Tampilkan postingan dengan label All Post. Tampilkan semua postingan
Tampilkan postingan dengan label All Post. Tampilkan semua postingan

Kamis, 24 November 2016

How to Solve the Problem (fix) errors "Windows Script Host access is disabled on this machine.."



In this post, I will share about how to solve the problem (fix) errors on the windows. If you experience an error "Windows Script Host access is disabled on this machine. Contact your administrator for more details.", Here's how to fix it.

Pada postingan kali ini, saya akan berbagi tentang bagaimana mengatasi masalah (memperbaiki) error pada windows. Jika anda mengalami error "Windows Script Host access is disabled on this machine. Contact your administrator for more details.", inilah cara untuk memperbaikinya.

Windows Script Host (WSH) is a Microsoft technology that provides scripting capabilities such as batch files, but includes more features. The script can be run directly from the desktop by double-clicking a script file, or from the command prompt (CMD). The cause of this error is usually due to a virus that disables HTML WSH system. Let's discuss how to correct the error on this one.

Windows Script Host (WSH) adalah teknologi Microsoft yang menyediakan kemampuan scripting seperti file batch, tetapi mencakup lebih banyak fitur. Script tersebut dapat dijalankan langsung dari desktop dengan mengklik dua kali file script , atau dari command prompt (CMD). Penyebab error ini biasanya karena adanya virus HTML yang menonaktifkan sistem WSH.  Mari kita bahas cara perbaiki error yang satu ini.

1. Click the Start Menu, then type regedit.exe in the search box. Then select regedit.exe .
Klik Start Menu, lalu ketik regedit.exe pada kotak pencarian. Lalu pilih regedit.exe.



2. Once entered into the Registry Editor, navigate to the directory : HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Script Host\Settings.
Setelah masuk ke Registry Editor, arahkan ke direktori : HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Script Host\Settings.



3. Right-click and select New, select again DWORD (32-bit Value).
Klik kanan lalu pilih New, pilih lagi DWORD (32-bit Value).


4. Name / rename her to Enabled.
Beri nama/ ganti nama-nya menjadi Enabled.



5. Double-click on Enabled, then replace in the Value data is changed to 1 to reactivate the WSH system. Click OK.
Double klik pada Enabled, lalu ganti pada bagian Value data diubah menjadi 1 untuk mengaktifkan kembali sistem WSH. Klik OK.


6. Finish, the final step is to restart your PC / computer.
Selesai, langkah terakhirnya adalah dengan Restart PC/komputer.

So, hopefully this information can help you troubleshoot this PC. Thanks and good luck ..
Sekian, semoga informasi ini dapat membantu anda mengatasi masalah PC ini. Terima kasih dan selamat mencoba..

Jumat, 29 Januari 2016

Top 10 Adware / PUP (Potentially Unwanted Program) 2015


Ransomware malware may be king in 2015, but if you see the ranking of malware based on the number of incidents that occur every month became the ruler did not ransomware but Adware. 

Ransomware boleh menjadi raja malware di tahun 2015, tetapi jika melihat pemeringkatan malware berdasarkan jumlah insiden yang terjadi setiap bulan yang menjadi penguasa sama sekali bukan ransomware tetapi Adware. 

Adware as the name Advertising Software was originally created to communicate the product / service, but in its development more widely used for negative activities such as display ads by coercion or deception and controlled content such as feature adult content, inappropriate or even lead to the installation of malware. There is a new category of adware called PUP Potentially Unwanted Programs, as the name of the program is likely unintended by the computer user, but like the uninvited guest with no idea of ​​shame he would ride on your computer. The trick is to menginstalkan himself along with the popular freeware used by many computer users.

Adware sesuai namanya Advertising Software pada awalnya diciptakan untuk mengkomunikasikan produk / layanan, namun dalam perkembangannya lebih banyak dimanfaatkan untuk aktivitas negatif seperti menampilkan iklan dengan paksaan atau tipuan dan konten yang tidak terkontrol seperti menampilkan konten dewasa, tidak pantas atau malah mengarahkan pada instalasi malware. Ada kategori baru dari Adware yang disebut PUP (Potentially Unwanted Program), sesuai namanya program ini kemungkinan besar tidak diinginkan oleh pengguna komputer namun ibarat tamu tidak diundang dengan tidak tahu malunya ia akan menumpang di komputer anda. Caranya adalah dengan menginstalkan dirinya bersama dengan freeware populer yang banyak digunakan oleh pengguna komputer.


Adware, PUP Potentially Unwanted Program.

Adware , Potentially Unwanted Programs PUP
If we look at the statistics Malware Information Initiative MII given by G Data https://www.gdatasoftware.com/securitylabs/statistics which gets data from G Data Antivirus user community around the world who are willing to participate and automatically transmit the data anonymously malware stopped by G Data . Adware is becoming evident that the rulers of the world and Indonesia malware stairs . ( see figure 1 )

Figure 1 , Adware / PUP is the amount of beating other malware category in 2015 and ruled the malware in 2015.
Gambar 1, Adware / PUP secara jumlah mengalahkan kategori malware lain di 2015 dan merajai tangga malware 2015

Jika kita melihat statistik Malware Information Initiative MII yang diberikan oleh G Data https://www.gdatasoftware.com/securitylabs/statistics yang mendapatkan data dari komunitas pengguna antivirus G Data di seluruh dunia yang bersedia berpartisipasi dan secara otomatis mengirimkan secara anonim data malware yang dihentikan oleh G Data. Terbukti bahwa Adware memang menjadi penguasa tangga malware dunia dan Indonesia. (lihat gambar 1)

Dan Top 10 malware yang dihentikan mencakup 44,16 % dari total jenis malware yang memang sangat bnayak variannya. Adapun ke 10 Adware yang pelru di waspadai dan aksinya yang merugikan dapat di lihat pada uraian di bawah ini :
  • As for the king Adware is Script.Adware.DealPly.G that installs itself along with other freeware. DealPly (24.51%) itself is an add-on to your browser and it will try to show ads on every page of the site visited by the user of the computer.Adapun yang menjadi raja Adware adalah Script.Adware.DealPly.G yang menginstalkan dirinya bersama dengan freeware lain. DealPly (24,51 %) sendiri adalah add on pada peramban dan ia akan berusaha menampilkan iklan yang pada setiap halaman situs yang dikunjungi oleh pengguna komputer.
  • After DealPly, entrenched in 2 Script.Application.Plush.D which comes in the form of Javascript and instalkan by Gen.Adware.Plush.1 that in carrying out the action to inject the browser used to display advertisements and banner. Setelah DealPly, bercokol di peringkat 2 Script.Application.Plush.D yang datang dalam bentuk Javascript dan di instalkan oleh Gen.Adware.Plush.1 yang dalam menjalankan aksinya akan menginjeksikan peramban yang digunakan guna menampilkan iklan dan banner. 
  • Then Script.Adware.Vbates.A also like to be in instalkan PUP by other third party installer. In carrying out the action it will display alternative product advertising every time the computer user interested in doing online shopping. Lalu Script.Adware.Vbates.A juga seperti PUP yang akan di instalkan oleh installer pihak ketiga lain. Dalam menjalankan aksinya ia akan menampilkan iklan produk alternatif setiap kali pengguna komputer berminat melakukan belanja online.
  • Win32.Application.OpenCandy.G is an application that runs on Windows 32 bit and into the category of PUP since installs itself along with the popular freeware program such as PDF Reader, DVD Player, archiver and other programs. Opencandy will change your browser settings, browser and setting the initial site search engine being used. He will direct the victim to unwanted sites and displays pop-up in order to obtain financial gain. Win32.Application.OpenCandy.G adalah aplikasi yang berjalan di Windows 32 bit dan masuk ke dalam kategori PUP karena menginstalkan dirinya bersama dengan program freeware populer seperti PDF Reader, DVD Player, archiver dan program lainnya. Opencandy akan mengubah setelan peramban anda, situs awal peramban dan setelan mesin pencari yang sedang digunakan. Ia akan mengarahkan korbannya ke situs yang tidak diinginkan dan menampilkan iklan pop up guna mendapatkan keuntungan finansial.
  • Script.Spyware.Skrum.A is an add-on to Mozilla Firefox browser that will installs itself without permission. He would spy on users to report eperti Firefox add on what is used in the Firefox browser. Script.Spyware.Skrum.A adalah add on pada peramban Mozilla Firefox yang akan menginstalkan dirinya tanpa izin. Ia akan memata-matai pengguna Firefox eperti melaporkan add on apa saja yang digunakan pada peramban Firefox tersebut. 
  • Adware.BrowseFox.BU is a PUP that target browsers Internet Explorer and Google Chrome. He will installs itself as Add ons then initiate action such as changing the start page, and default search engine in the browser's security settings. When the browser is used it will inject Javascript to display ads that benefit him. Adware.BrowseFox.BU adalah PUP yang mengincar peramban Internet Explorer dan Google Chrome. Ia akan menginstalkan dirinya sebagai Add ons lalu memulai aksinya seperti mengubah start page, default search engine dan setting sekuriti pada peramban. Ketika peramban digunakan ia akan menginjeksikan Javascript guna menampilkan iklan yang menguntungkan dirinya.
  • Adware.Agent.PJT is a PUP that diinstalkan by Opencandy who will attempt to change the start page and search engine settings to display ads that benefit him. Furthermore he will attempt to control network traffic and is designed in such a way that's hard to kill (uninstall) of the computer. Some examples of software that contains Agent.PJT are: Market Research Helper, Smarter Power, Common Share, Mega Browse, Flip Jump, Bring Star, Smarter Power and Wise Enhance. Adware.Agent.PJT merupakan PUP yang diinstalkan oleh Opencandy yang akan berusaha mengubah start page dan settingan mesin pencari guna menampilkan iklan yang menguntungkan dirinya. Lebih jauh lagi ia akan berusaha mengontrol trafik jaringan dan di desain sedemikian rupa agar sulit dibasmi (uninstal) dari komputer. Beberapa contoh software yang mengandung Agent.PJT adalah : Market Research Helper, Smarter Power, Common Share, Mega Browse, Jump Flip, Bring Star, Smarter Power dan Wise Enhance.
  • Scareware is a type Win32.Adware.Iobit.A. He will scare the victim computer users by displaying false information as if the computer contains a lot of malware and tries to convince the victim to purchase malware homemade cleaners for cleaning of malware that does not actually exist. Win32.Adware.Iobit.A adalah jenis Scareware. Ia akan menakut-nakuti pengguna komputer korbannya dengan menampilkan informasi palsu seakan-akan komputer tersebut mengandung banyak malware dan mencoba meyakinkan korbannya untuk membeli pembersih malware buatannya untuk membersihkan malware yang sebenarnya tidak ada.
  • Win32.Application.OpenCandy.O is another variant of Opencandy included in the category of PUP and benefit financially from displaying pop-up ads that are not desirable. Like the other variants OpenCandy it will also change the setting of the search engines and the browser start page. Win32.Application.OpenCandy.O adalah varian lain dari Opencandy yang termasuk dalam kategori PUP dan mendapatkan keuntungan finansial dari menampilkan iklan pop up yang tidak diinginkan. Seperti varian OpenCandy lainnya ia juga akan mengubah setting mesin pencari dan halaman awal peramban.
  • Gen.Adware.BrowseFox.1 is a PUP that will ride another freeware for installs itself on the victim's computer. He will menyarukan himself as programs Market Research Helper, Swift Browse, Browser Helper, Common Share, Mega Browse, Special Box, Net Crawl, Clear Think, Jump Flip, Bring Star, Smarter Power, Wise Enhance, Enter Digital, Framed Display, Digi Help, Rock Turner and Infinet. He will installs itself as Add ons in three popular browsers such as Internet Explorer, Firefox and Google Chrome. In addition he will also seek installs itself as a local proxy, services and drivers. Gen.Adware.BrowseFox.1 adalah PUP yang akan menumpang freeware lain guna menginstalkan dirinya pada komputer korban. Ia akan menyarukan dirinya sebagai program Market Research Helper, Swift Browse, Browser Helper, Common Share, Mega Browse, Special Box, Net Crawl, Clear Think, Jump Flip, Bring Star, Smarter Power, Wise Enhance, Enter Digital, Framed Display, Digi Help, Rock Turner dan Infinet. Ia akan menginstalkan dirinya sebagai Add ons pada tiga peramban populer seperti Internet Explorer, Firefox dan Google Chrome. Selain itu ia juga akan berusaha menginstalkan dirinya sebagai local proxy, services dan driver.

Although in a number of infectious threats PUP / Adware defeat other threats such as Ransomware Trojans Internet Banking or SocialMalware, but the impact of the loss is usually not directly felt by the victims because it resulted in long-term losses that may not be realized by the victim, but in the level of losses in many cases not less great than the losses caused by the above three types of malware.
Meskipun secara per jumlah infeksi ancaman PUP / Adware mengalahkan ancaman lain seperti Ransomware, Trojan Internet Banking atau SocialMalware, namun dampak kerugiannya biasanya tidak langsung terasa oleh korbannya karena mengakibatkan kerugian jangka panjang yang kemungkinan tidak disadari oleh korbannya, namun secara tingkat kerugian dalam banyak kasus tidak kalah besar daripada kerugian yang diakibatkan oleh ketiga jenis malware di atas.

Typically, the primary targets are targeted by PUP / Adware is a benefit of the ads that appear. The trick is quite diverse, from displaying pop-up unwanted and annoying to change the results by featuring more advertisers benefit toolbar maker. In the long term, the loss on the transfer of information experienced by computer users could be higher than the savings of buying application security / antivirus that does not pair the toolbar.

Biasanya, target utama yang diincar oleh PUP / Adware adalah mendapatkan keuntungan dari iklan yang tampil. Caranya cukup beragam, dari menampilkan pop up yang tidak diinginkan dan menjengkelkan sampai dengan mengubah hasil pencarian dengan menampilkan lebih banyak pemasang iklan yang memberikan keuntungan pembuat toolbar. Dalam jangka panjang, kerugian atas pengalihan informasi yang yang dialami oleh pengguna komputer bisa lebih tinggi daripada penghematan membeli aplikasi sekuriti / antivirus yang tidak memasangkan toolbar.

Another danger is greater than the PUP / Adware This is a toolbar that redirect to malware infection, whether intentional in order to benefit financially from a user's computer toolbar or unintentional such as carelessness in the coding toolbar which resulted in another malicious program can control the user's system toolbar.
Bahaya lain yang lebih besar dari PUP / Adware ini adalah toolbar yang mengarahkan pada infeksi malware, baik disengaja demi mendapatkan keuntungan finansial dari komputer pengguna toolbar atau yang tidak disengaja seperti kecerobohan dalam coding toolbar yang mengakibatkan program jahat lain bisa menguasai sistem pengguna toolbar.

Unfortunately, the method PUP / Adware is actually used by some applications security as a business model to gain a large user base in order to obtain financial gain. The usual method is to provide a free security application and compensate these applications users are prompted to install the toolbar in their browsers. Some app makers go further, in addition to offering security applications, application developers offer other applications such as browsers / browser with claims the browser is better and faster, you can imagine, if you install the toolbar alone is categorized as hazardous because of the potential to change the results and redirect to sites that are less reliable, especially until you are using a browser that is issued by the company indicated techniques utilizing PUP / Adware, meaning that all data and internet activity you are in the hands of the manufacturer of the browser to be exploited.
Celakanya, metode PUP / Adware ini justru digunakan oleh beberapa aplikasi sekuriti sebagai model bisnis untuk mendapatkan basis pengguna yang besar guna mendapatkan keuntungan finansial. Metode yang biasa digunakan adalah dengan memberikan aplikasi sekuriti gratis dan kompensasi pengguna aplikasi tersebut diminta menginstal toolbar di perambannya. Beberapa pembuat aplikasi bergerak lebih jauh lagi, selain menawarkan aplikasi sekuriti, pembuat aplikasi menawarkan aplikasi lain seperti peramban / browser dengan klaim peramban tersebut lebih baik dan lebih cepat, anda bisa bayangkan, kalau menginstalkan toolbar saja sudah termasuk kategori berbahaya karena berpotensi mengubah hasil pencarian dan mengarahkan ke situs yang kurang terpercaya, apalagi sampai anda menggunakan peramban yang dikeluarkan oleh perusahaan yang terindikasi memanfaatkan teknik PUP / Adware, artinya semua data dan aktivitas internet anda berada di tangan perusahaan pembuat peramban tersebut untuk dieksploitasi.

Source : www.vaksin.com, December 17, 2015

Sabtu, 21 November 2015

Guides Break Down Sites Linked Terrorist Group Islamic State of Iraq and Syria (ISIS).


Anonymous hacker group released a guide to find and break down the websites linked terrorist group Islamic State of Iraq and Syria (ISIS).

Post-tragedy of shootings and bombings in the city of Paris, France, Anonymous does declare cyber war against ISIS. They invite people to participate in the campaign Operation Paris (OpParis) which aims to attack websites and social media belonging to terrorist groups.

In total there are three guidelines that they release into the canal Internet Relay Chat (IRC). First, the NoobGuide on how to hack, guide "Reporter" about how to create a Twitter bot that is useful to reveal the ISIS account, as well as guide "Searcher" on how to find sites related to ISIS.

Since last week, OpParis already succeeded in toppling more than 5,500 Twitter accounts associated with terrorist groups.

"Instead of just sitting on my hands (channel) chat or hang around doing nothing, you can get great things from different tools and guidance that we have given," wrote one member of the hacker group.

"Your contribution is very significant and we hope you will participate in all activities Op if possible, more is better," he added.

As reported KompasTekno of International Business Time, Thursday (11/19/2015), here's a guide to find sites that are associated with ISIS.

Video : "Anonymous Hacker Guide For Anyone To Help Take Down ISIS"

1. First, install Python application on your computer, unless you already have the program. Link Download : https://www.python.org/downloads/

2. Open Terminal or Command Prompt (Windows), and type in Python.

3. Then copy the content contained in this link or this link and paste it into the Command Prompt, and then press Enter.

Its contents are some search-related material as well as content owned ISIS terrorist group. The search materials can direct the search results to be more specific.

4. Then select a series of characters (it is advisable to use the "3") from the list. Examples can use 3 + 38 + 46.

5. After selecting, continue entering characters (without the quotes) "print (str3 + str38 + str42)" and copy the results to appear.

6. Paste the result in this link, and then analyzing the results in translation. It is advisable to take some Google Chrome features integrated translator.

7. Enter any valid address to the communication channel and we are going to do the next action.


Sabtu, 28 Maret 2015

Table of contents My PC Defender 2015 V - 7.0 Build March 23, 2015 Advanced Version.

  
The total size of the files My PC Defender 2014 V - 6.9 Build March 23, 2014 was 1 , 33 Gb , what are the contents of the DVD ISO file so that its size ? To find out what the contents of the DVD My PC Defender 2015 V - 7.0 Build March 23 , 2015 , please read the following descriptions :

Total ukuran file My PC Defender 2014 V-6.9 Build 23 Maret 2014 adalah 1, 33 Gb, apa saja isi file ISO DVD tersebut sehingga berukuran sedemikian besar ? Untuk mengetahui apa isi DVD My PC Defender 2015 V - 7.0 Build March 23, 2015, silahkan baca uraian berikut : 


  • Live CD Antivirus.
  1. Bootable Anti Virus: BitDefenderRescueCD_v2.0.0_5_10_2010, Build March 18, 2015, is a tool made by BitDefender LLC, www.bitdefender.com.

  • Antivirus Installer.
  1. Avira Free Antivirus 15.0.8.656, build on March 17, 2015, an anti-virus created by the Avira GmbH, http://www.avira.com/ , a free anti virus the best in the world, Source : http://www.av_comparatives.org. Has a very complete functions to eradicate all types of malware, with regular updating and setting the right us make sure your computer is protected from malware attacks.  
  2. Avast! Free Edition 2015.10.2.2214, build on March 2, 2015, an anti-virus created by the Avast Software,  www.avast.com , a free anti virus the best in the world, Source : http://www.av_comparatives.org  Has a very complete functions to eradicate all types of malware, with regular updating and setting the right us make sure your computer is protected from malware attacks. This product is very best  free antivirus with on-line protection  and scan from boot time option for best destroy other malware out of the operating system works.
  3. Smadav 9.10, released Pebruary 17, 2015, made Indonesia by Zainudin Nafarin, with the site: http://SMADAV.net , think we have the most comprehensive features, of all anti-virus that is either made within and outside the country, only a shortage of anti-virus is "only effective for local virus", and most of the virus abroad.
  4. HijackThis 2.0.4 was released on January 4, 2013, made by Trend Micro Inc. is the site: http://Trend Micro.Inc, www.trendmicro.com  , is a versatile tool to prevent the exercise of a program automatically when the computer is turned on, so with this tool you can cuting program hidden dangerous / not that you do not want active when your computer starts up.
  5. Stuxnet Remover 1.0.1.3, released on July 26, 2010, a specific anti-virus stuknet made by Greatis Software with http://www.greatis.com/  site address.
  6. Ulocker 1.92, released on May 19, 2013 is a tool created by Cedrick Collomb http://ccollomb.free.fr , useful to delete the file that you can not delete on your computer because it is locked by the system or process.

  • Portable Antivirus.
  1. Norman Malware Cleaner 2.8.8(2015.03.23), released on March 23, 2015, is a tool made by Norman ASA, http://www.norman.com/.  Norman Malware Cleaner is one of the new apps in the security software industry, promising to keep computers around the world away from malware and other dangerous files that could compromise user's safety.. 
  2. McAfee AVERT Stinger  12.1.0.1423  Portable, was released on on March 23, 2015, Website: http://www.mcafee.com/, is made by McAfee anti-virus, Inc. This application is designed to detect and remove a number of viruses easier than a traditional antivirus program and it doesn't require complex configurations.
  3. Anti Virus Portable Dr. Web Cure It 9.0, was build and release released on March 23, 2015,  Site http://www.freedrweb.com/ , anti-virus is made Dr. Web Ltd., In our opinion is the only anti virus that could "lock system" your computer to perform "duties" effectively, and thus will produce a maximum scan process./.
  4. Microsoft Malicious Software Remover 5.22 (Windows-KB890830-V5.22) portable, released on March 12, 2014, Website: http://www.microsoft.com/  is an anti malware created by Microsoft to help us wipe out malware that nest on our computer.
  5. Norton Power Eraser4.3.5.28 portable, released on March 19, 2015, is an anti malware that was developed by Symantec Corporation, Website: http://www.security.symantec.com/.
  6. RegRun Reanimator 7.71, was released on March 4, 2015, Website: http://www.greatis.com/, is made by Greatis Software. RegRun Reanimator is an application designed to add an extra layer of security to your computer, providing advanced tools to remove multiple malware files.
  7. SpyBHORemover 5.5.0, release on January 1, 2015 is a tool created by the SecurityXploded, official site http://securityxploded.com/. SpyBHORemover Portable is a handy and reliable application designed to scan and clean your system from harmful BHO items. BHO, short for Browser Helper Objects are Internet Explorer plugins designed to enhance functionality, but ar often used by spyware programs to track browsing habbits.
  8. SpyDLL Remover 6.5, released on  January  10, 2015, is a tool created by the SecurityXploded, official site http://securityxploded.com/. SpyDLLRemover is one of the apps that could add a new security layer to your computer, trying to detect spyware and hidden rootkits DLLs on your computer.
  9. Spybot - Search & Destroy Portable 2.4 portable, released July 11, 2014, is the anti virus made by Safer Networking Ltd. Ireland, with http://www.safer-networking.org/ site. useful to eliminate some types of malware, spyware, botnets, and so lainl that may nest in your computer.
  10. Rogue Killer portable 8.8.12, released on March 22, 2014, is an anti rogue tool (including one type of malware) that made by Tigzi the website http://www.sur-la-toile.com/
  11. Revealer Keylogger Free Edition 2.09, released on August 13, 2013, is a tool created by the Logixoft official site http://www.logixoft.com/Revealer Keylogger Free can record all the user’s keystrokes and saves them in logs that can be regularly deleted, thus saving space on the computer. Alternatively, one can backup these logs and analyze them at a later time, so as to check if their child’s PC activity has changed.
  12. F-Secure Black Light portable 2.2.1092.0, released on October 1, 2008, 06:56 UTC, is a tool rootkit rootkit eliminator or repellent powerful tool in your computer, made by http://www.f-secure.com.
  13. Ice Sword 1.22 portable, released in 2007, is a reliable tool malware hunters in your computer, made by http://jfpan2000@sina.com.
  14. F-Secure Easy Clean 2.0.18360.26, was released on September 5, 2012, 12:28 UTC, is a tool for detect and remove malware from an infected computer, made by http://www.f-secure.com.
  15. Spyware Blaster 5.0, released on March 2,  2013, is a repellent and deterrent spyware tool created by Javacool Software LLC, a http://www.javacoolsoftware.com/  site.
  16. GMER 2.1.19163 portable released on April 4, 2013, is a versatile tool to eradicate rotkit / malware and equipment configuration settings of Microsoft Windows operating system, created by: www.gmer.net.
  17. FreeFixer 1.04 portable, released on March 27, 2013, is a tool created by Roger Karlsson, from Kephyr institutions, with the Site: http://www.freefixer.com/ , useful for removing unknown malicious programs on your computer and potentially damaging such as adware, spyware, trojan, virus.
  18. BitDefender Flamer Removal (TrojanFlamer_BDRemovalToolDropper_x86) 2.0.3.4, released on May 30, 2012, is a tool made by BitDefender LLC, www.bitdefender.com.
  19. F-Secure Easy Clean 2.0.18360.26 :, was released on September 5, 2012, 12:28 UTC, made by http://www.f-secure.com.


  • My Health Care System
My Health Care System, is useful tool for maintaining the performance of your computer to keep it in the best circumstances.
  1. CCleaner 5. 03 Portable, released on Pebruary 19, 2015, is a tool created by http://www.piriform.com , which you can use to clean up unused files in the recycle bin, temporary files, registry, uninstalling the program, disable autostart a program at when the computer is booting, as well as several other functions.
  2. Avira Registry Cleaner 7.0.0.12 portable, released on September 17,  2010, a registry cleaning tool waste created by Avira GmbH, http://www.avira.com/ , to keep your computer performance.
  3. Virus Effect Remover 3.2.2.26 portable, released on December 10, 2011, is a versatile tool that serves to restore all the effects due to virus attacks on computer, manufactured by Secure Virus Lab, with the site: http://virussecurelab.com/
  4. Free Port Scanner 2.9.5, released on October 24, 2012, 07:41 UTC, is a portable tool created by Nsasoft LLC, the Site: http://www.innosetup.com, useful to check if your computer port connected to the internet or local network, it is very beneficial to your network administrator,  with know which ports are open you will be able to give permission to the port is open or you close it (if that port was open for trojan attacks, and the dialer).
  5. Re-Enable v 2.0.1 Portable, released on March 30, 2010, this tool created by Tangomouse,with the site: http://www.tangosoft.co.uk/.The app helps you repair or re-enable Windows tools such as Regedit, Cmd Console, Run, Folder Options, System Restore, Control Panel, Task Scheduler, Task Manager, Context Menu, My Computer, Search and MS-Config, most of them automatically disabled by viruses to block you from removing the infected files.That's the purpose of Re-Enable, a software solution that can help you solve some of the problems caused by malware, offering a very simple interface to guide you through the whole process.
  6. Xpy  1.38 Portable, released on  June 1, 2013 , is a tool created by John T. Haller official site http://portableapps.com/.  xpy Portable was created as a lightweight and open source tool that can be used to tweak your system. xpy Portable allows users to quickly disable services, delete files, or change behaviors and usability options. The program can also be used to tweak Internet Explorer, Windows Media Player and Windows Messenger.
  7. Find Hidden Version 0.6.7a portable, a search software files that are hidden / concealed virus was made by Alexei Torgashin OPX.BIT daro, with the site: http://atorg.net.ru, by email: http://www. opx.web.id 

  • Set up of My PC
Set up of My PC is a useful tool for monitoring system performance, technical specification and optimization of hardware and software for the computer is your best performance.
  1. Autoruns 13.02 portable, released on March 10, 2015, is a tool created by Microsoft SysInternals, http http://www.Sysinternal.com which you can use to view and monitor all the processes that load when your computer is booting, running processes, both natural and hidden (illegal process). With this tool you can investigate the processes that you suspect, disabled, or other steps that you can do about the process that you suspect.
  2. Process Explorer (ProcceXp 16.05) portable, released on March 10, 2015. Is a tool created by Microsoft SysInternals, http://www.Sysinternal.com  which you can use to monitor all the processes running, looking for suspicious processes to investigate anything suspicious in the process, and you decide to leave or shut down the process.
  3. BootSafe 2.0.1000 portable, released in 2007. is a tool created by http://SuperAdBlocker.com, which is useful to help you run a restart in the mode of "SafeMode", with different configurations to suit your needs.
  4. Windows Autorun Disable 1.0, released on  June 6, 2013, is a tool created by theSecurityXploded, official site http://securityxploded.com/. Portable Windows Autorun Disable is a handy utility that helps you prevent malware from infecting your system through the 'autorun' Windows feature. This way, USB storage devices and CD/DVD optical drives will no longer start to load content as soon as they are connected to the system.
  5. Re-Enable v 2.0.1 Portable, released on November 5, 2012, this tool created by Tangomouse, with the site: http://www.tangosoft.co.uk/.Re-Enable Portable is basically a simple utility that brings back a number of Windows tools, such as the Registry Editor, System Restore, Control Panel, Cmd console, Task Manager and more. Since it's designed to be portable, there's no setup kit, so the only we had to do during our test was to copy the actual executable file on an USB flash drive.
  6. Vispa v 1.3.5,  released on May 12, 2013 is a tool created by Jan T. Sott , http://vispa.whyeye.org/, useful to configure the operational settings of Windows Vista or Windows Seven  on your computer.
  7. Safe Xp 1.5.7.1.4 Portable, released in 2005, is a tool created by the site Theorica Software: http://www.theorica.net, useful to configure the operational settings of Windows XP on your computer.
  8. Speccy 1.28.709 portable, released on March 11, 2015, is a tool created by http://www.piriform.com,  which you can use to determine the specifications of your computer hardware and software in great detail.
  9. Soft Key Revealer 2.7  portable, released in May 27, 2014,  is a search tool serial number of your computer's operating system and all programs installed on your computer, made by Mustafa Budraf http://sites.google.com/site/cakirbey/softkeyrevealer Aktap with the site and address e-mail: cakirbey_soft@hotmail.com.

Selasa, 24 Maret 2015

Link Download My PC Defender 2015 V - 7.0 Build March 23, 2015



My PC Defender 2015 V - 7.0 Build March 23, 2015  
Code Name : PITHO
© 2007-2015, e-library mediasoft , My PC Defender 2015

OUR WORK IS OUR DEDICATION TO THE PROGRESS OF INFORMATION AND COMMUNICATION TECHNOLOGY IN INDONESIA AND THE WORLD,IT'S HELPFUL AND GOOD TO YOU ALL.

KARYA KAMI INI KAMI DEDIKASIKAN UNTUK KEMAJUAN DUNIA TEKNOLOGI INFORMASI DAN KOMUNIKASI DI INDONESIA DAN DUNIA, SEMOGA BERMANFAAT BAGI ANDA SEMUA.


My PC Defender 2015 is an interface that will help you to destroy penganggu programs ( malware ) , securing and controlling your computer if your computer is currently experiencing interference against viruses, worms , trojans , exploits , rootkits , and others . My PC Defender 2015 is useful to make your computer in order to stay in the best condition to support your performance .

My PC Defender 2015 adalah sebuah antarmuka yang akan membantu anda untuk menghancurkan berbagai program penganggu (malware), mengamankan dan mengendalikan komputer anda jika saat ini komputer anda mengalami gangguan serangan virus, worm, trojan, exploit, rootkit, dan lain-lain. My PC Defender 2015 bermanfaat untuk menjadikan komputer anda agar tetap dalam kondisi terbaik untuk menunjang kinerja anda.



Introduction
Program Name
 My PC Defender 2015 V - 7.0 Build March 23, 2015 Advanced Edition
Theme music
Crysis 2 Intro Video, Composer: Hans Zimmer
Author 
Yohanes  Gitoyo, e-library mediasoft
Build Date
March 23, 2015
Release date
March 24, 2015
e-mail 
e.library.mediasoft @ gmail.com
Official Blog
Facebook 
Yohanes  Gitoyo


My PC Defender New Features :
  1. New engine and new update software (update : March 23, 2015).
  2. Supported Operating Systems Microsoft Windows Xp, Vista, 7, 8.
  3. Supported Operating Systems 32 bit and 64-bit (available on My PC Defender 2015 Advanced Professional Version)
  4. Stealth system integration with SFX technology
  5. Destruction of malware from the computer boot process, with a Bootable Antivirus  (Live DVD) BitDefenderRescueCD_v2.0.0_5_10_2010, build March 18, 2015.
  6. 18 system optimization tool and the latest spyware and malware destroyer of new (update: March 23, 2015)
  7. Tool newest destroyer rootkit (which can not be destroyed by any anti-virus)
  8. Fixed Bug   
  9. Fixed bad link 
  10. Rebuild other object in the new pocked 
  11. Portable engine up to 90 % software include CD working in optimalize temporary file mode
  12. Program-based CD / DVD without installation process, be read only, so it is not possible in the block / in any type of malware infection.
  13. Destroy: viruses, worms, trojans, exploits, dialers, spyware, hijackers, adware, rogue.
  14. Program Microsoft Office 2007 substitute alternative (free) Libre Office 4.4
  15. Interface controls access to the Microsoft Windows operating system (without a wizard)
  16. Setting the computer as necessary to speed up computer performance
  17. Various alternatives best weapon destruction various types of viruses and malware
  18. Anti-virus with the ultimate portable crusher setting the highest
  19. Free for personal / home use / profit institution / business use.


Fitur Baru My PC Defender :
  1. Di dukung dengan mesin penghancur terbaru (update : 23 Maret 2015). 
  2. Supported Operating Systems Microsoft Windows Xp, Vista, 7, 8.
  3. Mendukung Sistem Operasi  64 bit (khusus My PC Defender 2015Versi Advanced Profesional)
  4. Penerapan teknologi stealth terintegrasi dengan teknologi  SFX
  5. 18 tool optimasi sistem dan penghancur spyware dan malware terbaru (update :  23 Maret 2015)
  6. Tool terbaru penghancur rootkit (yang tidak dapat dihancurkan oleh anti virus manapun)
  7. Perbaikan beberapa bug   
  8. Perbaikan beberapa bad link 
  9. Pembaharuan pemaketan beberapa obyek 
  10. Mesin Portabel hingga 90 % program di dalam  CD dan optimalisasi kinerja program dalam temporary file mode 
  11. Penghancuran malware dari proses boot komputer, dengan Antivirus Bootable Antivirus  (Live DVD) BitDefenderRescueCD_v2.0.0_5_10_2010,  build March 18, 2015.
  12. Program berbasis CD / DVD tanpa proses instalasi, jadi baca saja (read only), jadi tidak mungkin di blok / di setiap jenis infeksi malware.
  13. Hancurkan: virus, worm, trojan, eksploitasi, dialer, spyware, hijackers, adware, rogue .
  14. Program Microsoft Office 2007 pengganti alternatif (gratis) Libre Office 4.4
  15. Antarmuka mengontrol akses ke sistem operasi Microsoft Windows (tanpa wizard)
  16. Mengatur komputer yang diperlukan untuk mempercepat kinerja komputer
  17. Berbagai alternatif jenis penghancuran senjata terbaik berbagai virus dan malware
  18. Anti-virus dengan crusher portabel utama pengaturan tertinggi
  19. Gratis untuk penggunaan pribadi / rumah menggunakan / laba lembaga / bisnis


Link Download.
Advisable to use program to download Internet Download Manager.
Untuk mendownload disarankan memakai program Internet Download Manager.

File Name : my pc defender 2015 v7 adv.nrg , 
Total size : 1.803.547 KB (1,8 Gb)  

The total file size DVD My PC Defender 2015 V - 7.0 Build March 23, 2015 are 1.803.547 KB (1,8 Gb) , what are the contents of the DVD ISO file to its size? Please read the Readme file below for the entire contents of the software, release date and other details on the download link below:

Total ukuran file DVD My PC Defender 2014 V-6.9 Build 23 Maret 2014 adalah 1, 33 Gb, apa saja isi file ISO DVD tersebut sehingga berukuran sedemikian besar ? Silahkan baca file Readme berikut untuk mengetahui isi keseluruhan software, tanggal release dan keterangan lain di link download berikut : 


         
my pc defender 2015 v7 adv.part01.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/sebgb8g59sqwtjh/my+pc+defender+2015+v7+adv.part01.rar
                 
my pc defender 2015 v7 adv.part02.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/000zn30td1410n0/my_pc_defender_2015_v7_adv.part02.rar
                   
my pc defender 2015 v7 adv.part03.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/kxjp2b83gcm2ayt/my+pc+defender+2015+v7+adv.part03.rar

my pc defender 2015 v7 adv.part04.rar  
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/ed1d49ura12crzo/my_pc_defender_2015_v7_adv.part04.rar

my pc defender 2015 v7 adv.part05.rar  
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/tqs79ea599roy9s/my_pc_defender_2015_v7_adv.part05.rar

my pc defender 2015 v7 adv.part06.rar  
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/px14x8kulgww7py/my+pc+defender+2015+v7+adv.part06.rar

my pc defender 2015 v7 adv.part07.rar  
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/5etg9lk53i99izm/my_pc_defender_2015_v7_adv.part07.rar

my pc defender 2015 v7 adv.part08.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/izkwaoqva5lyz1z/my+pc+defender+2015+v7+adv.part08.rar

my pc defender 2015 v7 adv.part09.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/b1f4r4a933ztmpr/my+pc+defender+2015+v7+adv.part09.rar

my pc defender 2015 v7 adv.part10.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/7tiaiyda437lrm7/my+pc+defender+2015+v7+adv.part10.rar

my pc defender 2015 v7 adv.part11.rar
 Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/76ujp41fjipceu3/my+pc+defender+2015+v7+adv.part11.rar

my pc defender 2015 v7 adv.part12.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/i3t5uy69saexbnm/my_pc_defender_2015_v7_adv.part12.rar

my pc defender 2015 v7 adv.part13.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/ehju514jh69wikc/my+pc+defender+2015+v7+adv.part13.rar

my pc defender 2015 v7 adv.part14.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/1lrqh0kjz3s3hcd/my+pc+defender+2015+v7+adv.part14.rar

my pc defender 2015 v7 adv.part15.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/2bbn993ute73ag0/my+pc+defender+2015+v7+adv.part15.rar
  
my pc defender 2015 v7 adv.part16.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/e7jzse42vdm54m3/my_pc_defender_2015_v7_adv.part16.rar

my pc defender 2015 v7 adv.part17.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/4lbwco1mjdw0abz/my+pc+defender+2015+v7+adv.part17.rar

my pc defender 2015 v7 adv.part18.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/8byg9n2r1lc2bhq/my+pc+defender+2015+v7+adv.part18.rar

my pc defender 2015 v7 adv.part19.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/4cd3rcbn377p5i5/my+pc+defender+2015+v7+adv.part19.rar

my pc defender 2015 v7 adv.part20.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/yjg1f4ucanz6fz4/my+pc+defender+2015+v7+adv.part20.rar

my pc defender 2015 v7 adv.part21.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/ixmb1c7d2gm1nu7/my+pc+defender+2015+v7+adv.part21.rar

my pc defender 2015 v7 adv.part22.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/1czkfijya19k2kt/my+pc+defender+2015+v7+adv.part22.rar

my pc defender 2015 v7 adv.part23.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/ryepr2y6dieex5e/my+pc+defender+2015+v7+adv.part23.rar

my pc defender 2015 v7 adv.part24.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/121bfm383mqkeka/my+pc+defender+2015+v7+adv.part24.rar

my pc defender 2015 v7 adv.part25.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/qfntpdbvrqhslco/my+pc+defender+2015+v7+adv.part25.rar

my pc defender 2015 v7 adv.part26.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/6z8noeo68shlo27/my+pc+defender+2015+v7+adv.part26.rar

my pc defender 2015 v7 adv.part27.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/9seeq5537g75o37/my+pc+defender+2015+v7+adv.part27.rar

my pc defender 2015 v7 adv.part28.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/71s136vc66bsigl/my+pc+defender+2015+v7+adv.part28.rar
     
my pc defender 2015 v7 adv.part29.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/2jptp5eeae0w2u5/my+pc+defender+2015+v7+adv.part29.rar

my pc defender 2015 v7 adv.part30.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/s28375p5sf6nkhj/my+pc+defender+2015+v7+adv.part30.rar

my pc defender 2015 v7 adv.part31.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/9v503azb0r6gg3b/my+pc+defender+2015+v7+adv.part31.rar

my pc defender 2015 v7 adv.part32.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/de7bh81b1prd7cn/my+pc+defender+2015+v7+adv.part32.rar
        
my pc defender 2015 v7 adv.part33.rar  
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/api7yp8s28m4maz/my+pc+defender+2015+v7+adv.part33.rar

my pc defender 2015 v7 adv.part34.rar
Size : 51.200 KB
Link Download :
http://www.mediafire.com/download/jo0x7b5kf8bdqa0/my+pc+defender+2015+v7+adv.part34.rar

my pc defender 2015 v7 adv.part35.rar
Size : 43.514 KB
Link Download :
http://www.mediafire.com/download/qasxc6g16ze1a6l/my_pc_defender_2015_v7_adv.part35.rar

Senin, 23 Maret 2015

Introduction : My PC Defender 2015 V - 7.0 Build March 23, 2015, Code Name : PITHO.

My PC Defender 2015 V - 7.0 , from Indonesia , for Indonesia and the world.

My PC Defender 2015 is an interface that helps you to destroy all mallicious software ( malware ), securing and controlling your computer if your computer is currently experiencing interference against viruses, worms , trojans , exploits , rootkits , and others .

My PC Defender 2015, adalah sebuah antarmuka yang membantu anda untuk menghancurkan berbagai aneka program penganggu (malware), mengamankan dan mengendalikan komputer anda jika saat ini komputer anda mengalami gangguan serangan virus, worm, trojan, exploit, rootkit, dan lain-lain.

My PC Defender 2015 is " computer security guard equipment and destroyer of all kinds of programs bully ( mallicoius malware software = ) " which may be nested and interfere with the performance of your computer . My PC Defender 2015 is a sophisticated combat equipment and integrated working with stealth technology and working in the temporary system , so that all work activities equipment in My PC Defender 2015 , could not be bothered and inhibited by malware in your computer . You can use My PC Defender 2015 to destroy malware , setting up and optimize your computer 's performance .

My PC Defender 2015, merupakan “peralatan penjaga keamanan komputer dan penghancur segala jenis program pengganggu (mallicoius software = malware) ”  yang mungkin bersarang dan mengganggu kinerja komputer anda.  My PC Defender 2015 adalah peralatan tempur yang canggih dan terintegrasi yang bekerja dengan teknologi stealth dan bekerja dalam temporary system, sehingga segala aktifitas kerja peralatan dalam My PC Defender 2015, tidak bisa diganggu dan dihambat oleh malware dikomputer anda. Anda dapat menggunakan My PC Defender 2015 untuk menghancurkan malware,  mensetting dan mengoptimalkan kinerja komputer anda.  


In this version of My PC Defender 2015 can be used and works well on the operating system Microsoft Windows XP , Vista , 7 and 8 .

Pada versi ini My PC Defender 2015 dapat digunakan dan bekerja dengan baik pada sistem operasi Microsoft Windows Xp, Vista, 7 dan 8.  


My PC Defender 2015 , presented in two languages ​​, namely English and Indonesian , it is because we created My PC Defender 2015 is indeed our special dedicated to the development of information technology in our country Indonesia , and also can be used by those who live outside Indonesia.

My PC Defender 2015, tersaji dalam 2 bahasa yaitu bahasa inggris dan bahasa Indonesia, hal ini karena kami menciptakan My PC Defender 2015 ini memang khusus kami dedikasikan untuk perkembangan teknologi informasi di negara kami Indonesia dan juga bisa digunakan oleh anda yang tinggal di luar Indonesia.


Our program My PC Defender 2015 is the full version , or we call as My PC Defender 2015 Advanced , which is equipped with a Live CD based boot feature the best antivirus in the world today : BitDefender , the latest release , March 18 , 2015. So with all the anti virus , anti- spyware , anti- keylogger , anti- rootkit , anti- exploit , anti hijacker and various other types of malicious malware , it is worth if we have our program dubbed as My PC Defender 2015 , Main Battle Suite for PC Shield and Protection .
Program kami My PC Defender 2015 ini merupakan versi full, atau biasa kami sebut sebagai My PC Defender 2015 Advanced, dimana dilengkapi dengan fitur booting Live CD berbasis Antivirus terbaik didunia saat ini : BitDefender, release terbaru, 18 Maret 2015. Sehingga dengan semua perangkat anti virus, anti spyware, anti keylogger, anti rootkit, anti exploit, anti hijacker dan berbagai jenis malware berbahaya lain, layaklah kalau program kami ini kami juluki sebagai My PC Defender 2015, Main Battle Suite for PC Shield and Protection.

Perhaps you feel confused when you are done burning CD / DVD of this, because you do not see the components of anti virus / malware of any kind. But do not worry insert this CD into the CD / DVD ROM drive and you will see the completion of new weaponry and the hidden power of the My PC Defender is. CD / DVD, we claim free from viruses, spyware, other malware types because we are very experienced in handling various kinds of malware on the computer, including CD / DVD of this.

Mungkin anda merasa bingung saat anda selesai memburning CD/ DVD ini, karena anda tidak melihat komponen anti virus/ malware apapun. Namun jangan kuatir masukkan CD ini ke CD/ DVD ROM komputer anda dan anda baru akan menyaksikan kelengkapan persenjataan dan kekuatan tersembunyi dari My PC Defender ini.  CD/ DVD ini kami klaim bebas virus, spyware, jenis malware lain karena kami sangat berpengalaman dalam penanganan berbagai macam malware di komputer, termasuk di CD/ DVD ini.


Do not worry with all the existing features My PC Defender 2015 program you can download and use for free , for personal non-business use.
Jangan kuatir dengan segala fitur yang ada program My PC Defender 2015 dapat anda download dan gunakan secara gratis, untuk pengunaan pribadi non bisnis.

For those of you who are interested in using our program My PC Defender 2015 , a download link will be given followed. This tool may be useful to make your computer to keep the best condition to support your performance.

Bagi anda yang berminat akan menggunakan program kami My PC Defender 2015, link download akan kami berikan menyusul. Semoga tool ini bermanfaat untuk menjadikan komputer anda agar tetap dalam kondisi terbaik untuk menunjang kinerja anda.

Senin, 15 Desember 2014

5 Steps to Getting rid of Malware "Drunk Girls" That Has staining your Facebook Account!


Malicious programs (malware) "drunk girl" has been circulating on Facebook since the beginning of last December 2014. This malware shaped trapping video with image preview video showing a woman in a drunken with vulgar poses.


Falsifying youtube

If the victim clicks on the Facebook wall posts Girls Drunk and happen to use the Google Chrome browser, it will then be redirected to a phishing site http://atasberita.info/gadis (according to watchlist Vaksincom, at the time of this article the manufacture of this site is no longer active). The phishing site will provide tmapilan are very similar to Youtube , but if pengaksesnya carefully and look at the website address then it is obvious that the site is accessible not YouTube but atasberita.info/gadis.

Do not forget the video look quite tempting because the vulgar given a message you need to have the plugin installed to watch this video. Click here to install the plugin. 


According to the observations of network security company, Vaksincom, this malware seen already circulating on social media sites such since last December 3, 2014. Until now, Vaksincom suspect there are already more than 2,000 infected user account malicious programs.

One key to the success of this malware, according to Alfons Tanujaya, Vaksincom analyst, is the cleverness to avoid using a Facebook app that security teams are powerless to act malware removal. The cyber criminals, according to Alfons observations, using a technique that utilizes the Google Chrome extension.

Drunk girls in addition to post on your account will conduct a tag on your Facebook contacts repeatedly

If the victim to click on a video or message the plugin, it will appear confirming the installation of Google Chrome Extension (for the record instead of a plugin / codec but a Google Chrome Extension) with name Top News.

Top Extension News-installed if the user wants to see the videos Drunk Girl

In order for an unsuspecting victim installs malicious extension, after successfully installs Chrome Extension, this malware authors cleverly displays You Tube video Ԅrunk Girls Video Compilation 2013Ԡbagi victims of Youtube

Youtube videos displayed after installation evil Chrome Extension

If the victim had seen the video, most likely thought that the video was promised and the unsuspecting. Whereas in the computer has been lodged malware (in the form of Google Chtomer Extension) which will routinely conduct regular post Drunk girl from his Facebook account and in addition he will also perform tag on friends Facebook account concerned. Malware disguised as the extension will create a Facebook account victims do auto-posting malware "drunk girl" on the Facebook wall . 

For the record, YouTube videos are shown actually does not require a plugin or Chrome Extension and by visiting the site directly Youtube videos will be seen.


Drunk Girl expel Malware from Your Computer

After reading the above article, you must already know that the culprit of all this is a Chrome Extension evil and to prevent automated posts the only way is to remove this Chrome Extension. Changing passwords Facebook or delete suspicious apps on Facebook will have no effect because the cause is not two things. 

If already be a victim, Vaksincom advised to perform these steps to remove Chrome Extension evil: 

  • Go to the Google Chrome browser.
  • Access Chrome Extension by typing: chrome: // extensions.

  • Search Top News Extensions by name or other extensions are suspicious. Currently, in addition to other extensions Top News obtained by Malware Laboratory Vaksincom use IDM Integration Module name. If you see the name of the first laind extension beyond the name, Vaksincom would be grateful if you helped inform the Security Clinic Vaksincom https://www.facebook.com/groups/880787835284533/ to help other Facebook users in Indonesia who are victims of this malware.
  • Click the image on the right bins and click the Delete button on the box Confirm Deletion to delete this malicious extension.
  • Shut down and restart your Google Chrome. In order to maintain the possibility of unwanted, Vaksincom recommend you change your password and activate your Facebook account TFA Two Factor Authentication on all your important Kaun as primary email account, Facebook and Google in order to prevent theft and misuse of your account.
  • After running the above steps, Vaksincom suggested for victims to immediately change the password Facebook account.


Composer: John Gitoyo, S Pd.
Source:
  1. http://vaksin.com/
  2. http://tekno.kompas.com/

Selasa, 18 November 2014

Top Malware in Indonesia October 2014


Towards the close of 2014, the spread of malware in Indonesia is still dominated by four large microbots like an overwhelming number of computer users threaten Indonesia. 

In addition to four of the Trojans, Adware, Exploit and Worm. Specifically in the category of Adware, recorded six dominant adware which controls more than 75% of adware infections, reminiscent of Baymax and 5 other Marvel hero who joined the Big Hero 6. 

In October 2014, there were a malware infection that is quite dominant and could even beat Exploit and Worm. Malware is Sality which alone beat Worm and Exploit. 

For details of malware that infects Indonesia in October 2014 can be found in the description and figure 1 below:

Figure 1, Malware Statistics Indonesia, 2014


Trojan 42,5 %

Trojans managed to control nearly 50% of malware infections in Indonesia in October 2014 and this action led by Trojan.Crypt.HO and JS.Runner.BH are responsible for 44% and 32% of the total Trojan infection. While ranked 3-5 were occupied by Trojan Autorun (2.7%), dropper (3.66%) and Trojan.LNK (8.02%) were responsible for much of spreading malware Shortcut in Indonesia.

For information, Trojan.Crypt.HO are brothers and both this malware Sality support each other. The high spread of Trojan.Crypt.HO will directly lead to high deployment Sality. This is evident from the statistics malware months in October 2014 where malware Sality successfully ranked third beat Exploit and Worm.

While JS.Runner.BH is a dangerous trojan which focuses himself to steal secret data is a victim computer. JS.Runner.BH infection usually occurs from bundling with programs on crack and torrent. JS.Runner also will download other malware and activate it, but that he would open security of computer operating system in the infection. In many cases, the infected programs JS.Runner will experience performance degradation becomes very slow due to malware is spending too much computer resources. The bad news, JS.Runner.BH hard to kill, because it modifies the registry and disguised as a legitimate Windows file system. Whenever in the clear, he will come back and back again. For a complete dafatr detected Trojan can be seen in Table 1 below.

Table 1, which infects the Top Trojan Indonesia in October 2014


Adware 24,7 %

If the Trojans dominated by two types Crypt and JS.Runner which controls 76% of the total Trojan infection, then Adware have a spread more evenly. Like a Big Hero 6, it took 6 names to dominate 74% of adware adware infection in October 2014. The six names are BrowseFox (34.81%), which controls 12.04% Adware.Graftor, Swiftbrowse (9.06%) , Search Protect, Browsefox.H and Relevant Knowledge.

Browsefox began detected carry out the action in mid-2014 and included into the PUP (Potentially Unwanted Programs) aka actual unwanted programs and in a way that sometimes tricky installs itself on the victim computer along with other popular programs are usually free from Brothersoft, Softonic and Cnet (download .com). In many cases PUP actually made by the authorized software company but has a low concern for the security and convenience of computer users and is only concerned with corporate profits above all else.

Adware.Graftor as Browsefox also installed along with other freeware and in many cases berbentul Add On a browser or additional toolbar to the browser. Please be careful to add a new toolbar or add on your browser in order to avoid the Adware infections. For a complete list Adware infecting Indonesia in October 2014 can be seen in Table 2 below.

Tabel 2, Top 10 Adware Indonesia Oktober 2014

After adware, Win32 / Sality is the only single malware capable ranks third with infection as much as 9.1% as most malware stopped by G Data. If successful menginfekis your system, Sality will run payloadnya spamming action to harvest email addresses from Outlook and Internet Explorer cached. He has the ability to penetrate the Windows Firewall protection and avoid blocking antispam company in carrying out the action.


Exploit 6,7 %

Just like the previous period, the exploitation of the most widely exploited CVE-2010-2568 is (81.30%) and CVE-2011-0979 (see table 3 below:

Table 3, the most widely Exploit stopped by G Data with anti Exploit

Security loopholes are imperfections or errors in programming (bugs) in all man-made software such as Microsoft Windows, Linux, MS Office, Adobe Acrobat, Java, Browse (IE, Chrome, Firefox etc), OpenSSL, Squid, and so on are usually unconscious / unintentional. This bug can cause system instability, crashes or system can be accessed / controlled by other people who are not eligible. Security loopholes always found every day and there is no way to avoid the threat of exploitation of this vulnerability in addition to the patch (patch) as you do every day to update the software. Security holes are cross platform and not just one particular operating system monopoly. In fact, in the case of popular applications such as Acrobat Reader or Java are very popular and used a variety of operating systems enable the exploitation of a cross on the operating system on which the application containing the security loopholes in installed. Therefore, it is very important to have adequate protection against exploitation of security holes in your system to always do a software update to get the latest on vulnerability patches. If possible and you have the funds, make sure you have an antivirus program has protection against exploits a security hole in order to maximize the protection of your system. Active protection against this exploit is very important because the system contains vulnerabilities that have not been patched (patch) will be infected by malware that exploits a security hole EVEN proficiency level the system is protected with updated antivirus program. So exploit security holes can bypass the protection afforded by antivirus programs. 

The two exploits vulnerabilities that most Anti Exploit stopped Gdata with this is:
  1. CVE-2010-2568 is a real security hole LNK.Shorcut more than 4 years old but is still included in the most security holes in exploitation (81.30%), security hole is a favorite because it can be exploited to control a lot of OS Microsoft Windows workstations and servers well as Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, Windows 7 that allows the attacker to control the victim's computer with .LNK file or shortcut PIF files that have been prepared in advance . This security hole is also diekslpoitasi by Stuxnet via CVE-2010-2772 on Siemens WinCC SCADA system.
  2. CVE-2011-0979 adalah celah keamanan pada Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, Office 2004, 2010, 2008 in 2011 for Mac, Open XML File Format Converter for Mac in Excel Viewer SP2. Celah keamanan united memungkinkan penyerang menjalankan program komputer yang lain guna menguasai memiliki celah keamanan united. Pada bulan October 2014, celah keamanan united menempati Nomor 2 said Bawah .LNK Shortcut draining tingkat eksploitasi sebanyak 17,89%



Worm

What is the difference worm with a virus? Definitively, worms and viruses are greeting both belong to the class of malware. But if the virus to spread itself usually requires the help of a third party, because it usually he would disguise himself as folders, JPEG files, MS Office and other files of interest. Worm has different skills that he does not need the help of a third party to infect your computer and automatically be able to infect all the computers in the network. The condition is that the infected computer has a vulnerability (vulnerability) that would exploit to run itself automatically. 2 worm most bnayak stopped by G Data is downadup (69.7%) and LNK.Runner (18.08). Downadup is long malware malware that could be number 1 in Indonesia for months. This malware has another name that may be you know, Conficker. Conficker has the ability to infect computers in the network, especially those that have the MS08-067 security holes found in Windows 2000, XP, Vista, Server 2003 and Server 2008. For those of you who want to avoid the action of Conficker, please do patching security holes mentioned above. Besides Conficker and LNK.Runner that exploit security holes shortcut, Vaksincom noted VBS malware action Dunihi, Beagle, Nimda and Palevo as in Table 4 below.

Table 4, Worm most widely discontinued in October 2014

In addition to malware-malware mentioned above, recorded zusy, Buzy, Virtob, Autorun and Trojan dropper that dominate the spread of malware in Indonesia in October 2014. The full list of malware that infects Indonesian statistics and stopped by G Data Antivirus Enterprise can be viewed at Table 5 below.

Table 5, Malware Top Indonesia Oktober 2014

Author: Alfons Tanujaya
Sumber : http://vaksin.com/, 10 November 2014.