Rabu, 29 Mei 2013

Fast & Furious 6, Indonesian Actor So Cold Bloody Murderer!!!


Fast & Furious 6 (also called Fast Furious Six or Six) is a 2013 action film written by Chris Morgan and directed by Justin Lin. It is the sixth film in the series Fast and the Furious movie. The film stars Vin Diesel, Paul Walker, Dwayne Johnson, Michelle Rodriguez, Jordana Brewster, Tyrese Gibson, Chris Bridges, Sung Kang, Luke Evans, Gina Carano, and John Ortiz. Fast & Furious 6 tells of a group of professional criminals whose leader Dominic Toretto (Diesel) who retire their post-robbery in Fast Five (2011), but is still at large. Agent U.S. Diplomatic Security Service (DSS) Luke Hobbs (Johnson) promised to erase their criminal records and allow them to go home if you like to help hunt down an organization led by a professional hitman Owen Shaw (Evans) and his deputy, Ortiz Letty (Rodriguez). 

As of February 2010, Fast & Furious 6 is being developed as the first film in the series is no longer a racing car theme as the previous films. Pre-production began in April 2011 and the photography is done primarily in London, England, in July 2012. Shooting locations include the Canary Islands, Glasgow, and Los Angeles. The film was first released in the United Kingdom on May 17, 2013 and worldwide on May 24, 2013. 


Joe Taslim be a cold-blooded killer. 

In the movie Fast & Furious 6 is, Joe Taslim antagonist role as Jah, a cold blooded assassin with parkour martial arts ability. Role as a character named Jah, Joe was deeply satisfied with the movie and got a pleasant experience with Hollywood stars and crew, and even a chance to say in Indonesian dialogue in the movie Fast and the Furious 6.

"Can my role here to audition. Due to my involvement in local films such as The Great Raid, the Hollywood sees us and open up opportunities. Amrik not me or what," said Joe met in the premiere of the film Fast & Furious 6 in Epicentrum XXI, Jakarta, Friday (17/5). 

Joe also admitted before the audition she had to continue to exercise discipline to prepare physically, mentally, and stamina. "That will come already ready. Enter yes If not okay, try again," he said. 

Joe admitted he was quite surprised, because almost all of her scenes were taken during shooting into the movie that will be aired in the U.S. on May 24 the. "I think a lot of the cut scenes, but apparently not. And there's no risk (stunts) Because Hollywood really safety," said the actor who had practiced the martial arts and judo. 

If you watch Fast & Furious 6, do not forget to listen to one scene where Joe utter a sentence in Indonesian. "Because of the open director and character so it could be three to four languages, so I'm Indonesian and allowed. When else? Rarely director ngasi freedom," said Joe, who claims to have been a fan of the franchise The Fast & The Furious since the first film. 

Joe gets the scene along with almost all the characters in the movie Fast & Furious 6 Vin Diesel, Paul Walker, Dwayne Johnson, Sung Kang up.


Groove 

After the robbery at the Rio, Dominic Toretto and his team spread around the world: Dominic lived with Elena; sister Mia and Brian O'Conner had one son, Jack; Gisele and Hang moved to Tokyo, and Roman and Tej luxury living. 

Agent Diplomatic Security Service (DSS) Luke Hobbs and his partner Riley to investigate the attacks and the Russian military convoy believed former member of the United Kingdom Special Forces Owen Shaw and his crew as the culprit. Dominic Hobbs track and asked for his help to catch Shaw; Dominic Hobbs agreed after photo shows former lover Dominic, Letty Ortiz, who he thought was dead. Dominic gather his friends and they accept this mission with the requisite criminal record them bleached and they were allowed back into the United States; Mia and Elena stay with Jack. 


Tim Shaw lured into hiding in London by one of his right hand. They and the police apparently trapped, while fellow Shaw robbery elsewhere. Shaw fled by car, blew up his hideout, and make the police do not move. Dominic, Brian, Tej, Han, Gisele, Hobbs, and Riley chase. Letty came to help Shaw and Dominic shot before fleeing. At their headquarters, Dominic Hobbs told the team that stole Shaw Nightshade components to assemble tool that can extinguish the state power, and he tried to sell it to the highest bidder. Meanwhile, Shaw attempts to know his team reveal facts Letty relationship with Dominic, but Letty known to suffer from amnesia. 

Roman, Han, Gisele, and Riley investigate and find out subordinates Shaw Shaw relationship with Arturo Braga, a drug boss arrested Brian. Brian returned to the United States as a prisoner in order to meet Braga. Braga said that Brian Shaw if Shaw could find themselves wanted to see him. He also reveals how Letty survived the explosion that supposedly killed him. Shaw was about to kill him, but after knowing Letty memory loss, he was recruited. Assisted by a former colleague at the FBI, Brian released from prison. In London, Dominic Letty in the fight against street racing. After that, they talked and Dominic return the necklace. After Letty go, Shaw arrived and offered to let Dominic and his team are free to leave, but Dominic refuses to leave without Letty. 

Tej track Shaw attack next to a NATO military base in Spain. Shaw and his team attacked a military convoy carrying computer chips to complete its assembly Nightshade. Dominic and his team come grab them, while Shaw, assisted Letty and Jah, drive a tank and start crushing cars on the road. Roman tried to tie the car to the tank, and then pushed Brian out bridges, so his tank overturned. Letty was thrown from the tank and Dominic tried to save him. Shaw and his team were arrested, but he revealed that his men have kidnapped Mia. Shaw was forced to free them, and Riley (apparently Shaw's men) to go with them; Letty decided to stay with Dom. Shaw and his team boarded the cargo while it is running on the ground while being chased Dominic and his team. Dominic, Letty, Brian, and Hobbs boarded the plane; Brian and Mia save them off the plane using the car. The plane tried to take off but was restrained by a cable attached to a vehicle driven by Han, Gisele, Roman, Tej, Brian, and Mia. Gisele sacrificed himself to save Han. Riley and he killed Letty and Hobbs jumped into a car under it. Dominic Shaw and pursuing a computer chip in his hand. Shaw was thrown from the plane, while the plane itself crashed. Dom remaining driving across the nose of the aircraft and meet his friends. The chip is returned to Hobbs as collateral their forgiveness. 

After that, Dominic and his team return to the United States. Hobbs and Elena come to confirm that they are free from any criminal charges. Dominic and his team prior to lunch, he asked whether Letty was familiar with the atmosphere of the moment; Letty replied no, but he was already at home. 

In the end credits scene, when Han chased in Tokyo, he was hit by foreign car, so the car exploded and killed him. The driver of a foreign car away from the scene and left a threatening message for Dominic. 


Player 


List of figures The Fast and the Furious: 
  1. Vin Diesel as Dominic Toretto: street racer and fugitive.
  2. Paul Walker as Brian O'Conner: Former FBI agent who become criminals. He had a relationship with Mia Toretto.
  3. Dwayne Johnson as Luke Hobbs: Diplomatic Security Service agent.
  4. Michelle Rodriguez as Letty Ortiz: Ex-boyfriend Dominic who is believed to have died. Because of amnesia, he worked for Shaw.
  5. Jordana Brewster as Mia Toretto: Dominic's sister and Brian O'Conner lover.
  6. Tyrese Gibson as Roman Pearce: Old friend Brian.
  7. Chris Bridges as Tej Parker: Friend Brian and Roman.
  8. Sung Kang as Han Seoul-Oh: street racer Dominic and team members.
  9. Luke Evans as Owen Shaw: former SAS Major who led the gang robbers.
  10. Gina Carano as Riley: Hobbs team members.
  11. John Ortiz as Arturo Braga: Former Shaw's right hand.
  12. Gal Gadot as Gisele Yashar: Former Mossad agent who became professional criminals.
  13. Joe Taslim as Jah: cold-blooded killer.
  14. Clara Paget as Vegh.
  15. Elsa Pataky as Elena Neves.
  16. Rita Ora as a leader in the London race.
  17. Shea Whigham as Agent Stasiak.
  18. Jason Statham as Ian Shaw, brother Owen Shaw in the final scene of credit

Music 

Lucas Vidal composing Fast & Furious 6. Song album released by Def Jam Recordings on May 21, 2013. It contained songs electronic and hip hop, including works by deadmau5, Ludacris, and others. 


Sequel 

On April 16, 2013, Diesel announced that the sequel will be released on July 11, 2014. Production started in August 2013. In May, 2013, Diesel stated that the sequel took place in Tokyo and the Middle East.

Source :
Author : Yohanes Gitoyo.
Source : http://pustakadigitalindonesia.blogspot.com/, May 29, 2013.

Jumat, 24 Mei 2013

Our Story e-library mediasoft : My PC Defender, Year 2007 - 2013.


On this occasion I would like to convey the story of the development of our program My PC Defender, a computer security program that assembled by the people of Indonesia, from Indonesia to the world. The purpose of writing this article is that I want to assure you that the Indonesian people are also able to work, not only for himself, but also for the country and internationally. Next, please follow the following description, on first glance My PC Defender program development from the years 2007-2013.
Pada kesempatan ini saya ingin menyampaikan kisah pengembangan program kami My PC Defender, sebuah program keamanan komputer yang dirakit oleh orang Indonesia, dari Indonesia untuk dunia. Tujuan penulisan artikel ini adalah saya ingin meyakinkan kepada anda bahwa orang Indonesia juga bisa berkarya, tidak hanya untuk dirinya sendiri, namun juga untuk negaranya dan dunia internasional. Selanjutnya silahkan mengikuti uraian berikut, tentang sekilas pengembangan program My PC Defender dari tahun 2007-2013. 


If you type the keyword "PC Defender" or "My PC Defender" you'll probably find the search results like the second picture below:

Jika Anda mengetik kata kunci "PC Defender" atau "Defender PC saya" Anda mungkin akan menemukan hasil pencarian seperti gambar kedua di bawah:

Keyword search: pc defender


Keyword search: my pc defender

Or if you find pictures of "pc defender" you will find the following software. 

Atau jika Anda mencari gambar "pc defender" Anda akan menemukan perangkat lunak berikut.





PC Defender since 2008 is known as an anti virus / anti spyware fake made by used by the "online scammers" to manipulate the user's Microsoft Windows operating system. Application seems to act like antivirus tools are useful, however, its function is mischievous and misleading because it is basically trying to steal money and personal data from unsuspecting users. The software is usually distributed with the help of Trojans and other forms of malicious software such as fake codec pack and browser page is misleading.
PC Defender sejak 2008 dikenal sebagai anti virus / anti spyware palsu yang dibuat oleh digunakan oleh "scammers online" untuk memanipulasi sistem operasi Microsoft Windows pengguna. Aplikasi tampaknya bertindak seperti alat antivirus yang berguna, namun, fungsinya adalah nakal dan menyesatkan karena pada dasarnya mencoba untuk mencuri uang dan data pribadi dari pengguna yang tidak curiga. Perangkat lunak ini biasanya didistribusikan dengan bantuan Trojan dan bentuk lain dari perangkat lunak berbahaya seperti paket codec palsu dan halaman browser menyesatkan.


Due to this fact, it is not wrong if you are prejudiced in our software. There may be some of you think that our program "My PC Defender 2012" This is the development of the program.

Karena fakta ini, maka tidak salah jika Anda berprasangka dalam perangkat lunak kami. Mungkin ada beberapa dari Anda berpikir bahwa program kami "My PC Defender 2012" ini adalah pengembangan program.

Need we explain our products, "My PC Defender 2012" in no way associated with the above products. Program "My PC Defender 2012" is our own raft, and initially we use to serve the computer virus eradication service our customers. My PC Defender program structured around our needs, and only owned by us and only us who use these programs to our interests.

Perlu kami jelaskan produk kami, "My PC Defender 2012" sama sekali tidak berhubungan dengan produk di atas. Program "My PC Defender 2012" adalah rakit kita sendiri, dan awalnya kami gunakan untuk melayani layanan pemberantasan virus komputer pelanggan kami. Program Defender PC saya terstruktur sekitar kebutuhan kita, dan hanya dimiliki oleh kita dan hanya kita yang menggunakan program ini untuk kepentingan kita.

Program "My PC Defender 2012" before we call the "PC Defender" program was first compiled by us in May 2007, the program is composed of several anti-virus tool that we believe could eradicate the virus that attacks our office. The background of the preparation of this program is: since the end of 2006 the school under our foundation Foundation Representative John Gabriel Surabaya I suffered a lot  complain "Brontok" or some other local virus. They memnta we help this problem, because many of our trivial file "missing", computer "slow". Even one of our computer hard drives affected by a Trojan that causes the C: drive is full, resulting in even-even boot process takes half an hour!.

Program "My PC Defender 2012" sebelum kita sebut "PC Defender" Program ini pertama kali disusun oleh kami dalam Mei 2007, program ini terdiri dari beberapa alat anti-virus yang kami percaya bisa membasmi virus yang menyerang kantor kami. Latar belakang penyusunan program ini adalah: sejak akhir tahun 2006 sekolah di bawah yayasan kami Yayasan Perwakilan John Gabriel Surabaya saya menderita banyak mengeluh "Brontok" atau beberapa virus lokal lainnya. Mereka memnta kami membantu masalah ini, karena banyak file sepele kami "hilang", komputer "lambat". Bahkan salah satu dari hard drive komputer kita dipengaruhi oleh Trojan yang menyebabkan drive C: penuh, sehingga bahkan-bahkan proses boot memakan waktu setengah jam!.

Then we will inevitably have racked my brain around this problem, fortunately we do not own, some of our friends to help provide a solution, at the time that the tools we use are the first generation and SMADAV PCMAV 3.4. All of these tools we put in our flash, and we fought from one computer to eradicate "rogue" is. But what happened to the virus will know the tools that we use, the software is on the block and the flash and the computers they infect us.
Kemudian kita pasti akan memeras otak mengatasi masalah ini, untungnya kita tidak sendiri, beberapa teman-teman kita untuk membantu memberikan solusi, pada saat itu alat yang kita gunakan adalah generasi pertama dan SMADAV PCMAV 3.4. Semua alat-alat ini kita masukkan ke dalam flash kita, dan kami berjuang dari satu komputer untuk memberantas "nakal" tersebut. Tapi apa yang terjadi pada virus akan tahu alat yang kita gunakan, software ini di blok dan flash dan komputer mereka menginfeksi kita.


From the entries that we received and our experience working hard, was born the "PC Defender" in May 2007, with the interface as below, our friends thought we were "playing games", the interface is similar to the game "Counter Strike" which was popular at that time.
Dari berbagai masukan yang kami terima dan pengalaman kami bekerja keras, lahirlah "PC Defender" pada Mei 2007, dengan antarmuka seperti di bawah ini, teman-teman kita pikir kita "bermain game", antarmuka yang mirip dengan game "Counter Strike" yang populer pada waktu itu.


The next "PC Defender 2008", "PC Defender 2009", "PC Defender 2010", "PC Defender 2011", and at the end of 2011 we change to "My PC Defender 2012" (adjust the official name of our blog is: http: / / mypcdefender.blogspot.com/, he .. he .. he).
Yang berikutnya "PC Defender 2008", "PC Defender 2009", "PC Defender 2010", "PC Defender 2011", dan pada akhir tahun 2011 kami mengubah ke "My PC Defender 2012" (sesuaikan nama resmi blog kita : http:/ / mypcdefender.blogspot.com /, he .. he .. he).



My PC Defender 2012




English Language Interface

Indonesian Language Interface My PC Defender 2013

Did we cheat ? Apakah kita menipu?
  1. Keep in mind we bring to the opening flag and the Bird Garuda Indonesia. Almost all points of the software there is always the identity of "Indonesia" of course we will not shame our own country. Perlu diingat kita bawa ke bendera pembukaan dan Burung Garuda Indonesia. Hampir semua titik software selalu ada identitas "Indonesia" tentu saja kita tidak akan malu negara kita sendiri.
  2. Please download, immediately scan all the files downloadan with all anti virus that you think is good, you may not find a virus, unless a "false alarm". Silahkan download, segera memindai semua file downloadan dengan semua anti virus yang Anda anggap baik, Anda mungkin tidak menemukan virus, kecuali "alarm palsu".
  3. Readme on the CD, there is a list showing the contents of CD / DVD, there are software and the maker's name, you can check the validity of such data. Readme pada CD, ada daftar yang menunjukkan isi CD / DVD, ada perangkat lunak dan nama pembuat, Anda dapat memeriksa validitas data tersebut.
  4. My PC Defender is a tool of our work, our institution for internal use, starting in June 2011, we load up with the goal of "social" from us to you, and Indonesia. My PC Defender adalah alat kerja kami, lembaga kami untuk penggunaan internal, mulai Juni 2011, kami sebarkan dengan tujuan "sosial" dari kami untuk Anda, dan Indonesia.
  5. My congratulations to use PC Defender 2013, may provide benefits to you all. Selamat untuk menggunakan PC Defender 2013, dapat memberikan manfaat untuk Anda semua.

Kamis, 23 Mei 2013

Introducing My PC Defender 2013 V-6.8 Beta.


On this occasion I would like to introduce our newest project, a computer security program that you know for a long time: "My PC Defender 2013 V-6.8 Beta". Although currently still under development, there are some implementation of new technologies that I want to share with you through our program.

Pada kesempatan ini saya ingin memperkenalkan proyek terbaru kami, sebuah program keamanan komputer yang telah anda kenal sejak lama :  "My PC Defender 2013 V-6.8 Beta". Meski saat ini masih dalam taraf pengembangan, ada beberapa penerapan teknologi baru yang ingin saya bagikan kepada anda melalui program kami ini.


My PC Defender 2013 V-6.8, a computer security program our 6th generation release 8th. If you happen to listen to some of the previous versions there are some new things in this version:
My PC Defender 2013 V-6.8, merupakan program keamanan komputer kami generasi ke-6 release ke-8.  Jika kebetulan anda menyimak pada beberapa versi sebelumnya ada beberapa hal baru dalam versi ini :
  • Supports 32 bytes and 64 bytes system. Mendukung system operasi 32 byte dan 64 byte.
  • Work in 2 operating system are completely different: Operating System Microsoft Windows and Linux Operating Systems. Bekerja dalam 2 sistem operasi yang sama sekali berbeda : Sistem Operasi Microsoft Windows dan Sistem Operasi Linux, 
  • New work systems are more focused on the temporary file, through a system of portable software work. Sistem kerja baru yang lebih menitik beratkan pada temporary file, melalui sistem kerja software portable.
  • Maximize the employment system features the latest stealth. Memaksimalkan fitur sistem kerja stealth terbaru
  • Equipped with a new computer security software that has not been available in previous versions. Dilengkapi dengan beberapa software keamanan komputer baru yang belum tersedia pada versi sebelumnya.
  • My PC Defender 2013 V-6.8 applications to implement a variety of advanced technology, articles about this subject can be found in the link: Application of Advanced Technology in the Program My PC Defender 2013. My PC Defender 2013 V-6.8 menerapkan aneka aplikasi teknologi canggih, artikel tentang bahasan ini dapat anda baca di link: Application of Advanced Technology in the Program My PC Defender 2013.

I plan soon to share the latest program next week, of course, after some problems were encountered we overcome, once again the program is still in development.
Saya merencanakan segera membagikan program terbaru tersebut minggu depan, tentunya setelah beberapa kendala yang muncul kami atasi, sekali lagi program tersebut masih dalam status pengembangan. 

Digital Fighter Alliace, Defender of Your Computer.

I hope my program is hopefully useful to you.
Harapan saya semoga program saya ini bermanfaat bagi anda.

Selasa, 21 Mei 2013

May 20, Day of National Awakening of Indonesia, Indonesian National Awakening Day.


Brother countrymen and compatriots Indonesia I love this day we commemorate the 105 national revival.

From 1596 to 1945, our nation was colonized by foreign colonialism. Regardless they are the Dutch, English, Spanish, Portuguese or Japanese, they are the same. Our nation has been enslaved by them, a variety of natural resources and human resources have been slashed by them.

Fortunately, in 1908 the fate of our ancestors realized the misfortune of the Indonesian nation, with the emergence of unity consciousness arose a sense of community amongst the colonized. Ethnicity, language, customs fused together, become one determination: One of Indonesia, Indonesia Merdeka.

Video Indonesian War of Independence 1945-1949

Year 1945 - 1950 our fathers and others have dying for this nation's independence, during these periods of newborns named Indonesia experienced many shocks, but during that time we did survive.

Year 1950-1965 our nation grow in various forms of division and conflict, but all of it is to educate people into adulthood.

1965-present young generation trying to foster progress in various forms and fields, despite any mistakes made we can accept and forgive them.

Now the older generation has passed, there is only us, yes me and you!
  1. Are our young people can only be slacker generation and consumption? Their days are filled with many social networking status updates and desires instantly famous!
  2. Are our young people can only demo and brawl? almost every day on television news demo full of news that anarchists or brawl is everlasting!
  3. Is the younger generation we've broken all by pornography and drugs? How many of our young women being raped or forced through social networks economically squeezed into a drug addict!
  4. Are our young people want excision with the dreaded "motorcycle gang member" or a thuggish organization?


You certainly can menambahkaaneka other questions according to the level of your insight!

Now in 2013 we have been an independent nation from the colonialist physical occupation, but let us realize the economic, social, cultural and technology as a nation we are still colonized.

  • In the economic field we remember our economic progress in 1996 diporak torn by their capitalist.
  • In the social culture teens realize how many of our young generation destroyed by what we call social networking, events due to the large spectacle rape pornography.
  • In the field of technology we realize also how we made you drool with various promotions iphone, Ipad, tablet, or a variety of products such technology.


I'm not a hypocrite, I also have 2 facebook accounts, account 5 blocks, 1 twetter account. So far my account that I use to help advance this nation, including the blog you are reading this. Healthy Internet and social networks let us Budayakan polite, as we receive school lessons first: take the good, take advantage as much as possible, avoid / do not do that bad.

On this occasion, allow me to invite you all to the spirit mengelorakan Indonesia is ours, we are not willing to be a colony of this nation in various forms, let us rise up brothers united we donate all our abilities in all areas of your ability all, to promote the Indonesian nation.


INDONESIA FOR ME, INDONESIA FOR ME 
PEOPLE, NATION
HOMELAND IS MINE, YOURS, ALL OURS,
WE MAINTAIN WE SEEK, WE PRESERVE, WE MOVE FORWARD
FOR 1 (ONE) INDONESIA
ONE FOR ALL, ALL FOR ONE!
INDONESIA GO, PRICE OFF!!!

WHAT DO YOU HAVE TO INDONESIA?

Senin, 20 Mei 2013

Often FBI "Peek" User Service Google.



The U.S. Federal Bureau of Investigators (FBI) is quite often "force" Google to hand over sensitive data from users of their services.

By using a letter "magic" called National Security Letters or Letters of National Security, the FBI has the right to ask the Internet service provider company, like Google, to hand over user data their services. In fact, the FBI does not need to ask permission from the court to take such data.

Data are "scraped" by the FBI may be information phone number, e-mail addresses, websites visited, and other information deemed relevant to the investigation.

Quoted from Wired, Friday (03/08/2013), Google claims, although the FBI can obtain information regarding the name, address, etc., the FBI can not use national security letters to request information about the contents of e-mail in GMail, search conducted in Google, YouTube video, or a user's IP address.

How often is the FBI asking sensitive data from Google? It turned out quite frequently. Through a site, Google revealed it. From 2009 to 2012, Google has received a national security letter 0-999 times as much.


Additionally, Google revealed that the account number information is held between 1000 and 1999 in the account each year, except in 2010, where as many as 2000 to 2999 the FBI asked for account information.

There is a special reason why I was reluctant to disclose the actual numbers.

"You will be aware that the report we provide a range of numbers, not the exact amount. This is done to accommodate the interest of the FBI, Department of Homeland Security, and other agencies that announced the actual amount may disclose information about the investigation. We plan to update these figures are periodically, "says Richard Salgado, Google Legal Director, in his official blog.

Author: Deliusno
Editor: Reza Wahyudi
Sources: http://tekno.kompas.com, Friday, March 8, 2013, 10:51 pm.

FBI Could Fill Peek "E-Mail" arbitrarily.



United States Federal Bureau of Investigation (FBI) was able to freely access e-mail, Facebook, or Twitter owned by "Uncle Sam" without need a search warrant.

It was stated in the guide belong to the agency revealed recently, as reported by ZDNet.

Although done without a warrant, according to the FBI, accessing e-mail does not violate the Fourth Amendment of the U.S. Constitution protects citizens from "unreasonable searches and examinations".

The same view applies to prosecutors and investigators from the U.S. Justice Department who did not need to be given a court order to access sensitive data and personal property of citizens.

In this case, a summons (subpoena) of federal prosecutors is enough to "access the entire tape of the internet service provider (ISP)".


FBI probe of top spy's emails led to affair discovery


Typically, a search warrant signed by a judge is required in order for a company willing to give up all user data, while the summons will only give access to the "data communication" such as who the other person, when a conversation occurred, and of the location or the computer where it is done by IP addresses.

The report surfaced just weeks after the request for the FBI spying unexpected passing hacker spyware rejected by the court. The FBI was criticized by the judge for not explain why other methods could not be used as effectively.

Tech companies have their own stance in addressing it. Google, for example, requires a search warrant before it would open "e-mail content" and other personal data belongs to the user.

Together with Microsoft, Google published a "transparency report" which also tells you how many users request access to personal data submitted by governmental authorities around the world, including the United States.

Other companies, such as Twitter, known keen to maintain its personal data, even when requested through a subpoena or search warrant.

Author: Oik Yusuf
Editor: Reza Wahyudi
Sources: http://tekno.kompas.com, Monday, May 20 2013,15.07 pm

Selasa, 14 Mei 2013

Battle 3 Best Free Anti Virus at the beginning of May 2013 !



For those of you who want maximum protection of your computer from virus attacks the computer and various other types of malware, at the beginning of May 2013, there is encouraging news!

Imagine 3 best antivirus manufacturers launched nearly simultaneous best product for free. Thus we can compare the advantages and disadvantages of each directly, and use it according to the needs of each of us.

The third anti-virus product has its own advantages and disadvantages of each, based on a review of http://www.filehippo.com/, here I present to you the power of each of them.


1. AntiVir Personal 13.0.0.3640


File size         : 97.54MB (102,283,000 bytes)
Requirements : Windows 2000 / XP / Vista / Windows7 / XP64 / Vista64 / Windows7 64
Languages     : en-US
License         : Non-Commercial Freeware
Date added     : May 8, 2013
Author          : Avira GmbH, www.avira.com

 AV-Comparatives Awards for Performance Test - 2013 May

Avira AntiVir Personal is a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected.
  1. Detects and removes more than 150,000 viruses
  2. Always among the winners of comparison test featured in computer journals
  3. The resident Virus Guard serves to monitor file movements automatically, e.g. downloading of data from the internet
  4. Scanning and repair of macro viruses
  5. Protection against previously unknown macro viruses
  6. Protection against trojans, worms, backdoors, jokes and other harmful programs
  7. AntiVir protection against viruses, worms and Trojans
  8. AntiDialer protection against expensive dialers
  9. AntiRootkit protection against hidden rootkits
  10. AntiPhishing protection against phishing
  11. AntiSpyware protection against spyware and adware
  12. NetbookSupport for laptops with low resolution
  13. QuickRemoval eliminates viruses at the push of a button
  14. Easy operation
  15. Internet-Update Wizard for easy updating
  16. Protection against previously unknown boot record viruses and master boot record viruses


2. Avast! Free Antivirus 8.0.1489.



Specification :
File size           : 112.04MB (117,478,104 bytes)
Requirements   : Windows 2000 / XP / Vista / Windows7 / XP64 / Vista64 / Windows7 64 / Windows8 / Windows8 64
Languages       : Multiple languages
License           : Non-Commercial Freeware
Date added      : May 10, 2013
Author            : Avast Software, www.avast.com
Homepage       : www.avast.com/free-antivirus-download

 AV-Comparatives Awards for Performance Test - 2013 May

Avast! Free Antivirus represents the best free antivirus protection currently available on the market. This edition is FREE OF CHARGE for non-commercial & home use. Its features include:
  1. Anti-spyware built-in
  2. Web Shield
  3. Anti-rootkit built-in
  4. Automatic updates
  5. Strong self-protection
  6. Virus Chest
  7. Antivirus kernel
  8. System integration
  9. Simple User Interface
  10. Integrated Virus Cleaner
  11. Resident protection
  12. Support for 64-bit Windows
  13. P2P and IM Shields
  14. Internationalization
  15. Network Shield


3. AVG Free Edition 2013.0.3336.



Specification :
File size: 129.98MB (136,293,904 bytes)
Requirements: Windows 2000 / XP / Vista / Windows7 / Windows8
Languages: Multiple languages
License: Freeware
Date added: May 10, 2013
Author: AVG Technologies, www.avg.com
Homepage     : free.grisoft.com/doc/avg-anti-virus-free/

 AV-Comparatives Awards for Performance Test - 2013 May

AVG Anti-Virus Free Edition is trusted antivirus and antispyware protection for Windows available to download for free. In addition, the new included LinkScanner® Active Surf-Shield checks web pages for threats at the only time that matters - when you're about to click that link.

AVG Anti-Virus Free has these following features:
  1. Award-winning antivirus and antispyware
  2. Real-time safe internet surfing and searching
  3. Quality proven by 80 million of users
  4. Easy to download, install and use
  5. Protection against viruses and spyware
  6. Compatible with Windows 7, Windows Vista and Windows XP

AVG Anti-Virus Free Edition is only available for single computer use for home and non commercial use.



av-comparatives Performance Tests.

logo

These tests evaluate the impact of anti-virus software on system performance, as programs running in background – such as real time protection antivirus software – use some percentage of system resources. Taking these tests as reference, users can evaluate their anti-virus protection in terms of system speed (system performance).




Award level in av-comparatives Performance Tests. 
http://www.av-comparatives.org/

Author : Yohanes Gitoyo.

Sabtu, 11 Mei 2013

Detachment 88 Heroes To Protect You From the Threat of Terrorism !



Detachment 88 is one of Indonesia's anti-terror unit, is part of the Indonesian National Police. Keep in mind that Indonesia now has the anti-terror unit in addition Denssus 88 namely:
  1. Brimob bomb squad Detachment C,
  2. Counter-Terrorism Detachment (Dengultor) aka Army Anti-Terror Group 5,
  3. Army Detachment 81 Kopassus (special forces Kopassus itself as also have anti-terror),
  4. Detachment Jalamangkara (Denjaka) Navy Marine Corps,
  5. Detachment Bravo (Denbravo) Air Force,
  6. BIN anti-terror unit.


Special Detachment 88 or Densus 88 is a special unit of the Indonesian National Police (Kepolisian Negara Republik Indonesia) to combat terrorism in Indonesia. This red rompi special forces are specially trained to deal with any terror threats, including bomb. Some members were also members of the Gegana team.


Number 88 is derived from the ATA (Anti Terror Act), which when pronounced in English reads Ei Ti EKT. The pronunciation sounds like the Eighty Eight (88). So the meaning of the number 88 is not like that had been circulating that the 88 is a representation of the number of victims of the Bali bombing majority (88 people from Australia), also nor representation of handcuffs.


Detachment 88 is designed as an anti-terrorist unit that has the ability to overcome the problems of terrorist ranging from bomb threats to hostage. Detachment 88 in the center (Mabes Polri) estimated strength of 400 personnel consisting of:
  1. expert investigation
  2. explosives expert (bomb squad)
  3. bat units in which there is an expert marksman.

Moreover each policing area also has a so-called anti-terror unit Detachment 88, consisting of 45-75 people, but with the facilities and capabilities are more limited.

Detachment 88 police functions are:
  • examine reports of terror activities in the area.
  • Arrest to a person or a person or a group of people who have been confirmed as members of a terrorist network that could compromise the integrity and security of the Republic of Indonesia


History.


This unit was inaugurated by Kepala Kepolisian Daerah Metro Jaya Inspektur Jenderal Firman Gani  on August 26, 2004. Detachment 88 which initially consisted of 75 men led by Ajun Komisaris Besar Polisi Tito Karnavian who had received training in several countries.

Detachment 88 was formed with the Chief of Police No. Skep. 30/VI/2003 dated June 20, 2003, to implement the Law. 15 of Regulation No. 2003 on the establishment. 1 Year 2002 on Combating Criminal Acts of Terrorism, which is the authority to arrest with initial evidence that can be derived from any intelligence report, for 7 x 24 hours (in accordance with Article 26 & 28). These laws are popular in the world as the "Anti-Terrorism Act".

The special forces financed by the U.S. government through the Diplomatic Security Service (Diplomatic Security Service) and the U.S. State Department trained directly by instructors from the CIA, FBI, and U.S. Secret Service. Most of the teaching staff are former members of U.S. special forces.


Information sourced from the FEER in 2003 was denied by the Kepala Bidang Penerangan Umum (Kabidpenum) Divisi Humas Polri, Kombes Zainuri Lubis and Kapolri Jenderal Pol Da’i Bachtiar  Nevertheless, there is significant support from the U.S. and Australian governments in the establishment and operation of Special Detachment 88. After formation, Detachment 88 was also cooperation with several other countries such as the UK and Germany. This is done in line with the Anti-Terrorism Act article 43.


Weaponry.


Police special forces unit is equipped with new weapons and combat vehicles made in various countries, such as the Colt M4 assault rifles, Steyr AUG assault rifles, HK MP5, sniper rifle Armalite AR-10, and a Remington 870 shotgun.


This unit will even rumored to have a C-130 Hercules aircraft itself to increase its mobility. Notwithstanding the completeness of weaponry and equipment is far Detachment 88 anti-terror forces under developed countries such as the Police SWAT Team in America.



Training. 

This particular unit is funded by the U.S. government through its Department of State Diplomatic Security Service (DSS). The unit is currently being trained in Megamendung, 50 km south of Jakarta, by the CIA, FBI, and U.S. Secret Service.

Most of the instructors are former U.S. special forces personnel. Training was also conducted with the assistance of the Australian Special Forces and various intelligence agencies.

Detachment 88 is designed to be the anti-terrorist unit that is able to counter terrorist threats, bomb threats to hostage situations.


Actions Detachment 88 The Unknown Public.

  • 9 November 2005 - Police Headquarters Detachment 88 fugitive terrorists stormed the residence of Dr. Azahari in Batu, East Java, which led to the death of the number one fugitive in Indonesia and Malaysia are.
  • January 22, 2007 - Detachment 88 are involved in the arrest operation 19 of 29 people Poso residents who entered the search list in the district of Poso City. Shoot-out between police and residents in the event of a policeman killed and nine civilians.
  • June 9, 2007 - Yusron Mahmudi alias Abu Dujana, the alleged terrorist network Al Jamaah Al Islamiyah group, was arrested in the village of Kebarongan, Kemranjen, Banyumas, Central Java.
  • In 2007, Detachment 88 arrested and interrogated human rights lawyer of West Papua, Iwangin Olif Patience, and charged him with incitement and insulting the head of state, because he sends SMS text messages critical of the military and the President of Indonesia. Detachment 88 were operating including the use of U.S. intelligence officers in Jakarta headquarters to tap telephone calls and read SMS text messages of Indonesian civilians.
  • August 8, 2009 - Raided a house in Jati Asih, Bekasi and killed two suspected terrorists.
Seconds Seconds raid Noordin M Top Beji Kedu area, Waterford August 8, 2009

  • 7 to 8 August 2009 - surrounded and eventually killed terrorist suspects Ibrahim alias Baim Kedu area in Beji village, Waterford.
  • 16 September 2009 - Capturing two terrorist suspects namely Rahmat Puji Prabowo alias alias Bejo and Supono Kedu in Ivory Market, Solo, about five hours before his arrest in Kepuhsari, Mojosongo.
  • 17 September 2009 - Siege of terrorists in Kampung Village Kepuhsari Mojosongo Jebres District Solo and killed four suspected terrorists such as Noordin Mohammed Top, Bagus Budi Pranowo alias Urwah, Hadi Susilo, Aryo Sudarso alias Aji and wife of Hadi Susilo, Munawaroh, who was in the house eventually survived but was shot in the leg.

Actions Detachment 88 vs. Terrorists in Ciputan, Bandung, Wednesday, May 8, 2013. 

  • Special Detachment 88 anti-terror police since Wednesday (05/08/2013) to Thursday (05/09/2013). Detachment 88 arrested 20 suspected terrorists in Ciputan, Bandung, Kendal, and Kebumen. Here's credentials. "The total we caught there were 20, 13 are alive. Abu Roban From the search, they remain associated with Posi Santoso of which is still DPO," said Karopenmas Police Headquarters, Gen. Pol Joey Boy Amar, in a press conference at Police Headquarters, Jl Trunojoyo, South Jakarta, Thursday (09/05/2013).
Densus 88, Defender of  The Indonesian People from Other Terrorist.


Allegations of torture. 

The unit has been accused of torture. In August 2010, Amnesty International said in an urgent appeal that Indonesia has arrested Moluccan activists, and they have a concern that the activists would be tortured by Detachment 88. In September 2010, Joseph Sipakoly Moluccan political prisoners suspected of gross human rights abuses by Detachment 88.

Author Yohanes Gitoyo.
Source : http://pustakadigitalindonesia.blogspot.com/

Reference :
  1. http://id.wikipedia.org/
  2. http://en.wikipedia.org/wiki/Detachment_88
  3. http://news.detik.com/