSS feed for you. If it finds one, it will automatically load it. I find this trick usually works with blogs but not with newspaper sites. One nuisance is that some sites, including the New York Times, don't list their feeds on their home pages, even though the Times provides feeds for nearly 20 sections. Even more confusing, some newspapers' feeds are only available through a third-party site such as NewsIsFree, which can prove impossible to search. To find those feeds, use the Syndic8 search engine. (The search box is hard to find; it's halfway down the site's home page, on the left.) If your favorite site doesn't have an RSS feed, odds are it will soon: Slate launched its feed today, and Amazon just added RSS feeds to let shoppers speed-browse its inventory.

To make RSS live up to its "really simple" moniker, I've compiled the feeds for some favorite reads—everything from Slate to the "Today's Papers" newspapers to some major blogs—on this page. Just right-click on the link, save it to your desktop, then import the file to your RSS reader. To do that in SharpReader, click File, then Import Subscriptions. Most RSS programs have a Preferences option that lets you tell the program how often to check sites for updates. Once you've subscribed to a feed, SharpReader will update it every hour. You can fiddle with the Preferences menu to speed that up to as little as 15 minutes. For advanced info junkies, there are more extreme ways to dose yourself. Feedster searches the content of thousands of RSS feeds and returns the newest posts first. It's sort of the Google News for RSS, but you can find stuff posted an hour ago that won't show up on Google for days. NewsGator is a program that works with Microsoft Outlook so you can sync incoming news and blogs to your PDA. No need to begin by going off the deep end, though. Start with SharpReader, cut and paste the RSS links from five or 10 of your favorite sites, and you'll instantly be rewarded with faster, less frustrating Net reading.

VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Friday, September 5, 2008

R.I.P RALITA (ANAK YANG HILANG) TELAH BERPULANG


Hari ini tgl .04-09-2008 aku mendapatkan email dari seorang wanita yang bernama "LINDA HUDSON" . Dia mengabarkan pada aku berita duka ini. Inilah isi surat itu:

Greetings,
Did you know that Lita had cancer? She didn't tell some of her online friends. She didn't want them to worry. Lita went to the doctor on Thursday, August 21. He told her the chemotherapy (obat) was no longer working to cure her cancer. He said she had 3 months to one year to live. She wanted to return to Indonesia. But, she died on Sunday, August 24.
She had a good, two-hour telephone visit with her family after her doctor appointment. They also called Saturday night to tell her goodbye. She was in a coma but when she heard her father's voice, she woke up long enough to hear her family.
I was there when Ralita died. She was at her home in Dallas. She was in a coma. Her American mother laid down on the bed beside her. We prayed. Her American mother sang to her. Lita gently passed from her American mother's arms into the arms of Jesus.
Lita's American parents will take her body back to Indonesia to her mother and father. She will be buried there. I think the service will be sometime next week. If you would like to contact her family, I can send you her father's phone number.
I really am not comfortable sending you the last pictures of Lita. It would be better for you to remember her from earlier photos. I love the photo of her on her friendster page - Lita hugging the teddy bear and smiling like always.
Please share with all her online friends how much you all meant to her. She had such fun with all of you. She loved hearing from you. The time she spent with her online friends was happy time for her.
Lita was an amazing young woman. Everyone who met her was touched by her beautiful smile and her sweet, spunky spirit. She will be greatly missed.
I have a friendster account. If you would like to stay in touch, you can find my account via my aol account.
Blessings,
Linda Hudson

Aku tak mampu berfikir dan saat ini baru ini yang bisa aku tuangkan
Lita adalah pemilik blog: Anak yang hilang


Selamat jalan kawan....
Selamat jalan adikku tersayang.....
Selamanya kamu tetap RALITA buat aku...
Tidurlah dengan damai....
Doaku selalu menyertai perjalananmu


INFORMATION


VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Thursday, September 4, 2008

Firewall Protection - How to, Big one

What is a Firewall?
A firewall is a tool that monitors communication to and from your computer. It sits between your computer and the rest of the network, and according to some criteria, it decides which communication to allow, and which communication to block. It may also use some other criteria to decide about which communication or communication request to report to you (either by adding the information to a log file that you may browse whenever you wish, or in an alert message on the screen), and what not to report.

What Is It Good For?
Identifying and blocking remote access Trojans. Perhaps the most common way to break into a home computer and gain control, is by using a remote access Trojan (RAT). (sometimes it is called "backdoor Trojan" or "backdoor program". Many people simply call it a "Trojan horse" although the term "Trojan horse" is much more generic). A Trojan horse, is a program that claims to do something really innocent, but in fact does something much less innocent. This goes to the days where the Greek soldiers succeeded to enter through the gates of Troy by building a big wooden horse, and giving it as a present to the king of Troy. The soldiers allowed the sculpture to enter through their gates, and then at night, when the soldiers were busy guarding against an outside attack, many Greek soldiers who were hiding inside the horse went out and attacked Troy from the inside. This story, which may or may not be true, is an example of something which looks like something innocent and is used for some less innocent purpose. The same thing happens in computers. You may sometimes get some program, via ICQ, or via Usenet, or via IRC, and believe this program to be something good, while in fact running it will do something less nice to your computer. Such programs are called Trojan horses. It is accepted to say that the difference between a Trojan horse and a virus, is that a virus has the ability to self-replicate and to distribute itself, while a Trojan horse lacks this ability. A special type of Trojan horses, is RATs (Remote Access Trojans, some say "remote admin Trojans"). These Trojans once executed in the victim's computer, start to listen to incoming communication from a remote matching program that the attacker uses. When they get instructions from the remote program, they act accordingly, and thus let the user of the remote program to execute commands on the victim's computer. To name a few famous RATs, the most common are Netbus, Back-Orifice, and SubSeven (which is also known as Backdoor-G). In order for the attacker to use this method, your computer must first be infected by a RAT.
Prevention of infections by RATs is no different than prevention of infection by viruses. Antivirus programs can identify and remove most of the more common RATs. Personal firewalls can identify and block remote communication efforts to the more common RATs and by thus blocking the attacker, and identifying the RAT.


Blocking/Identifying Other Types of Trojans and WQorms?
There are many other types of Trojan horses which may try to communicate with the outside from your computer. Whether they are e-mail worms trying to distribute themselves using their own SMTP engine, or they might be password stealers, or anything else. Many of them can be identified and blocked by a personal firewall.

Identifying/Blocking Spyware's/Adbots?
The term "spyware" is a slang which is not well defined. It is commonly used mainly for various adware (and adware is a program that is supported by presenting advertisements to the user), and that during their installation process, they install an independent program which we shall call "adbot". The adbot runs independently even if the hosting adware is not running, and it maintains the advertisements, downloads them from the remote server, and provides information to the remote server. The adbot is usually hidden. There are many companies that offer adbots, and advertisements services to adware. The information that the adbots deliver to their servers from the computer where the adbot is installed, is "how much time each advertisement is shown, which was the hosting adware, and whether the user clicked on the advertisement. This is important so that the advertisements server will be able to know how much money to get from each of the advertised companies, and how much from it to deliver to each of the adware maintainers. Some of the adbots also collect other information in order to better choose the advertisements to the users. The term "spyware" is more generic, but most of the spyware fall into this category. Many types of adbots can be identified and blocked by personal firewalls.

Blocking Advertisements?
Some of the better personal firewalls can be set to block communication with specific sites. This can be used in order to prevent downloading of advertisements in web pages, and thus to accelerate the download process of the web sites. This is not a very common use of a personal firewall, though.

Preventing Communication to Tracking Sites?
Some web pages contain references to tracking sites. e.g. instruct the web browser to download a small picture (sometimes invisible) from tracking sites. Sometimes, the pictures are visible and provide some statistics about the site. Those tracking sites will try to save a small text either as a small file in a special directory, or as a line in a special file (depending on what is your browser), and your browser will usually allow the saving site to read the text that it saved on your computer. This is called "web cookies" or sometimes simply "cookies". Cookies allow a web site to keep information that it saved some time when you entered it, to be read whenever you enter the site again. This allow the web site to customize itself for you, and to keep track on everything that you did on that site. It does not have to keep that information on your computer. All it has to save on your computer is a unique identifying number, and then it can keep in the server's side information regarding what has been done by the browser that used that cookie. Yet, by this method, a web site can get only information regarding your visits in it. Some sites such as "doubleclick" or "hitbox" can collect information from various affiliated sites, by putting a small reference in the affiliated pages to some picture on their servers. When you enter one of the affiliated web pages, your browser will communicate with the tracking site, and this will allow the tracking site to put or to read a cookie that identifies your computer uniquely, and it can also know what was the web page that referred to it, and any other information that the affiliated web site wanted to deliver to the tracking site. This way tracking sites can correlate information from many affiliated sites, to build information that for example will allow them to better customize the advertisements that are put on those sites when you browse them.
Some personal firewalls can be set to block communication to tracking sites. It is not a common use of a personal firewall, though, and a personal firewall is not the best tool for that, but if you already have one, this is yet another possible use of it.

Blocking or Limiting the NetBIOS Communication? (as well as other default services)
The two common methods of intruders to break into home computers, are through a RAT (which was discussed in II.3a) and through the NetBIOS communication. The NetBIOS is a standard for naming computers in small networks, developed long ago by IBM and Microsoft. There are a few communication standards which are used in relation to the NetBIOS. The ones that are relevant for Microsoft Windows operating systems, are: NBT (NetBIOS over TCP/IP), IPX/SPX, and NetBEUI. The communication standard which is used over the Internet, is NBT. If it is enabled, and there is no firewall or something else in the middle, it means that your computer is listening for communications over the Internet via this standard, and will react according to the different NBT commands that it gets from the remote programs. It is thus that the NBT (which sometimes loosely called "NetBIOS") is acting as a server. So the next question should be "what remote NBT commands the NBT server will do on the local computer". The answer to this question depends on the specific setting on your computer. You may set your computer to allow file and print sharing. If also NBT is enabled, it means that you allow remote users to share your files or printers. This is a big problem. It is true that in principle the remote user has to know your password for that computer, but many users do not set a password for their user on Windows, or set a trivial password. Older versions of Win95 had file and print sharing over NetBIOS enabled by default. On Win98, and WinMe it was disabled by default, but many technicians, when they set a home network, they enable the file and print sharing, without being aware that it influences also the authorizations of a remote Internet user. There are even worms and viruses who use the File sharing option to spread in the Internet. Anyway, no matter whether you need it for some reason or just are not aware of it, a personal firewall can identify and block any external effort to communicate with the NetBIOS server on your computer. The more flexible personal firewalls can be set to restrict the authorization to communicate with the NetBIOS. Some Windows operating systems, especially those which are not meant for home uses, offer other public services by default, such as RPC. A firewall can identify communication efforts to them, and block them. Since such services listen to remote communications, there is a potential risk when there are efforts to exploit security holes in the programs that offer the services, if there are such security holes. A firewall may block or limit the communication to those services.

Hiding Your Computer on the Internet?
Without a firewall, on a typical computer, even if well maintained, a remote person will still be able to know that the communication effort has reached some computer, and perhaps some information about the operating system on that computer. If that computer is handled well, the remote user will not be able to get much more information from your computer, but might still be able to identify also who your ISP is, and might decide to invest further time in cracking into your computer.
With a firewall, you can set the firewall so that any communication effort from remote users (in the better firewalls you may define an exception list) will not be responded at all. This way the remote user will not be able to even know that it reached a live computer. This might discourage the remote attacker from investing further time in effort to crack into your computer.

The Non-Firewall Defenses

We've discussed a few situations where a personal firewall can provide defense. Yet, in many cases a computer maintainer can deal with those situations even without a firewall. Those "alternative" defenses, in many cases are recommended regardless of whether you use a firewall or not.

Remote Access Trojans?
The best way to defend against remote access Trojans (RATs) is to prevent them from being installed in the first place on your computer. A RAT should first infect your computer in order to start to listen to remote communication efforts. The infection techniques are very similar to the infection techniques that viruses use, and hence the defense against Trojan horses is similar to the defense against viruses. Trojan horses do not distribute themselves (although they might be companions of another Internet worm or virus that distributes them. Yet, because in most cases they do not distribute themselves, it is likely that you will get them from anonymous sources, such as instant messengers, Kazaa, IRC, or a newsgroup. adopting a suspicious policy regarding downloads from such places, will save you not only from viruses but also from getting infected with Trojan horses, including RATs. Because Trojan horses are similar in some ways to viruses, almost all antivirus programs can identify, block from being installed, and remove most of the Trojan horses, including all the common ones. There are also some programs (sometimes called antiTrojan programs) which specialize in the identification and removal of Trojan horses. For a list of those programs, and for comparison on how well different antivirus, and antiTrojan programs identify different Trojan horses, see Hackfix (http://www.hackfix.org), under "Software test results". Hackfix also has information on the more common RATS (such as the Netbus and the Subseven) and on how to remove them manually. There are some tools and web sites, such port scanners, and some ways with a use of more generic tools such as telnet, msconfig, and netstat, which may help you to identify a RAT.

Other types of Trojans and worms?
Also here your main interest should be to prevent them from infecting your computer in the first place, rather than blocking their communication. A good antivirus and a good policy regarding the prevention of virus infections, should be the first and most important defense.

Spyware and Adbots?
The term spyware is sometimes misleading. In my view, it is the responsibility of the adware developer to present the fact that the adware installation will install or use an independent adbots, and to provide the information on how this adbot communicates, and which information it delivers, in a fair place and manner before the adware is installed. It is also a responsibility to provide this information in their web sites, so that people will be aware of that before they even download the software. Yet, in general, those adbots do not pose any security threat, and in many cases also their privacy threat is negligible for many people (e.g. the computer with adbot number 1127533 has been exposed to advertisements a, b, c, such and such times, while using adware x, while on computer with adbot number 1127534 has been exposed to advertisements a,d, and e, such amount of time, with the use of adware y, and clicked on ads number d). It should be fully legitimate for software developers to offer an advertisement supported programs, and it is up to the user to decide whether the use of the program worth the ads and the adbot, or not. Preventing adbot from communicating is generally not a moral thing. If you decide to use an adware, you should pay the price of letting the adbot work. If you don't want it, please remove the adware, and only if for some reason the adbot continue to work even if no hosting adware that uses it is installed, you may remove the adbot. Anyway, there are some very useful tools to identify whether a program is a "spyware", or whether a "spyware" is installed on your computer, and you are certainly entitled to this information. Two useful programs are "AdAware" which identifies "spyware" components on your computer and allows you to remove them, and Ad-Search which allows you to provide a name of a program, and it tells you whether this program is a "spyware" and which adbot it uses. It is useful to assist you in choosing whether to install a program or not. You may find those programs in http://www.lavasoft.nu (or, if it doesn't work, you may try http://www.lavasoftusa.com). Those programs are useful, mainly because many adware developers are not fair enough to present this information in a fair manner. AdAware allows you to also remove those adbot components from your computer. This might, however, terminate your license to use the hosting adware programs, and might even cause them to stop functioning. A website which offers to check whether a specific program that you wish to install is "spyware" or not, is http://www.spychecker.com .

Blocking Advertisements?
Leaving aside the moral aspect of blocking advertisements, a personal firewall is not the best tool for that anyway. This is not the main purpose of a firewall, and neither its main strength. Some of them can block some of the advertisements from being downloaded, if you know how to configure them for that. Yet, there are better tools for that, such as Proxomitron (http://www.proxomitron.org), CookieCop 2 (search for the word cookiecop on http://www.pcmag.com), or Naviscope (http://www.naviscope.com), and there are many other programs as well. You may check for other alternatives, e.g. in Tucows (http://www.tucows.com/adkiller95.html).

Blocking Tracking Sites?
Also here, a personal firewall is not the best tool for that, and there are other tools and ways which are more effective. These are cookie utilities. Since a tracking site uses a cookie to identify and relate the information gathered to the same person (or computer), by preventing the cookie from being installed. The tracking site will lose its ability to track things. There are plenty of cookie management utilities. Some of them are freeware, and some are not. CookieCop which was mentioned in the former section is one of them. WebWasher (http://www.webwasher.com) is another recommended one, and there are plenty of other alternatives such as cookie-crusher, cookie-pal, pop-up killer, etc. You may search for other alternatives, in Tucows (http://www.tucows.com/cookie95.html).

NetBIOS and Other Services?
The NetBIOS over TCP/IP (NBT) which is sometimes loosely called "NetBIOS", is a service which has some security problems with it. It is enabled by default in Windows default installations, and it is very common to see that a firewall does the job of preventing the efforts to get access to your computer via NBT. Yet, in almost all cases, this service is not needed, and thus can be disabled. To disable NBT in Win95/98/ME is not as simple as it is in Win2K/XP, but can still be done reliably. We explain how to do this in another article (#to be written soon). It is needless to say, that if NBT is disabled, there is no need for a firewall to block communication to it. Also, in the case of other services, such as RPC services, and others, in many cases you simply don't need those services and better disable them from within Windows rather than use the firewall to block them. There are various ways to know which services are running on your computer, and which of them are listening for communications from the outside. If there are ones that you don't need, they should be disabled.

Hiding the Computer?
In web sites of many personal firewall companies, they are putting a lot of weight on the ability of their firewall to hide the computer on the Internet. Yet, exposing your home computer on the Internet is by itself, neither a security nor a privacy threat. If you provide some services to the Internet on your computer, for example, you put a web server on your computer to allow other people to view web pages, then you might get rid of some of the crackers, by setting your firewall to unhide only this type of communications. Some attackers will not make a full scan of your computer, but only a partial scan, and if they did not scan for the specific service that you provided, they will not see your computer. Yet, if the service is a common one, there is a good chance for many of them to scan it and thus find the existence of your computer. If they "see" the existence of your computer, they might decide to scan it further, and find out the services you are providing, and scan it for security holes to use. Yet, there is no much meaning to it when we speak about simple home computers.

What a Firewall Cannot Do!

Another misconception about personal firewalls is that they are incorrectly thought as if they claim to give an overall protection against "hackers" (i.e. intrusions). They are not.
Defense Against Exploitation of Security Holes
A firewall can allow or deny access to your computer or from your computer according to the type of communication, its source and destination, and according to the question which program on your computer is handling the communication. Yet, its ability to understand the details of the communication is very limited. For example, you may set the firewall to allow or to deny your e-mail program from getting and/or sending messages. It may allow or deny your web browser from browsing the Internet. But if you allowed your e-mail program to communicate with the e-mail servers for sending and receiving messages, (and you are likely to allow it if you want to use your e-mail program), or if you set the firewall to allow your web browser to communicate with web sites, the firewall will not be able to understand the content of the communication much further, and if your web browser has a security hole, and some remote site will try to exploit it, your firewall will not be able to make a distinction between the communication that exploits the security hole, and legitimate communication. The same principle goes with e-mail program. A personal firewall may block you from receiving or sending e-mail messages, but if you allowed it to receive messages, the personal firewall will not make a distinction between a legitimate message and a non-legitimate one (such as a one that carries a virus or a Trojan horse). Security holes in legitimate programs can be exploited and a personal firewall can do practically nothing about it.
I should comment, however, that some personal firewalls come combined with some Trojan horse detection, or intrusion detection. This is not part of the classical definition of a firewall, but it might be useful. Such tasks are usually taken by other tools such as antivirus programs or antiTrojan programs.

Tricks to Bypass or Disable Personal Firewalls
There are also various ways to disable, or bypass personal firewalls. During the time a few tricks to bypass or disable were demonstrated by various programs. Especially, tricks for an internal program to communicate with the outside bypassing or tricking the firewall. For some of them such as the one demonstrated by the Leaktest, and in which a non-legitimate program disguises itself as Internet Explorer, practically today, all personal firewalls are immuned. For other tricks, such as a one demonstrated by Outbound, which uses some non-standard type of communication directly to the network adapters bypassing the components of the operating system which are suppose to deal with Internet communication, and by that bypassing the firewall, are only now being patched against by the various firewalls, and yet other methods, such as the one demonstrated by Tooleaky, which uses Internet Explorer as a messenger to communicate with the outside, and is thus identified as a mere legitimate browsing, are still waiting for most of the personal firewall to find a fix.

Firewalls CANNOT Decide for You What is a Legitimate Communication and What is Not

One of the main problems with personal firewalls, is that you cannot simply install them and forget them, counting on them to do their job. They can deny or permit various types of communications according to some criteria, but what is this criteria, and who decides what is the criteria for whether they should permit or deny some communication?

The answer, is that it is the computer user's job to define the exact criteria when the firewall should allow a communication and when it should block it. The firewall may make it easier for you, but it should not take the decisions. There are too many programs, too many versions, and it is not possible for the firewall to decide accurately when a communication is legitimate and when it is not. One person might think that it is legitimate for some program to deliver some information to the outside in order to get some service, while another will think that it is not. One version of a program might communicate with its home server in order to check whether there is an upgrade, and another version might also install the upgrade even if you do not wish. Some firewalls will try to identify communication efforts which are largely considered as legitimate, and will let you the information so that it will be easier for you to decide whether such should be allowed. Others will suffice with more basic information, making no suggestions (and thus - no incorrect recommendations). One way or another, once you installed a firewall, you will have better means to understand what types of communications are running on your computer, but you will also have to understand them in order to be able to configure your firewall so that it will correctly know which communications to allow and which to block.

Common Problems and Deficiencies Regarding Personal Firewalls

A personal firewall might be a good contribution to security. Yet, if you do not understand much about the topic, then you are likely to be confused and misled by its alerts and queries, and thus find yourself spending hours in chasing after imaginary crackers, fear from imaginary threats, and misconfigure it due to misunderstanding. You may find yourself blocking legitimate and important communication believing it to be cracking efforts, and thus surprised to see why things work slowly or why you are disconnected from the Internet, or you might be misled to allow a non-legitimate communication by some software that tricked you to believe that it is a legitimate one. On the other side, if you are quite knowledgeable on computers and security, then you are likely to effectively defend your computer even without a firewall (by means discussed in section II.4) and it is thus that the role of personal firewall in securing your computer, is extremely small and not much important. We discuss here in brief some of the problems that personal firewalls may generate.

A False Sense of Security

As we've already learned here, a firewall is limited in its ability to secure your computer. Yet, many people believe that if they will install a personal firewall they will be secured against the various security threats. I was even surprised to find out that there are people who believe that give much higher priority in installing a personal firewall than in installing an antivirus program. An always updated antivirus program plays a much more important role in the security of a personal home computer than installing and maintaining a personal firewall. A personal firewall should not come on account of any other security measure that you use.

A False Sense of Insecurity

When you install a firewall and you look at all the communication efforts through it, you might be surprised at the amount of communication efforts from the Internet to your computer. Most of them are blocked by a typically configured firewall. There are all the times efforts to try to communicate with various backdoor Trojans on your computers. If you are not infected, there will be nothing to listen and to respond to those communication efforts, and they are thus practically harmless. There are efforts to communicate with your NBT driver, to see if your computer by mistake allows file sharing. There are other types of probes to see if your computer exists, or various efforts of servers to probe your computer in order to find the best path for legitimate communication to it. There are sometimes remnants of communications that were supposed to go to other computers, but made their way to yours (for advanced readers: because the IP number that your computer uses, were used by some other computer earlier). Those communication efforts are blocked even without a firewall. If your computer is not infected with a RAT, and if your computer don't have NetBIOS over TCP/IP enabled or even it does not have file and print sharing enabled (and on most computers this is disabled by default), then none of these pose any security threat. If your computer is not infected with a SubSeven Trojan, then no matter how often there will be efforts to communicate with it, they are all doomed to be failed.
Yet, some personal firewall (such as Norton Personal Firewall or ZoneAlarm) by default proudly announce that they have just blocked an effort to crack into your computer. Norton may even define those efforts that were blocked as "high security threats" while they were not a threat at all even if your computer didn't have a personal firewall at all. Such firewalls give you the false impression that they save your computer again and again from extremely dangerous threats on the Internet, so that you wonder how did you survive so much time without noticing any intrusion before you installed the firewall. I usually say, that those personal firewalls are set their "report level" to "promotional mode". Namely, the personal firewall is set to give you the false impression that it is much more important than it really is.

Chasing After Ghosts

This is a side effect of the types of misunderstandings that were discussed in the previous subsection.
When a person who starts to learn about the jargon related to personal firewalls, is reported that some "dangerous" communication efforts persist from the same source, the person is decisive to locate and identify the "hacker", and perhaps report about it to the police or to its Internet service provider. However, since many people do not really understand thoroughly how things work, they may sometimes spend many hours in trying to locate a cracker that does not exist, or when the knowledge they need to have, in order to track the cracker, is much higher than what they have, and they might even suspect the wrong person due to lack of knowledge (e.g. the connection person on the Internet service provider that was used by the cracker). More knowledgeable people, usually do not bother to track those "hackers" (which are usually teenagers), but instead are concentrating on the security of their computer.

Blocking Legitimate Communications

No personal firewall is smart enough to decide for the user what is a legitimate communication and what is not. A personal firewall cannot make a distinction between a legitimate program trying to contact its server to check and notify the user when there is a newer version, and a non-legitimate program trying to communicate with its server in order deliver sensitive information such as passwords, unless the user tells it. It is thus up to the user to decide what should be considered as legitimate and what should not. Yet, can we count on the user to be knowledgeable enough to decide what is legitimate and what is not? In many cases the user is not knowledgeable enough, and may thus allow non-legitimate communication or disallow a legitimate and important communication. There are many types of communications handled just to manage other communications. Among this are various types of communications between your computer and the various servers of your Internet service provider. A not knowledgeable user may interpret those types of communications as cracking efforts, and will thus decide to block them. As a result, a connection might become slower, a connection to the Internet service provider might be disconnected quiet often and other types of communication problems.

Being Tricked by Trojans bbb

Just as less knowledgeable users may instruct the firewall to block legitimate communications, they can be tricked by various Trojans to allow them to communicate. Some Trojans are using names resembling or identical to names of legitimate programs, so that the user would think that it is a legitimate programs. Users should be aware of that.

Heavy Software, Buggy Software

Until now we discussed only problems related to lack of appropriate knowledge by the user. Yet, there are other problems regarding personal firewalls. For example, some of them are known to be quite heavy on computer resources, or slow down the communication speed. Different personal firewalls quite vary with regard to that. If you have a new computer with a slow Internet communication (such as regular dial-up networking) then it might not slow down your computer noticeably. Yet, if you use an older computer, and a fast communication, you might find that some personal firewalls will slow down your communication quite drastically. Personal firewalls also vary on how much they are stable.

Advantages of External Firewalls over Personal Firewalls

1. They do not take resources from the computer. This should be clear. This is especially useful when the firewall blocks flooding attacks.
2. It is harder (although in principle still possible) for a Trojan horse to disable it, because it does not reside in the same computer that the Trojan has infected. It is not possible to use the specific communication while totally bypassing the firewall.
3. They can be used without any dependence on the operating system on the computer(s) they defend.
4. No instability problems.



VIVA INDONESIA CODER TEAM
Get The Code and Fell The SOUL

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Sweet Tomatoes Printable Coupons