Saturday, September 27, 2008

Security warning over patient files || Wednesday, 23 July 2008 ||

A hacker who "tagged" medical centre websites, including one in Wellington, could have gone on to gain access to patients' records, a computer security expert says.Aura Software Security managing director Andy Prow said the hacker, who called himself "Mister Saint", appeared to be a prankster and made no attempt to gain access to patient data."But this highlights the security risks ... general practice should really take this as a warning."As repositories of highly sensitive information, medical clinics were prime targets for hackers looking for kudos, he said.Karori Medical Centre was among several practices that had their websites emblazoned with the cheeky message: "Hacked by Mister Saint".Centre manager Jo Douglas said the bogus links were removed as soon as they were discovered last week...

Tuesday, September 23, 2008

SAOSIN - Seven Years

Taking on seven yearsthe holy ghost had left aloneTest my arms, kick like crazyI've been trying way too longonly push the way off to fight youNow I'm sorry, I'm sorry, I'm not sureGetting off my chestthe story endsI would find a way without...Tell him his eyes see too clearI would find a way without youTell him his eyes see too clearThat mistake was goldI know that without youis something that I could never doThat was why staple the eyes andseven dates for me to sell machinesand tear onSeven years you assured methat I'd be fine if I compliedonly push the way off to fight you(only push the way off to fight you)Now I'm sorry, I'm sorry, I'm not sureGetting off my chestthe story endsI would find a way without...Tell him his eyes see too clearI would find a way without youTell him his eyes see...

Story of The Year - Until The Day I Die

Until the day I dieI'll spill my heart for you, for youUntil the day I dieI'll spill my heart for youAs years go byI race the clock with youBut if you died right nowYou know that I'd die tooI'd die tooYou remind me of the timesWhen I knew who I was (I was)But still the second hand will catch usLike it always doesWe'll make the same mistakesI'll take the fall for youI hope you need this nowCause I know I still doUntil the day I die (Until the day I die)I'll spill my heart for youUntil the day I die (Until the day I die)I'll spill my heart for youShould I bite my tongue?Until blood soaks my shirtWe'll never fall apartTell me why this hurts so muchMy hands are at your throatAnd I think I hate youBut still we'll say, "remember when"Just like we always doJust like we always doUntil the day I die...

Breaking Benjamin - Diary of Jane

If I had toI would put myself right beside youSo let me askWould you like that?Would you like that?And I don't mindIf you say this love is the last timeSo now I'll askDo you like that?Do you like that?No!Something's getting in the waySomething's just about to breakI will try to find my place in the diary of JaneSo tell me how it should beTry to find out what makes you tickAs I lie downSore and sickDo you like that?Do you like that?There's a fine line between love and hateAnd I don't mindJust let me say that I like thatI like thatSomething's getting in the waySomething's just about to breakI will try to find my place in the diary of JaneAs I burn another pageAs I look the other wayI still try to find my place in the diary of JaneSo tell me how it should beDesperate, I will crawlWaiting for...

Tuesday, September 16, 2008

tukulesto.co.cc

This is my page rank @ www.alexa.comLook at here for more detailsVIVA INDONESIA CODER TEAMGet The Code and Fell The S...

Sunday, September 14, 2008

Gmail security hole found and fixed

A bug of Gmail has been found which, if being abused, could give you access to any account. The bug was discovered in 14 Oct, by Anelkaos of elhacker.net. Anelkaos reported it to Google, which then fixed the bug 4 days later. I have a very quick look at the hacking procedure. If I understand that correctly, it involves using an victim’s partial "authentication string" - something like session ID or the long, seemingly random string sometimes you could see in URLs - to fake Gmail into believing that you were logged in as the victim. The procedure looks complicated, but can definitely be eased by a script or something. Anyhow, it is glad that Google has fixed it rather quickily.VIVA INDONESIA CODER TEAMGet The Code and Fell The S...

Google Analytics is watching YOU

I hosted this site on my own server before moving it to sourceforge. At that time, I used a free, lite version of WebLog Expert to generate site traffic information from the Apache log files. It was good. Of course this method no longer works as I do not have access to the log files now. I did not track the traffic, until Google announced Google Analytics, a free traffic-analyzing service for everyone. Oh, Google again! Those skeptics said, they are more and more like Microsoft, who keep acquiring and expanding and using "advanced" technology until there is no room (and money) for its competitors. But according to Eric Peterson, a senior analyst on web site technology, Google does not seem to be forcing other analytics vendors out of...

Filesystem for web app?

Ajax is hot. Some people even claimed that web applications, or web apps, based on this technology will one day dominate the market. Many people retold Sun’s motto some years ago: "Network is the computer." And suddenly, Google, with its rich "lab" of web apps, becomes the most threatening enemy of Microsoft. For security reason, browsers, and hence web apps, cannot access to your local files. Some say this is a critical limitation of web apps. But who needs local files if most of your apps are web-based? Actually, web apps nowadays normally allow you to open/save files located in their own domain. However, cross-domain file access is usually not supported. For example, the photos you saved in Flickr cannot be accessed from Writely. Well, Flickr is popular, so some web apps, mostly blog...

Gmail is not Gmail

Because of a new law suit, Gmail might not be able to keep using the name Gmail. This is an old news, and Google have already done something to “unload” the name. The changes have been done quietly that the general public may not notice, but not to us developer. For example, because of its change in URL from gmail.google.com/gmail to mail.google.com/mail, gmail-lite and libgmailer failed to use immediately. Fortunately we discovered that and fixed it quickily. And now it seems that you cannot find any references to the word “Gmail” anywhere in its AJAX source code. Google would probably rename Gmail back to “Google Mail”. Boring name, but safe. After this, I think Google will no longer “invent” new names for its new products. They will keep on using the pattern “Google xxxx”: Google Maps,...

Finally, the official Gmail lite

Google has just launched Gmail Mobile, a simplified XHTML interface for mobile phone with browsers. According to their Help Center: Gmail Mobile lets you access your Gmail account from your mobile phone. Just enter http://m.gmail.com in your phone’s web browser to log in to your account. Gmail Mobile offers a number of cool features: The interface is automatically optimized for the phone you’re using You can access attachments, including photos, Microsoft Word documents, and .pdf files If you enter phone numbers in your Gmail Contacts list, you can reply to messages by call You can try it yourself by entering this URL: http://m.gmail.com Does it mark an end to the gmail-lite/gmail-mobile projects? Not really. We will continue our maintenance...

Yahoo! INVISIBLE CHECKER

Priview :This is the answer, Check this outtools[at]indonesiancoder.comVIVA INDONESIA CODER TEAMGet The Code and Feel The S...

Friday, September 12, 2008

Learn how to send your own fake email

So, you want to learn how to send your own fake mail? It's extraordinarily easy to do, and requires no extra software installed on your PC at all. It can be done with Windows, Macintosh, Linux - any modern PC that has an internet connection will do it.There are a just a few simple steps. First, you'll need to decide on the FROM and the TO email addresses. If the FROM address that you're choosing isn't a real one, make sure that the domain name (the bit after the @ sign) is a real one. If it's not a real one, it almost certainly won't work.For the purpose of this tutorial, we'll be sending from bush@whitehouse.gov to dummy@deadfake.com.Second, you'll need to find out the mail server that your recipient is using.Windows User :Click Start, Run, enter "CMD", then presss OK. In the window that...

Thursday, September 11, 2008

Encrypt your Gmail Email!

If you want to be sure that your email can be read by no one but you, then it needs to be encrypted. You'd be surprised to find out who might want to read your email. I was.One of the best encryption systems is called GPG encryption which is an open-source version of PGP encryption. PGP stand for Pretty Good Privacy and is actually an understatement made by a programmer who didn't want to be too optimistic about how secure it is. However, as it turns out, PGP is has actually proven itself to be extremely good. It's been around for many years, being maintained by the best coders in the world and it hasn't been cracked.In this Instructable, I'll walk you through the simple process of setting up GPG and then installing a Firefox plugin that will...

Boot and Run Ubuntu from a Flash Drive

Running an operating system, like Windows, off of your flash drive can be very useful sometimes. You can recover your data from a hard drive and copy it to an external hard drive if that computer won't boot up or scan that computer for viruses and so on... This Instructable will show you how to install, boot, and run the popular Linux distro, Ubuntu from your flash drive. You will be able to automatically save your changes and settings back to the flash drive and restore them on each boot using a second partition.You can run Ubuntu will all your settings and files, even if you don't have your own computer with you. You will have a whole, powerful operating system in your pocket!Sorry for the not very helpful pictures. It was to hard to document...

Sunday, September 7, 2008

Bring on the Browser Wars!

At the turn of the century, Microsoft vanquished Netscape in the browser wars. For a while, that victory looked permanent. The battle had been ugly: A federal court found that Microsoft illegally used its Windows monopoly to expand Internet Explorer's market share; Netscape never recovered from its loss. For most computer users, though, the browser wars were sublime: The Web browser was invented in 1992, and within five years, with hundreds of developers at both Microsoft and Netscape pumping out code, browsers became fast, stable, and capable of some very neat tricks.These days, Web designers boast about all they can do with AJAX, the set of technologies that allow Web sites to emulate desktop-app behavior like drag-and-drop (think Google Maps or Yahoo Mail). AJAX runs on code that was created...

How To Speed-Read the Net

The invention of the Web browser added pictures to the Internet, but all those images still haven't made reading online a pleasant experience. If you're someone who uses the Web as your main source of news, you probably have 60 bookmarks that you never use, or you open 30 browser windows simultaneously to keep track of the articles you want to read—but you never get around to all of them. Never mind the killjoy, even on a fast connection, of waiting for some Web pages to load. Surfing within one well-designed site isn't so bad, but when you hop from site to site, there's nothing that replicates the appeal of scanning your local magazine rack or that pile of magazines splayed across your coffee table. But there's a way to keep track of the New York Times, the Washington Post, Talkingpointsmemo.com,...

Friday, September 5, 2008

R.I.P RALITA (ANAK YANG HILANG) TELAH BERPULANG

Hari ini tgl .04-09-2008 aku mendapatkan email dari seorang wanita yang bernama "LINDA HUDSON" . Dia mengabarkan pada aku berita duka ini. Inilah isi surat itu: Greetings, Did you know that Lita had cancer? She didn't tell some of her online friends. She didn't want them to worry. Lita went to the doctor on Thursday, August 21. He told her the chemotherapy (obat) was no longer working to cure her cancer. He said she had 3 months to one year to live. She wanted to return to Indonesia. But, she died on Sunday, August 24. She had a good, two-hour telephone visit with her family after her doctor appointment. They also called Saturday night to tell her goodbye. She was in a coma but when she heard her father's voice, she woke up long enough...

Thursday, September 4, 2008

Firewall Protection - How to, Big one

What is a Firewall?A firewall is a tool that monitors communication to and from your computer. It sits between your computer and the rest of the network, and according to some criteria, it decides which communication to allow, and which communication to block. It may also use some other criteria to decide about which communication or communication request to report to you (either by adding the information to a log file that you may browse whenever you wish, or in an alert message on the screen), and what not to report.What Is It Good For?Identifying and blocking remote access Trojans. Perhaps the most common way to break into a home computer and gain control, is by using a remote access Trojan (RAT). (sometimes it is called "backdoor Trojan" or "backdoor program". Many people simply call it...

Pages 3123 »
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Sweet Tomatoes Printable Coupons