Saturday 22 November 2014

Beautiful and unique bridges.

Bridge, now no longer simply connecting the two different places. But, it is also a place that is able to attract attention, so it can be used as an attractive tourist destination. Not because of its function, but rather a unique and beautiful shape. As six of the following bridges are quoted from the BBC.

Rakotz bridge, Germany.


It was proof that the bridge is not just connecting two places, but also as works of art combined human and natural. Rakotz bridge in Kromlau, Germany, the bridge was probably just plain with a curved shape. Which makes it special is the scenery around him. With a calm lake clear and karst rocks sticking out of the bottom of the lake, making the scenery around this bridge was very romantic.

Floating bridge, Malaysia

Floating bridge, Malaysia

The bridge is made by an architect named Mayur this Kanaya, built on top of Mount Mat Chopped on the island of Langkawi. According Kanaya, the bridge is made to provide an experience for the tourists to set foot lightly on the sky while enjoying the forest and wildlife.

Root bridge, India.

Root bridge, India.

If the bridge is usually made of stone or wood, the bridge in the village of Cherrapunji in the state of Meghalaya, India, is actually made from tree roots. The roots of trees on the left and right banks of the river, woven to form a bridge. War-Khasis, which is a local tribe in this place has been made of the root bridge since time immemorial. As a result, the root bridge can still be used by the residents to cross the river along 30 meters.

Splitting bridge river, Netherlands.

Splitting bridge river, Netherlands.

If most of the bridge is made on the water, sunken bridge in Fort de Roovere, near the village of Halsteren, Netherlands, is actually made by splitting the river. This bridge was made by architecture named Wu Zhuoyi who designed the bridge as a ditch. Wall bridge serves as a dam to hold back water into the bridge.

Rolling Bridge, London.

Rolling Bridge, London.

Bridge that divide when a passing ship, may be used. But, what if the bridge is actually rolled when a ship across the sea? This unique bridge is located in Paddington Basin, London. With the name Rolling Bridge, the bridge will be rolled each time a ship headed for the Grand Union Canal passes in Friday afternoon.

Stone bridge, Yemen.

Stone bridge, Yemen.

A mechanical engineer named Achilleas Vortselas once said that there will never be a modern bridge that can beat the beauty of traditional stone bridge. Stone bridge into evidence mankind persistence in overcoming obstacles, even with simple technical means. Shaharah Bridge in Yemen is one such example.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/beautiful-and-unique-bridges.html
DatePublished: November 22, 2014 at 11.14
Tag : Beautiful and unique bridges.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 11:14

Friday 21 November 2014

E-ID technology.

What we already know about the electronic ID card or e-ID card? Many of you may already have it, but do not yet know thoroughly. It is known about the e-ID card may only issue a ban on photocopying.

E-KTP actually been used in many countries. Indonesia's new cards to develop a model of this population. In terms of technology, what are the highlights of the e-ID card? Technology what is in it?

e-KTP

In a press conference on e-ID card held at the Agency for the Assessment and Application of Technology (BPPT), Wednesday (15/05/2013), engineers involved in the development of e-ID card Indonesia explained that the e-ID technologies are at least four, namely chips , blank or smart cards, biometrics, and e-ID card reader device.

Cip.

Chief Programme Engineer Research and e-ID card, reveal, one of the core technologies in e-ID card is chip. Cip e-ID card is a microprocessor-based smart card with 8 KB of memory.

Cip in e-KTP who owner is responsible for maintaining the data, signature, photograph, and two fingerprint data. Default fingerprint is used as well as the right hand index finger left hand.

E-ID chip is not visible from the outside. These chips already meet the standards of ISO 14443 A and 14443 B, supports the confidentiality of the data owner of the e-ID card. The chip can only be read by a particular reading device to ensure data security.

In the future, e-ID chip may still be developed. One of them, the second generation of e-ID card, the storage capacity of the chip would be a plus. The addition will support the use of e-ID cards than as identity cards, for example, social security cards and so on.

Blank aka "smart cards".

Blank aka smart card may look ordinary, but made with a special material polyethylene terephthalate glycol (PET-G). This blank has passed the test of the Polymer Technology Center Puspiptek BPPT in Serpong.

Card consists of seven layers. Chip and antenna that became a major component of the e-ID card is located in the middle layer has a thickness of 330 microns. Another layer serves as a protective layer, picture layer, and the free layer with a thickness of about 95 microns.

Blank material has been designed so that the resistance of certain environmental factors. For example, for temperature, blank material and chip resistant temperature between -25 to 70 degrees Celsius. Blank also resistant to pressure and certain chemicals.

Biometrics.

Biometrics are simply the identification of an individual based on the characteristics attached to it. Characteristics can include physiological traits such as fingerprints and eye or behavioral traits such as voice.

In the e-ID card, the individual characteristics used in biometrics are 10 fingerprints, iris in the two eyes and face photo. Feature is automatically saved to the data center at the Ministry of Interior when the owner takes care of e-ID card.

Biometric technology in e-KTP has two functions. First, to ensure the unity of the identity of the population. Consequently, with this technology, residents can not have two e-ID card with biographical data either the same or different.

When a person takes care of e-ID card, will be tested singularity. Ten fingerprints, two iris, and face will be taken and matched. If it proves not registered, all data will be incorporated into the data center and e-ID chip. If you are already registered, the process can not be continued.

The second function is the biometric verification process. This process ensures the cardholder is actually the owner. In this process, only the fingerprint data read with the help of e-ID card reader device.

E-ID card reader device.

E-ID card reader device is actually a separate device. However, these technologies into a single unit. Without the e-ID, e-ID card does not work because the necessary data in it can not be known.

E-ID card reader device is equipped with a biometric fingerprint module. The module serves fingerprint matching ID card holder with fingerprints stored in the e-ID card. If appropriate, confirmed that the e-ID card holders actually the owner.

To use the reader, the e-ID card first placed on the device. Description of e-ID card can be read will appear in less than 10 seconds. When you can not read, a great possibility of e-ID card is fake.

The next process, the e-ID card holders are asked putting fingerprints on fingerprint biometrics module. If the fingerprints match the fingerprints stored in the e-ID card, the data in e-ID chip will appear. If not, access to the data will be rejected.

By knowing the technology in e-KTP, the owner may have the right knowledge. With existing technology, the e-ID card will not be damaged if photocopied, but will be damaged if in-stapler. E-ID card would also be damaged when exposed to water but water with temperatures above 75 degrees celsius.

In the future, e-ID technology will continue to be developed. There is the idea that e-ID card also functions as a social security card, debit card, and so on. While the reader will also continue to be developed to fit the needs of many parties. Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/e-id-technology.html
DatePublished: 21 November 2014 at 20:38
Tag : E-ID technology.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 20:38

So Attractions.

The battle is very hated by the entire world, including Indonesia. However, sometimes there is no other way than war to resolve a dispute. As ever we, the people of Indonesia, naturally tens to hundreds of years ago. struggle against the invaders not only to the diplomatic efforts and negotiations, but also used for the war effort repelling them from their beloved homeland. For hundreds of years we have colonized, during which we fight. Since a very long time, the battle scars are still there to this day. The buildings are a silent witness to the struggle we are still standing strong. The buildings are now also has become a tourist attraction that generates decent revenue for Indonesia.

Morotai / Halmahera / North Maluku

The first war tourist attractions that can be visited in Indonesia, namely, the island of Morotai, in the islands of Halmahera, North Maluku.

Tourist attractions that can be visited first war in Indonesia, namely, Morotai, Halmahera Islands, North Maluku. The island is bordered by the Pacific Ocean leaving history World War II, due to the island of Morotai became the basis of the Japanese army against the allies. On this island, the Japanese army plotting attacks from the sea, and from the air.

To know the history of the second world war on the island of Morotai, we can find an assortment of legacy stuff, such as the caves where the Japanese army shelter, runways, and other artifacts such as aircraft, armored up. Even personal trinkets belonging to the Japanese army there are still left on the island.

However, the main attraction when we visited the island of Morotai can be done while diving, as there are aircraft belonging to the Japanese war that sank in the waters of Morotai. At the bottom of the sea in the location field Pante, the southern Morotai there Beufold Bristol wreckage at a depth of about 40 meters. Not only the wreck, because there are 25 other diving points relating to the history of the second world war there in the depths of the ocean Morotai. The historical remains, of course, will leave you sensation for the current tour of history to the place.

Skull Army Japan / Biak / Papua

Skull Army Japan / Biak / Papua

The place is no less important when studying the history as he traveled the island came multiply / papua. War relics in this place is unique because it shaped thousands of human skull which is the Japanese army during the second world war.

There are at least 12 thousand bones and skulls of Japanese soldiers scattered the island of Biak in OWI, Padaipo, Noemfoor and some other places.

In addition to the skull bones and relics of the Japanese army, there is also a cave which is also more popularly known as the Japanese cave, because during the first war, the cave is the hiding place and stronghold. One of these caves are named after the cave with five rooms with a length of 18 meters and an L-shaped and juts upward like the letter U. In this cave the Japanese army uses only the sap wood resin which is used as a means of lighting the candle.

Unfortunately the historical heritage in the form of a skull Japanese army was not maintained. When the Japanese tourists coming to the area will usually bring home or cremation to take home to Japan.

lodge / Yogyakarta

lodge / Yogyakarta

If you want to travel while studying the history of the war of course should not forget Yogyakarta. Because besides being a cultural tourist center, Yogyakarta is also rich in historical buildings rest of the war first. Yogyakarta people call the historic building with the lodge name, especially for the legacy of Dutch rule at that time. Named lodge because the building remnants large Dutch war with a large yard.

In times of war, lodge used as a resting place and where surveillance by Dutch soldiers. Even in times of emergency at the lodge, war strategy designed, or used temporarily to catch natives are considered rebels, before being taken to special prisons.

To visit the lodge you will not have to travel far, since most, the lodges are located in the city center, such as the post office building right on point 0 miles of Yogyakarta. Even still in the center of town, we can go to the oldest lodge, Vredeburg building built in 1776 until 1778. The fort was standing one shaft with Ngayogyakarta. Vredeburg supposedly built specifically watching the movements of the palace, until one cannon placed leads to the palace with the ready position.

Goa Netherlands / Bandung.

Goa Netherlands / Bandung.

Well, if you want to visit the sights of war with soothing natural atmosphere, perfect if you are visiting the cave Dutch and Japanese cave located in Forest Park Ir. H. Juanda, Bandung. At first place is the stretch of mountains from west to east that serves as a giant water tank naturally, to spare the Bandung region in the dry season. In addition there is a hydroelectric power plant, called crooked. Hydropower plant built in 1918 is the first in Indonesia.

At the time of the Dutch-resident, expert hills is considered very attractive for military strategy, because the location is protected and close to downtown Bandung. Ahead of the second world war, the beginning of 1941, the Dutch built a new tunnel in the existing hydropower tunnel, tunnels totaling 15 entrance hallway with two 3.25-meter-high and 547 meters long was used as a radio station to be free from air attack.

At the time of independence the Dutch cave once used by the Indonesian army ammunition depot. Currently cave Netherlands became one of the tourist attractions that demand a lot of local and foreign tourists.

Hole Japan / Bukittinggi.

Hole Japan / Bukittinggi.

The latter is still in the form of caves, namely Japanese hole in Bukittinggi, West Sumatra. Japanese hole is a tunnel protection built Japanese occupation army around 1942 for defense purposes.

Earlier, Japanese hole built as a storage supplies and armaments. The length of the tunnel reaches 1400 meters and winding, and has a width of about 2 meters. A number of special rooms contained in this tunnel, such as space surveillance, space ambush, prison and armory.

Ground into the tunnel wall, the soil type when mixed with water will be more sturdy. It is estimated that tens to hundreds of thousands of forced labor or romusha deployed on the island of Java, Sulawesi and Kalimantan to dig this tunnel. The workers from outside the region is a Japanese colonial strategy to maintain the confidentiality of this mega project. The labor of his own New York City to work on the tunnel defenses deployed in Bandung and multiply island.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/so-attractions.html
DatePublished: 21 November 2014 at 20:19
Tag : So Attractions.
Code : 7MHPNPADAEFW


Posted by: Bambang Sunarno
www.Primo.com Updated at: 20:19

The most deadly roads.

The highway is a public facility that is very important to take a trip to somewhere. The highway was built to enable people to drive. However, it turns out there are some very deadly highway in the world. why turn off? Yes, the danger is always lurking in the streets. If not careful, there are deadly consequences.

The World's Most Deadly road:

The Death Road - Bolivia.

The Death Road - Bolivia.

Located in the northern part of the Yungas region, this road is called the road of death. This area is located at 61-69 kilometers from the city to La Paz to Coroico (Bolivia's capital Amazon region). An estimated 200-300 people die each year on the streets so no wonder it is called the road of death. In 2006, the road was built across from La Paz to Coroico that make this region is no longer solid. Anyway, what you want to squeeze the car in a narrow street directly adjacent to the abyss?

Guoliang Cave Road - China.

Guoliang Cave Road - China.

The road is located in the Taihang mountains was built by local residents for five years. With shaped tunnel through a mountain caves along the 1.2 miles, this road has only 4 meters wide and 5 meters high. Want to try the crossing? Try to go to Hunan province in China. Be careful!

Ruta 5: Arica to Iquique Road - Chile

Ruta 5: Arica to Iquique Road - Chile

What makes a road linking Arica and Iquigue this dangerous? Wind speed. If you are driving at high speed and you will feel the wind hit from the side very quickly and can result in car driven then plunged into a deep valley. Even the pace of other cars also cause it. Not only that, located in the desert makes riders often experience hallucinations. It's dangerous.

Siberian Road to Yakutsk - Russia

Siberian Road to Yakutsk - Russia

For those of you who can not stand the cold, do not try to cross the road to reach Moscow this Yakutsk. For what? The road is located in the coldest place in the world (outside Antarctica) this can not be paved because it was so cold. As a result, when the summer comes, the rain will cause the street was badly damaged. In addition to the muddy streets, lurking robbers also made roads dangerous.

Highway Sichuan Tibet - China

Highway Sichuan Tibet - China

In China, cases of deaths caused by car accidents has doubled in the last 10 years. Rose from 3.9% to 7.6% per 100 thousand population between 1985-2005. The highway is located in Chengdu and Tibet has become a highway with the highest slope point in China. With a length of 2,412 km, this road crosses 14 high mountains which average 4000-5000 meters tall. In addition, this road also passes through dozens of rivers and dangerous jungle. Dare to pass?

James Dalton Highway - Alaska

James Dalton Highway - Alaska

James Dalton highway has a length of 666 km and the unique made of gravel. This terrible road through fields of ice in the Arctic and to the most northern location in Alaska. The combination of slippery gravel (because of ice and mud), rock, and the dusty streets of this noise has been made unfit for use. Traversing this area you have to prepare a lot of food and extra fuel to survive.

Road Patiopoulo to Perdikaki - Greece

Road Patiopoulo to Perdikaki - Greece

This path is the path to a short path that is very busy. Situated in this street Perdikakim Patiopoulo to climb the dangerous path because many parts are damaged and hills. As if not enough, the lack of street lighting also makes it makes you scared. Due to lack of light at night, you will often not see the pace car from the opposite direction. Scary.

Trollstigen - Norway

Trollstigen - Norway

The meaning of the word troll in Greek myth is a giant, and it seems like the streets located in the mountains of Rauma, Norway The first is the path of a giant cross. Connecting Andalsnes area in Rauma and Valldal Norddal, this area is often visited by tourists because of the short road with twists and turns sharply. But after crossing the path of this death, you can enjoy the view of the waterfall is so beautiful Stigfossen as high as 320 meters. Not bad fun.

Road A682 - English

Road A682 - English

Located on the A682 between the junction point 13 of the M65 and Long preston, this road is regarded as the worst street in Britain. There have been more than 100 accidents during the last 10 years. Even the paths along the 22 miles to the north Yorkshire is already consuming 22 fatal accidents in the last 3 years. Still curious to try the crossing?

Stelvio Pass Road Trollstigen - Italy

Stelvio Pass Road Trollstigen - Italy

It is the second highest paved road is located in the Alps. Stelvio Pass Road connects the Valtellina with the upper Adige valley and Merano. Although it seems quite safe with asphalt, but sharp corners make this road winding road title as the best and longest. But still, pretty awful to be crossed.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/the-most-deadly-roads.html
DatePublished: 21 November 2014 at 19:30
Tag : The most deadly roads.
Code : 7MHPNPADAEFW


Posted by: Bambang Sunarno
www.Primo.com Updated at: 19:30

Two Missing President in History.

Sjafruddin Prawiranegara and Mr. Assaat.


Sjafruddin Prawiranegara and Mr. Assaat.

Most of us say that the number of Indonesian president who has served until now (2013) there were six people, namely Soeharto, BJ Habibie, K.H. Abdurrahman Wahid (Gus Dur), President Megawati Sukarnoputri and Susilo Bambang Yudhoyono (SBY). However, it turns out it was wrong. There are actually eight presidents who served in Indonesia. However, there are two people who are not well known, because of a very short tenure.

Two figures were missed it is Sjafruddin Prawiranegara (to the left in the picture above) and Mr. Assaat. Both were not called, can as negligent, but may also be deliberate. Sjafruddin Prawiranegara is the Leader Emergency Government of the Republic of Indonesia (PDRI) when President Soekarno and Moh. Hatta was arrested Netherlands at the beginning of the second military aggression, while Mr. Assaat is the current President of the republic became part of the Republic of Indonesia (1949).

On December 19, 1948, when the Dutch military aggression II to attack and dominate the current capital of the Republic of Indonesia in Yogyakarta, they caught and arrested President Soekarno, Moh. Hatta, Indonesia as well as other leaders and then exiled to the island of Bangka. The news of the capture of Sukarno and the Indonesian leaders was heard by Sjafrudin Prawiranegara then served as Minister of Welfare and was in Bukittinggi, West Sumatra.

Mr Sjafruddin Prawiranegara.

To fill the void, Sjafrudin proposed the formation of an emergency government to carry on the government of Indonesia. In fact, when it's Soekarno - Hatta sent telegram reads, "We, the President of the Republic of Indonesia reported that on Sunday, December 19, 1948 6 o'clock in the morning the Netherlands has begun on Capital serangannja Jogjakarta. Djika in a state government can not carry out kewajibannja again, we authorize to Mr. Sjafruddin Prawiranegara, Minister of Welfare of Indonesia to form a Provisional Government in Sumatra ".

But when the telegram is not up to Bukittinggi. However, it turns out at the same time Sjafruddin Prawiranegara have taken similar initiatives. In a meeting at a house near the canyon Sianok Bukittinggi, December 19, 1948, he proposed the formation of an emergency government (emergency government). Sumatra Governor Mr. T.M. Hasan approved the proposal "to save the Republic of Indonesia which was in danger, that emptiness head of government, which is the requirement to be recognized internationally as a country".

On December 22, 1948, in Halaban, about 15 km from Payakumbuh, PDRI "proclaimed". Sjafruddin sits as chairman / president and Minister of Defence, Information, and Foreign Affairs, ad. the interim. Kabinatenya assisted Mr. T.M. Hasan, Mr. B.C. Rasjid, Mr. Lukman Hakim, Ir. Mananti Sitompul, Ir. Indracahya, and Marjono Danubroto. The Sudirman remained as Commander in Chief of the Armed Forces.

Sjafruddin hand back the mandate to President Soekarno on July 13, 1949 in Yogyakarta. Thus ended the history of the PDRI for approximately eight months to continue the existence of the Republic of Indonesia.

Mr Assaat.

In the Round Table Conference (RTC), which was signed in the Netherlands, December 27, 1949 it was decided that the Netherlands transferred sovereignty to the Republic of Indonesia (RIS). RIS consists of 16 states, one of which is the Republic of Indonesia. Other states such as the State Chancellor, State of East Indonesia, and others. Because Sukarno and Moh. Hatta has been determined to be the President and Prime Minister of the RIS, it means there is a vacancy in the leadership of the Republic of Indonesia.

Assaat is Stakeholder Position While President. Assaat very important role. If there is no RI then, there is a void in the history of Indonesia, that Indonesia never disappear and then reappear. However, by recognizing the presence of RI in the RIS that only a few months, it appears that the history of the Republic of Indonesia since 1945 uninterruptible until now. We know that the RIS then merged into the Republic of Indonesia on August 15, 1950. That means, Assaat has held the post of the President about nine months.

Thus, the president is the president of RI-8. The order of the President are as follows: Sukarno (punctuated by Sjafruddin Prawiranegara and Assaat), Suharto, BJ Habibie, Abdurrahman Wahid, Megawati Sukarnoputri and Susilo Bambang Yudhoyono. Thank you for reading this article.
Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/two-missing-president-in-history.html
DatePublished: 21 November 2014 at 12:40
Tag : Two Missing President in History.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 12:40

Thursday 20 November 2014

The way hackers penetrated website.

How can a hacker to penetrate or infiltrate and destroy a website is as follows. Techniques include:

1. IP Spoofing
2. FTP Attack
3. Finger Unix Exploits
4. Flooding & Broadcasting
5. Fragmented Packet Attacks
6. E-mail Exploits
7. DNS and BIND Vulnerabilities
8. Password Attacks
9. Proxy Server Attacks
10. Remote Command Processing Attacks
11. Remote File System Attack
12. Selective insertions Program
13. Port Scanning
14. TCP / IP Sequence Stealing, Passive Listening Port and Packet
15. HTTPD Attacks

IP Spoofing.

IP Spoofing is also known as the Source Address Spoofing, namely forgery attacker's IP address so that the target considers the attacker's IP address is the IP address of the host in the network instead of from the outside network. Suppose the attacker has an IP address of type A 66.25.xx.xx when the attacker to attack this type of network is under attack, the IP will assume the attacker is part of their network, eg IP 192.xx.xx.xx ie type C.

IP Spoofing occurs when an attacker? Outsmart? packet routing to change the direction of the data or transmissions to different destinations. Packet routing is usually transmitted in a transparent and clear so as to make the attacker to easily modify the data source or destination of the data. This technique is not only used by the attacker, but also used by security professionals to download tracing the identity of the attacker.

FTP Attack.

One of the attacks carried out against the File Transfer Protocol is a buffer overflow attack caused by malformed command. destination FTP server to attack the average is to get a command shell or to perform a Denial of Service. Denial Of Service attack can eventually lead to a user or attacker to retrieve the resource in the network without authorization, while the command shell can make an attacker to gain access to the server system and data files that an attacker can eventually make anonymous root-acces a right full to the system even attacked network.

Finger Unix Exploits.

In the early days of the Internet, Unix OS finger-efficient utility used to download information sharing among users. Because the demand for information on this finger information do not blame the rules, many system administrators leave this utility (finger) with minimal security, even without any security at all. For an attacker this utility is very valuable to have information on footprinting, including login names and contact information.

This utility also provide excellent information about user activity in the system, how long the user is in the system and how far the user take care of the system. The information generated from this finger to minimize Kracker effort in penetrating a system. Personal information about the user that is raised by the finger daemon is already enough for a atacker to perform social engineering using the social skill to utilize the user to? Tell? passwords and access codes to the system.

Flooding & Broadcasting.

An attacker can reduce the speed of the network and the hosts that are in it significantly by continuing to perform request / demand for the information of servers that can handle classic attacks Denial of Service (Dos), send a request to the named port of excessive flooding, sometimes it is also called spraying. The purpose of the attack is the same that makes network resources that provide information to be weak and eventually gave up.

Flooding Attacks by the way, depending on two factors: the size and / or volume (size and / or volume). An attacker could cause a Denial of Service by throwing large capacity files or a large volume of small packet to a system. In such circumstances the network server will deal with congestion: too much of the requested information and not enough power to push the data to run. Basically a big package that requires greater processing capacity, but abnormally small package and at a high volume resource will be spent in vain, and the resulting congestion.

Fragmented Packet Attacks.

Internet data is transmitted via TCP / IP can be further divided into packages that only contain the contents of the first package of information the main part (head) of TCP. Some firewalls will allow to process part of packages that do not contain information on the source address on the packet first, this will lead to some type of system to crash. For example, the NT server will be crash if the packages were broken up (fragmented packet) enough information to rewrite the first packet of a protocol.

E-mail Exploits.

Exploitation of e-mail occur in five types: mail floods, manipulation command (command manipulation), the attack rate of transport (transport-level attack), include a variety of code (inserting malicious code) and social engineering (utilizing physical socialization). Email assault could cause the system to crash, open and execute even rewrite the application files or also make access to command functions (command function)

DNS and BIND Vulnerabilities.

Recent news about the vulnerability (vulnerabilities) on apps Berkeley Internet Name Domain (BIND) in various versions illustrate the fragility of the Domain Name System (DNS), which is a crisis that is directed at the basic operation of the Internet (internet basic operation).

Password Attacks.

Password is common when we talk about security. Sometimes a user does not care about the number of pins they have, such as online transaction in the cafe, even transact online at home is very dangerous if it is not equipped with security software such as SSL and PGP. Password is one procedure that is very difficult to attack, an attacker might have many tools (technically and socially) just to open something that is protected by a password.

When an attacker managed to get a password that is owned by a user, then it will have the same power to the user. Train employees / users to remain vigilant in keeping the password of social engineering can at least minimize the risk, in addition to guard against social engineering practices organizations must be aware of this by way of technical. Most attacks are carried out against password guessing (guessing), brute-force, cracking and sniffing.

Proxy Server Attacks.

One of the functions of proxy servers is to speed up response time by bringing together the process of multiple hosts on a trusted network.

Remote Command Processing Attacks.

Trusted Relationship between two or more hosts Provides information exchange and resource sharing. Similar to a proxy server, trusted relationships give all members equal access to power networks in one and the other system (the network).
Attacker will attack the servers that are members of a trusted system. Just as the latency to the proxy server, when access is received, an attacker would have the ability to execute commands and access the data available to other users.

Remote File System Attack.

Protocols for transport of data? Backbone of the internet? is the TCP level (TCPLevel) with a mechanism that has the ability to read / write (read / write) between network and host. The attacker can easily obtain the information traces of this mechanism to gain access to the file directory.

Selective insertions Program.

Selective Program insertions are performed when the attacker attacks put destroyer programs, such as viruses, worms and trojans (maybe you already know this term well?) On the target system. Programs crusher is also called malware. These programs have the ability to damage the system, destruction of files, theft of the password to unlock the backdoor.

Port Scanning.

Through port scanning an attacker can see the functions and how to survive a system from a variety of ports. A atacker can gain access to the system through an unprotected port. Sebaia example, scanning can be used to determine where the default SNMP strings in open to the public, which means that the information can be extracted for use in remote command attack.

TCP / IP Sequence Stealing, Passive Listening Port and Packet.

Interception TCP / IP Sequence Stealing, Passive Listening Port and Packet Interception runs to gather sensitive information to access the network. Unlike active attacks and brute-force attacks that use this method have more stealth-like quality.

HTTPD Attacks.

The vulnerability is present in HTTPD webserver or five kinds: buffer overflows, bypasses httpd, cross scripting, web code vulnerabilities, and URL floods
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/the-way-hackers-penetrated-website.html
DatePublished: 20 November 2014 at 13:38
Tag : The way hackers penetrated website.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 13:38

Thieves money.

Various types of malicious programs often terrorize Internet users. The virus is classified as very dangerous because it can drain the contents of the victim's account.

Virus 'thief money' life has been discovered a few years ago, but gradually becoming more sophisticated malicious programs until it is feared could lead to huge losses.

Drug to counteract some of the virus had been found. But cyber criminals are not losing my mind, they are often modified with the latest techniques in order to successfully pass the various protection systems.

According to JD Sherry, Global Director of Technology and Solutions Trend Micro, there are at least six internet banking virus that is dangerous to the present, and it still could cost quite a bit.

Virus 'thief money' which, according to Trend Micro warrant concern are as follows:

Citadel.

In the ancient Citadel are used as a last defense of a kingdom. Hence, typically form large, sturdy, and comes with a variety of weapons systems.

In modern times it is in the name Citadel pincers cyber criminals to name a virulent virus. The virus specifically designed to drain the victim's account.

Citadel is a virus that is created from the source code of Zeus, one of the viruses that are also quite sophisticated. The difference Citadel is made specifically to attack internet banking.

The virus is found in the Citadel began in January 2012 and, since then a malicious program is constantly being developed to reach their latest version in October 2013. Until now, the virus is thought to still circulate freely.

Tinba.

One observer virus named Amit Klein wrote many stories about Tinba on his personal blog. This is one of the viruses attacker who should be wary of internet banking.

Tinba emerged from the underground hacker community about 9 months ago. This malware is designed to steal money.

Originally methods used Tinba still relatively unusual, even to say a little bit old school compared with viruses like. But in January 2013 found a new version Tinba more sophisticated, able to outsmart even the two-way authentication system of the bank.

"When the victim accessing their bank pages, Tinba will display a page that is very similar to the bank," writes Klein.

However, when trying to log into the page, the user is actually displayed error pages. This is where the process starts data theft.

Eurograbber.

In accordance with its name. The virus is designed to drain money internet banking users in Europe, even until the end of 2012 and at least 36 million euros ($ 455 billion) were successful in the brush of the virus.

Eurograbber first discovered by a security agency named Check Point Software Technologies, then assisted also by other institutions of Israel named Versafe. They say that these malicious programs designed to attack the banking sector.

In operation the virus was not only attacked by a computer, but also infiltrated into the smart phone of the victim. Having successfully entered, it will download some application components to be able to act.

Eurograbber first discovered in Italy, then spread to several areas of Europe such as Germany, the Netherlands and Spain. At least there are thousands of victims from 30 different banks that successfully infected by the virus.

SpyEye

Analysis and Guardian and McAfee announced the discovery of a new virus called SpyEye. It is said that these malicious programs created by programmers who know well about the working system of internet banking.

Just like the Citadel, SpyEye is based on the source code of Zeus. It's just the program to attack a specific target, such as corporate transactions, or users who have savings are numerous.

SpyEye said to be great because it managed to avoid the various protection systems. In fact, the virus is said to be relatively ingenious, it was difficult to detect when a transaction takes place.

"They know how to make the transaction as if it occurred. Obviously, these people (the author-ed) to know more than just the understanding of Internet banking," said David Marcus, director of Advanced Research and Threat Intelligence McAfee, as quoted of CRN.

Gozi-Prinimalka.

If Eurograbber attacking the banking system, then Gozi-Prinimalka made to beat the internet banking system in the United States.

Trend Micro managed to capture and analyze Gozi-Prinimalka, after the surgery turns out this malicious program has several unique among similar applications.

To steal information from its victims, the virus will first create a backdoor using exploits Java Script. There are two backdoor to be made, and BKDR_URSNIF.DN BKDR_URSNIF.B both are connected in real time to the control system of the virus.

The data stolen this virus was not only stored on the hard drive, but also temporary memory that is stored in the browser.

In America this virus at least have made a restless three banking institutions, they are TDBank, Firstrade, Options Xpress. The trio then make improvements to the system to fend off the attack.

High Roller.

The virus is spread pretty much the last terror is the High Roller. It is said that this is one of the biggest attacks in the banking industry world.

Unlike other malicious programs that only attack by stealth, launch a High Roller can blindly from various directions.

The virus is more difficult to track because they do not have the Command Center in a physical form. Performers are smart enough to make this control system in the 'cloud', making it difficult to track.

Basically the High Roller is made of a combination of Zeus and SpyEye virus, and in it there are also some conventional information theft techniques that are common in cyberspace.

Advanced technology owned by High Roller makes it quite difficult suppressed, even to this day. Therefore, the entire banking sector are advised to remain vigilant.

"By using a cloud system, the High Roller has a new attack techniques. They are difficult to analyze and difficult to detect its presence," said Chris Silveira, Manager of Fraud Intelligence of Guardian Analytics.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/thieves-money.html
DatePublished: November 20, 2014 at 13:16
Tag : Thieves money.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 13:16