Sabtu, 27 April 2013

Four modes Fraud on Facebook !



Facebook is a social networking site today with "population" of more than 800 million accounts. Every day, visited by 400 million Facebook users who relentlessly pressing the "like" and post a status update.

Facebook is not only a major media to share ideas and interact with friends, but a place of interest by any attack cyber criminals.

By taking advantage and confidence of users in their network relationships, cyber perpetrators spreading malicious code and sending spam messages using social engineering tricks to spread their message to thousands of unsuspecting users.


Here are the four most common scams on Facebook:

1. Like / Share Feed
Type: Social Engineering
Results: Users liked the link

Like or share feedback that occurs when a hacker to act as a credible source and ask the user clicks "like" on the page updates, photos, video, or status to access special content (typically sensational).

When the user clicks on the "like" button, chances are directed to a survey that requires the user to fill out some personal information, sign up for a subscription service, or they even posted a link a few times on Facebook.


2. 'Like' Clickjacking
Type: Social engineering / fraud
Results: Users liked the link

"Like" clickjacking happens when hackers present to view a video with a button "play" simple, but in fact there is a frame that is not visible on the page with hidden buttons "like".

When users "like" the page, post status updates appear on the other user wall, causing their friends curious and tempted to visit the page.


3. Tagging
Type: Spam
Results: A spam message is displayed

Tagging occurs when users upload an ad or photo and then marked to a series of random people. If the settings allow users to notify when the user is checked, users will receive an e-mail asking to see the picture. People who marked and clicked his friends have been marked and directed to spam.


4. Phishing
Type: Social Engineering
Results: Can read and controlling access to user accounts

Phishing is a fake message that tells users that their Facebook accounts suspended, or take the form of pending friend requests. When the user clicks on the link, it will take the user to a fake login page for the user account information.

Fake login page will record the user ID and password, then use them to gain unrestricted access to the user account, and allows to obtain detailed information into the user's password for other online activities such as Internet banking.


Prevention

After learning modes possible fraud committed by criminals internet, Facebook users are expected to be protected from harmful things. Norton recommends the following tips for users to stay safe on social networking sites:

Do not speak, or accept friendship invitations from unknown senders in social networking, IM, online forums, or cyberspace.
Do not post your home address, phone numbers, images, or other personal information about yourself on a public website.
Make sure you have strong passwords (not the pet's name, birthday or address) and do not tell it to anyone.
Create groups of friends, relatives, or other special sub-group of friends on a social networking platform as well as share photos, videos, and comments on limited groups.
Restrict access to your profile from search options and make sure you remove any unwanted applications or restrict access of others to your information.
Make sure you choose the most secure setting, ie https, access your account and get notified of new devices.
Maintaining browser up-to-date and operating systems.
Using free online tools like Norton Safe Web Lite that provides a safer search experience by warning you of dangerous sites right on the search results, so you can search, browse, and shop online without worry.

Editor: Wicaksono Surya Hidayat
Source: http://tekno.kompas.com/

4 Ways to Avoid Cyber ​​Crime !



According to Norton Cybercrime Report 2012 Internet users fear the e-mail account hacked. This was disclosed by Rita Nurtika, Consumer Sales Manager, Indonesia, Norton by Symantec,

Based on a survey of 13,018 Internet users ages 18 to 64 years, 27 percent said they worry about e-mails they infiltrated.

Interestingly, only 15 percent of respondents who claimed to worry if their bank accounts compromised.

Why Internet users are more worried if their e-mail accounts compromised compared with that in fact the bank account can make the user lose money?

"E-mail a lot contains employment information, billing statements, personal photos, and much more. Many loopholes (evil) which can be entered only through e-mail," said Nurtika.


To prevent crime happening in the virtual world, such as the e-mail account hacking, Norton has a few simple tips. Some of them are:

1. Create a complex password.

Do not use the name or date of birth as a password. We recommend using a password with a combination of letters, numbers, and symbols. Also change the password periodically. This applies to all types of accounts, be it e-mail, and social media.

2. Continue to check the credit card data and bank data on a regular basis.

Currently, many bank transaction data is sent via e-mail. Therefore, it would not hurt you to check periodically transaction.

This is done so that you can quickly find out if there is anything unusual transactions. If you use a credit card, you can directly contact the bank and do the blocking.

You can also submit a complaint to the bank so that the transaction can be canceled.

3. Be careful about clicking on links.

Nowadays, a lot of links that can direct you to a phishing site. The site is very similar to the original site. The difference lies in the site address. For example, there is a site with the name www.faceb00k.com. Such sites are used to steal usernames and passwords from victims.

If you get an e-mail containing a link from a suspicious person, you should immediately delete the e-mail.

4. Kept up-date your antivirus.

Antivirus nowadays not only serves as a blocker and malicious killer programs. Antivirus can also be used to protect you in internet activity. Antivirus can tell whether a link and the site is malicious or not.

Author: Deliusno
Editor: Wicaksono Surya Hidayat
Translate by : Yohanes Gitoyo
Source: http://tekno.kompas.com/.

Kamis, 25 April 2013

"Hacker" Wrath, World Internet Slows !


Internet speeds in the world, especially in parts of continental Europe, reportedly slowed. It is not caused by damage to the infrastructure or the existing submarine cable anchors are exposed, as happened to one of the internet network operator Indonesia some time ago.

Internet slowdown in Europe is caused by a distributed denial of service attack (DDoS) is claimed to be the largest in history.

Typically, to launch a DDoS attack, an attacker exploit server or botnet to send fake traffic to the target with the hope of making the target server being offline or dead.

http://2.bp.blogspot.com/_msBUFFOVy2o/TS_ODVzmZrI/AAAAAAAAAOM/3C9e1rYezCY/s1600/ddos_attack.gif

However, the attack was allegedly a little different this time. Hackers allegedly used the issue in the Domain Name System (DNS) servers to bombard the victim with the world's Internet traffic. The scale of this attack is referred to as the largest in history for being able to reach 300 GB per second.

The DDoS attack is directed to a network security firm called Spamhaus. The company is headquartered in the city of Geneva (Switzerland) and London (UK) has been working to make the black list (blacklist) web sites that are considered dangerous.

The black list will be sold to various companies internet service provider (ISP) that typically use this list as a reference to block web sites that are considered dangerous.

As quoted from Mashable, Thursday (03/28/2013), the estimated black list "responsible" for blocking 80 percent of spam e-mails around the world.

Spamhaus itself is rumored to be the victim of a DDoS attack after adding Cyberbunker, a Dutch internet organizers, in the black list.

Cyberbunker is a data storage service that allows users to store all data, except for child pornography and matters relating to terrorism.

Apparently, the parties behind Cyberbunker or sympathize with her anger over the blocking action, then they counterattacked revenge.

http://1.bp.blogspot.com/-5RkGvZ-3SEY/TydjYbPeosI/AAAAAAAAAKM/lcx2lMz2vNk/s1600/DOS.jpg

Although Cyberbunker not actually accused of responsibility for the attack, claiming to be a spokesman Cyberbunker, Sven Olaf Kamphuis, provide a statement that made the company become the accused.

The BBC, Kamphuis said Spamhaus should not be able to determine "what is allowed and not on the internet".

Steve Linford, Spamhaus's chief executive, told the BBC, said the scale of this attack is unprecedented. "We're in a cyber attack for more than a week,'' he said.

"But, they can not undermine us. Technician we did a tremendous job to ward off the attack.''

Linford said police forces from five countries internet is now investigating the cyber attack.

Author: Author: Deliusno
Editor: Reza Wahyudi
Translators: John Gitoyo.
Source: http://tekno.kompas.com/, Thursday, March 28, 2013, 11:06 pm.

Cyber Terrorism Only Time Problem !

 http://www.dailygalaxy.com/photos/uncategorized/2008/04/14/cyber_warfare_4.jpg

Still remember the Stuxnet virus that crippled the United States used Iran's nuclear facilities? According to security expert Eugene Kaspersky of Kaspersky Labs, is only a matter of time before cyber terrorists use similar methods to attack a country vital infrastructure.

It was expressed when speaking in Information Security conference in London. As quoted by The Inquirer, Kaspersky said that the attack against vital infrastructure is "the worst possible of the bad".

"We live in the age of cyber weapons and cyber warfare. Till now attacks (against critical infrastructure) seems to only come from the government of a country," said Kaspersky.


He added that the technology to carry out such an attack is not owned by the terrorists, but it is only a matter of time.

Described by Kaspersky, cyber attacks are launched by a country is usually done with a "very professional", learn the victim by taking the data.

Kaspersky split into three possible scenarios of cyber terrorism by scale effects. The first and the worst are the attacks on industrial systems such as power generation, telecommunications, transportation, and healthcare.

"(About the telecommunications industry), I do not know how to protect them other than using brain intelligence. Worried that I can do is get ready to welcome the attack and manage the damage," said Kaspersky.

Scenario most "serious" the second one is an attack against critical infrastructure in the IT field that could cripple an industry. Many industries rely heavily on IT infrastructure, but do not realize it.

Third, the attack on the government, especially education. "The good news is I do not know what's worse scenario," said Kaspersky.

He explained, the more terrorists will probably be switching to cyber weapon because it is cheaper and easier to develop than physical weapons.

Author: Oik Yusuf
Editor: Reza Wahyudi
Translators: Yohanes Gitoyo.
Source: http://tekno.kompas.com/, Thursday, April 25, 2013, 11:27 pm.

Selasa, 23 April 2013

Maximizing Windows 8 Security Features, Three core enhancements can improve security.


Windows 8 drivers, anti-malware

Windows 8 provides system administrators with a number of new features designed to enhance the product’s security and streamline the end user’s security experience. 

The latest version of the operating system includes three core security enhancements: support for the Unified Extensible Firmware Interface (UEFI) secured boot process; major improvements to Windows Defender; and tight integration of reputation filtering with the operating system. Understanding these enhancements and how best to use them can significantly improve an organization’s security.


1. Protect the boot process with UEFI secure boot.


One of the most important new features in Windows 8 is support for the UEFI secured boot process through a new Windows technology dubbed Secure Boot. This new technology leverages the Trusted Platform Modules that have shipped in most professional-grade computing systems manufactured during the past five years.

Secure Boot protects computers against particularly insidious forms of malware that interfere with the boot process itself, injecting themselves deeply into the operating system as it loads from a disk. When the computer starts up, Secure Boot performs a cryptographic analysis of the operating system to detect the presence of malware. If undesired software is present, Secure Boot prevents the infection and automatically starts the Windows Recovery Console.

This new technology is not without its critics, however. Many in the open-source community fear that the use of UEFI technology will hinder the installation of alternative operating systems on hardware shipped with Windows preinstalled.  Keep an eye on this debate as you make hardware purchase decisions over the coming year.


2. Consider your antivirus strategy in light of Windows Defender.


Some of the biggest news about Windows 8 revolves around a little-used product from earlier versions of Windows. The Windows Defender product, previously designed to protect Windows systems against spyware, has received a significant upgrade to defend against all types of malicious code. 

Like earlier versions, this enhanced Windows Defender will be shipped as an included operating system component, which means there is no subscription fee for updates. It will also be enabled by default, allowing the automatic protection of systems as received from the factory.

The news here will be the impact on McAfee, Symantec and other manufacturers that have built their businesses on providing antivirus software and maintenance contracts. It remains to be seen how the market will react to this free offering from Microsoft.  Security professionals should use the release of Windows Defender as an opportunity to re-examine their security software subscription agreements. 


3. Educate your users about SmartScreen.


If you use Internet Explorer, you’re likely already familiar with Microsoft’s SmartScreen technology. Born as an antiphishing filter, SmartScreen uses a reputation-based scoring database to warn users when they are about to visit a website of questionable origin.

SmartScreen sees two major enhancements with the release of Windows 8. First, it includes improvements designed to reduce the likelihood of false positive reports.  Microsoft’s initial testing of the tool indicates that the typical user should see a SmartScreen warning only once or twice per year. The warning itself is designed to stand out from typical error messages: It explains to the user that the program could pose a threat and offers the user the option of running the program anyway or of not running it.

The second major enhancement to SmartScreen is that it is now an operating system feature and is no longer specific to Internet Explorer. SmartScreen will verify all applications downloaded from the Internet, regardless of the browser used to retrieve the file. IT staff might want to use a Windows 8 upgrade as an opportunity to educate users about SmartScreen and ensure that they understand the impact of clicking “Run Anyway.”

The new security features in Windows 8 are bound to shake up the marketplace. In addition to providing users and administrators with stronger tools in the fight against malware and phishing attacks, Windows 8 introduces technology that is bound to alter the competitive landscape for security products. 

Author : MIKE CHAPPLE
Source : http://www.edtechmagazine.com/, August 16, 2012

Top Eight Security Tips for Microsoft Windows 8.



Microsoft is releasing Windows 8, the newest version of the Windows operating system, for general availability on October 26. Although Windows 8 offers enhanced security features, it also raises new security concerns because of changes to the graphical user interface and a new online app store.


We’re offering the following eight security tips to help you stay secure as you move to Windows 8.

1. Exercise caution with apps for the new Windows 8 user interface (formerly known as Metro)

Some familiar applications have been completely re-written for the new Windows 8 UI. As a result they may work completely differently, despite looking the same. For example, an application historically delivered as an executable could now be entirely web-based. This impacts the visibility your existing security and monitoring tools have into these apps.


2. Use the Windows 8 style UI version of Internet Explorer

By default, plugins are disabled, blocking a major target for exploit kits and Blackhole attacks.


3. Make sure your security vendor can flag malicious Windows 8 UI apps

Windows 8 UI apps have important differences from regular applications, and your security product should be able to distinguish the two. The security product should correctly flag malicious or modified Windows 8 UI applications (tampered, modified, invalid license).

4. Disable hard drive encryption hibernation

Hard drive encryption is a cornerstone of data protection. If possible, disable the hibernation option in Windows 8 through group policy, as it doesn’t always work well with encryption.


5. Make sure your hardware carries the “Designed for Windows 8” logo

To carry this logo, hardware must be UEFI compliant. This means you can take advantage of the secure boot functionality available in Windows 8. Secure boot is designed to ensure the pre-OS environment is secure in order to minimize the risk from boot loader attacks.


6. Make application control a priority

The Windows 8 app store makes application control increasingly important for both malware prevention and productivity control. While the Windows Store will be secured, history shows that malicious apps are likely to slip through. Disable the use of apps that aren’t relevant to your organization.


7. Treat Windows RT (ARM) devices like any other mobile devices

Make sure you impose the same security levels on Windows RT devices as all others. You should have the ability to control, track, remote wipe and encrypt them.


8. Review application permissions in the Windows Store

Applications in the Windows Store must list any resources they require. Carefully review these permissions in the details tab as some will grant access by default to your location information, calendar, etc.

You should still run a full security suite for superior filtering and centralized management and reporting. While Microsoft has included a minimalist antivirus and firewall, most organizations will still require commercial-grade security. And of course, all the old security rules also apply with Window 8. It’s still a bad idea to allow automatic log-on. Above all, remain vigilant.

Source : http://www.sophos.com/

Minggu, 21 April 2013

All About Superman, Super Heroes Legend of Planet Krypton.



Superman, is a fictional superhero character's most famous and influential of comics publisher DC Comics from the United States. Superman has been widely regarded as a cultural icon who symbolizes the power of the United States culture.

In English, Superman also known as "The Man of Steel" ("Man of Steel") "The Man of Tomorrow" ("Man of the Future") and "The Last Son of Krypton" ("Last Son of Krypton Planet"). Superman was given the nickname by his colleagues superhero friend with the nickname "The Big Blue Boy Scout" ("Son of Big Blue Boy Scout a man").

Invented by a Canadian artist, Joe Shuster and American writer Jerry Siegel in 1932 when they were teenagers in Cleveland, Ohio and then sell it to Detective Comics, Inc.. in 1938. Superman first appeared in Action Comics series ("Action Comics") issue # 1 in the United States (June 30, 1938) and later also appeared on numerous radio drama series, television shows, feature films, newspapers, comics, novels, and English video game. With the success of his adventures, Superman helped create the variety and popularity of super hero comic books United States.


History.

Berkas:Reign of the Superman.jpg
"The Reign of the Super-Man" in Science Fiction, Vol. 1, No. 3 (June 1933).

When Jerry Siegel and Joe Shuster first created Superman, not a super hero who is always helping other people, but a bald genius psychopath with telepathic powers who want to rule the whole world. He appeared in a short story entitled "The Reign of the Super-Man" from Science Fiction # 3, a magazine published by Siegel in 1933. Because his behavior is not this character, in the end "Balding Superman" that was subsequently rewritten by Siegel in the year 1933 as a hero, is different from previous bad character, was modeled on actor Douglas Fairbanks Sr. and his alter ego Clark Kent, on Harold Lloyd comedy actor. Superman evil bald and then became an archenemy of Superman named Lex Luthor.

As told in the Action Comics issue # 1, Superman was born on the planet Krypton as Kal-El, and when an infant was launched by rocket to Earth by his father, Jor-El, moments before the planet was destroyed. Rockets later landed on Earth, in a field, which was discovered by a couple Kent, Jonathan Kent and Martha Kent, who later adopted him and named Clark Kent. As a child growing up, he found that he had mastered the power that is far above ordinary people and uses his powers to help others. To hide his identity secret when you're not dealing with criminals as a Superman, he lived as Clark Kent, mild-mannered human being, a reporter for The Daily Star (later renamed The Daily Planet). Clark worked with reporter Lois Lane, and involved a romance with him, and told married in advanced comic story.


Logo S 

 

Superman was the first super hero character who wears eblem or a logo on the chest. The design of the original characters do not wear any emblems, but because of the times and the time, then added the mark "S" is. For the creators "S" can also be derived from the acronym "Shield" (shield). Her Logo is the original form of the Badges Police cheat in America, but after Superman became famous, the logo was better known as "The Knight Shield".


Personality Characteristics

In early pernciptaan by Siegel and Shuster, Superman has a rugged and aggressive personality. The characters you see in the steps to stop domestic violence, the moneylenders, gangsters and mobsters, with slightly rough and lack the moral code for the viewer can be used at this time. Then there are writers who have softened the character and instilled a sense of idealism and moral code of conduct. Although not sesadis / cold character in the early days of Batman, Superman appeared in comics in the 1930s cares not told about the dangers that can be caused by strength, throw the criminals in a way that will cause death if only occur, although this is not shown explicitly uncommon on the page. This story came to an end late 1940, when a new editor is named Whitney Ellsworth provide code for this character, banning Superman to ever kill someone.

File: Clark-Kent.png

Clark Kent, Superman's secret identity, was based partly on Harold Lloyd and named after Clark Gable and Kent Taylor. Creators have discussed the idea of ​​whether Superman pretends to be Clark Kent or vice versa, and sometimes different in publications both approaches have been adopted.

Although typically a newspaper reporter, during the 1970s the character left the Daily Planet for a time to work for television, whilst the 1980s revamp by John Byrne saw the character become somewhat more aggressive. This aggressiveness since faded with subsequent creators restoring the traditional gentle nature to the character.

Personal Data
  • Surname: Clark Kent (Planet Earth) / Kal-El (Planet Krypton)
  • Status: Married
  • Height: 6'3 "(192 024 cm)
  • Weight: 102.1 kg
  • Eye Color: Blue
  • Hair: Black
  • Alias: Man of Steel, Man Of Tomorrow, Last son of Krypton and Krypton's favorite son
  • Occupation: Adventurer, a newspaper reporter, columnist, novelist, former editor,
  • Group Affiliation: Justice League of America (currently); Justice League International
  • Address: Metropolis, USA

Family
  • Jor-El (birth father; deceased);
  • Lara (biological mother; deceased);
  • Jonathan Kent (adoptive father),
  • Martha Clark Kent (foster mother);
  • Lois Lane (wife);
  • Harry Kent (adoptive uncle);
  • Sarah Kent (adoptive aunt);
  • Jason White (biological children);


Age and birthday Superman.

Age Superman has varied through history in comics. He's initially defined, with real-time references to specific years are sometimes given to past events in the beginning of the Golden Age and Silver Age comics. In the comics published between the 1970s and early 1990s, he was usually quoted as 29 years. However, during the Death of Superman storyline, Clark age was given as 34 years (in the paper published fiction promotion), while the Zero Hour time in 1994 founded his age as 35.

In the Golden Age, 1950 Action Comics # 149 gives birth date of October as Superman. In the Silver Age and Bronze Age stories, Superman's birthday on February 29 is described as a, as shown in Superman Annual # 11 in 1985. Clark Kent, meanwhile, will celebrate his birthday on June 18, the date was first discovered Clark Kents (June 18, also born of Superman voice actor Bud Collyer.) Post-Crisis story also references a February 29 re Clark Kent, as shown in Action Comics # 655 (July 1990). However, in 2009 Superman: Secret Origin describe Clark celebrated his birthday on December 1st.


Superman biography.

Details of Superman's origin, relationships and abilities changed significantly during the publication of the character, from what is considered the Golden Age of Comic Books through the Modern Age. Powers and villains were developed through the 1940s, with Superman developing the ability to fly, and costumed villains introduced from 1941. The character has learned the existence of Krypton is shown in 1949. The concept itself was originally founded in 1939 for the readers in the Superman comics.

The 1960s saw the introduction of a second Superman. DC has created a multiverse within the fictional universe of the character. This allows the characters published in the 1940s to exist alongside colleagues published updated in 1960. It is explained to the reader through the notion that the two groups of characters inhabited parallel Earth. The second Superman was introduced to explain to the reader Superman's members in both the 1940s superhero team the Justice Society and the American 1960s superhero team the Justice League of America.

The 1980s saw a radical revision of the character. DC decided to remove the multiverse in a bid to simplify its comics line. This led to the rewriting of the back story of the characters DC published, Superman included. John Byrne rewrote Superman, move back a lot of terms defined and the characters from continuity, including Superboy and Supergirl. Byrne also re-established Superman's adoptive parents, The Kents, as characters. In a previous story, the character has been written as had died in early life of Superman (Clark Kent on the time of graduation from high school).

File: Deathofsuperman.jpg
Superman Lois Lane dies at arm 's: Superman No. 75 (vol. 2 January 1993), Art by Dan Jurgens and Brett Breeding

In 1992 Superman was killed by the villain Doomsday, although the character immediately resurrected the following year. Superman married Lois Lane in 1996. His origins back in 2004. In 2006 Superman stripped of their power, although this is returned within one year of fiction.

Superman vs. Doomsday battle video on Youtube,
Click the link to watch.
Superman: Doomsday - The Death of Superman Part 1

Superman: Doomsday - The Death of Superman Part 2

Superman: Doomsday - The Death of Superman Part 3

Superman: Doomsday - The Death of Superman Part 4

Superman: Doomsday - The Death of Superman Part 5

After a confrontation with Brainiac that resulted in the deaths of his father, Superman found the lost city of Kandor, which contains 10,000 Kryptonians. They stay on Earth causes trouble, and the Kryptonians create their own planet, New Krypton. Eventually, New Krypton wages war against Earth. Both sides retain large casualties and most of the Kryptonians killed. Superman then begins journey to reconnect with his adopted home world.


Strengths and capabilities.


As an influential archetype of the superhero genre, Superman has extraordinary powers, with the character traditionally described as "faster than a speeding bullet, more powerful than a locomotive, and able to leap tall buildings in a single bound", a phrase coined by Jay Morton and first first used in the Superman radio serials and Max Fleischer animated shorts in the 1940s, as well as TV series in the 1950s.

For most of his existence, Superman's famous arsenal:
  • aviator super
  • super strength
  • immunity to non-magical attacks, super-speed,
  • power of vision (including x-ray, heat-emitting, telescopic, infra-red, and microscopic vision)
  • super hearing
  • ability to think super
  • super breath, which enables him to blow out air at freezing temperatures, as well as exerting a driving force of high-speed winds.



As originally conceived and presented in the beginning of the story, Superman's strength is relatively limited, consisting of superhuman strength that allowed him to lift a car over his head, run at amazing speeds and leap one-eighth of a mile, and very dense body structure that could not be penetrated by less than an artillery shell exploded. Siegel and Shuster compared the strength and jumping abilities of ants and grasshoppers. When making the cartoons, the Fleischer Brothers found it difficult to keep him jump and turn requested to DC to change his ability to fly,. This is a very convenient concept for short films, which would otherwise have wasted valuable time running earthbound Clark Kent moves from place to place.

Writers gradually increased his powers to larger extents during the Silver Age, in which Superman could fly to other galaxies and the world and even in the entire universe with relative ease. He often fly across the solar system to stop meteors from hitting the Earth, or sometimes just to clear his head.

Writers found it increasingly difficult to write Superman stories in which the character was believably challenged, so DC made a series of attempts to rein the character entered the most significant attempt, John Byrne's 1986 rewrite, established several hard limits on his ability: he barely survives a nuclear blast, and his space flights are limited by how long he can hold his breath. Superman's power levels have again increased since then, with Superman currently has enough strength to hurl mountains, withstand nuclear blasts with ease, fly into the sun unharmed, and survive in the vacuum of outer space without oxygen.

Source of strength Superman has subtly changed during its history. It was originally stated that Superman's abilities derived from Kryptonian heritage, which made him eons more evolved than humans, this soon changed, with the source of power is now based upon the establishment of Krypton gravity as having been stronger than the Earth. This situation reflects that Edgar Rice Burroughs' John Carter. As Superman strength increased, the implication that all Kryptonians have the same ability to be a problem for the author, so it is doubtful that a race of such beings could have been destroyed by something as trivial as the planet explodes. In part to counter this, Superman writers established that Kryptonians, whose native star Rao had been red, have a super power only under the light of a yellow sun.

Superman is most vulnerable to green Kryptonite, mineral debris from Krypton transformed into radioactive material by the forces that destroyed the planet. Exposure to green Kryptonite Superman cancel strength and immobilize him with pain and nausea, prolonged exposure will eventually kill him.

The only substance on Earth that can protect him from Kryptonite is lead, which blocks the radiation. Lead is also the only known substance that Superman can not see through with his x-ray vision. Kryptonite was first introduced to the public in 1943 as a plot device to allow the radio serial voice actor, Bud Collyer, to take some time. Although green Kryptonite is the most commonly seen form, writers have introduced other forms over the years: such as red, gold, blue, white, and black, each with its own effect.


Superman enemy.

Superman also has enemies, including the most well-known nemesis, Lex Luthor, who has been envisioned over the years in various forms either as a genius scientist who jerk with personal grudges against Superman, and powerful but corrupt CEO of a conglomerate called LexCorp who thinks Superman is somehow inhibited human progress by his heroic efforts.

In the 2000s, he even became president of the United States, and has been described generally as a former childhood friend of Clark Kent. The alien android (in most incarnations) known as Brainiac is considered by Richard George to be the second most effective enemy of Superman.

Enemies who achieved the most, by actually killing Superman, is the raging monster Doomsday. Darkseid, one of the most powerful beings in the DC Universe, is also a formidable enemy in most post-Crisis comics. Other important enemies who have featured in various incarnations of the character, from comic books to film and television include the fifth-dimensional imp Mr. Mxyzptlk, the reverse Superman known as Bizarro and the Kryptonian criminal General Zod, among many others.



Superman publications.
  • Serial publications Superman in Superman comics
Superman comic with his own role is not as successful at the beginning of its emergence. Superman and the JLA joined the group as its leader and become a separate comic. Superman on the other hand do the Cross-Over the hero of the other DC like Superman vs. Batman and others.

File: Action Comics 1.jpg

Superman's first appearance in Action Comics # 1, published on April 18, 1938 (cover-dated to June 1938). In 1939, a self-titled series was launched. The first issue mainly reprinted adventures published in Action Comics, but despite this the book achieved sales greater. 1939 also saw the publication of New York World's Fair Comics, which in the summer of 1942 became World's Best Comics. With issue No.7 of All Star Comics, Superman made the first of a number of infrequent appearances, on this occasion appearing in cameo to establish his honorary membership in the Justice Society of America.


Initially Jerry Siegel and Joe Shuster provided the story and art for all the strips published. However, Shuster eyesight began to deteriorate, and the increasing appearance of the character meant an increase in workload. This led Shuster to establish a studio to assist in the production of art, although he insisted on drawing the face of every Superman the studio produced. Outside the studio, Jack Burnley began supplying covers and stories in 1940, and in 1941 artist Fred Ray began contributing stream of Superman covers, some of which, such as that of Superman # 14 (February 1942), became iconic and much reproduced. Wayne Boring, initially working in the Shuster studio, began working for DC in his own right in 1942 providing pages for both Superman and Action Comics. Al Plastino was hired initially to copy Wayne Boring but was eventually allowed to create his own style and became one of the most prolific Superman artists during the Gold and Silver Ages of comics.

Scripting duties also became shared. In late 1939 a new editorial team in control of adventure character. Whitney Ellsworth, Mort Weisinger and Jack Schiff were taken after Vin Sullivan's departure. New editorial team brought in Edmond Hamilton, Manly Wade Wellman, and Alfred Bester, established writers of science fiction.

In 1943, Jerry Siegel was drafted into the army in a special celebration, and as a result the contribution is reduced. Don Cameron and Alvin Schwartz joined the writing team, Schwartz worked with Wayne Boring to work on the Superman comic, which had been launched by Siegel and Shuster in 1939.

In 1945, Superboy made his debut in More Fun Comics # 101. The character moved to Adventure Comics in 1946, and his own title, Superboy, was launched in 1949. 1950 saw the launch of Superman's Pal Jimmy Olsen (1954) and Superman's Girl Friend, Lois Lane (1958). In 1974 the title had merged into Superman Family, although the series was canceled in 1982. DC Comics Presents was a series published 1978-1986 featuring team-ups between Superman and other characters from the DC Universe.

In 1986, the decision was taken to restructure the universe the Superman character inhabited with other DC characters in the mini-series Crisis, resulting in the publication of "Whatever Happened to the Man of Tomorrow", a two-part story written by Alan Moore, with art by Curt Swan , George PĂ©rez and Kurt Schaffenberger. This story was published in Superman # 423 and Action Comics # 583 and presented what Les Daniels notes as "the sense of loss the fans might have experienced if this really has been the last Superman tale."

File: Mansteel1.png
Originally revamped Superman in The Man of Steel # 1 (July 1986), written and drawn by John Byrne.

Superman was relaunched by writer & artist John Byrne, initially in the limited series The Man of Steel (1986). 1986 also saw the cancellation World's Best Comics, and the Superman title renamed The Adventures of Superman.

A second volume of Superman was launched in 1987, running until cancellation in 2006. After this cancellation, The Adventures of Superman back to the Superman title. Superman: The Man of Steel was launched in 1991, running until 2003, while the quarterly book Superman: The Man of Tomorrow ran from 1995 to 1999.

In 2003 Superman / Batman was launched, ending in 2011 and Superman: Birthright limited series, with All-Star Superman launched in 2005 and Superman Confidential in 2006 (this title was canceled in 2008). He also appeared in the TV animated series-based comic book tie-ins Superman Adventures (1996-2002), Justice League Adventures, Justice League Unlimited (canceled in 2008) and The Legion of Super-Heroes in the 31st Century (canceled in 2008).

In 2011, DC Comics relaunched Superman comics, along with the rest of their degree. Superman and Action Comics canceled and restarted with the all-new # 1 issues. Superman's costume was redesigned to look more like armor and red shorts over tights have been removed.

Superman and Wonder Woman in Justice League shared a kiss vol. 2, # 12 (August 2013), which has since been developed into a romantic relationship.

As of 2013, the ongoing publication featuring Superman on a regular basis are Superman, Action Comics and Justice League. The character often appears as a guest star in other series and is usually a pivotal figure in DC crossover events.

  • Publication Superman in the film world.
  1. 1948: Superman, a series in the 15 series, starring Kirk Alyn and Noel Neill.
  2. 1950: Atom Man Vs. Superman serial in 15 parts starring Kirk Alyn, Noel Neill and Lyle Talbot. Bertampur with Atom Man and Lex Luthor.
  3. 1951: Superman and the Mole Men, widescreen movie, starring George Reeves and Phyllis Coates.
  4. 1954: Stamp Day for Superman, short duration movie featuring George Reeves and Noel Neill promote Stamp Day for the U.S. Treasury Department.
  5. 1978: Superman, direction by Richard Donner and starring Christopher Reeve, Marlon Brando, Gene Hackman and Margot Kidder.
  6. 1981: Superman II, the direction of Richard Lester and starring Christopher Reeve, Margot Kidder, and Terence Stamp.
  7. 1983: Superman III, direction of Richard Lester and starring Christopher Reeve, Richard Pryor, Annette O'Toole and Robert Vaughn.
  8. 1984: Supergirl, film for extra income based on extra character comic, landing Jeannot Szwarc and starring Helen Slater and Faye Dunaway.
  9. 1987: Superman IV: The Quest For Peace, landing Sidney J. Furie and starring Christopher Reeve, Gene Hackman, Margot Kidder, and Mariel Hemingway.
  10. 2006: Superman Returns, Bryan Singer's direction and starring Brandon Routh, Kate Bosworth and Kevin Spacey.
  11. 2006: Superman II: The Richard Donner's Cut. Edits new version of Superman II movie, featuring approximately 70% additional new long taken by director Richard Donner, including new material featuring Marlon Brando.
  12. 2013: Man of Steel, the film directed by Zack Snyder, starring Kevin Costner, Amy Adams, Russell Crowe and Henry Cavill.

  • Publication in the Superman TV Series
  1. 1952 - 1958: Adventures of Superman, starring George Reeves, Phyllis Coates (season 1) and Noel Neill (seasons 2-6).
  2. 1957: I Love Lucy - episode "Lucy and Superman" featuring George Reeves as Superman.
  3. 1961: The Adventures of Superboy was not aired on television series, starring Johnny Rockwell.
  4. 1975: It's A Bird, It's A Plane, It's Superman, for the television production of the broadway musical starring David Wilson and Lesley Ann Warren.
  5. 1988 - 1992: Superboy, a television series starring John Haymes Newton (1988-1989), Gerard Christopher (1989-1992) and Stacy Haiduk
  6. 1993 - 1997: Lois & Clark: The New Adventures of Superman, starring Dean Cain and Teri Hatcher.
  7. 2001 - (current): Smallville, starring Tom Welling, Michael Rosenbaum, Kristin Kreuk and Erica Durance.

  • Superman publications in the Video Game.
While Superman is largely considered as the archetypal superhero, and the flagship character of DC Comics, he has enjoyed virtually no success in video games. Various Superman video game has been released, starting with Superman for the Atari 2600 in 1978, nothing has been commercially successful.

One of the most famous examples is the 1999 game for the Nintendo 64, simply titled Superman (although often erroneously called Superman 64 because of the tradition of N64 games putting the number "64" at the end of several titles), which is largely considered to be one of the worst games of all time.


"Marvel Versus DC"

In 2007, a site preselect the strongest super hero with a power that was given the title of "The Most Strength Superhero" (Indonesian: "Strongest Super Heroes"). Here is the third to occupy the position of unity.
  1. The Incredible Hulk (Marvel comic)
  2. Superman (from DC comic)
  3. The Thing from the Fantastic Four (Marvel comic)

But then, DC in collaboration with Marvel comics publishing joint entitled "DC vs. Marvel". At this comic brought together several prominent DC against Marvel characters. And among the winners of The Incredible Hulk 1 against Supeman reunited. And in this fight, Superman manages to defeat The Incredible Hulk which means undermining the notion that the Hulk is stronger than Superman. Even The Thing which occupies the third position was defeated by Martian Manhunter is back undermine the position of The Thing.


Critical reception and popularity.

File: Obama Superman Los Angeles.jpg
Barack Obama as Superman, Los Angeles, California.

The character of Superman and various comic series have received various awards over the years.
  1. Magazine "Empire" named greatest comic book character of all time
  2. Superman government which is one of many storylines or works have received Comics Buyer's Guide for the Fan Award, winning the Favorite Comic Story category in 1993
  3. Superman came at number 2 in VH1's Top Pop Culture Icons 2004
  4. Also in 2004, "cinemagoers" English as Superman's greatest superhero of all time
  5. Works featuring the character have also garnered six Eisner Awards and three Harvey Awards, either to work alone or creator of the work
  6. Superman films have received a number of nominations and awards, with Christopher Reeve winning a BAFTA for his performance in Superman: The Movie
  7. The Smallville television series has garnered Emmys for crew members and various other awards.


Copyright issues.

Joe Shuster and Jerry Siegel, the BBC © BBC Four (1981) 

As part of the deal which saw Superman published in Action Comics, Siegel and Shuster sold the rights to the company in exchange for $ 130 and a contract to supply the publisher with material.

The Saturday Evening Post reported in 1940 that the pair was each being paid $ 75,000 per year, a fraction of the millions of National Comics Publications' Superman profits. Siegel and Shuster renegotiated their deal, but bad blood lingered and in 1947 Siegel and Shuster sued for their 1938 contract to be made void and the re-establishment of their ownership of the intellectual property rights of Superman. The pair also sued National in the same year over the rights Superboy, which they claimed was a separate creation that National had published without authorization. National immediately fired them and took their byline on the story, prompting a legal battle that ended in 1948, when a New York court ruled that the 1938 contract should be upheld. However, the decision of Judge J. Young Addison rights granted Siegel Superboy. A month after the Superboy judgment the two sides agreed on a settlement. National paid Siegel and Shuster $ 94,000 to drop all claims. The pair also acknowledged in writing the company ownership of Superman, to prove that they hold the rights for "all other forms of reproduction and presentation, whether now existing or which may hereafter be created", but DC refused to re-employ them.

In 1973 Siegel and Shuster again launched a suit claiming ownership of Superman, this time basing the claim on the Copyright Act of 1909 which saw copyright granted for 28 years, but allowed for an additional 28-year extension. Their argument was that they had granted DC the copyright for only 28 years. The pair again lost this battle, both in a district court ruling October 18, 1973 and an appeal court ruling dated December 5, 1974.

In 1975 after news reports of the existence of the poor as they were, Warner Communications gave Siegel and Shuster lifetime pensions of $ 20,000 per year and health care benefits. Jay Emmett, then executive vice president of Warner Bros., as quoted by The New York Times stating, "There is no legal obligation, but I sure feel there is a moral obligation on our part." Heidi MacDonald, writing for Publishers Weekly, noted that in addition to this pension "Warner agreed that Siegel and Shuster would later be credited as creators of Superman on all comics, TV shows and movies".

Years after the completion of, 1976, the copyright term was extended again, this time for 19 years with a total of 75 years. However, this time a clause inserted into the extension to allow authors to reclaim their work, reflecting the arguments Siegel and Shuster had made in 1973. The new law came into force in 1978 and allows the reclamation window in the period based on the previous copyright term of 56 years. This meant the copyright on Superman could be reclaimed between 1994 to 1999 based on the initial publication date of 1938. Jerry Siegel died in January 1996, his wife and daughter filed a copyright termination notice in 1999. Although Joe Shuster died in July 1992, no termination was filed at the time by his estate.

In 1998, the copyright was extended again with the Sonny Bono Copyright Term Extension Act. This time the copyright term was extended to 95 years with a further window for reclamation introduced. In January 2004 Mark Peary, nephew and legal heir to Joe Shuster's estate, filed notice of his intent to reclaim Shuster half of the copyright, the termination effective in 2013. Siegel shares the status of copyright is now the subject of legal battles. Warner Bros. and Siegel had a discussion about how to address the issues raised by the termination notice, but these discussions aside by Siegel and in October 2004 they filed suit alleging copyright infringement on the part of Warner Bros. Warner Bros. counter sued, alleging that the termination notice contains defects , among other arguments.

On March 26, 2008, Judge Larson of the United States District Court for the Central District of California ruled that Siegel's estate was entitled to claim stake in U.S. copyright. The decision does not affect the International rights, which Time Warner hold on the character through DC. The issue of the amount of money borrowed and whether the claims Siegel real estate has extends to derivative works such as movie versions will be settled at trial, although any compensation would be owed only from works published since 1999. Time Warner does not give a statement on the ruling but has the right to challenge it. The case is scheduled to be heard in California federal court in May, 2008.

A notice of termination-of-copyright the same filed in 2002 by Siegel's wife and daughter on the Superboy character was ruled in their favor on March 23, 2006. However, on July 27, 2007, the same court issued a ruling reversing the March 23, 2006 ruling. This ruling is currently subject to a legal challenge from Time Warner, with the case unresolved.

File: Siegels.jpg The
Jerry Siegel, with wife Joanne and daughter Laura in 1976. Joanne and Laura Siegel filed a termination notice on Jerry Siegel shares Superman copyright in 1999.

A dated July 9, 2009, verdict on the case denied a claim by Siegel's family that it was owed licensing fees. U.S. District Court Judge Stephen G. Larson said Warner Bros. and DC Comics have fulfilled their obligations under the agreement for the distribution of profits Siegel for the 2006 film Superman Returns and the CW series Smallville. However, the court also ruled that if Warner Bros. does not start a new Superman movie in 2011, the family will have the right to sue to recover damages. Warner Bros. hired David S. Goyer to write the script and Christopher Nolan to produce in 2010.

On January 10, 2013, the 9th Circuit Court of Appeals ruled that the 2001 agreement that had been reached with the Siegel family of DC Comics still legally binding, thus quashing 2008 decision in favor of Siegel. The copyright only effectively ensure the DC Comics' Superman.

Author : Yohanes Gitoyo.
Reference :
  1. http://id.wikipedia.org/wiki/Superman
  2. http://en.wikipedia.org/wiki/Superman
Source : http://pustakadigitalindonesia.blogspot.com/, 4/21/2013 03:16:00 AM.

Selasa, 16 April 2013

'' Tens of thousands'' Botnet Attack Site WordPress




WordPress was attacked by a botnet '' tens of thousands'' of individual computer since last week, said by Cloudflare server provider and Hostgator.

Botnets targeting WordPress users who use the name'' admin'' for trying to steal thousands password or passwords.


The attacks began a week after WordPress strengthen security with two-step filter an additional option when users log in to the system.

WordPress now has 64 million blogs and read by 371 million people every month.

According to the poll W3Techs site, about 17 percent of the world is run by WordPress sites.


"Change Password"


"This is what I can recommend: If you are still using the name 'admin' on your blog, change, use a strong password,'' wrote the WordPress founder Matt Mullenweg on its official blog.

He also suggested two-step log filter, including using numbers'' secret'' in the user name and password, and ensure that the latest version of WordPress has been installed.

"Most of the other suggestions are not good, considering the botnet has more than 90,000 IP addresses, IP restrictions are not so good because they can try on a variety of other IP addresses in seconds for 24 hours.''

Matthew Prince, CEO and founder of Cloudflare, said the purpose of the attack is likely to further strengthen the botnet.

"One of the concerns of this kind of attack is a hacker using relatively weak botnet from home computers to build a bigger botnet in order to prepare the next attack,'' he said so.

"The bigger engine could cause greater damage in DDos because the server has a network connection and is able to generate huge traffic,'' he added.

Editor: Reza Wahyudi
Translators: Yohanes Gitoyo
Sources: http://tekno.kompas.com/, Tuesday, April 16, 2013, 15:16 pm

Warning !, Tens of Thousands 'Malware' Discovered in Android !


Kaspersky Lab, a network security company from Russia, never revealing predictions related to the mobile world in 2012. At that time, the company is led by Eugene Kaspersky predicts cybercriminals will focus on the Android platform.

Kaspersky Lab is the prediction ultimately proved accurate. In January 2012, Kaspersky Lab claims to have less than 6,000 unique malware samples, specifically for the Google-made platform.

Then, in late 2012, Kaspersky Lab claims, has gained more than 43,000 malware targeting About 99 percent of smartphones and tablet devices based on Android.



While the threat to Symbian-based devices and a BlackBerry or mobile device that supports Java version is less than 1 percent.

Excerpted from a press release received KompasTekno, Thursday (28/03/2013), the biggest threat Android can be divided into three major groups, namely SMS Trojan that can steal money by sending SMS; adware, and exploits to gain root access are able to provide access full to the device and data stored in dalamnnya.

There is also a new mobile botnets with names Foncy allowing cyber criminals to control mobile devices. For this particular case, the creator of the botnet has been arrested by French police. The perpetrators are thought to have managed to earn 100 thousand euros, or about Rp 1.2 billion from the victims.

"Cyber ​​criminals are really serious work on mobile devices as mobile devices usually contain more personal data is first stored in the PC. In 2012 we recorded thousands of new malware in order to steal information, take money from mobile accounts and bank accounts and spying on users. Unfortunately, the Android platform has become quite hazardous environments and in desperate need of protection, "said Denis Maslennikov, Senior Malware Analyst, Kaspersky Lab.


The attack on platforms other than Android

Although the number of new malicious applications for smartphones based on Symbian and Blackberry less, there are some applications that target the known victims bank account.

Last year Kaspersky Lab's experts noted a new version of the Trojan like Zeus-in-the-Mobile and SpyEye-in-the-Mobile is joining forces with malicious applications on the desktop to get the user's bank account. Mobile malware is here used to steal from a bank authorization messages, or mTAN code, which is needed to carry out the transaction.

Malware like this also hides the message from the bank so that the user does not receive the message. New users will be aware of the irregularities when checking their bank balances.



Where Least Secure, Android or iPhone?

Popularity of a mobile operating system is not always better, especially if potentially invite attack by cyber criminals. Currently, the operating system for mobile phones is the most popular Android and iOS in the iPhone.


Now, which of these two operating systems are the most vulnerable or least secure?

To find the answer, Sourcefire security research institute conducted a study titled "25 Years of Vulnerability" which was released in March.

His research is quite surprising. iPhone turned out to contain far more vulnerabilities than other mobile operating systems, including Android.

Yet all this is always referred to as the operating system is the least secure because it brings the open source Android.

Sourcefire states, the popularity of the iPhone and Apple's strict controls imposed on its application store would encourage cyber criminals to find loopholes in the iOS operating system.

A total of 210 security holes discovered in iPhones. That amount represents 81 percent of the overall number of vulnerabilities that exist in the mobile operating system, and is much larger than the total security holes in Android OS-based smartphone, Windows, and BlackBerry that figure only reached 19 per cent combined.

iPhone takes the mobile phone vulnerability market share over the past 25 years
(Source: SourceFire)

Yves Younan, a senior researcher Sourcefire, said that Apple mobile devices have increased year-over-year which is significant in terms of the number of vulnerabilities found, although iOS is always implementing new security features in every update.

With the Android operating system, according to Younan, cyber criminals apparently less motivated to search for vulnerabilities in smartphones. This is due to the open nature of Android that allows hackers to enter or send the user to a malicious application.

On the other hand, it is difficult to do on iOS devices because Apple controls the applications that are circulating in his platform tightly. Therefore, the cyber criminals increasingly challenged to find security holes in Apple's own software system.

Author: Deliusno
Editor: Reza Wahyudi
Sources: http://tekno.kompas.com/.

Dangers Play Games On-line Without Antivirus!



The online game players was potentially high exposure to cyber threats. It can happen because of online gamers often disable security applications on the computer, make computer system is not protected at all.

Why online game players decided to turn off security applications?
The answer is quite simple. They do not want to play games that are "heavy" or cause anymore.

According to research conducted by Eset security agencies against 1,000 British gamers, about 30 percent of them admitted to having closed the computer security application before starting to play.


Finally, because there is no more security, half of those who disable security features malware infection and it took more than two days to repair the computer to return to normal.

The question is, what are the biggest threats faced by actual gamers online?
Eset according to a press statement received KompasTekno, Tuesday (04/09/2013), there are four ongoing threats lurking online gamers.

  1. Phishing: Beware of fake gaming sites that spread threats in the online gaming world and some of them use URLs that are superficially similar to the original. If caught, could be infected with malware and computer gamers lose personal data range.
  2. Social networking sites: A lot of fake Facebook accounts created for the needs of committing a crime. The account claims that they are the official game developer. Highly advised not to give any personal data to these websites.
  3. Games that contain malware content and cheating software: Computer games are fake, or the results of a potential crack malware spreaders and spread via the Internet. The players are encouraged to be extra careful with email attachments and USB flash drives.
  4. Malware: Currently malware online gaming is the most widely spread type of Trojan Win32/PSW.OnLineGames used to conduct phishing attacks, and the target is gamers. This type of malware with keylogging and generally appear rootkits act to collect information related to online games and user data.



To prevent these things happening, ESET gives some simple tips.

  1. Use antivirus: Use antivirus software that features Antispyware and Firewall, and always updated in real time.
  2. Password: Always use a password that is not easy to guess and different for each different account.
  3. Type the URL of games to be played. Thus you avoid dangerous links that appear in search engines because one click.
  4. Download the game from the official site or buy the original CD in order to guarantee quality. Do not use cracked game results, as potentially containing malware.
  5. Play with honest, avoid patches to cheat on a game that is usually due to potentially contain malware.


Author: Deliusno
Editor: Reza Wahyudi
Translator : Yohanes Gitoyo.
Sources: http://tekno.kompas.com/, quoted from : http://pustakadigitalindonesia.blogspot.com/, 16 April 2013 01:12:00 AM

Sabtu, 13 April 2013

Android Apps Can Used Plow Plane.



A digital security consultant named Hugo Teso from Germany shows how an Android application that he developed specifically to be used to take control of a commercial aircraft.


In a digital security forum Hack in the Box in Amsterdam, Netherlands, Teso bring scientific journal titled Aircraft Hacking: Practical Aero Series. He showed that the application can extract important information from the aircraft systems. In fact, the application can be used to control the aircraft.

The applications that run PlaneSploit named Teso in smart phone Samsung Galaxy. Following application view:

 Tampilan aplikasi PlaneSploit buatan Hugo Teso, foto oleh isa56k via Instagram

"This presentation will be a practical demonstration of how your taking over full control of the aircraft remotely, to show the results of three years of my research in the field of aviation security," wrote Teso in abstract scientific journals.

How, can be done by going to the steering system wirelessly plane, or it could also make another trip planned system, which is then uploaded into the system belongs to the specific application.

He was able to manipulate the steering of Boeing jet aircraft while the aircraft was in the mode "autopilot."


Teso, who had trained as a pilot, said the plane there are some systems that are not encrypted and are not safe. He knows it's access to the system so that it can control the plane.

Teso described what has not been studied directly in the aircraft carrying passengers to a place. He prefers to test in a laboratory aircraft systems. He also will not distribute PlaneSploit to the public.

Author: Aditya Panji
Editor: Reza Wahyudi
Translate : Yohanes Gitoyo
Sources: http://tekno.kompas.com/, Friday, April 12 2013,18.13 pm.

Rabu, 03 April 2013

Did you know: How Computers Make Robot Fighting In Transformers 3?


I'm sure most of you have seen virulence Transformers movie, Transformers either 1, 2 or 3 good on a movie screen, television, or on your computer. But do you know how to make the effect Michael Bay robot fights are so real and a very severe impairment. We know all things indeed effect done with CGI computer, but how do they make such terrible effect watch the following video.


The Visual Effects of Transformers- Dark of the Moon Part 1

The Visual Effects of Transformers- Dark of the Moon Part 2

The Visual Effects of Transformers 1 and 2


Meanwhile, what does the Transformers film crew making a movie so terrible? watch the video behind the making of the film Transformers Dark of the Moon follows.

Transformers DOTM The Making 1/3

Transformers DOTM The Making 2/3

Transformers DOTM The Making 3/3 watch in this link

How, you've seen how a technology able to fool you with ease, and it just pleases you? Is this weird, glad you cheated? fraud are amazing and you are not entertained, Indonesia had a dream one day we could make a similar film someday. Yes you and I have much to learn more!

Know the Assault Rifle SS2 made ​​Pindad, Indonesia.


SS2, which stands for Assault Rifle 2, is an assault rifle made by PT Pindad that, a second generation of assault rifle Pindad before, SS1.

SS2 claimed to have a more ergonomic design, resistant to high humidity, lighter, and better accuracy. This rifle uses bullets caliber 5:56 x 45 mm NATO standard and has an empty weight of 3.2 kg, as an early variant of SS1 record has an empty weight of 4.01 kg. In 2006, the Army bought 10,000 rifles SS2.


Evolution SS2

Initially available in three basic versions (standard rifle SS2-V1, carbine SS2-V2 and para-sniper SS2-V4) is now also available in subcompact SS2-V5 version, which was introduced in 2008.


By carrying SS2 4 HB V and G2 Pistol Combat Indonesia overall champion of the international military shooting competition AASAM-Australia 2012. Even Indonesia has 5 times the overall winner AASAM, and brought the different variants of the weapon SS2.

Unlike the SS-1 made under license Belgian FN FNC, SS-2 purely designed by technicians Pindad. That is why, a form SS-2 undergo much change.

SS-1 is still using forged steel as the main raw material, making it the lightest weight of 3.75 pounds for a variant of the SS-1V5. While using aluminum, heavy SS-2 to 3.4 pounds. Even the SS2 variant V5, 3.2 Kg lighter again.

SS2 V5 Assaut Riffle by Audryliahepburn

Pisir SS-1 can only be set at the position of 250 meters and 400 meters. Sedangan pisir SS-2 can be adjusted for distance: 100, 200, 300 meters and beyond. It is useful to facilitate petembak shoot the target. Ammunition SS-2 still use the standard NATO caliber 5.56 mm.

SS-2 fitted ball stopper. When a bullet fired out, petembak not need guns cocked back for charging magazines.

Distance range of SS-2 V1 reaches 400-500 meters and is equipped telescope Trijikon or Close Quarter / Tactical CQT. Weapons SS-2 can be mounted: night vision goggles, bayonets, silencers and grenade launcher caliber 40 millimeters. Popornya can be folded, making it easy to be carried by soldiers in the field. SS 2 assault rifles claimed to operate in various fields without worrying bogged down when in use.

SS2 V5 Commando

Since manufactured 2005, Pindad has made several variants, namely: SS-2 V1, V1 SS-2 Heavy Barrel (HB), SS-2 carbine version V2 (750 rounds / min), SS-2 V4 sniper rifle, SS-2 HB V4 and V5 subcompact SS-2. In 2006, the Army bought 10,000 rifles SS2. Weapons SS-2 is only used by the military. While the SS-1 has been used several African and South American countries, the Philippines and Thailand.


Excess SS2 Pindad.

President Yudhoyono and UN Secretary General Ban Ki Moon to SS2 V5

Product Design Staff PT Pindad, Windu Paramarta explain the advantages Pindad weapon, Assault Rifles 2 (SS2), one of which has a resistance in the water.

According Windu, resistance in water that is at SS2 tersrbut take advantage of the state-owned weapons, such as a flexible M16 and AK-47 that has a resistance in every field.

"The weapons we produce using the mechanism of the combination with M16 and AK-47," said Windu told the Tribune at the Indo Defence 2012 exhibition held in Kemayoran, Jakarta, Friday (11/09/2012).

Windu explained, SS2 well in all variants, such as V1, V2, and V5 V4HB adopting accuracy as on the M16 and M4. Moreover, continued Windu, SS2 tailored to its users, the TNI.

"Arguably the quality is also not far away. Dlihat weapon of accuracy with less memudahan users. We make with human ergonomics Indonesia," said Windu.

For durability, said Windu, SS2 modeled as AK-47, which has a flue gas in the body SS2, so do not bother discharge a bullet from the muzzle covered in mud or water.

"So do not make the water or mud stuck. Least the first shot was the bullet to clean the mud into the muzzle," said Windu.

With the advantages of the adoption of the two arms, then SS is a fitting weapon used by the military in Indonesia's tropical climate.


Because of its advantages, the SS2 also sought a number of countries, such as Iraq, Iran, Uganda, Congo, and Saudi Arabia, which is considered a potential market weapon sales Indonesia.



Weapons SS2 V5C Version Kopassus

Pindad SS2 V5A1

Thousands of assault weapons SS2 V5C Kopassus order being produced by PT Pindad. For the initial stage, Kopassus will get 1000 SS2 V5K shoots in the near future. While Brimob book V5A1 SS2 variant.

Military forces have been using SS2 V1 since 2005, but SS2 V5 was first shown in 2008. While the Commando V5 variant SS2 and SS2 V5AI, newly produced in 2012. 

Weapons SS2 V5 appeared to respond to complaints against SS2 weapons V2 and V4 during this time. 

Pindad SS2 V5 Assault Riffle

Let us listen to the recognition of a person who had fired the SS2 V2: 

"Weaknesses: Position pisir rather high and not supported by a good cheekpiece. When shooting is not cheekbones stuck in cheekpiece butt, but more towards the chin making it less comfortable. 

"Barrel is too long, the same as the M16. For the war in the woods might be appropriate, but it can be a hassle for urban warfare movement, although can be folded butt ". 

"Handgrip is shaped tubular. It is better replaced with Picanntiny rail (MIL-STD-1913 rail, STANAG 2324 rail or simply "Tactical Rail). 


Some weapons technology experts judge the distance between the height of the rear sight butt is too big. Rear sight of the buttstock butt is too high, making petembak could / had to lose a good cheek weld to get the sight picture. 

Sight differentialsenjata SS2 is considered one of the laws violated the Basic Rifle Marksmanship, that rifle shooting is determined by: support arm, shooting arm, shoulder, and cheek weld. 

SS2 weapons have recoil greater than SS1. For single shot does not significantly affect accuracy. But if you use rapid fire, the larger recoil will extend the target reacquisition time so the accuracy will decline.


SS2 variant V5




From such a correction comes the SS2 variant V5. V5 SS2 weapon designed by PT Pindad to meet the needs of urban warfare weapons. Size is shorter, lighter, comfortable to wear, resistant to high humidity and more accurately after correcting sustained rate of fire. 

SS2 V5 has a barrel length of 252mm. Compare with SS2 V1 = 460mm, SS2 and SS2 V2 = 403mm-460mm V4. With a shorter barrel, making the SS2 V5 also has the shortest length among all rifle SS2 variants which have an average length of 920 - 990mm. While SS2 V5 only 770mm. 

SS2 V5 has a rifle butt extended, additional Picatinny rail that allows the telescope in and out, more accurate telescope and a front handle that allows the operation of the weapon.

Defence Minister and Army Chief of Staff with SS2 V5A1

SS2-V5 has three models of fire modes: automatic, single shot and the machine. Pindad claimed to have tested various military standard well field water rivers, swamps, and marine and power rubber. 

Here's delish if military forces using weapons production country. The unit can be ordered military units based variant type of weapon they want. Special Forces Commando book V5 SS2 and SS2 Brimob V5AI.

Author : Yohanes Gitoyo
Sources: 

  1. http://id.wikipedia.org/wiki/Pindad_SS2
  2. http://en.wikipedia.org/wiki/Pindad_SS2
  3. http://jambi.tribunnews.com/2012/11/09/ini-dia-kelebihan-ss2-pindad
  4. http://jakartagreater.com/, June 24, 2012.