How To Check Your Websiite Security
10:27 AM | Author: IT Blog
At the time you / your institution is to take a decision (presense) reputation on the Internet then you will also specify the image by you on the Internet. Of course, concepts of public relations (PR), known in the old world old-economy also apply in the cyber world, the difference in the world's cyber infrastructure is able to interact for two (2) direction to make things become more interesting. Of course, the ability of infrastructure interaction two (2) direction is only useful if we want to interact with many people on the internet, speed & ability to respond to our mayarakat who eventually became an important part in the various aspects of social relationships in humans.

Aspects that are not less important is the ability of our defense against the attack site cracker want to disrupt the site. Imagine if the information on the site was changed by the hacker/cracker malunya how the site has a more shameful is owner of the site because of its effects to be very bad. Imagine if the site is the site of a bank or store will be very difficult for us to reach the public so that it will spread to many as there will be no trade transactions. How can we believe that these transactions do not akan intip in by other people? What can we believe that the credit card number will not be on the steal?

One of the most simple way is to ask the help of colleagues expert in the field of network security to help secure the Internet sites that we have. There are several services on the Internet that can provide services for mencheck and secure the site that we have. Examples are secure-me.net is the Internet service that can secure the minimum or if the settings that we use the Internet quite well & not perforated by cracker. Example of this service is http://www.secure-me.net/.



Secure-Me (http://www.secure-me.net) is a service on the Internet that some may get in free to see if the network system that we have enough safe & does not have holes that are open. Indeed, the scanning complex is not provided free of charge. Appear in the image is http://www.secure-me.net we do at the time of registration to request help for the system we have in the scan.

Secure-Me is not just a normal scan. After initial scanning, Secure-Me akan evaluate results and to detect the various weaknesses in the system. Because of their experience in conducting various scanning system, the secure-every week like me does not want to have to try many new things. Appear in the image on the queue are also many machines that mengantri for the scan. Indeed, for the basic scan only take 3-4 minutes for each machine. For a complete scan required approximately 30-60 minutes.

Is your system secure enough? Statistics obtained from colleagues in the secure-me from the moment they start scanning in the July and run more than 32,000 scans only 3% of the machine that is getting a good score. 97% of the engine on the Internet that they have a scan that one or more weaknesses. Including the services have a network that does not need to, the name public, guest accounts, protection configuration, the printer is open to all people and so on. Clearly you need to ask yourself again whether you truly secure?

More mad again Secure-Me have facilities to keep the system setup network/computer in a way that we can only ask if the Secure-Me service to run the scan repeated continuously to maintain the alert in case there are people who change the system setup that we use .

Another way that can also be located is friends with the hackers have in the group have some colleagues from hackers and their age average is still very young. Some of them include topnotch Wenas like that in Singapore adili in court because the break site in Singapore at the age of 15 years. They were not even in the hit-age that is still very young in fact have a remarkable ability outside their ability to much older veterans & on the Internet.

In fact, if only we can adequately interact with colleagues hackers is the fact that they are good also. Like usual there are a kind of bond between friends, this is a flock kesetia interesting if we enter the field of Internet security network. Often we would in bantu by friends who are informal help secure the Internet in Indonesia.
To run the application-application below:
Open command prompt and type the program's name (example: cleanmgr.exe) or click Start -> Run and type the program's name (example: cleanmgr.exe).
1. Disk Cleanup = cleanmgr.exe
Used for disk cleanup

2. Character Map = charmap.exe
Is used to find characters that are not public

3. Dr Watson = drwtsn32.exe
Used for troubleshooting on the PC.

4. DirectX diagnosis = dxdiag.exe
Used for diagnosis audio your video card

5. Private character editor = eudcedit.exe
Used to create a new character in your windows

6. IExpress Wizard iexpress.exe = Used to create self-extracting / self-installing package. such as Zip files

7. Microsoft Synchronization Manager = mobsync.exe Used to create sincronisasi.

8. Clipboard Viewer = clipbrd.exe
Used to view the content of the Windows clipboard

9. Windows Media Player 5.1 = mplay32.exe
Used to open Windows Media Player version 5.1

10. ODBC Data Source Administrator = odbcad32.exe
Used for database

11. Object Packager = packager.exe
Used to insert the object into the file.

12. System Configuration Editor = sysedit.exe
Used to change the system.ini and win.ini

13. Syskey = syskey.exe
Used to configure the account in windows.

14. Microsoft Telnet Client = telnet.exe
Used to connect the internet before the browser.

15. Driver Verifier Manager = verifier.exe
Used for monitoring the driver in your windows

16. Windows for Workgroups Chat = winchat.exe
Used to chat sec

17. System configuration = msconfig.exe
Used to control the startup program

18. System Monitor = perfmon.exe
Used to monitor your PC.

19. Program Manager = progman.exe
It is a heritage from the Windows 3.x desktop shell

20. gpedit.msc
Used to set the group policy and the authorization, if you use Active Directory.

21. Remote Access phone book = rasphone.exe
It is applications such as phone book

22. Registry Editor = regedt32.exe [also regedit.exe]
Used for editing and tweaking the windows registry

23. Network shared folder wizard = shrpubw.exe
Used to create shared folders in network

24. File siganture verification tool = sigverif.exe
Used for signature verification

25. Volume Control = sndvol32.exe
Used to display the sound control in the System Tray
Tricks About Windows OS
6:49 AM | Author: IT Blog
Speed up loading windows
Disable windows logo start early
• Open Windows Explorer
• "tools | folder options | view" Remove Attribute "Read-only"
• confirm "ok"
• Double click msdos.sys open the file with the "text editor"
• Add part in the
• "option" with the "logo = 0" when using the write window 95 "logo = off"
• Save the file
• Aktive back with the attribute "read-only"


Stop the search floppy disk drive
• Right-click on the "My Computer | Properties | Performance | File System"
• Select the tab "Floopy Disk"
• Deaktivasition option "Search for new floppy disk drives each time your computer start"
• confirm "ok"
• Turn off the automatic Scandisk
• Start menu | run
• Type "msconfig"
• Open the "Configuration Utility system" with the Enter
• Tab "General" click "Advanced"
• Enable the "Disable Scandisk after bad shutdown"
• Confirm "ok"
• Restart back
• Mode "Hibernation"

Turn off the Windows Sound events
• Control Panel>> "Sound your Multimedia"
• Select the Sound tab
• In the Scheme select
• "No Sound" by selecting items
• in the event in the sound and pull down to choose "none"
• confirm "ok"
• Determining the size of the swap file
• Right click "My Computer"
• Properties
• Tab "Performance"
• Click on "Virtual Memory"
• Enable the option "Use personalized settings for virtual memory"
• specified under "Minimum and Maximum" a value of at least 200 MB
• Ok
• Yes
• Restart

Startup program does not start automatically
Start | Run
Type "msconfig" in the tab "Startup" enable non-program that does not need to confirm Ok
Restart

Reboot without load bios Press shift key when restarting the Virtual Memory Add the file config.sys device = C: WindowsCommandRamDrive.Sys
1024 512
in the Autoexec.bat and set Temp = F: if the ram is in the drive F: Commands for a long

Keyboard buffer can only handle a maximum of 127 characters, but sometimes we give
command that is longer than that, the solution is added to the config.sys: shell = c: windowscommand.com / u: 255 / p, so grow the buffer into maximum 255

Instant Shut Down or Restart win98

With 1 click you can restart and shutdown

1. Right-click the desktop and select new> shortcut

2. in the command box type c: \ windows \ rundll.exe user.exe, ExitWindows (for Shutdown)

3. c: \ windows \ rundll.exe user.exe, ExitWindowsExec
(for Shutdown

4. Press Next, give a name the shortcut and click finish.