loading...
berbagi-itu-indah-dan-menyenangkan

19 April, 2012

Not so snap happy


Not so snap happy: Android Instagram users hit by virus-infected fake app which secretly runs up enormous bills

If you've downloaded the hit app Instagram for Android, you could be in for a huge mobile phone bill.

A 'clone' site offers an infected version of the Android app which sends SMS messages to premium services, running up enormous bills.

The app has millions of users around the world, and was recently acquired by Facebook for $1 billion.

Rather surreally, the app is also filled with pictures of a Russian 'mystery man' - apparently a cult joke on Russian websites, from a photo showing a casually dressed man at a Russian wedding.


Android users are at risk if they downloaded the app from sites other than the official Google Play market.


More...
Birds, bees and Claude Monet: How the famed artist could see in ultraviolet just like some animals


The malicious software was picked up by anti-virus company Sophos.

'Cybercriminals have created fake versions of the Instagram Android app, designed to earn money from unsuspecting users,' says Graham Cluley, senior technology consultant at Sophos.

'Cybercriminals have played on the popularity of the Instagram app - which
If Android owners download the app from unapproved sources, rather than official sites such as the official Google Play Android marketplace, they run the risk of infecting their smartphone.'

'Once installed, the app will send background SMS messages to premium rate services earning its creators revenue. Sophos products detect the malware, which has been distributed on a Russian website purporting to be an official Instagram site, as Andr/Boxer-F.'

‘Android malware is becoming a bigger and bigger problem,’ said Graham Cluley, senior technology consultant at Sophos.

‘Just last week, we saw a bogus edition of the Angry Birds Space game and it’s quite likely that whoever is behind this latest malware are also using the names and images of other popular smartphone apps as bait.'

Unlike phones running Apple's iOS, Android handsets can install and run apps from any source.

This leaves them vulnerable to malicious software - and even Google's Play store often has 'fake' apps which infect phones with malicious apps.

Ohio Anonymous hacker in court for Utah police website hacks


Ohio resident John Anthony Borell III is being tried today for two counts of felony computer intrusion after hacking into Utah law enforcement websites in January.

Borell was recently arrested after Federal Bureau of Investigations agents found him using Twitter and Internet Relay Chat logs. The investigation was spurred by two tips sent in to tips.fbi.gov and ic3.gov that stated Borell was a member of hacking collective Anonymous. It also provided a number of pseudonyms he was associated with including Kahuna, TehTiger, and anonJB.

The indictment states that Borell used the SQL Injection technique to access and take down the websites utahchiefs.org and slcpd.com (Salt Lake City Police Department). The FBI found Twitter direct messages and tweets in which Borell admitted to taking down the websites. Further proof of his identity was found when the FBI looked through chat logs in IRC. There, Borell explained that his father was an attorney and was advising him against talking to the FBI. Agents searched Ohio-based attorneys and found two local attorneys named “John Anthony Borell Esq.”

He had also been in contact with Sabu, Anonymous’s once bullhorn, turned FBI informant.

Borell hacked these websites in order to make a statement about copyright infringement and the current Megaupload case. After hacking utahchiefs.org, Borell tweeted, “Whoever removed the Megaupload image from http://utahchiefs.org and replaced it with their nick when I hacked it for a purpose. Fuck OFF.”

According to the Salt Lake City Tribune, Borell has pleaded not guilty to the two charges. But a guilty conviction could put him in jail for 20 years, and hit him with a fine of $500,000. A trial is tentatively scheduled for June 25.

Breasts lead to arrest of Anonymous hacker


Police allege that an Anonymous hacker posted a picture of his presumed girlfriend's breasts as a taunt to U.S authorities. The picture allegedly contained GPS information that led the FBI to her.

Pride in one's lover's bodily parts can lead to a fall in one's own bodily security.

That seems to be the lesson from the tale of an alleged hacker, Higinio O.Ochoa, a 30-year-old Linux administrator from Galveston, Texas, who was arrested by the FBI and charged with unauthorized access to a protected computer.

The accusation, as described by the Sydney Morning Herald, is that Ochoa hacked into several Web sites belonging to law enforcement.

Sometimes, though, the temptation to leave a calling card can be too great. So Ochoa allegedly used a Twitter account to direct people to a Web site when all the law enforcement information he'd supposedly hacked was on display.

Also on display was a picture of a woman, her breasts lowering themselves tantalizingly toward the camera, with a sign beneath them reading: "''PwNd by w0rmer & CabinCr3w XXX u BiTch's''.

Now CabinCr3w is the apparent name of an Anonymous offshoot. And the "w0rmer" part? Well, the Twitter account linking people to the site was @AnonW0rmer.

However, the photograph of the breasts apparently linked authorities to Ochoa -- because, taken with an iPhone, it contained GPS information. The information allegedly suggested she lived in Melbourne, Australia.

Further burrowing led the police to discover a posting on Ochoa's Facebook page that allegedly revealed his girlfriend was Australian.

The claim is that police have managed to match pictures of her that Ochoa allegedly posted on Facebook to the breast image.

To the untrained eye, this might seem curious, as the Facebook pictures allegedly show her face, while the taunting picture does not.

Perhaps the authorities have gone beyond mere facial-recognition technology and are in possession of software that can match other bodily parts with astonishing accuracy.

"Hacker" Anonymous Tertangkap Gara-gara Foto Sang Pacar


Gara-gara sang pacar mem-posting foto tak senonohnya di Twitter, hacker Anonymous berhasil dilacak jejaknya oleh FBI.

Hacker bernama Higinio O Ochoa III itu dituduh melakukan aksi melawan hukum dengan membobol jaringan sejumlah situs Pemerintah Amerika Serikat (AS).

Seperti diberitakan Daily Mail, Sabtu (14/4/2012), polisi berhasil melacak keberadaan sang hacker melalui foto yang lokasi pengambilannya dilakukan di Australia.

Hacker berusia 30 tahun ini adalah seorang programmer komputer yang tinggal di Galveston, Texas, AS.

Foto ini memperlihatkan seorang perempuan, mulai dari leher ke bawah, dan sebuah tulisan,"'PwNd by w0rmer & CabinCr3w <3 u B****'s!'.

FBI kemudian berhasil mendapatkan identitas Ochoa yang menyebut dirinya "w0rmer online" dan merupakan anggota CabinCr3w, sebuah kelompok kecil dari Anonymous.

Februari lalu, Ochoa, melalui akun Twitter @AnonW0rmer memasukkan link sebuah situs di mana data-data dari situs Pemerintah AS dipublikasikan. Pada bagian bawah situs itu terdapat foto perempuan memakai sebuah tanda. Data itu menunjukkan foto itu diambil menggunakan iPhone.

Hasil GPS menunjukan, foto-foto itu diambil melalui ponsel di sebuah rumah di Wantirna South, Melbourne, dan ternyata perempuan tersebut adalah pacar Ochoa bernama Kylie Gardner.

Setelah polisi memantau dalam jangka waktu lama, aparat kemudian menyerbu rumah Ochoa pada 20 Maret silam dan kemudian menangkapnya.


ref : Tribunnews.com

CISPA Nightmare in the web


The good news is that SOPA and PIPA haven’t come to pass, but the bad news is that they could be followed by a bill that is even more invasive and could violate even more of your civil liberties. It’s called CISPA and it stands for the Cyber Intelligence Sharing and Protection Act. In short, it allows the government to request all kinds of information of Internet service providers and web hosts about its users.


Private companies are “encouraged” to “monitor” for “cyber threat” information happening on their networks, even if they have no real reason to do so. As Kendall Burman from the Center for Democracy and Technology explains in the video below, the breadth of the bill is remarkably broad, covering just about any kind of Internet activity at all. It doesn’t even really say what “government” can demand this kind of information, leaving it very vague and wide-reaching.

Ironically, even GOP candidate Rick Santorum went out to say that the Internet is “not a free zone,” and that regulations have to be in place to prevent an “anything goes” environment online. So much for small government. Following the Supreme Court ruling that allows getting strip searched for even the most minor of offenses, CISPA could allow the strip-searching of your online habits too… even without any kind of offense at all.

CISPA Good or not


Saya tidak ingin salah mengartikan jadi saya berikan tulisan asli saja :

An onrush of condemnation and criticism kept the SOPA and PIPA acts from passing earlier this year, but US lawmakers have already authored another authoritarian bill that could give them free reign to creep the Web in the name of cybersecurity.

As congressmen in Washington consider how to handle the ongoing issue of cyberattacks, some legislators have lent their support to a new act that, if passed, would let the government pry into the personal correspondence of anyone of their choosing.

H.R. 3523, a piece of legislation dubbed the Cyber Intelligence Sharing and Protection Act (or CISPA for short), has been created under the guise of being a necessary implement in America’s war against cyberattacks. But the vague verbiage contained within the pages of the paper could allow Congress to circumvent existing exemptions to online privacy laws and essentially monitor, censor and stop any online communication that it considers disruptive to the government or private parties. Critics have already come after CISPA for the capabilities that it will give to seemingly any federal entity that claims it is threatened by online interactions, but unlike the Stop Online Piracy Act and the Protect IP Acts that were discarded on the Capitol Building floor after incredibly successful online campaigns to crush them, widespread recognition of what the latest would-be law will do has yet to surface to the same degree.

Kendall Burman of the Center for Democracy and Technology tells RT that Congress is currently considering a number of cybersecurity bills that could eventually be voted into law, but for the group that largely advocates an open Internet, she warns that provisions within CISPA are reason to worry over what the realities could be if it ends up on the desk of President Barack Obama. So far CISPA has been introduced, referred and reported by the House Permanent Select Committee on Intelligence and expects to go before a vote in the first half of Congress within the coming weeks.

“We have a number of concerns with something like this bill that creates sort of a vast hole in the privacy law to allow government to receive these kinds of information,” explains Burman, who acknowledges that the bill, as written, allows the US government to involve itself into any online correspondence, current exemptions notwithstanding, if it believes there is reason to suspect cyber crime. As with other authoritarian attempts at censorship that have come through Congress in recent times, of course, the wording within the CISPA allows for the government to interpret the law in such a number of degrees that any online communication or interaction could be suspect and thus unknowingly monitored.

In a press release penned last month by the CDT, the group warned then that CISPA allows Internet Service Providers to “funnel private communications and related information back to the government without adequate privacy protections and controls.

The bill does not specify which agencies ISPs could disclose customer data to, but the structure and incentives in the bill raise a very real possibility that the National Security Agency or the DOD’s Cybercommand would be the primary recipient,” reads the warning.

The Electronic Frontier Foundation, another online advocacy group, has also sharply condemned CISPA for what it means for the future of the Internet. “It effectively creates a ‘cybersecurity'’ exemption to all existing laws,” explains the EFF, who add in a statement of their own that “There are almost no restrictions on what can be collected and how it can be used, provided a company can claim it was motivated by ‘cybersecurity purposes.’”

What does that mean? Both the EFF and CDT say an awfully lot. Some of the biggest corporations in the country, including service providers such as Google, Facebook, Twitter or AT&T, could copy confidential information and send them off to the Pentagon if pressured, as long as the government believes they have reason to suspect wrongdoing. In a summation of their own, the Congressional Research Service, a nonpartisan arm of the Library of Congress, explains that “efforts to degrade, disrupt or destroy” either “a system or network of a government or private entity” is reason enough for Washington to reach in and read any online communiqué of their choice.

The authors of CISPA say the bill has been made “To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities,” but not before noting that the legislation could be used “and for other purposes,” as well — which, of course, are not defined.

“Cyber security, when done right and done narrowly, could benefit everyone,” Burman tells RT. “But it needs to be done in an incremental way with an arrow approach, and the heavy hand that lawmakers are taking with these current bills . . . it brings real serious concerns.”

So far CISPA has garnered support from over 100 representatives in the House who are favoring this cybersecurity legislation without taking into considerations what it could do to the everyday user of the Internet. And while the backlash created by opponents of SOPA and PIPA has not materialized to the same degree yet, Burman warns Congress that it could be only a matter of time before concerned Americans step up to have their say.

“One of the lessons we learned in the reaction to SOPA and PIPA is that when Congress tries to legislate on things that are going to affect Internet users’ experience, the Internet users are going to pay attention,” says Burman. H.R. 3523, she cautions, “Definitely could affect in a very serious way the internet experience.” Luckily, adds Burman, “People are starting to notice.” Given the speed that the latest censorship bill could sneak through Congress, however, anyone concerned over the future of the Internet should be on the lookout for CISPA as it continues to be considered on Capitol Hill.

18 April, 2012

Mari Belajar Logika 1 (IF)

Siapa yang tidak kenal akan program Ms.Office, sejak tahun 1995 (kalao gak salah) hingga sekarang program tersebut banyak mengalami upgrading bahkan update dengan fitur-fitur baru yang menarik. Bahkan pihak Open source pun yang di prakarsai oleh Sun Microsystem mengeluarkan program yang mirip sekali dengan program Ms.Excel, yaitu Open Office dan Libre Office.

Didalam kedua program aplikasi tersebut terdapat program khusus untuk menghitung yaitu Ms.Excel dan Open Office Spreadsheet (Kalo gak salah kalo salah tolong diralat ya....xD, Nah tapi semua program ini memiliki cara menghitung yang sama, yaitu memiliki fungsi hitung SUM,MIN,MAX,Average ... dll. Tapi yang disini akan saya bahas bagaimana cara menggunakan fungsi logika "IF".

Fungsi logika IF biasanya kita gunakan dalam membuat sebuah perhitungan-perhitungan khusus. Berikut Logika rumus IF

=IF(CELL ACUAN=LOGIKA TEST,EXPRESI 1,EXPRESI 2) <---- Jika IF dua tingkat

Contoh Kasus perhatikan gambar berikut ini :



Mari kita jabarkan :

Jika NILAI RATA-RATA kurang dari atau sama dengan 60 maka keterangannya GAGAL
Jika NILAI RATA-RATA lebih dari atau sama dengan 60 maka keterangannya LULUS

=IF(F7'<'60,"GAGAL","LULUS")


Disitu terlihat bahwa yang berperan sebagai cell acuan adalah kolom "RATA-RATA", Sebelum saya jelaskan sedikit apa itu cell acuan. Cell acuan adalah cell kolom yang menjadi sumber utama dari soal yang letak posisi nya sejajar dengan cell kolom logika yang akan kita hitung.


=IF( ---> Jika
F7 ---> NILAI RATA-RATA ---> Cell acuan
<60 ---> kurang dari atau sama dengan 60 ---> Logika test
, ---> maka (Note = , atau ; berdasarkan dari setting komputer/laptop yang kita gunakan.
"GAGAL" ---> Expresi 1
,"LULUS" ---> Expresi 2 atau Expresi terakhir


=IF(F7<60,"GAGAL" ---> value if true
"LULUS") ---> value if false <-- tidak perlu menggunakan IF untuk di akhir

To be continued ...