Kamis, 27 Oktober 2011

Germany Makes Malware 'Soldier' Scouts

Not only hackers that take advantage of malware, government agencies also use it. As the German government is using it for the needs of surveillance (surveillance). Allegations of the use of malware as a 'soldier' ​​in the world of cyberspace surveillance by the German government came in a report released last October 8 by the European hacker group, Chaos Computer Club (CCC). Bundestrojaner malware known as Trojan becomes the tool or the Federal German Police work in carrying out their duties primarily related to reconnaissance duties. Bundestrojan somewhat different from the trojan is also used by other countries, namely Egypt, which uses trojans FinFisher, and France are using spyware. Different from the case in France and Egypt, Malware Bundestrojaner (DLL and its driver system) actually published by the CCC, and demanded the German Government to discontinue the use of malware spying on people because of the constitutional court has imposed the ban since February 27, 2008. Researchers at cyber security firm ESET, identify the malware as Win32/R2D2.A. The Trojan displays a tapper and able to take screenshots and record sounds, this capability could potentially widen further than Wiretapping functions allowed by the court. Some applications that will be affected and subject to spying, among others, Skype, MSN Messenger, Yahoo Messenger, and X-Lite - a VoIP application. Furthermore, the malware also creates a backdoor on the infected computer, so the trojan can send all information available to the controller computer. Another is the ability to download other malware that can be run in the system. This is not much different from the usual backdoor trojan that we encounter everyday. Yudhi Strong, Technical Consultant of ESET Prosperita Indonesia argues, from where the malware originated in the context of detection, not too important to be known. Because, if the malicious code contained in it, then there is no reason for antimalware to not detect it. "The main strength of behavior analysis methods and heuristics are used ESET principle is anyone sending software, and for whatever its consumer, if found any malicious code in it, it will be detected," he explained through information received detikINET, Thursday (27/10/2011) . Responding to this, David Harley, researcher of malware intelligence at ESET mentions in some cases, action to plant spy software on the computer a person who is suspected should be done with the consent of the government. "But in many countries this still is not allowed, except in special situations, eg for the investigation of crime or the need for national security," he said. In conclusion, this problem still save a lot of questions and could be a double-edged sword. For the government, how it can support the performance of law enforcement and security. But on the other side will catch all the antivirus software with a charge of malicious code.
READ MORE - Germany Makes Malware 'Soldier' Scouts

Selasa, 25 Oktober 2011

8 Shocking Facts on Steve Jobs Biography

Biography of Steve Jobs, who began to be marketed in several countries reveal surprising facts. This book is based on interviews Walter Isaacson, the author, with Jobs and the people nearby. Steve Jobs biography preliminary review indicates this book is very interesting. Jobs biography said to be a rich portrait of one person with the best minds of his day. Here are some startling facts about Steve Jobs in the biography, as quoted detikINET from the Huffington Post, Tuesday (10/25/2011): 

1. Where did the name Apple originate? Executek, Matrix, to Personal Computers Inc. is the names that had considered Steve Jobs and Steve Wozniak for technology companies that will they founded. Jobs express the name Apple after returning from an apple farm and eventually the name was used. "This name sounds fun, vibrant and not intimidating," said Jobs. 

2. Bill Clinton asked for advice Jobs Monica Lewinski scandal Bill Clinton's scandalous affair with Monica Lewinski had horrendous United States in the decade of the 1990s. Clinton's confusion turns Jobs had asked for advice. "I do not know you had an affair, but if it is true, you must tell the (citizens) of this country," advises Jobs in Clinton that the U.S. president at that time. 

3. Why Jobs is almost always wearing a black sweater? Jobs identical appearance with a black sweater. It started when Jobs visited the Sony factory in Japan and meet employees there in uniform. He loved it and had thought that Apple employees were in uniform. Although it was not so accomplished, Jobs decided to create a unique outfit for yourself. Be he always wore a black sweater, designed by Japanese designer Issey Miyake named. 

4. Jobs disillusioned with Barack Obama Jobs is a supporter of President Barack Obama. But he was disappointed with some of Obama's policies and at the time the two met, Jobs are expecting Obama will only be served during the first period alone. Jobs argued the government should be more friendly to business circles and reforming education. 

5. Jobs initially refusing cancer surgery Jobs at first refused a cancer operation that could potentially save his life. Jobs apparently did not like her diutak tweaking. "He was not prepared to 'open' body," said Jobs's wife, Laurene Powell. 

6. Jobs had rejected the idea of ​​an application for Apple devices Application services including Apple's key success factors. But who would have thought at first Jobs does not like the idea of ​​a third party may make application for Apple devices due to various reasons such as the possibility of virus attacks. But finally, Jobs was convinced to allow the application on the Apple device. 

7. Jobs felt depressed during the launch of the first generation iPad Critics had lunged at the launch of the Apple iPad though ultimately successful gadget is hard. These devices lack features considered. "'I seem to get depressed today," Jobs said in Isaacson, night after Jobs introduced the iPad. 

8. Jobs wrath on Google "I'll spend my last breath if necessary and I would spend all the money Apple of USD 40 billion in the bank, to correct this error. I will destroy the Android because it is a stolen product," said Jobs on Android. He did not accept Google's stealing ideas iPhone on Android....
READ MORE - 8 Shocking Facts on Steve Jobs Biography

Senin, 24 Oktober 2011

Tips Avoid Buying Fake iPhone 4S

The launch of the iPhone 4S trigger counterfeit sales at stores online. Not much different physical inversely with the price is priced much cheaper. Of course with sloping price there are many things sacrificed including specifications, quality and durability of the goods. Well to avoid being stuck buying counterfeit goods, the following tips you can do as quoted detikINET from Cnet, Friday (07/10/2011). 

  1.  Know your price. If the price is priced too low, the articles are questionable. So, when resellers offer high discounts. 
  2. Observe the specifications. Although the physical of counterfeit resemble the original, but often it has different specifications. Either that it adds new features or even reducing features that should exist in the original goods. 
  3. Returns policy. Resellers who have trusted returns policy for consumer satisfaction. Beware if the number of resellers do not offer it. 
  4. Warranty. All the company's smartphones offer a warranty that covers products, accessories and software. Counterfeit resellers do not offer the same thing. 
  5. Facebook and Twitter accounts. Many resellers who use social media to promote the account. There is no harm in checking their accounts and comments provided consumers in the account. Find out about how long they have that account to measure reputation.
READ MORE - Tips Avoid Buying Fake iPhone 4S