Hacker Community

Would you like to know the success stories of legendary hackers. This blog will discuss the final trick hackers. And prevent hacker attacks?

Ubuntu...

Ubuntu is a complete operating system based on Linux, is freely available and has good support from community and professional experts. Ubuntu itself was developed by the Ubuntu community volunteers and we invite you to participate to develop Ubuntu!

The Ubuntu community is formed based on the ideas contained in the Ubuntu philosophy: that software should be available free of charge, that software applications should be used in the local language of each and for the people who have physical limitations, and that users should have freedom to modify the software in accordance with what they need.

About freedom is what makes Ubuntu different from proprietary software (proprietary); not only the equipment you need available free of charge, but you also have the right to modify your software until the software works the way you want.

The following is a public commitment to the Ubuntu team to its users:

* Ubuntu will always free of charge, therefore there will be no additional costs for the "enterprise edition", we will make all the best jobs Ubuntu is available for all people with the same Free terms.
* Ubuntu also provide commercial support from hundreds of companies around the world. Ubuntu is released regularly and can you predict; latest Ubuntu release available every six months. Each release will be supported by Ubuntu with improvements in security and other improvements are free for at least 18 months.
* Ubuntu will include translations and accessibility infrastructure that is owned by Best Free Software community, it is useful to make Ubuntu can be used by many people. We are also working together with the entire Free Software community in terms of bug fixes and code sharing.

* Ubuntu is fully committed to the principles of the development of free software; for this we encourage people to use free software and open source, then fix it and then pass it back.

Ubuntu suitable for both desktop and server. Ubuntu currently supports a variety of computer architectures such as PC (Intel x86), 64-byte PC (AMD64), PowerPC (Apple iBook and Powerbook, G4 and G5), and Sun UltraSPARC T1 (Sun Fire T1000 and T2000).

Ubuntu includes over 16,000 pieces of software, and for desktop installations can be performed using only a single CD. Ubuntu includes all the standard desktop application from word processing, spread sheet application (spreadsheet) to the application to access the Internet, software for web servers, equipment for programming languages and of course a variety of games. Read More ..

Blog??

Maybe you've heard the "blog"? Or maybe You even have to use it? This time I want to tell about the blog, which was a short for "web log". Before further told, Let us first what nisikan defi blog. Here is defi nisi My suggestion. Blog is a record made periodically by a person or a group of people who can be accessed through the web and can be managed by using the (base) web. The word "record" I use to distinguish them news like the one in the newspaper. So detik.com, for example, not a blog. The word "periodically" was needed to demonstrate the ongoing renewal. General appearance from blogs sorted in chronological order, but not necessarily so.

Blog not include records generated by computer or machinery. For example, the output syslog program that then given the appearance through the web is not a blog. Human factors have emerged. So the blog must be made by a person or group of people. The main feature blog adalag he must be accessible via the web. His name also blogs. Management blog also commonly used
web, although there is a client program that does not for managing web-based blog. Also often a
content management system (CMS) is used behind the scenes as machine from blogs. In addition to the above, there are several other blogs on tour fi as a mechanism to provide comments or conduct tracking, and also mechanisms for syndication. All This makes the author because he no longer had to learn HTML or design their own appearance. Usually editor blog system provides an easy to use and there many attractive design templates. This is apart by making a web site or homepage conventional. To place, there are also many places that provide services blog for free (eg blogger.com, ebloggy.com, and crimsonblog.com). For Linux computers that have their own as a web server, you can try the software WordPress can be obtained for free from WordPress.org.
Read More ..

A brief MySQL tutorial

Creating and Deleting Databases

1) Creating a database mysql> CREATE database 134a; Query OK, 1 row affected (0.00 sec)
2) Deleting a database mysql> DROP database 134a; Query OK, 0 rows affected (0.00 sec)

Creating a Table

3) After we have created the database we use the USE statement to change the current database; mysql> USE 134a; Database changed
4) Creating a table in the database is achieved with the CREATE table statement mysql> CREATE TABLE president (
-> last_name varchar(15) not null,
-> first_name varchar(15) not null,
-> state varchar(2) not null,
-> city varchar(20) not null,
-> birth date not null default '0000-00-00',
-> death date null
-> );
Query OK, 0 rows affected (0.00 sec)

Examining the Results

5) To see what tables are present in the database use the SHOW tables:
mysql> SHOW tables;
+----------------+
| Tables_in_134a |
+----------------+
| president |
+----------------+
1 row in set (0.00 sec)
6) The command DESCRIBE can be used to view the structure of a table
mysql> DESCRIBE president;
+------------+-------------+------+-----+------------+-------+---------------------------------+
| Field | Type | Null | Key | Default | Extra | Privileges |
+------------+-------------+------+-----+------------+-------+---------------------------------+
| last_name | varchar(15) | | | | | select,insert,update,references |
| first_name | varchar(15) | | | | | select,insert,update,references |
| state | char(2) | | | | | select,insert,update,references |
| city | varchar(20) | | | | | select,insert,update,references |
| birth | date | | | 0000-00-00 | | select,insert,update,references |
| death | date | YES | | NULL | | select,insert,update,references |
+------------+-------------+------+-----+------------+-------+---------------------------------+ Read More ..

Quick Advanced Visual Basic 6

Visual Basic is one of the computer programming language. Programming languages are the commands understood by the computer to perform certain tasks. Visual Basic programming language, developed by Microsoft since 1991, is the predecessor of the development of the programming language BASIC (Beginner's All-purpose Symbolic Instruction Code) which was developed in the era of the 1950s. Visual Basic is one of the Development Tool is a tool for making a variety of computer programs, especially those using the Windows operating system. Visual Basic is one of the computer programming language that supports object (Object Oriented Programming = OOP).

Quick advance writing Visual Basic 6 describes the comprehensive programming techniques Visual Basic 6, complete with pictures and examples of programs that makes it easy to understand and try it. Read More ..

Architecture of the Trusted Internet Banking


The development of information technology, telecommunications, and Internet applications causes began the emergence of Internet-based business. One application that was getting noticed is the Internet Banking or often also called e-Banking. Some statistics indicate increasing number of perpetrators of e-Banking in the world. In Indonesia there have been several perpetrators Internet Banking. One well-known actors in society is a service "KlikBCA" of BCA. One very important aspect of banking services is the security aspects (security).

Unfortunately, these security issues are often overlooked (both technical and non-technical) and this caused some problems. In Indonesia there are already some news about people who feel their money was stolen through the Internet Banking transactions. The existence of the site "slippage" (typosquatter) that does not belong kilkbca.com BCA will be made to resemble klikbca.com but also tarnish the fact that Internet Banking in Indonesia. If this problem is not solved, then public confidence will be safe Internet Banking transactions become faded and avoidable causes of this service. Security problem is one of a fairly complex topic. The discussion in this paper can not completely and just focused on Internet Banking application. Read More ..

HTML and CSS


Hypertext Markup Language is standard language used to display the web document, you can do with HTML that is:

1. Controlling the display of the web page and its content.
2. Publishes an online document that can be accessed from around the world.
3. Create online forms that can be used to handle registration, transactions online.
4. Adding object-object such as image, audio, video, and also java applets in the HTML document.

Style Sheets is a very important feature in a Dynamic HTML. Although not a necessity in making the web, but the use of style sheets is an advantage. A style sheet is a place where you control and manage-style style there. Style sheets describe how the HTML document display on the screen. You can also call it as a template from HTML documents that use it. You can also make special effects on your website using style sheets.

Theoretically you can use style sheets with HTML technology. However, in practice only Cascading Style Sheets (CSS) technology that support in almost all web browsers. Because CSS has been in standard by the World Wide Web Consortium (W3C) for use in a web browser. This tutorial will explain about html and CSS. Read More ..

Linux Operating System for the Future

Perhaps many more advantages that Linux can not write here because of time. But the author wants to convey one important thing that Linux is now being used by several companies and government instant. Also allows Linux hardware needed is not too big even for the web or mail server simply by using a computer device 386. With the same hardware that Linux offers speeds faster than the commercial other OS. As a server operating system is cheap and for commercial purposes, Linux is an alternative to "true" for Windows NT as well as commercial Unix systems. He is very precise as clients thanks to the Internet or Intranet TCP / IP and Netscape Navigator that is always actual and the level of stability.

Linux desktop operating system instead of Windows 98 also recommended With the spread of hardware and software support. Although the installation process is more complicated than Windows, but Linux has the advantage that is not acquired by another operating system. With many advantages over the denomination is not impossible that the windows will gradually shift to Linux and only time determine if the Microsoft did not change strategies. Many people predicted the Linux operating system will be a future leader of the other operating systems. Read More ..

Linux Server: Building Linux as Internet / Intranet Server

Over the last few years, Linux is just as dark horses for anyone who wants to find an alternative to Microsoft. Whether moving from boredom, complaining that the system is not stable, the price is too expensive, or idealism, making Linux an option. One thing is quite clear, Linux accessible to the average bag of Indonesia, and can be obtained the complete program without being branded as a user of pirated programs. One example is interesting that since India implement strict laws against piracy of software, the IT (Information Technology) in India growing rapidly. Executors IT 'forced' to learn and develop the software themselves.

The result can be seen that India is now giving a significant contribution in developing the IT world. Migration to Linux User friendliness or ease of use by users, is an interesting issue, and often appear when users in general want to migrate from Windows (or some of them from the Macintosh) to Linux. Doubts arise could be because of the absurdity of the term itself. My colleagues for years using the WAS and Lotus to stutter when using Word or Excel. In a small heart she thought that Word or Excel is more difficult, and less user friendly.

As of this writing, the literature on language Linux is still rare in Indonesia. In filling vacancies, the author tries to provide such a manual that contains practical steps. Formulation is based on the experience sesistematis possible to design a small-scale networks. Discussion that there is no in-depth study of the system, but the method step by step how to make the system work, followed by a brief explanation of what is done by the program when executed. By following what is presented in this book, Linux can run as an Internet or intranet server that is relatively tough. Read More ..

Wicked Code / Destroyer (Malicious Codes)

Definition

Malicious code / destroyer (malicious codes or abbreviated malcodes) is defined as all kinds of programs, macros or scripts that can executed and created with the purpose of damaging computer systems. Therefore, bugs that accidentally created by programmers, not included in this category. But for the bug really disturbing, many people categorizes as malcode.

Previously used the term "Malware (= Malicious Software)" is intended to malcode. But the term is too weak and narrow, so that bogus e-mail / lie that in fact is not the software can not be included in this group. Therefore, the term used malcode, not malware.

Classification

Malicious code can be classified into 3 types of groups: viruses, worms and Trojan Horses, and some programs that have bugs.

Virus

The virus has a nasty ability to reproduce themselves and consists of a collection of code that can modify the target code is running, or it can also modify the internal structure of the target code, so that the target code before running forced to run a virus.

Viruses are often display undesirable message, destroy the layout display, delete the C-MOS memory, destroying the information in the hard disk, etc.. The effects of the virus develop serious enough lately.

Examples of viruses: Brain, Ohe half, Die Hard, XM / Laroux, Win95/CIH

The virus still can be subdivided into several categories:

1.Boot Virus: If the computer is turned on, the initials on the boot sector program will be executed. Virus in the boot sector virus called the boot.
2.File Viruses: File virus is a virus that infects executable program. Reported that nearly 80% of the virus is a virus file.
3.Multipartite Virus: A virus that infects both boot sector and file.
4.Macro Virus: Recently discovered. The target is not executable programs, document files such as Microsoft Excel or Word. He will start when the program infects the application to read documents that contain macros.

Worm

Worm directed to a program that copies itself into the computer memory ONLY. Fundamental differences from the worms and viruses are, whether infected or not the target code. The virus infects the target code, but the worm does not. Worm ngendon only in memory.

Worm was originally found in large computer (the 1970s), and recently it was found in small computers like the PC. Especially since 1999, which work much e-mail circulated through the media.

Example worm: I-Worm/Happy99 (Ska), I-Worm/ExploreZIP, I-Worm/PrettyPark, I-Worm/MyPics..

Trojan Horse

Trojan Horse produced with evil purpose. In contrast to viruses, Trojan horses can not produce themselves. In general, they were taken by other utility programs. Utility programs contain himself, or a Trojan Horse itself to "flourish" as the utility programs.

Example Trojan Horse: Win-Trojan/Back Orifice, Win-Trojan/SubSeven, Win-Trojan/Ecokys (Korean)

Trojan horses can still be subdivided into:

1.DOS Trojan Horse: Trojan Horse that runs in DOS. He slowed computer or delete files on a given day or situation.
2.Windows Trojan Horse: Run the Microsoft Windows system. Number of Windows Trojan Horse increased since 1998 and used as a hacking program for the evil purpose that can collect information from internet connected computer. Read More ..

Get Money With AdSense Fast

The Google AdSense program is one of the most popular advertising programs on the internet. Each day more webmasters realize that they can increase their internet revenues by strategically implementing AdSense on their websites. Unfortunately most websites do not optimize their potential to make the most money with AdSense. The click through rates are so low that the income generated is almost negligible. However this can be fixed very quickly by making a few simple changes. Here are a few AdSense optimization tips that can help to increase your overall earnings:

Tip 1: Put Ads Above The Fold


The section of your website that is seen when the site first loads without having to scroll down is consider 'above the fold'. This is an important part of your site since it gets plenty of attention. It is not necessary to flood this part with ads but rather you can subtly add a horizontal or vertical link unit mixed in with the rest of the content. Maintaining a good ad to content ratio is important so never flood a site with just ads.

Tip 2: Use Well Recognized Link Colors

Blue is the standard for links on the internet. Try to make your site navigation links blue in color so that your AdSense links can blend in with the rest of your site.

Tip 3: Use the 336x280 Ad Unit

This particular ad unit has a history of good performance as far as click through rates are concerned so use it whenever you can.

Tip 4: Wrap Content Around Ad Units

If you have a decent length article then consider using an html table and wrap the content around the ads. This should help to dramatically increase click through rates.

Tip 5: Use The Maximum Allowable Ads

The AdSense program permits 3 ad units and 2 link units. If a page has enough content then be sure to use the maximum number of ads as long as your page does not develop the flea market syndrome which occurs with too much advertising and too little content. If there is an article over 800 words in length then you should be easily able to integrate the maximum allowable ads without turning off your website visitors.

Tip 6: Make The URL Color Black Or Grey

It may be best to make the url at the bottom of each ad either black or grey. This is because you want visitors to notice the headline which is created by advertisers to draw clicks so doing this places more focus on the headline of the ad.

Tip 7: Draw Relevant Ads

It is important to use AdSense in niches that are advertiser heavy otherwise you will not get relevant ads. Also make sure each page is optimized properly with proper keyword meta tags, description meta tags and keyword rich title tags. Also make the url of the page keyword rich also to increase the chances of getting the most relevant ads. Use some of these AdSense tips to increase your internet revenues.

Good Luck !!!
Read More ..

Professional Notepad 2.9

Professional Notepad is a powerful editor that allows you view and edit HTML, CSS, JavaScript, PHP, PERL, SQL, Delphi, C++ and other languages source code. It is a advanced tool supporting the features you've always dreamt about, such as syntax highlighting, Code Templates, bookmarks, unlimited text size, URL highlighting, line numbers, powerful search and replace, multiple undo/redo, Drag&Drop, and color printing.

Click here to download... Read More ..

GMail Drive 1.0.14

GMail Drive takes the short stack of gigabytes given to Gmail users and turns them into a virtual drive accessible from your computer's file tree.

In short, it creates a shell name--a space extension that creates a virtual file system around the account. This lets you treat those 5 gigs (at the time of writing) as a standard remote drive. You can drag and drop files into the drive, or use standard cutting and pasting. When you add a file, it sends an e-mail to your Gmail account with the file as an attachment. If you delete a file from the virtual drive, it deletes the associated e-mail, as well.

There's not much else users can do with GMail Drive. It's an effective tool, but lacks any additional features. It does allow for proxy authentication and secure HTTP, it preserves long filenames, and it can auto-login, a useful touch for those who want to regularly use their Google account for file transfers. Also, it'd be helpful if the install file was a self-extracting EXE instead of a ZIP. Although it's nice to have a virtual drive option that doesn't require using your Web browser, GMail Drive would benefit by adopting some of the features of its competition.

Click here to download...

Read More ..

How to Change a Windows XP Lost Password

Sunday morning. You just had your breakfast, now you're settling in to check your e-mail. A fatal error occurred and administrative access is required to fix it. So you prepare to log in to the administrative account on your computer, and find that the account is password protected, and you can't remember that, since it was probably several months since you installed Windows. You may be thinking "What can I do to change the password or just get administrative access?" Here's one way you can get back in!
    • When you installed Windows XP (or when the people who sold you the computer installed it), it created an administrative account automatically. This account has NO password by default, and can be used to access everything in the computer. By accessing it, you can change any password on the system.
  1. Log out all limited user accounts. When a limited user account is logged in, it prevents you from accessing the classic log-in dialogue.
  2. Press CTRL+ALT+DEL twice. Make sure you are at the log-in dialogue. When you do this, the screen will flicker, and you will see the classic log-in that existed on earlier versions of Windows.
  3. Log in to the administrative account. Change the username in the dialogue to "Administrator", and press ENTER or click OK.
  4. Open up the command shell. Press START, click RUN, and type in CMD, press ENTER. This will bring up a window likely unfamiliar to you. This is the command line, it allows you to manage files or change settings without restriction (no restriction on the administrative account). Before the graphical environment of Windows, this is

what Microsoft users used. For more info, PM Boidsie or look it up on a search engine.

  1. Change the password of the account. Type in (without the quotes, and yes, the asterisk (*) is necessary) "net user (username) *". It will ask you to type in a password, then to retype it. You just changed the password!
  2. Log in. Exit the command shell dialogue, don't type in anything else if you don't know what you're doing, you could really hose down your computer. Log out of the administrative account, then log back in to your account with the new password.
  3. 3rd party utilities There are many 3rd party utilities which can recover forgotten Windows password:
    • Windows Password Recovery Tool Service: passwordunlocker.com
    • Windows Password Recovery Tool is a program that works instantly to remove any lost or forgotten password. Simply boot your PC from the supplied Boot CD, and get access to forgotten Windows and administrator passwords in just seconds. Their method is so much faster/easier, and works great!
Source : www.wikihow.com
Read More ..

What is Hacker?

Wednesday, May 9, 2007

About Hacker


Hacker, a term that may not be familiar to our ears. According to the general stigma that developed in the community,
hackers identical with that crazy person computer daily activities can not be separated from the virtual nature of crime
like burglary website, identity theft, credit card number theft, viruses, data theft or enterprise organizations and others. Hackers usually depicted with a figure of anti-social, technological crazy, aloof, and daily activities just in front of the computer.

Some of the illustrations above may be true while others are much distorted and become a general understanding from generation to generation. Hacker mistaken about is actually very related to the activity itself that many hackers caused controversy in the community other than that coupled with 'spice' which is given by the press and film maker (read: Hollywood) in describing the activities of a hacker so unknowingly giving a negative bias about hackers and hacker ultimately makes the term so far deviated from the true purpose.

This requires a special discussion about the hacker community in order to assess their activities more objectively. So that's why I created this article, this article is expected to provide benefits to the reader as well.

Before we discuss more about hackers and some of its derivatives such as crackers, script kiddie, and others. Be worthwhile to review briefly the history of the term hacker. Referring to the view of Steven Levy in his book "Hackers: Heroes of the Computer Revolution", the term hacker was first used in the computer in 1960 among students Tech Model Railroad Club at the Massachusetts Institute of Technology (MIT). This term is the designation for someone who has the ability in designing a computer program that is better than programs that have been designed together. MIT later recognized as the originator of the term hacker in the scope of the more modern. But there are also some people who think that the term hacker has been used previously among those who experimented with a set of tube radios and amplifiers. The meaning of the term literally true hacker is someone who is expert in processing (hacking) of wood to be made into furniture.

To understand a hacker then can be seen from hackingnya activities. Based on these approaches can then be divided into hackerpun some variant.

Cracker. Imagine a program that has a code of protection such as serial number or even the copy protection. Then there was someone with programming skills are high enough to successfully break into or remove the protection routine to the source code so the application can be used completely for free. Then that person is called a cracker and activities referred to cracking software. Cracking activity for personal needs is legal but if the program had been distributed will crack it against the law. But, nevertheless generally recognized due cracker. In contrast to the hacker, cracker activities usually violate the law but there is also the opinion that the cracking could also be said as a first step to become a hacker. Indeed when a hacker from hacking activities that violate the law, then that's when he became a cracker.

Script kiddie. Crackers are using the script (read: the source code) and programs written by others to perform activities of a system of security break-ins. Script kiddie does not know how to make program / script or even their own exploits do not understand how the actual workings of the script other people who they use.
In the area of hacking a man to get the status based on the level of ability / skill and knowledge. Script Kiddie is the people who do not have the skills, knowledge, and ethics. Another term for the script kiddie is Lammer (lazy) or lame.

Phreak (baca: Freak). Can be called also referred to as 'species' by hackers. Phreak is a hacker who are interested and have mengusai Traffic in telephone systems. One thing that distinguishes the hacker phreak is, if the hacker is someone who is very interested in mastering the computer technology phreak are people who are interested in telephone systems. Therefore phreak is Hacker.

White Hat and Black Hat. White Hat term which refers to the first hacker used in 1996 when the holding of the Black Hat conference in Las Vegas. Black Hat conference is a meeting of IT experts worldwide who held once a year. The conference was organized by a hacker named Jeff Moss aka DarkTangent this conference, where hackers or the black hat before presenting pengethuannya security professionals. Terminology Black hat and white hat actually refers to 'evil hacker' and 'good hackers'. The term black hat sorang figure taken from a criminal character in the classic films that Hollywood always use black hat. Black hat is often used for the hacker who uses his ability to conduct criminal. However, not everyone agrees with this because in the world of hackers is very thin difference of good and evil. For example, a hacker broke into considers that the activities are good if the system in view of the security aspects of the system because by doing the piercing so weaknesses can be identified so that systems can be improved and create a better system. But not so well with security experts (white hat), they tends argued that exploitation of a system and all information associated with it must be covered to the vendor only and does not deserve to be published to the general public. Because the two opposing views of the hacker is divided into two groups of black hat and white hat.

Gray Hat. The hacker who dalah adopts Full Disclosure . Where they believe that the world is not divided into black and white only. The gray hat believe that every individual is responsible for what he does. They assume that any information is free (full disclosure), freely published for public interest. They do not judge the black hat always evil and white hat is always good. The following is an excerpt from the words of a gray hat hacker named Weld Pond which is a member of the group of gray hat L0pht :

"First off, being grey does not mean you engage in any criminal
activity or condone it. We certainly do not. Each individual is
responsible for his or her actions. Being grey means you recognize
that the world is not black or white. Is the French Govt infowar
team black hat or white hat? Is the U.S. Govt infowar team black
hat or white hat? Is a Chinese dissident activist black hat or white
hat? Is a US dissident activist black hat or white hat? Can a black
hat successfully cloak themselves as a white hat? Can a white hat
successfully cloak themselves as a black hat? Could it be that an
immature punk with spiked hair named “evil fukker” is really a
security genius who isn’t interested in criminal activity? Typically,
a white hat would not fraternize with him.
Seems like there is a problem if you are going to be strictly
white hat. How are you going to share info with only white hats?
What conferences can you attend and not be tainted by fraternizing
with black hats? The black hats are everywhere. We don’t want to
stop sharing info with the world because some criminals may use it
for misdeeds.
—Weld"

Hacktivism. Hackers who are using it's hacking ability for certain political purposes. Examples of such cases on the site hacktivism Klux Klux Klan to display speech dideface Luther King Jr. Dr.marthin. Or deface (replacing the front page of a website) with the sentence political.

Therefore, it can be seen that hackers can not be judged from one perspective or just one form of activity. In general hacker is someone who is very interested in information technology and contribute to the development of information technology. Well, if you are someone who is interested in information technology and can design an application that is useful to society, then you are a hacker. If any of the readers who have exploited the ability of a computer security system and are willing to share information with the public in hopes of memebrikan positive side effects to people and feedback system improvement is better than the vendor, then you are a hacker.

First few of my brief. Hopefully usable and can add to your knowledge. And apologize if any of my colleagues who take offense at this writing, because I never intend to. This article was written on the basis of sharing information only.
Read More ..

Olympics Hacker: Educate Japanese Government Business Hacker

Ministry of Economy, Trade and Industry (METI) will hold an Olympic "Computer Security Champhionship" (security-shi kou-en) is the first in Japan.

According to METI, Olympic aims to find and educate the young seedlings that have knowledge of techniques and computer hacking. This race will be held with the mechanisms by which these Olympic participants will be selected from high schools and vocational schools throughout Japan, numbering as many as 20 teams.

Each team will try to enter the server tough opponent team. These winners will be rewarded in the form of opportunities to study abroad to America, such as the Carnegie Mellon University Dartmouth College or to the United States. According to METI, also held similar contests by many other countries, but only this time held by the government of a country.

According to research data, Japan's software imports in the year 2000 as many as 920 billion yen, while exports of Japanese software only for 9 billion yen. Therefore, the Olympic status is important to collect seeds in the field of computers, to educate them abroad, and ultimately will strengthen Japan's competitiveness in the field of computers.

These Olympics will be held at a hotel in Tokyo in August of 2003, and registration will begin from the month of June 2003. One team consists of 3 persons, all initially servers have security holes (security holes). Each team must try to close the security holes and strengthen their servers. At the same time they also must try to find security holes opponent, came in and took over control of the server opponent. Read More ..