Senin, 15 Desember 2014

5 Steps to Getting rid of Malware "Drunk Girls" That Has staining your Facebook Account!

Malicious programs (malware) "drunk girl" has been circulating on Facebook since the beginning of last December 2014. This malware shaped trapping video with image preview video showing a woman in a drunken with vulgar poses.

Falsifying youtube

If the victim clicks on the Facebook wall posts Girls Drunk and happen to use the Google Chrome browser, it will then be redirected to a phishing site (according to watchlist Vaksincom, at the time of this article the manufacture of this site is no longer active). The phishing site will provide tmapilan are very similar to Youtube , but if pengaksesnya carefully and look at the website address then it is obvious that the site is accessible not YouTube but

Do not forget the video look quite tempting because the vulgar given a message you need to have the plugin installed to watch this video. Click here to install the plugin. 

According to the observations of network security company, Vaksincom, this malware seen already circulating on social media sites such since last December 3, 2014. Until now, Vaksincom suspect there are already more than 2,000 infected user account malicious programs.

One key to the success of this malware, according to Alfons Tanujaya, Vaksincom analyst, is the cleverness to avoid using a Facebook app that security teams are powerless to act malware removal. The cyber criminals, according to Alfons observations, using a technique that utilizes the Google Chrome extension.

Drunk girls in addition to post on your account will conduct a tag on your Facebook contacts repeatedly

If the victim to click on a video or message the plugin, it will appear confirming the installation of Google Chrome Extension (for the record instead of a plugin / codec but a Google Chrome Extension) with name Top News.

Top Extension News-installed if the user wants to see the videos Drunk Girl

In order for an unsuspecting victim installs malicious extension, after successfully installs Chrome Extension, this malware authors cleverly displays You Tube video Ԅrunk Girls Video Compilation 2013Ԡbagi victims of Youtube

Youtube videos displayed after installation evil Chrome Extension

If the victim had seen the video, most likely thought that the video was promised and the unsuspecting. Whereas in the computer has been lodged malware (in the form of Google Chtomer Extension) which will routinely conduct regular post Drunk girl from his Facebook account and in addition he will also perform tag on friends Facebook account concerned. Malware disguised as the extension will create a Facebook account victims do auto-posting malware "drunk girl" on the Facebook wall . 

For the record, YouTube videos are shown actually does not require a plugin or Chrome Extension and by visiting the site directly Youtube videos will be seen.

Drunk Girl expel Malware from Your Computer

After reading the above article, you must already know that the culprit of all this is a Chrome Extension evil and to prevent automated posts the only way is to remove this Chrome Extension. Changing passwords Facebook or delete suspicious apps on Facebook will have no effect because the cause is not two things. 

If already be a victim, Vaksincom advised to perform these steps to remove Chrome Extension evil: 

  • Go to the Google Chrome browser.
  • Access Chrome Extension by typing: chrome: // extensions.

  • Search Top News Extensions by name or other extensions are suspicious. Currently, in addition to other extensions Top News obtained by Malware Laboratory Vaksincom use IDM Integration Module name. If you see the name of the first laind extension beyond the name, Vaksincom would be grateful if you helped inform the Security Clinic Vaksincom to help other Facebook users in Indonesia who are victims of this malware.
  • Click the image on the right bins and click the Delete button on the box Confirm Deletion to delete this malicious extension.
  • Shut down and restart your Google Chrome. In order to maintain the possibility of unwanted, Vaksincom recommend you change your password and activate your Facebook account TFA Two Factor Authentication on all your important Kaun as primary email account, Facebook and Google in order to prevent theft and misuse of your account.
  • After running the above steps, Vaksincom suggested for victims to immediately change the password Facebook account.

Composer: John Gitoyo, S Pd.

Jumat, 28 November 2014

Complex Android Malware Warning

News has emerged from mobile security firm Lookout that a bug called NotCompatible, was the most sophisticated Android bug it had seen. The hackers behind the malware had recently rewritten its core code in order to make it more difficult to defeat. Mobile malware that is specifically aimed at Smartphones is surely getting more and more complex. A security analyst at Lookout, Jeremy Linden said, ‘The group behind NotCompatible are operating on a different plane to the typical mobile malware maker.’ He said, mobile malware campaigns usually lasted only a couple of weeks but the NotCompatible creators had been operating for more than 48 months.

The bug first hit the open back in 2012, only now it is on its third iteration.  Linden added that the latest version had been rewritten recently and was now as sophisticated as the type of malware that is usually aimed at desktop computers. The latest version employed ‘end-to-end encryption, peer-to-peer networking technologies and stealth operating procedures to help it avoid being spotted and removed’ he said.

Linden continued, ‘They are successful enough to make it worth ripping out the back end of the malware to make it be much more stable and resistant to efforts to take it down…This is the most technically sophisticated threat we are facing and it’s the most worrying to us.’ said Mr Linden.

Linden said phones that were compromised had been used in numerous scams including sending spam, attacking WordPress blogs and buying tickets for popular events in bulk, so that they then could be resold at a massively significant profits.

The spread of NotCompatible is quite prolific; it occurs via spam and websites that are seeded with booby-trapped downloads. Android users are to be wary of any application that requires a security update to be installed before the app can be run.

Writer : Scott Leen
Source:,  November 26, 2014 

Rabu, 26 November 2014

Download And Install Microsoft Windows 10 Technical Preview In A Sandbox Step by step (Free).

All eyes are on Microsoft next year, in 2011 the team screwed up by offering a mobile-like experience to Windows customers with Windows 8, alongside pricing it rather highly, compared to Apple who decided to drop the price of OS X and make it free to all desktop users on the platform.

It looks like Microsoft will take a note from Apple’s book and make Windows 10 (also Windows 9) free for all consumers. Notice the last bit? Yep, Microsoft will still offer paid features and upgrades for enterprise, the one market they can count on.

Enterprise has been stuck in this time-lapse where Windows XP is still acceptable, but throughout the past half decade, we have seen a steady move to the new age-old option: Windows 7, which will probably last longer than Windows XP if Microsoft doesn’t hit a home-run with Windows 10.

Microsoft will make the initial upgrade to Windows 10 free for enterprise, but offer paid privileges like only having to update annually, better admin controls, more enterprise level help on basic functionality – allowing a company to install the system without having issues.

It is about time Microsoft dropped the price for Windows, especially when they offer Windows Phone – their mobile product which will become Windows 10 in 2015 – for free to smartphone users.

Microsoft will talk more about Windows 10 at BUILD in April next year. Until then, we will get to see the latest updates via the Technical Preview, launched last month by Microsoft.

If you love Windows and just can’t wait for the final public release of Windows 10 then don’t worry Windows 10 Technical Preview is here and available to download and install at your leisure. Microsoft made the OS available for download recently and it’s available free of charge.

If you want to get up close and personal with the latest version of Windows then you have a couple options. First up, if you have an old PC that isn’t doing very much then you could install Windows 10 from a flash drive. That may not be the best solution. We think it would be better to run the new OS inside a “sandbox,” a virtual machine. This way it won’t affect your system in any way and it’ll be more convenient than rummaging around for that old PC.

System requirements

  • Basically, if your PC can run Windows 8.1, you’re good to go. If you're not sure, don't worry—Windows will check your system to make sure it can install the preview.
  • Processor: 1 gigahertz (GHz) or faster
  • RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
  • Free hard disk space: 16 GB
  • Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
  • A Microsoft account and Internet access

Important notes

  • Some PC processors and hardware configurations aren’t supported by Technical Preview.
  • To access the Windows Store and to download and run apps, you need an Internet connection, a screen resolution of at least 1024 x 768, and a Microsoft account.
  • After you install the preview, you won't be able to play DVDs using Windows Media Player.
  • If you have Windows 8 Pro with Media Center and you install the preview, Windows Media Center will be removed.
  • The preview won’t work on Windows RT 8.1 and Windows N editions.
  • The preview is not available for Windows Phone.
  • A small number of older, 64-bit CPUs might be blocked from installing the preview.
  • If you're running Windows 7 without SP1, you can only upgrade to the preview by downloading an ISO file. If you install Windows 7 SP1, you can upgrade to the preview by using Windows Update or by downloading an ISO file.

Download Windows Technical Preview
Follow these steps to download Technical Preview:

  1. Sign up for the Windows Insider Program, if you haven't already.
  2. Read the system requirements.
  3. Click one of the Download links on this page to download a special file—it's called an ISO file—that you can use to install the preview.
  4. When the download is complete, transfer the ISO file to installation media such as a USB flash drive or DVD.
  5. Boot your PC from the installation media, and then follow the steps to perform a clean install.


  • You'll need a third-party program to convert the ISO file into installable media—DVD burning software often includes this capability.
  • Remember, trying out an early build like this can be risky. That's why we recommend that you don't install the preview on your primary home or business PC. Unexpected PC crashes could damage or even delete your files, so you should back up everything.
  • If you want to stop using Windows Technical Preview and return to your previous version of Windows, you'll need to reinstall your previous version from the recovery or installation media that came with your PC—typically a DVD. If you don't have recovery media, you might be able to create recovery media from a recovery partition on your PC using software provided by your PC manufacturer. You'll need to do this before you upgrade. Check the support section of your PC manufacturer's website for more info.
  • After you install Windows Technical Preview, you won’t be able to use the recovery partition on your PC to go back to your previous version of Windows.
Official Site Windows 10 Technical Preview download link :

Download links


LanguageLink to downloadSHA-1 hash value
English (United States) 64-bit (x64)
 Download (3.81 GB)  
English (United States) 32-bit (x86)
 Download (2.93 GB) 
English (United Kingdom) 64-bit (x64)
 Download (3.79 GB)  
English (United Kingdom) 32-bit (x86)
 Download (2.94 GB) 
Chinese (Simplified) 64-bit (x64)
 Download (3.96 GB)   
Chinese (Simplified) 32-bit (x86)
 Download (3.05 GB)   
Portuguese (Brazil) 64-bit (x64)
 Download (3.76 GB)    
Portuguese (Brazil) 32-bit (x86)
 Download (2.91 GB)   

Windows 10 Technical Preview enterprise edition.

Quick guide to install Windows 10 Technical Preview 

To install Windows 10 Technical preview doesn’t take too long, the whole process takes approximately 30 (depending on the speed of your PC). This is a quick guide on how to install what you need in a few steps:
  1. Start off by navigating Microsoft’s website and download the Windows 10 Technical Preview ISO file. Just simply click through the “Get Started” and “Join Now” screens, then scroll down and choose the appropriate language and version (32- or 64-bit).
  2. Download and install Oracle VM VirtualBox, the free virtualization tool which is going to make it possible for you to run Windows 10 inside Windows. 
  3. Run VirtualBox, then click the New icon. In the Create Virtual Machine dialog box, type ‘Windows 10,’ then click the version selector and choose Windows 8.1 You must ensure that you match the ISO to what you downloaded, either 32 or 64 bit, to what version is listed for 8.1.
  4. VirtualBox will provide you with a recommended memory size; accept unless you have a specific reason for changing it. Then select ‘Create a virtual hard drive’ and click Create. Accept VDI as the file type for the drive and then choose Fixed Size for the virtual drive. Finally, click Create and wait while VirtualBox constructs your virtual drive.
  5. When the drive is ready, click the Start button in the VirtualBox toolbar. You’ll see a box telling you to ‘Select start-up disk.’ Just Click the file folder next to the pull-down and navigate to the Windows 10 ISO file you downloaded in the first step and click Start.
  6. Now just install Windows as normal, but make sure to choose the ‘Custom: Install Windows only (advanced)’ option when asked. As usual, the setup process may involve a few reboots, though only within the confines of the VM.

A PC running Windows Technical Preview

Voila! Now you should have a version of Windows 10 running inside a safe and sandboxed window. Please note although the installation appears to have completed, you will have to reboot the system manually once more. After that, you are good to go for as long as you have the preview trial.

Technical Preview expires on April 15, 2015

If you’re running Technical Preview, we'll send you notifications beginning on April 1, 2015 to remind you that it’s time to upgrade your PC to a newer version.

Oracle VM VirtualBox download link :

Source : 


Selasa, 18 November 2014

Top Malware in Indonesia October 2014

Towards the close of 2014, the spread of malware in Indonesia is still dominated by four large microbots like an overwhelming number of computer users threaten Indonesia. 

In addition to four of the Trojans, Adware, Exploit and Worm. Specifically in the category of Adware, recorded six dominant adware which controls more than 75% of adware infections, reminiscent of Baymax and 5 other Marvel hero who joined the Big Hero 6. 

In October 2014, there were a malware infection that is quite dominant and could even beat Exploit and Worm. Malware is Sality which alone beat Worm and Exploit. 

For details of malware that infects Indonesia in October 2014 can be found in the description and figure 1 below:

Figure 1, Malware Statistics Indonesia, 2014

Trojan 42,5 %

Trojans managed to control nearly 50% of malware infections in Indonesia in October 2014 and this action led by Trojan.Crypt.HO and JS.Runner.BH are responsible for 44% and 32% of the total Trojan infection. While ranked 3-5 were occupied by Trojan Autorun (2.7%), dropper (3.66%) and Trojan.LNK (8.02%) were responsible for much of spreading malware Shortcut in Indonesia.

For information, Trojan.Crypt.HO are brothers and both this malware Sality support each other. The high spread of Trojan.Crypt.HO will directly lead to high deployment Sality. This is evident from the statistics malware months in October 2014 where malware Sality successfully ranked third beat Exploit and Worm.

While JS.Runner.BH is a dangerous trojan which focuses himself to steal secret data is a victim computer. JS.Runner.BH infection usually occurs from bundling with programs on crack and torrent. JS.Runner also will download other malware and activate it, but that he would open security of computer operating system in the infection. In many cases, the infected programs JS.Runner will experience performance degradation becomes very slow due to malware is spending too much computer resources. The bad news, JS.Runner.BH hard to kill, because it modifies the registry and disguised as a legitimate Windows file system. Whenever in the clear, he will come back and back again. For a complete dafatr detected Trojan can be seen in Table 1 below.

Table 1, which infects the Top Trojan Indonesia in October 2014

Adware 24,7 %

If the Trojans dominated by two types Crypt and JS.Runner which controls 76% of the total Trojan infection, then Adware have a spread more evenly. Like a Big Hero 6, it took 6 names to dominate 74% of adware adware infection in October 2014. The six names are BrowseFox (34.81%), which controls 12.04% Adware.Graftor, Swiftbrowse (9.06%) , Search Protect, Browsefox.H and Relevant Knowledge.

Browsefox began detected carry out the action in mid-2014 and included into the PUP (Potentially Unwanted Programs) aka actual unwanted programs and in a way that sometimes tricky installs itself on the victim computer along with other popular programs are usually free from Brothersoft, Softonic and Cnet (download .com). In many cases PUP actually made by the authorized software company but has a low concern for the security and convenience of computer users and is only concerned with corporate profits above all else.

Adware.Graftor as Browsefox also installed along with other freeware and in many cases berbentul Add On a browser or additional toolbar to the browser. Please be careful to add a new toolbar or add on your browser in order to avoid the Adware infections. For a complete list Adware infecting Indonesia in October 2014 can be seen in Table 2 below.

Tabel 2, Top 10 Adware Indonesia Oktober 2014

After adware, Win32 / Sality is the only single malware capable ranks third with infection as much as 9.1% as most malware stopped by G Data. If successful menginfekis your system, Sality will run payloadnya spamming action to harvest email addresses from Outlook and Internet Explorer cached. He has the ability to penetrate the Windows Firewall protection and avoid blocking antispam company in carrying out the action.

Exploit 6,7 %

Just like the previous period, the exploitation of the most widely exploited CVE-2010-2568 is (81.30%) and CVE-2011-0979 (see table 3 below:

Table 3, the most widely Exploit stopped by G Data with anti Exploit

Security loopholes are imperfections or errors in programming (bugs) in all man-made software such as Microsoft Windows, Linux, MS Office, Adobe Acrobat, Java, Browse (IE, Chrome, Firefox etc), OpenSSL, Squid, and so on are usually unconscious / unintentional. This bug can cause system instability, crashes or system can be accessed / controlled by other people who are not eligible. Security loopholes always found every day and there is no way to avoid the threat of exploitation of this vulnerability in addition to the patch (patch) as you do every day to update the software. Security holes are cross platform and not just one particular operating system monopoly. In fact, in the case of popular applications such as Acrobat Reader or Java are very popular and used a variety of operating systems enable the exploitation of a cross on the operating system on which the application containing the security loopholes in installed. Therefore, it is very important to have adequate protection against exploitation of security holes in your system to always do a software update to get the latest on vulnerability patches. If possible and you have the funds, make sure you have an antivirus program has protection against exploits a security hole in order to maximize the protection of your system. Active protection against this exploit is very important because the system contains vulnerabilities that have not been patched (patch) will be infected by malware that exploits a security hole EVEN proficiency level the system is protected with updated antivirus program. So exploit security holes can bypass the protection afforded by antivirus programs. 

The two exploits vulnerabilities that most Anti Exploit stopped Gdata with this is:
  1. CVE-2010-2568 is a real security hole LNK.Shorcut more than 4 years old but is still included in the most security holes in exploitation (81.30%), security hole is a favorite because it can be exploited to control a lot of OS Microsoft Windows workstations and servers well as Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, Windows 7 that allows the attacker to control the victim's computer with .LNK file or shortcut PIF files that have been prepared in advance . This security hole is also diekslpoitasi by Stuxnet via CVE-2010-2772 on Siemens WinCC SCADA system.
  2. CVE-2011-0979 adalah celah keamanan pada Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, Office 2004, 2010, 2008 in 2011 for Mac, Open XML File Format Converter for Mac in Excel Viewer SP2. Celah keamanan united memungkinkan penyerang menjalankan program komputer yang lain guna menguasai memiliki celah keamanan united. Pada bulan October 2014, celah keamanan united menempati Nomor 2 said Bawah .LNK Shortcut draining tingkat eksploitasi sebanyak 17,89%


What is the difference worm with a virus? Definitively, worms and viruses are greeting both belong to the class of malware. But if the virus to spread itself usually requires the help of a third party, because it usually he would disguise himself as folders, JPEG files, MS Office and other files of interest. Worm has different skills that he does not need the help of a third party to infect your computer and automatically be able to infect all the computers in the network. The condition is that the infected computer has a vulnerability (vulnerability) that would exploit to run itself automatically. 2 worm most bnayak stopped by G Data is downadup (69.7%) and LNK.Runner (18.08). Downadup is long malware malware that could be number 1 in Indonesia for months. This malware has another name that may be you know, Conficker. Conficker has the ability to infect computers in the network, especially those that have the MS08-067 security holes found in Windows 2000, XP, Vista, Server 2003 and Server 2008. For those of you who want to avoid the action of Conficker, please do patching security holes mentioned above. Besides Conficker and LNK.Runner that exploit security holes shortcut, Vaksincom noted VBS malware action Dunihi, Beagle, Nimda and Palevo as in Table 4 below.

Table 4, Worm most widely discontinued in October 2014

In addition to malware-malware mentioned above, recorded zusy, Buzy, Virtob, Autorun and Trojan dropper that dominate the spread of malware in Indonesia in October 2014. The full list of malware that infects Indonesian statistics and stopped by G Data Antivirus Enterprise can be viewed at Table 5 below.

Table 5, Malware Top Indonesia Oktober 2014

Author: Alfons Tanujaya
Sumber :, 10 November 2014.

Senin, 20 Oktober 2014

Welcome and Works Mr. Jokowi, President Our New President !

Wahai presiden kami yang baru
Kamu harus dengar suara ini
Suara yang keluar dari dalam goa
Goa yang penuh lumut kebosanan

Walau hidup adalah permainan
Walau hidup adalah hiburan
Tetapi kami tak mau dipermainkan
Dan kami juga bukan hiburan

Turunkan harga secepatnya
Berikan kami pekerjaan
Pasti kuangkat engkau
Menjadi manusia setengah dewa


Masalah moral masalah akhlak
Biar kami cari sendiri
Urus saja moralmu urus saja akhlakmu
Peraturan yang sehat yang kami mau

Tegakkan hukum setegak-tegaknya
Adil dan tegas tak pandang bulu
Pasti kuangkat engkau
Menjadi manusia setengah dewa

Kembali ke: Reff

Turunkan harga secepatnya
Berikan kami pekerjaan
Tegakkan hukum setegak-tegaknya
Adil dan tegas tak pandang bulu
Pasti kuangkat engkau
Menjadi manusia setengah dewa

Wahai presiden kami yang baru
Kamu harus dengar suara ini

Lagu : Manusia 1/2 Dewa 
Pencipta : Iwan Fals 

Iwan Fals - MANUSIA 1/2 DEWA (Official Video)

English Translate :

O our new president
You must hear this sound
The sound that comes out of the cave
Goa is full of moss boredom

Although life is a game
Although life is entertainment
But we do not want to be mocked
And we are also not entertainment

Lower prices soon
Give us a job
Surely I raised thee
Being a demigod


Moral issues moral issues
Let us find itself
Mind your moral mismanagement alone akhlakmu
Regulation healthy that we want

Enforce the law as straight-upright
Fair and firm indiscriminate
Surely I raised thee
Being a demigod

Back to: Reff

Lower prices soon
Give us a job
Enforce the law as straight-upright
Fair and firm indiscriminate
Surely I raised thee
Being a demigod

O our new president
You must hear this sound

Senin, 01 September 2014

Belajar dari Kasus Penahanan Florence Sihombing UU Informasi dan Transaksi Elektronik (ITE) dan Bahaya Terkait Jika Tidak memahami Dengan Benar Implementasi.

Pelapor Florence 'Ratu SPBU' Tak Paham Bahaya UU ITE  

Penahanan mahasiswi Program Studi Magister Kenotariatan Fakultas Hukum Universitas Gadjah Mada, Florence Sihombing, oleh Kepolisian Daerah DIY dinilai Aliansi Jurnalis Independen Yogyakarta berlebihan. 

Ketua AJI Yogyakarta Hendrawan Setiawan menilai Florence telah mendapatkan sanksi sosial dari masyarakat, antara lain dengan pernyataan balasan yang bersifat menghujat dan mengancam melalui media sosial ataupun telepon seluler. "Florence sudah mendapatkan sanksi sosial atas tindakannya. Kasusnya tak perlu sampai ke ranah hukum," ujar Hendrawan saat dihubungi Tempo, Ahad, 31 Agustus 2014.

Pengamat hukum pidana, Andi Hamzah, berpendapat, penahanan Florence Sihombing, mahasiswa Pascasarjana Universitas Gadjah Mada oleh Kepolisian Daerah Istimewa Yogyakarta tak tepat. Apalagi Florence dijerat dengan Undang-Undang Informasi dan Transaksi Elektronik. “Alasan penahanan dan pasal yang dikenakan tidak sesuai,” kata Andi saat dihubungi, Sabtu, 30 Agustus 2014.

Menurut Andi, UU ITE baru bisa dikenakan pada orang yang menyebar berita fitnah dan menghina. Sedangkan Florence dinilai hanya mencurahkan pendapatnya atas sesuatu hal. Pendapat itu, ujar Andi, merupakan hak pribadi dan menjadi bagian dari proses demokrasi.

Nama Florence dikenal setelah ramai diperbincangkan di Internet. Pasalnya, Florence memaki Kota Pelajar di jejaring sosial Path dan Twitter dengan kata-kata celaan yang membuat marah warga Yogyakarta. "Jogja miskin, tolol dan tak berbudaya. Teman-teman Jakarta-Bandung jangan mau tinggal di Jogja," tulis Florence. 

Atas tulisan Florence ini, LSM Jangan Khianati Suara Rakyat (Jatisura) mempolisikannya. Ia pun dimasukkan dalam sel tahanan Polda DIY pada Sabtu, 30 Agustus 2014, sekitar pukul 17.00 WIB. Florence ditahan karena dianggap tak kooperatif dengan petugas kepolisian yang memeriksanya. 

Andi menilai penahanan Florence justru menjadi bentuk pembunuhan demokrasi. Dia khawatir tindakan Polda DIY Yogyakarta justru menjadi yurisprudensi bagi aparat hukum lainnya untuk menahan orang-orang yang menyampaikan pendapat berbeda di media sosial. 

Dosen hukum di Universitas Indonesia ini meminta masyarakat lebih terbuka dan lebih bijak dalam menyikapi perbedaan pendapat. Masyarakat juga tak perlu terpancing dengan pernyataan seseorang yang dinilai berbeda. "Kalau tidak suka dengan orang atau pernyataannya, ya, tidak usah dibaca dan dikomentari."

Penahanan Florence Sihombing bertentangan dengan KUHAP dan prosedur penahanan berdasarkan UU Informasi dan Transaksi Elektronik (ITE).

Koalisi Masyarakat Sipil mengatakan, penahanan Florence Sihombing oleh Polda Daerah Istimewa Yogyakarta bertentangan dengan KUHAP dan prosedur penahanan berdasarkan UU Informasi dan Transaksi Elektronik (ITE). Sebab, penahanan seharusnya dilakukan untuk kepentingan penyidikan dengan syarat terhadap seseorang tersangka atau terdakwa dengan bukti yang cukup.

"Penahanan Flo hanya berdasarkan alasan hukuman di atas 5 tahun dan polisi mengabaikan tidak adanya keadaan yang menimbulkan kekhawatiran bahwa adanya kemungkinan tersangka untuk melarikan diri, mengulangi perbuatan, dan menghilangkan barang bukti," kata Kepala Divisi Pemenuhan HAM Sipil Kontras, Alex, di kantor Kontras, Minggu (31/8).

Selanjutnya, kata Alex, berdasarkan Pasal 43 ayat (6) UU ITE, dalam melakukan penangkapan dan penahanan, penyidik melalui penuntut umum wajib meminta penetapan ketua pengadilan negeri setempat dalam waktu 1 x 24 jam. 

"Koalisi menilai bahwa ada kemungkinan justru polisi tidak mengikuti prosedur sebagaimana dalam ketentuan Pasal 43 ayat (6) UU ITE, polisi langsung melakukan penahanan tanpa penetapan dari Ketua Pengadilan Negeri untuk kasus-kasus yang dijerat UU ITE."

Florence ditahan Polda DIY setelah menjalani pemeriksaan karena laporan terkait postingannya yang dinilai menghina warga Yogyakarta, Sabtu (30/08). Florence pun dijerat dengan undang-undang Informasi dan Transaksi Elektronik (ITE) serta pasal Kitab Undang-Undang Hukum Pidana (KUHP).

Menurut Kabid Humas Polda DIY, AKBP Anny Pujiastuti, Florence secara resmi ditangkap pada 29 Agustus kemarin pukul 17.00 WIB dan kemudian resmi ditahan pukul 17.00 WIB.

"Penangkapan terhadap Florence Sihombing berdasarkan laporan polisi nomor LP/644/VIII/2014/DIY/SPKT tanggal 28 Agustus 2014. Setelah itu dilakukan pemeriksaan di ditreskrimsus Polda," kata Anny pada wartawan di Polda DIY, Sabtu (30/08).

Pasal yang dikenakan kepada Florence dalam UU ITE yaitu pasal 27 ayat 3 jo pasal 45 ayat 1, pasal 28 ayat 2 jo pasal 45 ayat 2 UU ITE no 11 Tahun 2008. Sementara untuk KUHP Pasal 310 KUHP dan atau Pasal 311 KUHP.

Undang-Undang Nomor 11 Tahun 2008 bisa berbahaya bagi pelapor yang tak paham aplikasinya.

Penggunaan pasal-pasal dalam Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik untuk menjerat Florence, menurut dia, justru menegaskan upaya pemberangusan kebebasan berpendapat dan berekspresi. Pelaporan ke polisi, tutur Hendrawan, bisa mengancam siapa pun yang melontarkan kritikan melalui media sosial

"Pihak-pihak yang melaporkan ke polisi tidak sadar kalau pasal-pasal itu justru memberi kesempatan negara untuk memberangus diri sendiri," kata Hendrawan. 

Koordinator Masyarakat Anti-Kekerasan Yogyakarta (Makaryo), Beny Susanto, menambahkan, meskipun proses hukum harus dihormati, dia meminta polisi agar tidak bersikap diskriminatif lantaran Florence juga menerima hujatan balik dan ancaman. 

"Bagaimana dengan orang-orang yang menghujat balik melalui media sosial? Semestinya, polisi juga menindaknya. Jadi, polisi harus proporsional, tidak diskriminatif," kata Beny. 

Dia juga berharap kasus tersebut tidak melebar pada bentuk-bentuk tindak kekerasan yang mengarah pada intoleransi dan kekerasan fisik. Mengingat Florence adalah pendatang di Yogyakarta. Selain itu, Florence juga mengaku telah menerima ancaman akan dibunuh dan diperkosa.

Penyusun : Yohanes Gitoyo, S Pd.
Sumber :

Minggu, 24 Agustus 2014

Introduction SmadAV 2014 Rev. 9.8 : Combat Weapons to Fight Against Malware from Indonesia !

SmadAV is a local Antivirus unpaid devoted to overcome viruses are widespread local and foreign tourists in Indonesia. Antivirus has a free and paid version after it was a donationware.

To date Antivirus SMADAV can run the operating system: Windows 2000, Windows XP, Windows XP x64, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64.

SmadAV works in conjunction with almost all international antivirus. When combined, SmadAV will protect your computer from the local and international anti-virus that will protect your computer from virus locally (Indonesia) and the whole international virus.

Development History SmadAV

SmadAV name is taken from the name of the school stands Nafarin Zainuddin, SMADA (SMA 2) in Palangkaraya in Central Kalimantan, while AV stands for antivirus.

STC Nafarin alias Zainuddin aka Zai, is the inventor of the local anti SmadAV Medium Public School students 2 Pahandut Palangkaraya, Central Kalimantan class XI IA 1 SmadAV created in 2006, not because he created Smadav love alma mater, but since the beginning (incidentally ) he knows Visual Basic in computer labs SMAN-2 Palangkaraya in about mid-2006. Then Zainuddin Nafarin start trying to learn, and a few months after it was born SmadAV v1.0. But because of his work in the following math Olympics, eventually developing SmadAV postponed until completed in 2008. Smadav first created in Palangkaraya, but the location is a lot more development takes place in the Jogjakarta area due to busy studying at the Faculty of Computer Science Universitas Gadjah Mada.

Zainuddin himself did not come from Java, Zainuddin own original of Amuntai, South Kalimantan, and he speaks fluent row. Zainuddin living in a suburb of Palangkaraya, precisely in the area of ​​swamp forest. But now the forest has been destroyed in large part by fires that might accidental fires by humans, shady forests that used to now look no further.

SmadAV started Zainuddin developed since October 2006 (when it was still in class XI Zainuddin Nafarin or 2 SMA). Since there are some friends who asked Zainuddin to clean computer from local viruses are annoying, but Zainuddin itself is still quite common on local virus that time. There are 2 that was irritating here, the first local virus itself. Second, Zainuddin Nafarin should come to their homes Nafarin Zainuddin friends to "help" clean up local viruses on their computers manually. Because of this would have to be willing to be friends Zainuddin fixed Nafarin helped and Zainuddin Nafarin do not bother anymore, since SmadAV Zainuddin start developing applications.

smadav antivirus indonesia

Zainuddin Nafarin named Zainuddin Nafarin SmadAV because SMA is SMAN-2 Palangkaraya, commonly called SMADA. So, SmadAV = SMADA + AV (Antivirus SMADA). Why should SMADA? Because Zainuddin Nafarin just starting to learn programming since the beginning of class XI (since Zainuddin Nafarin find Visual Basic in the lab SMADA) and even got a new Nafarin Zainuddin computer while mid-grade X.

Zainuddin Nafarin develop SmadAV since October 2006, and finally stopped in the month of May 2007 and just started again now. Zainuddin due in May 2007 will follow the Provincial Mathematics Olympiad time. And he thought for a while he had to concentrate first Olympics. But because Zainuddin (accidental) escape again to the national level, would not want Zainuddin fixed concentration at the Olympics until the end of October 2007.

After the Olympics ended, again Zainuddin still think has not been possible to re-develop SmadAV, because at that time Zainuddin return must be prepared to face the national exam (because he was sitting in class XII). Zainuddin think early on, he must be prepared to learn the bitter end, because it not only to face the UN (the number 6 subjects) but also the University Entrance Test. After it was all over, and (thankfully) Zainuddin acceptable at GMU in the Department of Mathematics, Zainuddin Nafarin think when it is time to develop more SmadAV. Although now Zainuddin Nafarin is a student and only child boarding, Zainuddin Nafarin will try to develop the maximum possible SmadAV.

License of Use.

SmadAV Antivirus is a free software licensed to SmadAV Free, and to a limited circle belisensi paid for SmadAV Pro.

What are the advantages compared SmadAV Pro Smadav Free?

SmadAV Pro has many additional features that do not exist in SmadAV Free, the following are additional features that you would get at SmadAV Pro: Automatic Update Online, Faster Scanning, Exception List, Maximize / Resize, Change Color Theme, Admin Password, and License Use of Profit. You must be a donor to get SmadAV Pro. Note: SmadAV Free & Pro has the same detection capabilities. The difference is only on the auto-update feature and other additional features.

SmadAV indeed require operational costs, research, hosting, and many other costs. So it is not possible to rely only Smadav Smadav Free to grow. SmadAV Pro is also the difference is not too much to ask Smadav Free Zainuddin Nafarin Benediction and a little donation (If you find it so SmadAV move forward.

SmadAV created with Visual Basic

SmadAV created using Visual Basic, not using Delphi, C / C + + or even assemby. Why? From the beginning Zainuddin Nafarin already focused on Visual Basic and will also take a long time if you have to convert Source Code SmadAV (more than 10000 lines) of the Visual Basic programming language to another. In addition to its re Zainuddin Nafarin must learn new programming languages, Zainuddin Nafarin also here just alone and do not have much time to develop SmadAV, because Zainuddin Nafarin must also fulfill Zainuddin Nafarin to college and get a high IP.

Excess use Visual Basic, SmadAV becomes easier and faster to develop than other programming language that is more complicated and much less Assembly SmadAV Exe File size smaller than Delphi.

The drawback using Visual Basic, SmadAV MSVBVM60.DLL actual need is always there in the Windows Platform system. "If the file is deleted by virus", automatic SmadAV and all the other Visual Basic applications can not be run on that computer. But this can be overcome by downloading MSVBVM60.DLL and put a folder with SmadAV. So no problem. SmadAV never used a database for VBS Virus detection, all total with heuristics alone.

Logo SmadAV

Zainuddin Nafarin time just looking for the most amazing objects ever found, especially in the field of mathematics. Zainuddin Nafarin impossible and decided this object as an icon because the icon is awesome SmadAV although very simple. While the green color symbolizes peace, which is why Smadav use green for all the components including this icon. SmadAV always use green because we are Indonesia, the world's lungs.

Release SmadAV

SmadAV use the thousands of API functions, little VB functions, making it much faster scanning. The average speed of scanning is 100 files per second. SmadAV only open-source for version 1.7 and 2.3.

Release SmadAV division, namely:
  •     Small Revision: rev.X.0.0 so rev 8.0.1 (revised periodically in a matter of days)
  •     Ordinary Revision: rev. X.0 so rev. 8.1 (typically 2 weeks)
  •     Major Revision: rev.X.5 so rev. 9.0 (usually 2 months)

Overall the release is as follows SMADAV extent that I know of:
  1.  SmadAV v1.0
  2. SmadAV v1.7
  3. SmadAV v2.3
  4. Smadav 2008 Rev 3.2
  5. Smadav 2008 Rev 3.4
  6. Smadav 2008 Rev 3.5
  7. Smadav 2008 Rev 3.6
  8. Smadav 2008 Rev 3.8
  9. SmadAV 2009 Rev 1.0
  10. Smadav 2009 Rev 3.8
  11. Smadav 2009 Rev 4.1
  12. Smadav 2009 Rev 4.3
  13. Smadav 2009 Rev 5.1
  14. Smadav 2009 Rev 5.2
  15. Smadav 2009 Rev 6.0
  16. Smadav 2009 Rev 6.2
  17. Smadav 2009 Rev 6.4
  18. Smadav 2009 Rev 7.0
  19. Smadav 2009 Rev 7.1
  20. Smadav 2009 Rev 7.2
  21. Smadav 2009 Rev 7.3
  22. Smadav 2009 Rev 7.4
  23. Smadav 2009 Rev 7.5
  24. Smadav 2010 Rev 8.0
  25. Smadav 2010 Rev 8.1
  26. Smadav 2010 Rev 8.2
  27. Smadav 2010 Rev 8.3
  28. Smadav 2011 Rev 8.4
  29. Smadav 2011 Rev 8.5
  30. Smadav 2011 Rev 8.6
  31. Smadav 2011 Rev 8.7
  32. Smadav 2011 Rev 8.8
  33. Smadav 2012 Rev 8.9
  34. Smadav 2012 Rev 9.0
  35. Smadav 2012 Rev 9.1
  36. SmadAV 2013 Rev 9.2
  37. SmadAV 2013 Rev 9.3
  38. SmadAV 2013 Rev 9.4
  39. SmadAV 2013 Rev 9.5
  40. SmadAV 2014 Rev 9.6
  41. SmadAV 2014 Rev 9.7
  42. SmadAV 2014 Rev 9.8, release August 23, 2014.

We usually test the beta version of the first in the Forum SmadAV, so if there are user forums that find bugs or disagree with a particular feature, of course SmadAV be repaired again. So it does not really end-user that we made in place SmadAV test. Sure we may not find all the bugs currently in beta testing Smadav forum, so do not rule out that there are still bugs in the release version SmadAV.

We do not prevent anyone who wants to criticize Smadav, because Smadav very open and still needs a lot of improvement. Also note that the program is not Smadav commercial / profit, SmadAV made for research and application of science Computer Science. So there is no reason to put the interests of our more self / group rather than the application of the science of Computer Science itself. We are more dedicated to the application Smadav Computer Science and scientific research in Indonesia.

Office SmadAV

SmadAV has no official office. SmadAV fruit is the result of the work of the hands of Gajah Mada University students residing in Yogyakarta. While all team members are volunteers who gathered online.

Forum SmadAV

Forum SmadAV made by mas kambeeng dated March 23, 2009. So, on March 23, 2012 forum Smadav even 3 years old. The initial purpose of the establishment of this forum is to provide users and asked questions through the forum. Forum SmadAV also available for users who want to report bugs, suggestions / criticism for SmadAV. In August 2011, the forum SmadAV recorded 69,923 registered users. Data source: Statistics Center SmadAV Forum.

External server (International) tend to be cheaper than a local server (IIX). Especially for a very cheap Shared Hosting abroad. not wear Shared Hosting, but using VPS (Virtual Private Server) which is much more expensive and more stable for a sufficiently large forum. Currently there Daxa Server 2,500,000, -/bulan and Server and using Virtual Private Server at DreamHost, pay him between $ 50 - $ 100 per month or 500,000, - / month ( Rp6.000.000 - Rp12.000.000 per year). So can serve Smadaver the maximum possible speed.

Focus Development SmadAV.

SmadAV currently focused on the following four main functions:

1) additional protection for your computer, 100% compatible with other antivirus!

Most of the antivirus can not be installed together with other antivirus, it is because the antivirus is designed for primary protection on your computer. Unlike SmadAV, Smadav antivirus is a type that are designed as an additional protection, so 100% compatible and can work well although there has been another antivirus on your computer, in this case serves as a layer of defense SmadAV second. SmadAV has its own way (behavior, heuristic, and whitelisting) in detecting and cleaning viruses that will further enhance the security of the computer. Because the resource usage is very small SmadAV, SmadAV will not increase your computer's performance under heavy use. So, with a mix between SmadAV and antivirus protection that is installed on your computer will further strengthen the defense of your computer from virus infection.

2) Best USB Antivirus (Total Protection USB stick)

USB flash drive is one of the largest medium for spreading viruses in Indonesia. SmadAV have special technology for total prevention of virus that spreads via USB stick. Mission SmadAV is 100% no longer infectious virus from the flash. SmadAV have enough signatures of viruses that infect the flash, and has a special ability to detect new viruses in the flash though not in the database SmadAV. Not only is prevention, Smadav also able to clean up a virus that infects and restore virus hidden files in USB Flashdisk

3) Best for offline use (no need to update very often)

SmadAV very well be used for computers that rarely or even not connected to the internet. SmadAV do not need to update as often as any other antivirus that usually do updates per week and even per day. SmadAV usually only update once a month (monthly). SmadAV not overly dependent on the signature / virus database, but rather depends on the behavior detection techniques, heuristic, and whitelisting.

4) Cleaner and tools to clean the virus

SmadAV also able to clean the virus that has infected your computer and fix registry is modified by a virus. Other antivirals are usually not done cleaning the registry so that the computer has not returned to normal after cleaning the antivirus. Many supporting tools that are included in SmadAV as a weapon for cleaning viruses.

Note: Not all types of viruses can be cleaned Smadav, Smadav is still not able to clear the virus type penginfeksi programs or rootkit type (eg: virus Ramnit, Sality, Alman, Virut, etc..) Because this strain has blown most of your program files .

Our focus now is to thoroughly cleaning the virus types other than these two types (eg: virus WormShortcut, Cervical, MSO, Brontok, etc..)

Computer Security Key Features:

1. Process SmadAV

At Smadav clicked surreptitiously checking first (that is not to kill the virus) the state of your computer, if there is a virus going direct-kill SmadAV before the GUI (view) Smadav it appears. And this should be less than 3 seconds

2. File Cleaning

If it fails to do the cleaning Smadav, actual documents will not be deleted but quarantined, so they can restore (undelete) on the Quarantine tab.

There are several possible causes for cleaning files document fails (so it must be quarantined):
  •     File documents possessed (join) the body of the virus
  •     File documents hidden in a place that can not be reached smadav
If you are sure all data is secure, just delete all the virus in quarantine

3. Autorun.inf

Folder autorun.inf SmadAV serves to fend off the virus that makes autorun.inf file. Autorun.inf is only detected if any stick / Removable disk, not on the CD / DVD Drive. Zainuddin Nafarin computer itself is very often infected with Conficker because Zainuddin Nafarin often lax in researching in Lab SmadAV, Conficker infected computers often loose and Zainuddin Nafarin own, but still failed Conficker infects the flash by creating an autorun.inf file, because it is already locked by Smad -Lock.

autorun.inf virus is likely to be only duplicate themselves so similar to all the folders on the drive, including autorun.inf folder, so the virus will exe extension named autorun.inf.exe Recycler Folder in flash is 100% Virus Conficker. It should be noted that autorun.inf folder that has the attribute system + hidden so it will not confuse a novice user because most ordinary computer users do not display the file system + hidden. Only advanced computer users only from mostly hidden + file system, and they are mostly already know uses autorun.inf folder.

Keep in mind, Windows 7 was not using and ignoring the autorun.inf file on a removable disk. Actually autorun.inf on removable disk feature has been widely criticized by users of Windows XP because it is very dangerous and a very nice gap for the virus, Smadav just want to break the chain of virus, mostly in Indonesia spread via autorun.inf. So it is not recommended to remove autorun.inf folder SmadAV made.

Until now, almost all the virus (99%) are not able to remove autorun.inf folder SmadAV.

Zainuddin Nafarin realized there was a counter with Smad-Lock though only a small fraction. But please understand that the mission is actually just Smadav to significantly reduce the spread of the virus in Indonesia, and eventually we will get a high security on computers in Indonesia, both for users online and offline, mostly in Indonesia. Folder Autorun.inf automatic stay but no confirmation before will be added shortly after the flash is not installed there will be users who are confused, you should note that when it is removed the autorun.inf folder there will be a notification from windows: "This autorun.inf is LOCKED by SMADAV to protect your Flash-Disk from virus infection. "

So, the mission is really just SmadAV to significantly reduce the spread of the virus in Indonesia, and eventually we will get a high security on computers in Indonesia, both for users online and offline, mostly in Indonesia.

4. Smad-Lock

Folder Smad-Lock Δ Δ can not be d-scan by SmadAV Rev. 4 and previous versions. This is because the path has Unicode character that is Δ. Similarly, the virus can not scan and infect files in it, because to make a program may enter this folder programmer must create code that supports Unicode characters so it must overhaul reset all the codes that do not support Unicode. SmadAV 2009 Rev. 5 has been re Rombak Nafarin Zainuddin and supports Unicode. Smad-Lock virtually impossible to be modified by a virus. Virus penginfeksi folder is duplicating themselves like all the folders it finds including autorun.inf folder owned by Smad-Lock. But the virus can not be penginfeksi folder into the folder "Smad-Lock Δ Δ" Smad-Lock Folder is reserved only for files opened with microsoft made programs, such as office, explorer, notepad, etc.. Only a few non-Microsoft program that can open the file in a folder Smad-Lock. SmadAV already provide adequate notification and records in the folder Smad-Lock in the Read Me file. Indeed, there are approximately 5% local virus can enter the folder Smad-Lock, but almost no one could infect documents in it

Very strong reasons to make Smad-Lock feature:

90% of the virus (the virus either locally or outside the virus) in Indonesia are now spreading through autorun.inf, so please say you use the features in the autorun.inf file but get ready because your autorun.inf file will be replace by the viral and Removable Disk will be infected. If you are more concerned with security, switch Smad-Lock (Autorun.inf), until now most viruses (99%) are not able to remove autorun.inf folder SmadAV.

As you know, Windows 7 is not using and ignoring the autorun.inf file on a removable disk. Actually autorun.inf on removable disk feature has been widely criticized by users of Windows XP because it is very dangerous and a very nice gap for the virus, Smadav just want to break the chain of virus, mostly in Indonesia spread via autorun.inf. So it is not recommended to remove autorun.inf folder SmadAV made.
SmadAV already provide adequate notification and records in the folder Smad-Lock in the Read Me file. More detailed technical notes may be added in the next revision in the Read Me file

The trick to ensure safe flash-disk (almost 100%) of the virus
  • First Activate Smad-Lock in flash disk and insert all the files / folders into the folder "Smad-Lock Δ Δ"
  • Folder Smad-Lock (Safe Smadav) it will have to be made manually via Tools-> Smad-Lock.
  • Remember, do not ever change the name "Smad-Lock Δ Δ".

Is it possible that Smad-Lock penetrated virus?

Smad-Lock is still possible penetrated by a small virus. Viruses that (1) as a whole or (2) only some functions that support UNICODE path.
  • For the first type, the virus which overall supports UNICODE, can even infect documents / files in a folder Smad-Lock, but until now I have not been there found a virus like this, especially in Indonesia which could infect documents (not executable), there is only alien virus that can infect the exe.
  • For the second type of virus, only a partial function that supports UNICODE path, just be able to copy the file to the folder Smad-Lock, and most do not modify the other files that already exist in the folder Smad-Lock. Viruses of this type may be estimated less than 5% of the entire local virus spread in Indonesia.
Thus, Smad-Lock folders clear gap still exists and it is not possible 100% safe.

5.    Smad-RTP

Smad-RTP only prevent the execution of virus Explorer and flash. So there will be no registry if execution viral infections have been prevented. SmadAV not automatic scanning of all file activity on your computer, because this is a very light Smadav protection. So SmadAV will prevent you execute the virus file a moment when you open the folder through Explorer.

6. Registry

Smadav can always clean the registry it detects, if the difference is Forbidden String and string can not automatically correct and detected again despite being cleared, there may be a viral infection that constantly change to their original values.

7. Flashdisk

For example SmadAV in flash and infected and the user opens Smadav of the media, it Smadav warned that the file has been corrupted. There is no 100% security, but we have to try the best security possible.

SmadAV Link Download Antivirus Free Edition:

Download SmadAV Rev 2014. 9.8
Download Smadav 2014 Rev. 9.8

SmadAV Link Download Antivirus Pro Edition:

Key Smadav Pro

Source link for those of you who want to know more about Antivirus SmadAV:

For those of you who want to participate to contribute the development of Antivirus SmadAV visit this link:

Jumat, 08 Agustus 2014

Inilah Isi Peraturan Blokir Konten Negatif di Internet : Peraturan Menteri Kominfo No. 19 Tahun 2014 !

Rancangan Peraturan Menteri Komunikasi dan Informatika tentang Penanganan Situs Internet Bermuatan Negatif telah resmi disahkan menjadi Peraturan Menteri Kominfo No. 19 Tahun 2014.

Rancangan Peraturan Menkominfo yang salinannya diterima KompasTekno, Kamis (7/8/2014), telah diteken oleh Menkominfo pada 7 Juli 2014 dan diundangkan oleh Menteri Hukum dan HAM pada 17 Juli 2014. 

Ini artinya, pemerintah sudah mempunyai dasar hukum atas kewenangan memblokir situs-situs yang dianggap bermuatan negatif, seperti situs porno, situs perjudian, situs yang mengandung unsur SARA, dan lainnya.

Ke depannya, pemerintah bakal lebih agresif memblokir situs-situs web yang mengandung konten pornografi dan kegiatan ilegal lainnya. Ini tercantum dalam Bab III pasal 4 dari Peraturan Menteri tersebut.

Kementerian atau lembaga pemerintah dapat memblokir situs internet bermuatan negatif sesuai dengan kewenangannya dan daftar alamat situs yang bermuatan negatif akan disusun oleh Direktur Jenderal Kominfo dalam TRUST+Positif. 

Meski demikian, seperti tercantum dalam Bab III Pasal 7, masyarakat dapat berpartisipasi atau melaporkan situs-situs negatif untuk dimasukkan dalam TRUST+Positif.

Untuk melakukan pemblokiran, Peraturan Menteri ini mewajibkan Penyelenggara Jasa Akses Internet (ISP-internet service provider) untuk berperan aktif. Ada sanksi sesuai peraturan perundang-undangan untuk ISP jika tidak melakukan pemblokiran.

Menuai kritik

Peraturan menteri sejatinya ini menuai kritikan dari berbagai lembaga swadaya masyarakat seperti Indonesia Media Defense Litigation Network (IMDLN), ICT Watch, ELSAM, SAFENET dan PAMFLET. Peraturan itu dianggap tidak sesuai dengan Pasal 28 huruf J Undang-Undang Dasar 1945 dan juga pasal 19 Kovenan Hak Sipil dan Politik yang telah diratifikasi lewat Undang-Undang Nomor 12 Tahun 2005.

Menurut IMDLN, pembatasan terhadap kebebasan berekspresi negara seharusnya wajib lulus dalam uji tiga rangkai yakni, pertama, pembatasan harus melalui undang-undang. Kedua. pembatasan hanya diperbolehkan dengan tujuan yang sesuai dengan pasal 19 ayat 3 Kovenan Hak Sipil dan Politik. Ketiga, pembatasan benar-benar diperlukan untuk menjamin dan melindungi tujuan yang sah tersebut.

Sementara, ICT Watch menyoroti pemberian mandat penyusunan situs-situs bermuatan negatif. Beberapa waktu lalu, Direktur ICT Watch Donny BU menyoroti ketidakjelasan asal muasal Trust+Positif ini. Dia menilai pemberian mandat penyusunan database Trust+Positif ini tidak transparan dan akuntabel.

Hal inilah yang sempat terjadi ketika pemerintah memutuskan pemblokiran situs Vimeo beberapa waktu lalu. Para pengguna internet memprotes pemblokiran situs Vimeo itu karena tanpa alasan yang jelas. Sementara Tifatul menyatakan pemblokiran Vimeo karena mengandung konten pornografi.

Permen Kominfo No 19 Tahun 2014 tentang Penanganan Situs Internet Bermuatan Negatif
Peraturan Menteri Kominfo tentang Penanganan Situs Internet Bermuatan Negatif selengkapnya dapat dibaca dari tautan ini : 

Penulis: Oik Yusuf 
Editor: Wicak Hidayat
Sumber :, Jumat, 8 Agustus 2014, 14.26 WIB.

Kamis, 17 Juli 2014

Military Design ‘Transformer’ Aircraft (Real).

The Transformer Aircraft, Starscream

The UK defence and aerospace contractor, BAE Systems, have unwrapped several concept designs, which it envisions as possible tools for the military in the future.  If these designs are anything to go by, I think Shia Labeouf or Mark Wahlberg need to be ‘de-briefed,’ as the battlefields of tomorrow are going to look like the set of a Transformers movie.

The Transformer Aircraft Concept
The Transformer Aircraft Concept

One of the concepts is actually called the Transformer.  It is a stealth aircraft, which is composed of three separate airplanes; a large, diamond-shaped craft and two smaller flanking planes.  The Transformer is theoretically capable of longer flights because it will conserve fuel, thereby reducing the overall aerodynamic drag.

Currently, the most common aerial refuelling techniques are the boom and the probe-and-drogue methods.  These both require very skilled mid-air synchronization of separate aircraft. The Transformer would make the prospect of longer missions that much easier by requiring fewer refuels.

Future Concepts - The Survivor

BAE Systems also unveiled other concept vehicles.  These included a self-healing aircraft called the Survivor.  This model repairs its exterior in mid-flight using a lightweight adhesive fluid within a pattern of carbon nanotubes!

The other concept videos include an aircraft that is capable of shooting a concentrated energy beam in order to disable an enemy’s missiles. And a craft with the ability to fabricate and deploy UAVs (unmanned aerial vehicles) using on-board 3D printers.

Future Concepts - On-board 3D Printing

These are all possibilities that may come about in the next 25 years. BAE’s advanced research group is well known for producing clever concepts, but the company has been careful to mention these concepts are just predictions of what may be possible by 2040.

Future Concepts - The Transformer

Nick Colosimo, an engineering manager from BAE’s R&D team said in a statement, “[W]e don’t know exactly what sorts of aircraft technologies will be used in 2040 with any certainty…But it’s great to be able to show the public some concepts that might be possible through projecting where today’s technology could get to.”

As always, if you would like to leave a sensible comment, then please do so in the comments section below.

Writer : SCOTT LEE
Source:, July 14, 2014.