Rabu, 29 Mei 2013

Fast & Furious 6, Indonesian Actor So Cold Bloody Murderer!!!


Fast & Furious 6 (also called Fast Furious Six or Six) is a 2013 action film written by Chris Morgan and directed by Justin Lin. It is the sixth film in the series Fast and the Furious movie. The film stars Vin Diesel, Paul Walker, Dwayne Johnson, Michelle Rodriguez, Jordana Brewster, Tyrese Gibson, Chris Bridges, Sung Kang, Luke Evans, Gina Carano, and John Ortiz. Fast & Furious 6 tells of a group of professional criminals whose leader Dominic Toretto (Diesel) who retire their post-robbery in Fast Five (2011), but is still at large. Agent U.S. Diplomatic Security Service (DSS) Luke Hobbs (Johnson) promised to erase their criminal records and allow them to go home if you like to help hunt down an organization led by a professional hitman Owen Shaw (Evans) and his deputy, Ortiz Letty (Rodriguez). 

As of February 2010, Fast & Furious 6 is being developed as the first film in the series is no longer a racing car theme as the previous films. Pre-production began in April 2011 and the photography is done primarily in London, England, in July 2012. Shooting locations include the Canary Islands, Glasgow, and Los Angeles. The film was first released in the United Kingdom on May 17, 2013 and worldwide on May 24, 2013. 


Joe Taslim be a cold-blooded killer. 

In the movie Fast & Furious 6 is, Joe Taslim antagonist role as Jah, a cold blooded assassin with parkour martial arts ability. Role as a character named Jah, Joe was deeply satisfied with the movie and got a pleasant experience with Hollywood stars and crew, and even a chance to say in Indonesian dialogue in the movie Fast and the Furious 6.

"Can my role here to audition. Due to my involvement in local films such as The Great Raid, the Hollywood sees us and open up opportunities. Amrik not me or what," said Joe met in the premiere of the film Fast & Furious 6 in Epicentrum XXI, Jakarta, Friday (17/5). 

Joe also admitted before the audition she had to continue to exercise discipline to prepare physically, mentally, and stamina. "That will come already ready. Enter yes If not okay, try again," he said. 

Joe admitted he was quite surprised, because almost all of her scenes were taken during shooting into the movie that will be aired in the U.S. on May 24 the. "I think a lot of the cut scenes, but apparently not. And there's no risk (stunts) Because Hollywood really safety," said the actor who had practiced the martial arts and judo. 

If you watch Fast & Furious 6, do not forget to listen to one scene where Joe utter a sentence in Indonesian. "Because of the open director and character so it could be three to four languages, so I'm Indonesian and allowed. When else? Rarely director ngasi freedom," said Joe, who claims to have been a fan of the franchise The Fast & The Furious since the first film. 

Joe gets the scene along with almost all the characters in the movie Fast & Furious 6 Vin Diesel, Paul Walker, Dwayne Johnson, Sung Kang up.


Groove 

After the robbery at the Rio, Dominic Toretto and his team spread around the world: Dominic lived with Elena; sister Mia and Brian O'Conner had one son, Jack; Gisele and Hang moved to Tokyo, and Roman and Tej luxury living. 

Agent Diplomatic Security Service (DSS) Luke Hobbs and his partner Riley to investigate the attacks and the Russian military convoy believed former member of the United Kingdom Special Forces Owen Shaw and his crew as the culprit. Dominic Hobbs track and asked for his help to catch Shaw; Dominic Hobbs agreed after photo shows former lover Dominic, Letty Ortiz, who he thought was dead. Dominic gather his friends and they accept this mission with the requisite criminal record them bleached and they were allowed back into the United States; Mia and Elena stay with Jack. 


Tim Shaw lured into hiding in London by one of his right hand. They and the police apparently trapped, while fellow Shaw robbery elsewhere. Shaw fled by car, blew up his hideout, and make the police do not move. Dominic, Brian, Tej, Han, Gisele, Hobbs, and Riley chase. Letty came to help Shaw and Dominic shot before fleeing. At their headquarters, Dominic Hobbs told the team that stole Shaw Nightshade components to assemble tool that can extinguish the state power, and he tried to sell it to the highest bidder. Meanwhile, Shaw attempts to know his team reveal facts Letty relationship with Dominic, but Letty known to suffer from amnesia. 

Roman, Han, Gisele, and Riley investigate and find out subordinates Shaw Shaw relationship with Arturo Braga, a drug boss arrested Brian. Brian returned to the United States as a prisoner in order to meet Braga. Braga said that Brian Shaw if Shaw could find themselves wanted to see him. He also reveals how Letty survived the explosion that supposedly killed him. Shaw was about to kill him, but after knowing Letty memory loss, he was recruited. Assisted by a former colleague at the FBI, Brian released from prison. In London, Dominic Letty in the fight against street racing. After that, they talked and Dominic return the necklace. After Letty go, Shaw arrived and offered to let Dominic and his team are free to leave, but Dominic refuses to leave without Letty. 

Tej track Shaw attack next to a NATO military base in Spain. Shaw and his team attacked a military convoy carrying computer chips to complete its assembly Nightshade. Dominic and his team come grab them, while Shaw, assisted Letty and Jah, drive a tank and start crushing cars on the road. Roman tried to tie the car to the tank, and then pushed Brian out bridges, so his tank overturned. Letty was thrown from the tank and Dominic tried to save him. Shaw and his team were arrested, but he revealed that his men have kidnapped Mia. Shaw was forced to free them, and Riley (apparently Shaw's men) to go with them; Letty decided to stay with Dom. Shaw and his team boarded the cargo while it is running on the ground while being chased Dominic and his team. Dominic, Letty, Brian, and Hobbs boarded the plane; Brian and Mia save them off the plane using the car. The plane tried to take off but was restrained by a cable attached to a vehicle driven by Han, Gisele, Roman, Tej, Brian, and Mia. Gisele sacrificed himself to save Han. Riley and he killed Letty and Hobbs jumped into a car under it. Dominic Shaw and pursuing a computer chip in his hand. Shaw was thrown from the plane, while the plane itself crashed. Dom remaining driving across the nose of the aircraft and meet his friends. The chip is returned to Hobbs as collateral their forgiveness. 

After that, Dominic and his team return to the United States. Hobbs and Elena come to confirm that they are free from any criminal charges. Dominic and his team prior to lunch, he asked whether Letty was familiar with the atmosphere of the moment; Letty replied no, but he was already at home. 

In the end credits scene, when Han chased in Tokyo, he was hit by foreign car, so the car exploded and killed him. The driver of a foreign car away from the scene and left a threatening message for Dominic. 


Player 


List of figures The Fast and the Furious: 
  1. Vin Diesel as Dominic Toretto: street racer and fugitive.
  2. Paul Walker as Brian O'Conner: Former FBI agent who become criminals. He had a relationship with Mia Toretto.
  3. Dwayne Johnson as Luke Hobbs: Diplomatic Security Service agent.
  4. Michelle Rodriguez as Letty Ortiz: Ex-boyfriend Dominic who is believed to have died. Because of amnesia, he worked for Shaw.
  5. Jordana Brewster as Mia Toretto: Dominic's sister and Brian O'Conner lover.
  6. Tyrese Gibson as Roman Pearce: Old friend Brian.
  7. Chris Bridges as Tej Parker: Friend Brian and Roman.
  8. Sung Kang as Han Seoul-Oh: street racer Dominic and team members.
  9. Luke Evans as Owen Shaw: former SAS Major who led the gang robbers.
  10. Gina Carano as Riley: Hobbs team members.
  11. John Ortiz as Arturo Braga: Former Shaw's right hand.
  12. Gal Gadot as Gisele Yashar: Former Mossad agent who became professional criminals.
  13. Joe Taslim as Jah: cold-blooded killer.
  14. Clara Paget as Vegh.
  15. Elsa Pataky as Elena Neves.
  16. Rita Ora as a leader in the London race.
  17. Shea Whigham as Agent Stasiak.
  18. Jason Statham as Ian Shaw, brother Owen Shaw in the final scene of credit

Music 

Lucas Vidal composing Fast & Furious 6. Song album released by Def Jam Recordings on May 21, 2013. It contained songs electronic and hip hop, including works by deadmau5, Ludacris, and others. 


Sequel 

On April 16, 2013, Diesel announced that the sequel will be released on July 11, 2014. Production started in August 2013. In May, 2013, Diesel stated that the sequel took place in Tokyo and the Middle East.

Source :
Author : Yohanes Gitoyo.
Source : http://pustakadigitalindonesia.blogspot.com/, May 29, 2013.

Jumat, 24 Mei 2013

Our Story e-library mediasoft : My PC Defender, Year 2007 - 2013.


On this occasion I would like to convey the story of the development of our program My PC Defender, a computer security program that assembled by the people of Indonesia, from Indonesia to the world. The purpose of writing this article is that I want to assure you that the Indonesian people are also able to work, not only for himself, but also for the country and internationally. Next, please follow the following description, on first glance My PC Defender program development from the years 2007-2013.
Pada kesempatan ini saya ingin menyampaikan kisah pengembangan program kami My PC Defender, sebuah program keamanan komputer yang dirakit oleh orang Indonesia, dari Indonesia untuk dunia. Tujuan penulisan artikel ini adalah saya ingin meyakinkan kepada anda bahwa orang Indonesia juga bisa berkarya, tidak hanya untuk dirinya sendiri, namun juga untuk negaranya dan dunia internasional. Selanjutnya silahkan mengikuti uraian berikut, tentang sekilas pengembangan program My PC Defender dari tahun 2007-2013. 


If you type the keyword "PC Defender" or "My PC Defender" you'll probably find the search results like the second picture below:

Jika Anda mengetik kata kunci "PC Defender" atau "Defender PC saya" Anda mungkin akan menemukan hasil pencarian seperti gambar kedua di bawah:

Keyword search: pc defender


Keyword search: my pc defender

Or if you find pictures of "pc defender" you will find the following software. 

Atau jika Anda mencari gambar "pc defender" Anda akan menemukan perangkat lunak berikut.





PC Defender since 2008 is known as an anti virus / anti spyware fake made by used by the "online scammers" to manipulate the user's Microsoft Windows operating system. Application seems to act like antivirus tools are useful, however, its function is mischievous and misleading because it is basically trying to steal money and personal data from unsuspecting users. The software is usually distributed with the help of Trojans and other forms of malicious software such as fake codec pack and browser page is misleading.
PC Defender sejak 2008 dikenal sebagai anti virus / anti spyware palsu yang dibuat oleh digunakan oleh "scammers online" untuk memanipulasi sistem operasi Microsoft Windows pengguna. Aplikasi tampaknya bertindak seperti alat antivirus yang berguna, namun, fungsinya adalah nakal dan menyesatkan karena pada dasarnya mencoba untuk mencuri uang dan data pribadi dari pengguna yang tidak curiga. Perangkat lunak ini biasanya didistribusikan dengan bantuan Trojan dan bentuk lain dari perangkat lunak berbahaya seperti paket codec palsu dan halaman browser menyesatkan.


Due to this fact, it is not wrong if you are prejudiced in our software. There may be some of you think that our program "My PC Defender 2012" This is the development of the program.

Karena fakta ini, maka tidak salah jika Anda berprasangka dalam perangkat lunak kami. Mungkin ada beberapa dari Anda berpikir bahwa program kami "My PC Defender 2012" ini adalah pengembangan program.

Need we explain our products, "My PC Defender 2012" in no way associated with the above products. Program "My PC Defender 2012" is our own raft, and initially we use to serve the computer virus eradication service our customers. My PC Defender program structured around our needs, and only owned by us and only us who use these programs to our interests.

Perlu kami jelaskan produk kami, "My PC Defender 2012" sama sekali tidak berhubungan dengan produk di atas. Program "My PC Defender 2012" adalah rakit kita sendiri, dan awalnya kami gunakan untuk melayani layanan pemberantasan virus komputer pelanggan kami. Program Defender PC saya terstruktur sekitar kebutuhan kita, dan hanya dimiliki oleh kita dan hanya kita yang menggunakan program ini untuk kepentingan kita.

Program "My PC Defender 2012" before we call the "PC Defender" program was first compiled by us in May 2007, the program is composed of several anti-virus tool that we believe could eradicate the virus that attacks our office. The background of the preparation of this program is: since the end of 2006 the school under our foundation Foundation Representative John Gabriel Surabaya I suffered a lot  complain "Brontok" or some other local virus. They memnta we help this problem, because many of our trivial file "missing", computer "slow". Even one of our computer hard drives affected by a Trojan that causes the C: drive is full, resulting in even-even boot process takes half an hour!.

Program "My PC Defender 2012" sebelum kita sebut "PC Defender" Program ini pertama kali disusun oleh kami dalam Mei 2007, program ini terdiri dari beberapa alat anti-virus yang kami percaya bisa membasmi virus yang menyerang kantor kami. Latar belakang penyusunan program ini adalah: sejak akhir tahun 2006 sekolah di bawah yayasan kami Yayasan Perwakilan John Gabriel Surabaya saya menderita banyak mengeluh "Brontok" atau beberapa virus lokal lainnya. Mereka memnta kami membantu masalah ini, karena banyak file sepele kami "hilang", komputer "lambat". Bahkan salah satu dari hard drive komputer kita dipengaruhi oleh Trojan yang menyebabkan drive C: penuh, sehingga bahkan-bahkan proses boot memakan waktu setengah jam!.

Then we will inevitably have racked my brain around this problem, fortunately we do not own, some of our friends to help provide a solution, at the time that the tools we use are the first generation and SMADAV PCMAV 3.4. All of these tools we put in our flash, and we fought from one computer to eradicate "rogue" is. But what happened to the virus will know the tools that we use, the software is on the block and the flash and the computers they infect us.
Kemudian kita pasti akan memeras otak mengatasi masalah ini, untungnya kita tidak sendiri, beberapa teman-teman kita untuk membantu memberikan solusi, pada saat itu alat yang kita gunakan adalah generasi pertama dan SMADAV PCMAV 3.4. Semua alat-alat ini kita masukkan ke dalam flash kita, dan kami berjuang dari satu komputer untuk memberantas "nakal" tersebut. Tapi apa yang terjadi pada virus akan tahu alat yang kita gunakan, software ini di blok dan flash dan komputer mereka menginfeksi kita.


From the entries that we received and our experience working hard, was born the "PC Defender" in May 2007, with the interface as below, our friends thought we were "playing games", the interface is similar to the game "Counter Strike" which was popular at that time.
Dari berbagai masukan yang kami terima dan pengalaman kami bekerja keras, lahirlah "PC Defender" pada Mei 2007, dengan antarmuka seperti di bawah ini, teman-teman kita pikir kita "bermain game", antarmuka yang mirip dengan game "Counter Strike" yang populer pada waktu itu.


The next "PC Defender 2008", "PC Defender 2009", "PC Defender 2010", "PC Defender 2011", and at the end of 2011 we change to "My PC Defender 2012" (adjust the official name of our blog is: http: / / mypcdefender.blogspot.com/, he .. he .. he).
Yang berikutnya "PC Defender 2008", "PC Defender 2009", "PC Defender 2010", "PC Defender 2011", dan pada akhir tahun 2011 kami mengubah ke "My PC Defender 2012" (sesuaikan nama resmi blog kita : http:/ / mypcdefender.blogspot.com /, he .. he .. he).



My PC Defender 2012




English Language Interface

Indonesian Language Interface My PC Defender 2013

Did we cheat ? Apakah kita menipu?
  1. Keep in mind we bring to the opening flag and the Bird Garuda Indonesia. Almost all points of the software there is always the identity of "Indonesia" of course we will not shame our own country. Perlu diingat kita bawa ke bendera pembukaan dan Burung Garuda Indonesia. Hampir semua titik software selalu ada identitas "Indonesia" tentu saja kita tidak akan malu negara kita sendiri.
  2. Please download, immediately scan all the files downloadan with all anti virus that you think is good, you may not find a virus, unless a "false alarm". Silahkan download, segera memindai semua file downloadan dengan semua anti virus yang Anda anggap baik, Anda mungkin tidak menemukan virus, kecuali "alarm palsu".
  3. Readme on the CD, there is a list showing the contents of CD / DVD, there are software and the maker's name, you can check the validity of such data. Readme pada CD, ada daftar yang menunjukkan isi CD / DVD, ada perangkat lunak dan nama pembuat, Anda dapat memeriksa validitas data tersebut.
  4. My PC Defender is a tool of our work, our institution for internal use, starting in June 2011, we load up with the goal of "social" from us to you, and Indonesia. My PC Defender adalah alat kerja kami, lembaga kami untuk penggunaan internal, mulai Juni 2011, kami sebarkan dengan tujuan "sosial" dari kami untuk Anda, dan Indonesia.
  5. My congratulations to use PC Defender 2013, may provide benefits to you all. Selamat untuk menggunakan PC Defender 2013, dapat memberikan manfaat untuk Anda semua.

Kamis, 23 Mei 2013

Introducing My PC Defender 2013 V-6.8 Beta.


On this occasion I would like to introduce our newest project, a computer security program that you know for a long time: "My PC Defender 2013 V-6.8 Beta". Although currently still under development, there are some implementation of new technologies that I want to share with you through our program.

Pada kesempatan ini saya ingin memperkenalkan proyek terbaru kami, sebuah program keamanan komputer yang telah anda kenal sejak lama :  "My PC Defender 2013 V-6.8 Beta". Meski saat ini masih dalam taraf pengembangan, ada beberapa penerapan teknologi baru yang ingin saya bagikan kepada anda melalui program kami ini.


My PC Defender 2013 V-6.8, a computer security program our 6th generation release 8th. If you happen to listen to some of the previous versions there are some new things in this version:
My PC Defender 2013 V-6.8, merupakan program keamanan komputer kami generasi ke-6 release ke-8.  Jika kebetulan anda menyimak pada beberapa versi sebelumnya ada beberapa hal baru dalam versi ini :
  • Supports 32 bytes and 64 bytes system. Mendukung system operasi 32 byte dan 64 byte.
  • Work in 2 operating system are completely different: Operating System Microsoft Windows and Linux Operating Systems. Bekerja dalam 2 sistem operasi yang sama sekali berbeda : Sistem Operasi Microsoft Windows dan Sistem Operasi Linux, 
  • New work systems are more focused on the temporary file, through a system of portable software work. Sistem kerja baru yang lebih menitik beratkan pada temporary file, melalui sistem kerja software portable.
  • Maximize the employment system features the latest stealth. Memaksimalkan fitur sistem kerja stealth terbaru
  • Equipped with a new computer security software that has not been available in previous versions. Dilengkapi dengan beberapa software keamanan komputer baru yang belum tersedia pada versi sebelumnya.
  • My PC Defender 2013 V-6.8 applications to implement a variety of advanced technology, articles about this subject can be found in the link: Application of Advanced Technology in the Program My PC Defender 2013. My PC Defender 2013 V-6.8 menerapkan aneka aplikasi teknologi canggih, artikel tentang bahasan ini dapat anda baca di link: Application of Advanced Technology in the Program My PC Defender 2013.

I plan soon to share the latest program next week, of course, after some problems were encountered we overcome, once again the program is still in development.
Saya merencanakan segera membagikan program terbaru tersebut minggu depan, tentunya setelah beberapa kendala yang muncul kami atasi, sekali lagi program tersebut masih dalam status pengembangan. 

Digital Fighter Alliace, Defender of Your Computer.

I hope my program is hopefully useful to you.
Harapan saya semoga program saya ini bermanfaat bagi anda.

Selasa, 21 Mei 2013

May 20, Day of National Awakening of Indonesia, Indonesian National Awakening Day.


Brother countrymen and compatriots Indonesia I love this day we commemorate the 105 national revival.

From 1596 to 1945, our nation was colonized by foreign colonialism. Regardless they are the Dutch, English, Spanish, Portuguese or Japanese, they are the same. Our nation has been enslaved by them, a variety of natural resources and human resources have been slashed by them.

Fortunately, in 1908 the fate of our ancestors realized the misfortune of the Indonesian nation, with the emergence of unity consciousness arose a sense of community amongst the colonized. Ethnicity, language, customs fused together, become one determination: One of Indonesia, Indonesia Merdeka.

Video Indonesian War of Independence 1945-1949

Year 1945 - 1950 our fathers and others have dying for this nation's independence, during these periods of newborns named Indonesia experienced many shocks, but during that time we did survive.

Year 1950-1965 our nation grow in various forms of division and conflict, but all of it is to educate people into adulthood.

1965-present young generation trying to foster progress in various forms and fields, despite any mistakes made we can accept and forgive them.

Now the older generation has passed, there is only us, yes me and you!
  1. Are our young people can only be slacker generation and consumption? Their days are filled with many social networking status updates and desires instantly famous!
  2. Are our young people can only demo and brawl? almost every day on television news demo full of news that anarchists or brawl is everlasting!
  3. Is the younger generation we've broken all by pornography and drugs? How many of our young women being raped or forced through social networks economically squeezed into a drug addict!
  4. Are our young people want excision with the dreaded "motorcycle gang member" or a thuggish organization?


You certainly can menambahkaaneka other questions according to the level of your insight!

Now in 2013 we have been an independent nation from the colonialist physical occupation, but let us realize the economic, social, cultural and technology as a nation we are still colonized.

  • In the economic field we remember our economic progress in 1996 diporak torn by their capitalist.
  • In the social culture teens realize how many of our young generation destroyed by what we call social networking, events due to the large spectacle rape pornography.
  • In the field of technology we realize also how we made you drool with various promotions iphone, Ipad, tablet, or a variety of products such technology.


I'm not a hypocrite, I also have 2 facebook accounts, account 5 blocks, 1 twetter account. So far my account that I use to help advance this nation, including the blog you are reading this. Healthy Internet and social networks let us Budayakan polite, as we receive school lessons first: take the good, take advantage as much as possible, avoid / do not do that bad.

On this occasion, allow me to invite you all to the spirit mengelorakan Indonesia is ours, we are not willing to be a colony of this nation in various forms, let us rise up brothers united we donate all our abilities in all areas of your ability all, to promote the Indonesian nation.


INDONESIA FOR ME, INDONESIA FOR ME 
PEOPLE, NATION
HOMELAND IS MINE, YOURS, ALL OURS,
WE MAINTAIN WE SEEK, WE PRESERVE, WE MOVE FORWARD
FOR 1 (ONE) INDONESIA
ONE FOR ALL, ALL FOR ONE!
INDONESIA GO, PRICE OFF!!!

WHAT DO YOU HAVE TO INDONESIA?

Senin, 20 Mei 2013

Often FBI "Peek" User Service Google.



The U.S. Federal Bureau of Investigators (FBI) is quite often "force" Google to hand over sensitive data from users of their services.

By using a letter "magic" called National Security Letters or Letters of National Security, the FBI has the right to ask the Internet service provider company, like Google, to hand over user data their services. In fact, the FBI does not need to ask permission from the court to take such data.

Data are "scraped" by the FBI may be information phone number, e-mail addresses, websites visited, and other information deemed relevant to the investigation.

Quoted from Wired, Friday (03/08/2013), Google claims, although the FBI can obtain information regarding the name, address, etc., the FBI can not use national security letters to request information about the contents of e-mail in GMail, search conducted in Google, YouTube video, or a user's IP address.

How often is the FBI asking sensitive data from Google? It turned out quite frequently. Through a site, Google revealed it. From 2009 to 2012, Google has received a national security letter 0-999 times as much.


Additionally, Google revealed that the account number information is held between 1000 and 1999 in the account each year, except in 2010, where as many as 2000 to 2999 the FBI asked for account information.

There is a special reason why I was reluctant to disclose the actual numbers.

"You will be aware that the report we provide a range of numbers, not the exact amount. This is done to accommodate the interest of the FBI, Department of Homeland Security, and other agencies that announced the actual amount may disclose information about the investigation. We plan to update these figures are periodically, "says Richard Salgado, Google Legal Director, in his official blog.

Author: Deliusno
Editor: Reza Wahyudi
Sources: http://tekno.kompas.com, Friday, March 8, 2013, 10:51 pm.

FBI Could Fill Peek "E-Mail" arbitrarily.



United States Federal Bureau of Investigation (FBI) was able to freely access e-mail, Facebook, or Twitter owned by "Uncle Sam" without need a search warrant.

It was stated in the guide belong to the agency revealed recently, as reported by ZDNet.

Although done without a warrant, according to the FBI, accessing e-mail does not violate the Fourth Amendment of the U.S. Constitution protects citizens from "unreasonable searches and examinations".

The same view applies to prosecutors and investigators from the U.S. Justice Department who did not need to be given a court order to access sensitive data and personal property of citizens.

In this case, a summons (subpoena) of federal prosecutors is enough to "access the entire tape of the internet service provider (ISP)".


FBI probe of top spy's emails led to affair discovery


Typically, a search warrant signed by a judge is required in order for a company willing to give up all user data, while the summons will only give access to the "data communication" such as who the other person, when a conversation occurred, and of the location or the computer where it is done by IP addresses.

The report surfaced just weeks after the request for the FBI spying unexpected passing hacker spyware rejected by the court. The FBI was criticized by the judge for not explain why other methods could not be used as effectively.

Tech companies have their own stance in addressing it. Google, for example, requires a search warrant before it would open "e-mail content" and other personal data belongs to the user.

Together with Microsoft, Google published a "transparency report" which also tells you how many users request access to personal data submitted by governmental authorities around the world, including the United States.

Other companies, such as Twitter, known keen to maintain its personal data, even when requested through a subpoena or search warrant.

Author: Oik Yusuf
Editor: Reza Wahyudi
Sources: http://tekno.kompas.com, Monday, May 20 2013,15.07 pm

Selasa, 14 Mei 2013

Battle 3 Best Free Anti Virus at the beginning of May 2013 !



For those of you who want maximum protection of your computer from virus attacks the computer and various other types of malware, at the beginning of May 2013, there is encouraging news!

Imagine 3 best antivirus manufacturers launched nearly simultaneous best product for free. Thus we can compare the advantages and disadvantages of each directly, and use it according to the needs of each of us.

The third anti-virus product has its own advantages and disadvantages of each, based on a review of http://www.filehippo.com/, here I present to you the power of each of them.


1. AntiVir Personal 13.0.0.3640


File size         : 97.54MB (102,283,000 bytes)
Requirements : Windows 2000 / XP / Vista / Windows7 / XP64 / Vista64 / Windows7 64
Languages     : en-US
License         : Non-Commercial Freeware
Date added     : May 8, 2013
Author          : Avira GmbH, www.avira.com

 AV-Comparatives Awards for Performance Test - 2013 May

Avira AntiVir Personal is a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected.
  1. Detects and removes more than 150,000 viruses
  2. Always among the winners of comparison test featured in computer journals
  3. The resident Virus Guard serves to monitor file movements automatically, e.g. downloading of data from the internet
  4. Scanning and repair of macro viruses
  5. Protection against previously unknown macro viruses
  6. Protection against trojans, worms, backdoors, jokes and other harmful programs
  7. AntiVir protection against viruses, worms and Trojans
  8. AntiDialer protection against expensive dialers
  9. AntiRootkit protection against hidden rootkits
  10. AntiPhishing protection against phishing
  11. AntiSpyware protection against spyware and adware
  12. NetbookSupport for laptops with low resolution
  13. QuickRemoval eliminates viruses at the push of a button
  14. Easy operation
  15. Internet-Update Wizard for easy updating
  16. Protection against previously unknown boot record viruses and master boot record viruses


2. Avast! Free Antivirus 8.0.1489.



Specification :
File size           : 112.04MB (117,478,104 bytes)
Requirements   : Windows 2000 / XP / Vista / Windows7 / XP64 / Vista64 / Windows7 64 / Windows8 / Windows8 64
Languages       : Multiple languages
License           : Non-Commercial Freeware
Date added      : May 10, 2013
Author            : Avast Software, www.avast.com
Homepage       : www.avast.com/free-antivirus-download

 AV-Comparatives Awards for Performance Test - 2013 May

Avast! Free Antivirus represents the best free antivirus protection currently available on the market. This edition is FREE OF CHARGE for non-commercial & home use. Its features include:
  1. Anti-spyware built-in
  2. Web Shield
  3. Anti-rootkit built-in
  4. Automatic updates
  5. Strong self-protection
  6. Virus Chest
  7. Antivirus kernel
  8. System integration
  9. Simple User Interface
  10. Integrated Virus Cleaner
  11. Resident protection
  12. Support for 64-bit Windows
  13. P2P and IM Shields
  14. Internationalization
  15. Network Shield


3. AVG Free Edition 2013.0.3336.



Specification :
File size: 129.98MB (136,293,904 bytes)
Requirements: Windows 2000 / XP / Vista / Windows7 / Windows8
Languages: Multiple languages
License: Freeware
Date added: May 10, 2013
Author: AVG Technologies, www.avg.com
Homepage     : free.grisoft.com/doc/avg-anti-virus-free/

 AV-Comparatives Awards for Performance Test - 2013 May

AVG Anti-Virus Free Edition is trusted antivirus and antispyware protection for Windows available to download for free. In addition, the new included LinkScanner® Active Surf-Shield checks web pages for threats at the only time that matters - when you're about to click that link.

AVG Anti-Virus Free has these following features:
  1. Award-winning antivirus and antispyware
  2. Real-time safe internet surfing and searching
  3. Quality proven by 80 million of users
  4. Easy to download, install and use
  5. Protection against viruses and spyware
  6. Compatible with Windows 7, Windows Vista and Windows XP

AVG Anti-Virus Free Edition is only available for single computer use for home and non commercial use.



av-comparatives Performance Tests.

logo

These tests evaluate the impact of anti-virus software on system performance, as programs running in background – such as real time protection antivirus software – use some percentage of system resources. Taking these tests as reference, users can evaluate their anti-virus protection in terms of system speed (system performance).




Award level in av-comparatives Performance Tests. 
http://www.av-comparatives.org/

Author : Yohanes Gitoyo.

Sabtu, 11 Mei 2013

Detachment 88 Heroes To Protect You From the Threat of Terrorism !



Detachment 88 is one of Indonesia's anti-terror unit, is part of the Indonesian National Police. Keep in mind that Indonesia now has the anti-terror unit in addition Denssus 88 namely:
  1. Brimob bomb squad Detachment C,
  2. Counter-Terrorism Detachment (Dengultor) aka Army Anti-Terror Group 5,
  3. Army Detachment 81 Kopassus (special forces Kopassus itself as also have anti-terror),
  4. Detachment Jalamangkara (Denjaka) Navy Marine Corps,
  5. Detachment Bravo (Denbravo) Air Force,
  6. BIN anti-terror unit.


Special Detachment 88 or Densus 88 is a special unit of the Indonesian National Police (Kepolisian Negara Republik Indonesia) to combat terrorism in Indonesia. This red rompi special forces are specially trained to deal with any terror threats, including bomb. Some members were also members of the Gegana team.


Number 88 is derived from the ATA (Anti Terror Act), which when pronounced in English reads Ei Ti EKT. The pronunciation sounds like the Eighty Eight (88). So the meaning of the number 88 is not like that had been circulating that the 88 is a representation of the number of victims of the Bali bombing majority (88 people from Australia), also nor representation of handcuffs.


Detachment 88 is designed as an anti-terrorist unit that has the ability to overcome the problems of terrorist ranging from bomb threats to hostage. Detachment 88 in the center (Mabes Polri) estimated strength of 400 personnel consisting of:
  1. expert investigation
  2. explosives expert (bomb squad)
  3. bat units in which there is an expert marksman.

Moreover each policing area also has a so-called anti-terror unit Detachment 88, consisting of 45-75 people, but with the facilities and capabilities are more limited.

Detachment 88 police functions are:
  • examine reports of terror activities in the area.
  • Arrest to a person or a person or a group of people who have been confirmed as members of a terrorist network that could compromise the integrity and security of the Republic of Indonesia


History.


This unit was inaugurated by Kepala Kepolisian Daerah Metro Jaya Inspektur Jenderal Firman Gani  on August 26, 2004. Detachment 88 which initially consisted of 75 men led by Ajun Komisaris Besar Polisi Tito Karnavian who had received training in several countries.

Detachment 88 was formed with the Chief of Police No. Skep. 30/VI/2003 dated June 20, 2003, to implement the Law. 15 of Regulation No. 2003 on the establishment. 1 Year 2002 on Combating Criminal Acts of Terrorism, which is the authority to arrest with initial evidence that can be derived from any intelligence report, for 7 x 24 hours (in accordance with Article 26 & 28). These laws are popular in the world as the "Anti-Terrorism Act".

The special forces financed by the U.S. government through the Diplomatic Security Service (Diplomatic Security Service) and the U.S. State Department trained directly by instructors from the CIA, FBI, and U.S. Secret Service. Most of the teaching staff are former members of U.S. special forces.


Information sourced from the FEER in 2003 was denied by the Kepala Bidang Penerangan Umum (Kabidpenum) Divisi Humas Polri, Kombes Zainuri Lubis and Kapolri Jenderal Pol Da’i Bachtiar  Nevertheless, there is significant support from the U.S. and Australian governments in the establishment and operation of Special Detachment 88. After formation, Detachment 88 was also cooperation with several other countries such as the UK and Germany. This is done in line with the Anti-Terrorism Act article 43.


Weaponry.


Police special forces unit is equipped with new weapons and combat vehicles made in various countries, such as the Colt M4 assault rifles, Steyr AUG assault rifles, HK MP5, sniper rifle Armalite AR-10, and a Remington 870 shotgun.


This unit will even rumored to have a C-130 Hercules aircraft itself to increase its mobility. Notwithstanding the completeness of weaponry and equipment is far Detachment 88 anti-terror forces under developed countries such as the Police SWAT Team in America.



Training. 

This particular unit is funded by the U.S. government through its Department of State Diplomatic Security Service (DSS). The unit is currently being trained in Megamendung, 50 km south of Jakarta, by the CIA, FBI, and U.S. Secret Service.

Most of the instructors are former U.S. special forces personnel. Training was also conducted with the assistance of the Australian Special Forces and various intelligence agencies.

Detachment 88 is designed to be the anti-terrorist unit that is able to counter terrorist threats, bomb threats to hostage situations.


Actions Detachment 88 The Unknown Public.

  • 9 November 2005 - Police Headquarters Detachment 88 fugitive terrorists stormed the residence of Dr. Azahari in Batu, East Java, which led to the death of the number one fugitive in Indonesia and Malaysia are.
  • January 22, 2007 - Detachment 88 are involved in the arrest operation 19 of 29 people Poso residents who entered the search list in the district of Poso City. Shoot-out between police and residents in the event of a policeman killed and nine civilians.
  • June 9, 2007 - Yusron Mahmudi alias Abu Dujana, the alleged terrorist network Al Jamaah Al Islamiyah group, was arrested in the village of Kebarongan, Kemranjen, Banyumas, Central Java.
  • In 2007, Detachment 88 arrested and interrogated human rights lawyer of West Papua, Iwangin Olif Patience, and charged him with incitement and insulting the head of state, because he sends SMS text messages critical of the military and the President of Indonesia. Detachment 88 were operating including the use of U.S. intelligence officers in Jakarta headquarters to tap telephone calls and read SMS text messages of Indonesian civilians.
  • August 8, 2009 - Raided a house in Jati Asih, Bekasi and killed two suspected terrorists.
Seconds Seconds raid Noordin M Top Beji Kedu area, Waterford August 8, 2009

  • 7 to 8 August 2009 - surrounded and eventually killed terrorist suspects Ibrahim alias Baim Kedu area in Beji village, Waterford.
  • 16 September 2009 - Capturing two terrorist suspects namely Rahmat Puji Prabowo alias alias Bejo and Supono Kedu in Ivory Market, Solo, about five hours before his arrest in Kepuhsari, Mojosongo.
  • 17 September 2009 - Siege of terrorists in Kampung Village Kepuhsari Mojosongo Jebres District Solo and killed four suspected terrorists such as Noordin Mohammed Top, Bagus Budi Pranowo alias Urwah, Hadi Susilo, Aryo Sudarso alias Aji and wife of Hadi Susilo, Munawaroh, who was in the house eventually survived but was shot in the leg.

Actions Detachment 88 vs. Terrorists in Ciputan, Bandung, Wednesday, May 8, 2013. 

  • Special Detachment 88 anti-terror police since Wednesday (05/08/2013) to Thursday (05/09/2013). Detachment 88 arrested 20 suspected terrorists in Ciputan, Bandung, Kendal, and Kebumen. Here's credentials. "The total we caught there were 20, 13 are alive. Abu Roban From the search, they remain associated with Posi Santoso of which is still DPO," said Karopenmas Police Headquarters, Gen. Pol Joey Boy Amar, in a press conference at Police Headquarters, Jl Trunojoyo, South Jakarta, Thursday (09/05/2013).
Densus 88, Defender of  The Indonesian People from Other Terrorist.


Allegations of torture. 

The unit has been accused of torture. In August 2010, Amnesty International said in an urgent appeal that Indonesia has arrested Moluccan activists, and they have a concern that the activists would be tortured by Detachment 88. In September 2010, Joseph Sipakoly Moluccan political prisoners suspected of gross human rights abuses by Detachment 88.

Author Yohanes Gitoyo.
Source : http://pustakadigitalindonesia.blogspot.com/

Reference :
  1. http://id.wikipedia.org/
  2. http://en.wikipedia.org/wiki/Detachment_88
  3. http://news.detik.com/

Jumat, 10 Mei 2013

Why Terror Groups Operating in Indonesia?



The question in the title of this article would seem difficult for new colleagues who study the history of terrorism in Indonesia started in the 1980s. Will be increasingly difficult for those who only studied since the 1990s, and will be increasingly more difficult again if we only see it from the phenomenon of bomb attacks since 2000 were noted to occur about 20 more cases of terrorist bombings. But of course, we wonder why? Only Indonesiakah who experienced it? the answer is no, because the Philippines and Thailand also experienced repeated bomb attacks. What about Malaysia, Singapore and other ASEAN countries? Different characteristics of each country led to the growth of terrorist groups is also different. But in general the countries such as Indonesia, Malaysia, Philippines, Thailand and Singapore have entered the radar of terrorist organizations in the name of Islam by forming Mantiqi-Mantiqi.

Compared to neighboring countries, Indonesia has roots far deeper history-related Islamic militant groups. We are not fanatics here translated as something positive or negative, but understood as a totality of a person's psychological state in the philosophy and principles of life that negates the other effects. This is a state of religious fanatics or al-ta'ashubud diiniyyu which finally led to the emergence of an extreme point of the attitudes and behaviors that looked beyond himself and his group is kafir (yakfuru).

In Muslim there is nothing wrong with the attitude of negating the other, since the beginning of the principles it teaches there is no God but Allah, a basic principle of tawhid is understood universally mandatory for all streams in Islam. But apparently it's not just the religious worship of God, but also do good to the environment and our fellow beings, so it is also the world touch the social, economic and political. The most crucial point is to do with politics and power. , Referring to the struggle of the Prophet, the Companions and the Islamic caliphate in the past, of course, very natural that later emerged the ideology of political struggle and military power to bring back the Islamic government in the world. The argument is without power, Islam has not ditagakkan on this earth, so that the developing doctrine includes the obligation to uphold Islam Islamic jihad establish that the real power to regulate public life (political power).

The fight then reopen the pages of history fight theocracy and the secular state (democracy). History of the world recorded a whopping various world religions such as Christianity, Islam, Hinduism, Buddhism in the race for control of the country which is the regulator of the community. Post-powers (regional-global) Ottoman Turkey, the Islamic world back to areas smaller countries. Occurred a number of models in Middle Eastern countries such as family dynasty collaboration with Wahhabist doctrine (Saudi Arabia), growth of secularism and the creation of resistance cells to fight Islamic state in various countries.

Islam was introduced in Indonesia since the 11th century where even the oldest records from the era Singsari kingdom in Java in 1082 AD (thought to be the tomb of the notes to the Muslim Arab origin). In 1292 AD, has no historical record of Marcopolo news about Muslims are large in Aceh, while the kingdom of Pasai is the first Islamic kingdom archipelago. In the 14-15 century AD, is the rise of Islam Nusantara kekuatasn and early collapse of the Hindu-Buddhist kingdom, Islam in the archipelago is getting stronger because of the arrival of Islam to the archipelago is a unique phenomenon because it truly peace through education, culture and a touch occurs cultural accommodation gave birth to a typical Indonesian Islamic syncretism. Peace Islam is the hallmark of Islam in Indonesia, which does not use a sword in dissemination. Character of Indonesian Islam is Peace in Western Nations final change as the 15th century AD entered the archipelago. Seeing the growing reality of Islam in the archipelago, there was the first Muslim-Christian conflict in the archipelago due to the influence of the Crusades that occurred in other parts of the world (the Middle East and Europe).

History of Islamic kingdoms of the struggle against colonial archipelago in the name of Christianity with Gospelnya is the first of its historical roots in the unconscious majority of Indonesian Muslims are always suspicious of Western powers. After all, we are the children and grandchildren's people not earlier?

Nusantara Islamic empire destroyed and colonized the archipelago for 350 years, but the history of the resistance occurs everywhere and all elements of the Indonesian struggle with all existing capabilities. Post-destruction Islamic kingdoms archipelago, the struggle for independence does not happen on a national scale, but locally, where the local communities the power interfaith, inter-ethnic against the Dutch colonialists.

The destruction of Muslim political power does not destroy the joints of Muslims who had been entrenched for several hundred years before the arrival of the Dutch.

In short, until the birth of the Indonesian nationalist movement in the early 20th century, the Indonesian independence struggle for independence reached the finalization stage. Groups that exist in the national struggle include various elements of inter-religious nation, ethnic nationalities, political and ideological views. Political Islam is dominant, and the color also varied. Jakarta Charter is evidence of the political history of Indonesia, where the dominance of the Islamists is so strong at the time of preparation for independence. However, due to the belief that the best option for the people of Indonesia is the basic principle of Indonesian nationalism, the charter does not apply as well jakarta removed and transformed into the nuances of its Islamic ideology.

Post-event victory of the principles of Indonesian nationalism, some Muslims are very disappointed. Even elements of military fighters of Islam (Army of Islam) then drafting the Darul Islam and the Islamic State of Indonesia (DI / NII) in West Java in 1949 with the leadership of SM Kartosuwirjo, and in Aceh in 1953 with the leadership of David Beureuh. Besides the resistance element for the formation of the Islamic Army of the Republic of Indonesia, is also developing elements of Islamic "jihad" (the amount in his late 70s) and supporting elements of Islamic law Masjumi party who destroyed the Sukarno government. In the New Order era since 1965, the Indonesian government to conduct policy approach to violent militarism destroys latent radical left (communism) and the radical right (Islam). This has sharpened hurt Indonesian community groups who are in the category of the radical right and the left, so that they all go into the nursery cells are getting louder. Pesantren Ngruki (1972) who built Abu Bakar Bashir is just one of the other schools who also teaches jihad, but this can not be generalized into the world of terrorism.


Blog II research into terrorist organizations, it is known that the behavior of suicide bombings is not taught in schools, it happens in the resistance movement against the government considered infidels. Thing in the modern history refers to the pattern of the strategy adopted by the group Hezbollah in Lebanon. It is considered successful scare opponents, but then reduced by the West (the U.S. and its allies) as international terrorism. So imaging heroism suicide bombing Hezbollah turned into a cowardly terrorist act.

Indonesia has historically been known as suicide bombings in Aceh when the Dutch Aceh as Moord. And all of us will certainly respect the most heroic actions in the history of Indonesian independence in 1945 by Muhammad Toha in South London with an ammunition depot blew himself up in order weaken the power of the Netherlands, which became known as the "Bandung Ocean of Fire." That is, we do not 'll never mentions Muhammad Toha action as cowardly is not it? would otherwise pay their respects and prayers, and we recognize the heroism Muhammad Toha.

Similarly, the movement of modern terrorism in Indonesia, the group considers the action as a noble act, which is contrary to the common view that we see it as an act of contempt. (Consider the case of Bandung lake of fire, and absorb how our own feelings).

Ah ha ... I went back to talk here and there but have not answered why terrorist groups operating in Indonesia?


The answer is in our hearts and there in front of our own eyes, which is as follows:
  1. History of the struggle of our nation who do not fear death still exist within us, so if there is a part of the Indonesian nation has the character of resistance is not afraid of death is a natural thing. This quality is not owned by neighboring countries that gained independence from colonial powers easily free kind.
  2. Peace Muslim majority Indonesia since the 11th century AD has a silent character and only react when the event occurs to disturb the peace, so it takes a long time to raise awareness of the existence of a handful of Muslims who use violent means to achieve their goals.
  3. The majority of Indonesian Muslims carry the unconscious historical strong suspicion against Western intervention in the war, as happened in the Indonesian archipelago and the Crusades in the world, so it would be hard to believe when there is hurt a fellow Muslim, let alone terrorism.
  4. That Indonesia is a very fertile land yan for the birth of the radical right (official version) due to misdirected policy of repression of the New Order government. In the reform era, there has been a dialogue in which the improvement of the various elements of the nation so as to achieve a more equitable situation in the future. In the fertile land for 40 million of our people are still poor, while corruption is still rampant, of course, if there among peers Blog II who commit suicide bombings in the centers of the Indonesian national corruption will be a hero instead?
  5. Indonesia new start healthier communication in the past 10 years, previously suffering and pain are not communicated, it is the history of Indonesian Human Rights is very bad. Indonesian man suffered many injustices, including in terms of legal protection and fair treatment. Note the difference in the fate of the Bali bombing bomber obtain judicial process and a more balanced coverage compared to the founders of DI / NII disappear or die somewhere. Necessary to develop a mechanism for better communication in the discourse of Indonesian national character with the rest of the elements, and it is the duty of the government. It also occurs in the case of both separatism in the former province of East Timor, Aceh, Maluku and Papua.
  6. Acts of terror in Indonesia is relatively easy because of the security forces, particularly the installation of security both general and special place has poor discipline. This needs to be reformed to increase the welfare and use of prevention tools and supervision of a more modern, such as in neighboring Singapore and Malaysia.
  7. I may say that all elements of the Indonesian terrorist is the original made in the country, which is a continuation of the history of the elements that I mentioned above. International event is a catalyst element that strengthens and accelerates the growth of terrorist groups. For example, experience "jihad" in Afghanistan and the southern Philippines, communications with Al Qaeda, the radical Wahhabist elements and elements of Salafi jihad or military movement Muslim Brotherhood.
  8. I some times have revealed the possibility of "puppet master" which refers to Western nations, for instance with the case of Omar Faruq awkwardness or strangeness of Afghanistan history that is still colored by armed conflict, as well as on the situation in Iraq and Lebanon. His background could have advanced weapons test the West, the Islamic terrorist labeling efforts, as well as conspiracy to divert world attention from the real global problem. But until now, it is very difficult for us to collect the facts that can be used to prove it, but it looks pretty convincing analysis. For this last note, I leave to fellow Blog II, consider this as an intellectual exercise in improving our understanding of national security issues in Indonesia.


Are the things mentioned above causes of terrorist groups operating in Indonesia? of course there is one more record is no less important or even the most important of all, especially the phenomenon ness. Namely the terrorists as well as the majority of Indonesian people to think locally and act locally anyway, think locally and act locally also. Why is that? because of very weak knowledge on an international scale, making it easier to operate in Indonesia, it is also the underlying actions of Malaysian citizens in acts of terror in Indonesia.

Hopefully with a variety of security and safety improvements sectors of the Indonesian people, as well as the professionalism of the security forces, there will be no terror to intimidate the peace of Indonesia.

Source: http://intelindonesia.blogspot.com/2009/09/mengapa-kelompok-teroris-beroperasi-di.html , Friday, September 18, 2009. Translate by Yohanes Gitoyo.