Hacker Community

Would you like to know the success stories of legendary hackers. This blog will discuss the final trick hackers. And prevent hacker attacks?

Ubuntu...

Ubuntu is a complete operating system based on Linux, is freely available and has good support from community and professional experts. Ubuntu itself was developed by the Ubuntu community volunteers and we invite you to participate to develop Ubuntu!

The Ubuntu community is formed based on the ideas contained in the Ubuntu philosophy: that software should be available free of charge, that software applications should be used in the local language of each and for the people who have physical limitations, and that users should have freedom to modify the software in accordance with what they need.

About freedom is what makes Ubuntu different from proprietary software (proprietary); not only the equipment you need available free of charge, but you also have the right to modify your software until the software works the way you want.

The following is a public commitment to the Ubuntu team to its users:

* Ubuntu will always free of charge, therefore there will be no additional costs for the "enterprise edition", we will make all the best jobs Ubuntu is available for all people with the same Free terms.
* Ubuntu also provide commercial support from hundreds of companies around the world. Ubuntu is released regularly and can you predict; latest Ubuntu release available every six months. Each release will be supported by Ubuntu with improvements in security and other improvements are free for at least 18 months.
* Ubuntu will include translations and accessibility infrastructure that is owned by Best Free Software community, it is useful to make Ubuntu can be used by many people. We are also working together with the entire Free Software community in terms of bug fixes and code sharing.

* Ubuntu is fully committed to the principles of the development of free software; for this we encourage people to use free software and open source, then fix it and then pass it back.

Ubuntu suitable for both desktop and server. Ubuntu currently supports a variety of computer architectures such as PC (Intel x86), 64-byte PC (AMD64), PowerPC (Apple iBook and Powerbook, G4 and G5), and Sun UltraSPARC T1 (Sun Fire T1000 and T2000).

Ubuntu includes over 16,000 pieces of software, and for desktop installations can be performed using only a single CD. Ubuntu includes all the standard desktop application from word processing, spread sheet application (spreadsheet) to the application to access the Internet, software for web servers, equipment for programming languages and of course a variety of games. Read More ..

Blog??

Maybe you've heard the "blog"? Or maybe You even have to use it? This time I want to tell about the blog, which was a short for "web log". Before further told, Let us first what nisikan defi blog. Here is defi nisi My suggestion. Blog is a record made periodically by a person or a group of people who can be accessed through the web and can be managed by using the (base) web. The word "record" I use to distinguish them news like the one in the newspaper. So detik.com, for example, not a blog. The word "periodically" was needed to demonstrate the ongoing renewal. General appearance from blogs sorted in chronological order, but not necessarily so.

Blog not include records generated by computer or machinery. For example, the output syslog program that then given the appearance through the web is not a blog. Human factors have emerged. So the blog must be made by a person or group of people. The main feature blog adalag he must be accessible via the web. His name also blogs. Management blog also commonly used
web, although there is a client program that does not for managing web-based blog. Also often a
content management system (CMS) is used behind the scenes as machine from blogs. In addition to the above, there are several other blogs on tour fi as a mechanism to provide comments or conduct tracking, and also mechanisms for syndication. All This makes the author because he no longer had to learn HTML or design their own appearance. Usually editor blog system provides an easy to use and there many attractive design templates. This is apart by making a web site or homepage conventional. To place, there are also many places that provide services blog for free (eg blogger.com, ebloggy.com, and crimsonblog.com). For Linux computers that have their own as a web server, you can try the software WordPress can be obtained for free from WordPress.org.
Read More ..

A brief MySQL tutorial

Creating and Deleting Databases

1) Creating a database mysql> CREATE database 134a; Query OK, 1 row affected (0.00 sec)
2) Deleting a database mysql> DROP database 134a; Query OK, 0 rows affected (0.00 sec)

Creating a Table

3) After we have created the database we use the USE statement to change the current database; mysql> USE 134a; Database changed
4) Creating a table in the database is achieved with the CREATE table statement mysql> CREATE TABLE president (
-> last_name varchar(15) not null,
-> first_name varchar(15) not null,
-> state varchar(2) not null,
-> city varchar(20) not null,
-> birth date not null default '0000-00-00',
-> death date null
-> );
Query OK, 0 rows affected (0.00 sec)

Examining the Results

5) To see what tables are present in the database use the SHOW tables:
mysql> SHOW tables;
+----------------+
| Tables_in_134a |
+----------------+
| president |
+----------------+
1 row in set (0.00 sec)
6) The command DESCRIBE can be used to view the structure of a table
mysql> DESCRIBE president;
+------------+-------------+------+-----+------------+-------+---------------------------------+
| Field | Type | Null | Key | Default | Extra | Privileges |
+------------+-------------+------+-----+------------+-------+---------------------------------+
| last_name | varchar(15) | | | | | select,insert,update,references |
| first_name | varchar(15) | | | | | select,insert,update,references |
| state | char(2) | | | | | select,insert,update,references |
| city | varchar(20) | | | | | select,insert,update,references |
| birth | date | | | 0000-00-00 | | select,insert,update,references |
| death | date | YES | | NULL | | select,insert,update,references |
+------------+-------------+------+-----+------------+-------+---------------------------------+ Read More ..

Quick Advanced Visual Basic 6

Visual Basic is one of the computer programming language. Programming languages are the commands understood by the computer to perform certain tasks. Visual Basic programming language, developed by Microsoft since 1991, is the predecessor of the development of the programming language BASIC (Beginner's All-purpose Symbolic Instruction Code) which was developed in the era of the 1950s. Visual Basic is one of the Development Tool is a tool for making a variety of computer programs, especially those using the Windows operating system. Visual Basic is one of the computer programming language that supports object (Object Oriented Programming = OOP).

Quick advance writing Visual Basic 6 describes the comprehensive programming techniques Visual Basic 6, complete with pictures and examples of programs that makes it easy to understand and try it. Read More ..

Architecture of the Trusted Internet Banking


The development of information technology, telecommunications, and Internet applications causes began the emergence of Internet-based business. One application that was getting noticed is the Internet Banking or often also called e-Banking. Some statistics indicate increasing number of perpetrators of e-Banking in the world. In Indonesia there have been several perpetrators Internet Banking. One well-known actors in society is a service "KlikBCA" of BCA. One very important aspect of banking services is the security aspects (security).

Unfortunately, these security issues are often overlooked (both technical and non-technical) and this caused some problems. In Indonesia there are already some news about people who feel their money was stolen through the Internet Banking transactions. The existence of the site "slippage" (typosquatter) that does not belong kilkbca.com BCA will be made to resemble klikbca.com but also tarnish the fact that Internet Banking in Indonesia. If this problem is not solved, then public confidence will be safe Internet Banking transactions become faded and avoidable causes of this service. Security problem is one of a fairly complex topic. The discussion in this paper can not completely and just focused on Internet Banking application. Read More ..

HTML and CSS


Hypertext Markup Language is standard language used to display the web document, you can do with HTML that is:

1. Controlling the display of the web page and its content.
2. Publishes an online document that can be accessed from around the world.
3. Create online forms that can be used to handle registration, transactions online.
4. Adding object-object such as image, audio, video, and also java applets in the HTML document.

Style Sheets is a very important feature in a Dynamic HTML. Although not a necessity in making the web, but the use of style sheets is an advantage. A style sheet is a place where you control and manage-style style there. Style sheets describe how the HTML document display on the screen. You can also call it as a template from HTML documents that use it. You can also make special effects on your website using style sheets.

Theoretically you can use style sheets with HTML technology. However, in practice only Cascading Style Sheets (CSS) technology that support in almost all web browsers. Because CSS has been in standard by the World Wide Web Consortium (W3C) for use in a web browser. This tutorial will explain about html and CSS. Read More ..

Linux Operating System for the Future

Perhaps many more advantages that Linux can not write here because of time. But the author wants to convey one important thing that Linux is now being used by several companies and government instant. Also allows Linux hardware needed is not too big even for the web or mail server simply by using a computer device 386. With the same hardware that Linux offers speeds faster than the commercial other OS. As a server operating system is cheap and for commercial purposes, Linux is an alternative to "true" for Windows NT as well as commercial Unix systems. He is very precise as clients thanks to the Internet or Intranet TCP / IP and Netscape Navigator that is always actual and the level of stability.

Linux desktop operating system instead of Windows 98 also recommended With the spread of hardware and software support. Although the installation process is more complicated than Windows, but Linux has the advantage that is not acquired by another operating system. With many advantages over the denomination is not impossible that the windows will gradually shift to Linux and only time determine if the Microsoft did not change strategies. Many people predicted the Linux operating system will be a future leader of the other operating systems. Read More ..

Linux Server: Building Linux as Internet / Intranet Server

Over the last few years, Linux is just as dark horses for anyone who wants to find an alternative to Microsoft. Whether moving from boredom, complaining that the system is not stable, the price is too expensive, or idealism, making Linux an option. One thing is quite clear, Linux accessible to the average bag of Indonesia, and can be obtained the complete program without being branded as a user of pirated programs. One example is interesting that since India implement strict laws against piracy of software, the IT (Information Technology) in India growing rapidly. Executors IT 'forced' to learn and develop the software themselves.

The result can be seen that India is now giving a significant contribution in developing the IT world. Migration to Linux User friendliness or ease of use by users, is an interesting issue, and often appear when users in general want to migrate from Windows (or some of them from the Macintosh) to Linux. Doubts arise could be because of the absurdity of the term itself. My colleagues for years using the WAS and Lotus to stutter when using Word or Excel. In a small heart she thought that Word or Excel is more difficult, and less user friendly.

As of this writing, the literature on language Linux is still rare in Indonesia. In filling vacancies, the author tries to provide such a manual that contains practical steps. Formulation is based on the experience sesistematis possible to design a small-scale networks. Discussion that there is no in-depth study of the system, but the method step by step how to make the system work, followed by a brief explanation of what is done by the program when executed. By following what is presented in this book, Linux can run as an Internet or intranet server that is relatively tough. Read More ..

Wicked Code / Destroyer (Malicious Codes)

Definition

Malicious code / destroyer (malicious codes or abbreviated malcodes) is defined as all kinds of programs, macros or scripts that can executed and created with the purpose of damaging computer systems. Therefore, bugs that accidentally created by programmers, not included in this category. But for the bug really disturbing, many people categorizes as malcode.

Previously used the term "Malware (= Malicious Software)" is intended to malcode. But the term is too weak and narrow, so that bogus e-mail / lie that in fact is not the software can not be included in this group. Therefore, the term used malcode, not malware.

Classification

Malicious code can be classified into 3 types of groups: viruses, worms and Trojan Horses, and some programs that have bugs.

Virus

The virus has a nasty ability to reproduce themselves and consists of a collection of code that can modify the target code is running, or it can also modify the internal structure of the target code, so that the target code before running forced to run a virus.

Viruses are often display undesirable message, destroy the layout display, delete the C-MOS memory, destroying the information in the hard disk, etc.. The effects of the virus develop serious enough lately.

Examples of viruses: Brain, Ohe half, Die Hard, XM / Laroux, Win95/CIH

The virus still can be subdivided into several categories:

1.Boot Virus: If the computer is turned on, the initials on the boot sector program will be executed. Virus in the boot sector virus called the boot.
2.File Viruses: File virus is a virus that infects executable program. Reported that nearly 80% of the virus is a virus file.
3.Multipartite Virus: A virus that infects both boot sector and file.
4.Macro Virus: Recently discovered. The target is not executable programs, document files such as Microsoft Excel or Word. He will start when the program infects the application to read documents that contain macros.

Worm

Worm directed to a program that copies itself into the computer memory ONLY. Fundamental differences from the worms and viruses are, whether infected or not the target code. The virus infects the target code, but the worm does not. Worm ngendon only in memory.

Worm was originally found in large computer (the 1970s), and recently it was found in small computers like the PC. Especially since 1999, which work much e-mail circulated through the media.

Example worm: I-Worm/Happy99 (Ska), I-Worm/ExploreZIP, I-Worm/PrettyPark, I-Worm/MyPics..

Trojan Horse

Trojan Horse produced with evil purpose. In contrast to viruses, Trojan horses can not produce themselves. In general, they were taken by other utility programs. Utility programs contain himself, or a Trojan Horse itself to "flourish" as the utility programs.

Example Trojan Horse: Win-Trojan/Back Orifice, Win-Trojan/SubSeven, Win-Trojan/Ecokys (Korean)

Trojan horses can still be subdivided into:

1.DOS Trojan Horse: Trojan Horse that runs in DOS. He slowed computer or delete files on a given day or situation.
2.Windows Trojan Horse: Run the Microsoft Windows system. Number of Windows Trojan Horse increased since 1998 and used as a hacking program for the evil purpose that can collect information from internet connected computer. Read More ..

Get Money With AdSense Fast

The Google AdSense program is one of the most popular advertising programs on the internet. Each day more webmasters realize that they can increase their internet revenues by strategically implementing AdSense on their websites. Unfortunately most websites do not optimize their potential to make the most money with AdSense. The click through rates are so low that the income generated is almost negligible. However this can be fixed very quickly by making a few simple changes. Here are a few AdSense optimization tips that can help to increase your overall earnings:

Tip 1: Put Ads Above The Fold


The section of your website that is seen when the site first loads without having to scroll down is consider 'above the fold'. This is an important part of your site since it gets plenty of attention. It is not necessary to flood this part with ads but rather you can subtly add a horizontal or vertical link unit mixed in with the rest of the content. Maintaining a good ad to content ratio is important so never flood a site with just ads.

Tip 2: Use Well Recognized Link Colors

Blue is the standard for links on the internet. Try to make your site navigation links blue in color so that your AdSense links can blend in with the rest of your site.

Tip 3: Use the 336x280 Ad Unit

This particular ad unit has a history of good performance as far as click through rates are concerned so use it whenever you can.

Tip 4: Wrap Content Around Ad Units

If you have a decent length article then consider using an html table and wrap the content around the ads. This should help to dramatically increase click through rates.

Tip 5: Use The Maximum Allowable Ads

The AdSense program permits 3 ad units and 2 link units. If a page has enough content then be sure to use the maximum number of ads as long as your page does not develop the flea market syndrome which occurs with too much advertising and too little content. If there is an article over 800 words in length then you should be easily able to integrate the maximum allowable ads without turning off your website visitors.

Tip 6: Make The URL Color Black Or Grey

It may be best to make the url at the bottom of each ad either black or grey. This is because you want visitors to notice the headline which is created by advertisers to draw clicks so doing this places more focus on the headline of the ad.

Tip 7: Draw Relevant Ads

It is important to use AdSense in niches that are advertiser heavy otherwise you will not get relevant ads. Also make sure each page is optimized properly with proper keyword meta tags, description meta tags and keyword rich title tags. Also make the url of the page keyword rich also to increase the chances of getting the most relevant ads. Use some of these AdSense tips to increase your internet revenues.

Good Luck !!!
Read More ..

Professional Notepad 2.9

Professional Notepad is a powerful editor that allows you view and edit HTML, CSS, JavaScript, PHP, PERL, SQL, Delphi, C++ and other languages source code. It is a advanced tool supporting the features you've always dreamt about, such as syntax highlighting, Code Templates, bookmarks, unlimited text size, URL highlighting, line numbers, powerful search and replace, multiple undo/redo, Drag&Drop, and color printing.

Click here to download... Read More ..

GMail Drive 1.0.14

GMail Drive takes the short stack of gigabytes given to Gmail users and turns them into a virtual drive accessible from your computer's file tree.

In short, it creates a shell name--a space extension that creates a virtual file system around the account. This lets you treat those 5 gigs (at the time of writing) as a standard remote drive. You can drag and drop files into the drive, or use standard cutting and pasting. When you add a file, it sends an e-mail to your Gmail account with the file as an attachment. If you delete a file from the virtual drive, it deletes the associated e-mail, as well.

There's not much else users can do with GMail Drive. It's an effective tool, but lacks any additional features. It does allow for proxy authentication and secure HTTP, it preserves long filenames, and it can auto-login, a useful touch for those who want to regularly use their Google account for file transfers. Also, it'd be helpful if the install file was a self-extracting EXE instead of a ZIP. Although it's nice to have a virtual drive option that doesn't require using your Web browser, GMail Drive would benefit by adopting some of the features of its competition.

Click here to download...

Read More ..

How to Change a Windows XP Lost Password

Sunday morning. You just had your breakfast, now you're settling in to check your e-mail. A fatal error occurred and administrative access is required to fix it. So you prepare to log in to the administrative account on your computer, and find that the account is password protected, and you can't remember that, since it was probably several months since you installed Windows. You may be thinking "What can I do to change the password or just get administrative access?" Here's one way you can get back in!
    • When you installed Windows XP (or when the people who sold you the computer installed it), it created an administrative account automatically. This account has NO password by default, and can be used to access everything in the computer. By accessing it, you can change any password on the system.
  1. Log out all limited user accounts. When a limited user account is logged in, it prevents you from accessing the classic log-in dialogue.
  2. Press CTRL+ALT+DEL twice. Make sure you are at the log-in dialogue. When you do this, the screen will flicker, and you will see the classic log-in that existed on earlier versions of Windows.
  3. Log in to the administrative account. Change the username in the dialogue to "Administrator", and press ENTER or click OK.
  4. Open up the command shell. Press START, click RUN, and type in CMD, press ENTER. This will bring up a window likely unfamiliar to you. This is the command line, it allows you to manage files or change settings without restriction (no restriction on the administrative account). Before the graphical environment of Windows, this is

what Microsoft users used. For more info, PM Boidsie or look it up on a search engine.

  1. Change the password of the account. Type in (without the quotes, and yes, the asterisk (*) is necessary) "net user (username) *". It will ask you to type in a password, then to retype it. You just changed the password!
  2. Log in. Exit the command shell dialogue, don't type in anything else if you don't know what you're doing, you could really hose down your computer. Log out of the administrative account, then log back in to your account with the new password.
  3. 3rd party utilities There are many 3rd party utilities which can recover forgotten Windows password:
    • Windows Password Recovery Tool Service: passwordunlocker.com
    • Windows Password Recovery Tool is a program that works instantly to remove any lost or forgotten password. Simply boot your PC from the supplied Boot CD, and get access to forgotten Windows and administrator passwords in just seconds. Their method is so much faster/easier, and works great!
Source : www.wikihow.com
Read More ..