Showing posts with label Software. Show all posts
Showing posts with label Software. Show all posts

Kexi Open Source Competitor for Microsoft Access


Kexi open source competitor for microsoft access an answer to the problem in a linux environment to open access mdb file format of microsoft office. Open source is always the best answer to a problem licensed program. It can be used for creating database schemas, inserting data, performing queries, and processing data. Forms can be created to provide a custom interface to your data. All database objects - tables, queries and forms - are stored in the database, making it easy to share data and design.

One disadvantage of open source like Linux is to transform the habits of computer users who have been accustomed to use the operating system, window, so open source developers have to adjust their habits and needs of users to support the program of work.

ReadMore »»  

DAEMON Tools Lite 4.35.6 Virtual Disc ISO and MDS


Daemon Tools Lite 4.35.6 is new release free virtual disc software for create iso and mds file, it's have about 5 years from first release (Daemon tools 3.47 Released: 21 Jul 2005 about 5 years 1 month ago). Daemon tools lite 4.35.6 is a free and license software that supports variety of image types, use cd/dvd image converter to have one format images in your image catalog with have features.

Daemon tools can save your physical  cd/dvd/hd dvd/Blu-ray discs into "virtual discs" or so-called disc image files directly on your hard drive, you can also work with images created by other programs recording. Daemon tools supports different types of images, using cd/dvd-image-converter to an image format of the image of the store.
  1. Emulate virtual cd/dvd/hd-dvd/ and Blu-ray. Daemon tools lite [commercial] can emulate up to 4 PC cd/ dvd virtual. virtual drives appear in the operating system, so real. Select a virtual disk, then choose a disk image you want to mount. Locate the virtual disk created in the mounted disk image on my computer. Start working! It seems that working with a real drive and a real disk, or not? Yes, but is much faster.
  2. Create a disk image. Daemon tools lite [commercial] use of ISO and MDS image files from the original CD in a physical cd/dvd/hd dvd/Blu-ray, or use the images that you have created with other programs. DAEMON Tools products work with different types of images.
The Specials from Daemon tools lite 4.35.6 highlights is :
  • Create *. iso and *. MDS images;
  • Emulates up to 4 virtual CD / DVD;
  • Perform assembly and disassembly of the image;
  • Compatible with *. B5 *. B6t, *. BWT, *. CCD, *. cdi, *. cue, *. nrg, *. PDI, *. ISZ;
  • Provides a command line interface to powerful.
Download daemon tools lite 4.35.6 from http://fs21.filehippo.com/9955/4e89dbfe625c41af8bd926ac99d6ee07/DTLite4356-0091.exe or filehippo.com there are most free software that have powerfull featured for your windows os.
ReadMore »»  

Install ZTE MF636 Driver With Windows 7


Modem ZTE MF 636

ZTE MF636 is a cheap wireless gsm modem that have stability connection, but if you trying to running this modem in Windows 7, i'm sure you can receive warn "Not Found" device is disconnected, heheh. Don't panic about this warn,this is just a warn that can't eat your modem :-D

Driver that include in ZTE MF636 Modem just supports for Windows Vista, Windows XP (SP2 & SP3), Windows 2000 (SP4) and MAC OS 10.5 and above is supported but 32 bit only, so if your Os is windows 7 you can follow this simple tips.

First step, download driver ZTE Mf636 for windows seven here. Read the instructions carefully, after finish your download extract that file and stop don't do anything like double click software.

Second way, plug your zte mf636 modem to usb and install driver from autorun follow the instruction, remember after complete install don't click finish.

Three way, remove your modem device from usb.

Four way, double click driver zte mf 636 for windows seven from your download and install it's till complete and finish.

Five way, plug modem zte mf636 to usb slot and click finish button from the second way above. So, after that connection manager will run and windows 7 will load your zte mf636 driver. Note: if you get other warn from windows 7 show, please select this program install corectly.

Enjoy for surfing...
ReadMore »»  

Protect Online Lifestyle With Norton Antivirus 2010


Lifestyle Norton Antivirus Online 2010


Protect your online lifestyle with norton antivirus 2010 because the trend of online lifestyle has now become a style of most people, online trends through targeted a wise and careful in using a computer that connected to the Internet, because your personal information easily in the investigation or stolen by the programs created voor steal data. Prior to the online internet keep your computer safe from malicious programs by installing antivirus and firewall to the loss of your personal data.

Norton AntiVirus 2010 defends and protect your PC against viruses, spyware, bots, worms, and more without slowing you down or getting in your way. Intelligence-driven technology identifies and targets only files at risk, for faster, less frequent scans computer with or without internet connection.

Vulnerability protection prevents threats from exploiting security holes in your PC’s software. Pulse Updates every 5 to 15 minutes and real-time online security checks help ensure continuous, up-to-the-minute protection against the risk program, find and get oem norton antivirus full version here : Norton 2010.
ReadMore »»  

Create Partition In Your Mini Netbooks Easy


Create a partition on mini netbooks were not the same as creating a partition on a notebook or laptop as usual like acer or hp mini, this is when aksesanda trying to creating partitions mini netbook has a boyfriend. First think it is easy to use tools like Partition Magic, click click and clear, but it turned out to be wrong.

How can i make a partition on the original Mini netbook to be done with a tool called : EASEUS Partition Master, first step to do is download a small program on that partition:
http://download.cnet.com/Easeus-Partition-Master-Home-Edition/3000-2248_4-10863346.html
then install it on your mini netbooks, the next step like using Partition Magic, click the partition size choice your size and create, after that create new partition on allocated space partition and browsing internet. Good Luck.


warning : becarefully with your harddisk, before you doing this job,  ask other people that knowing about it or follow read installation doc first. 
ReadMore »»  

Jolicloud Original Cloud-Based OS


Jolicloud is very original cloud-based operating system with a new architecture of Web applications, chromium promised this month. The operating system, the company now, 600 + Web applications and surf at high speed and support HTML5, shows the official blog. Chrome changes the back-end platform is Mozilla Prism, the future of Google, more so, Google Chrome will launch soon a lot of interesting line of operating systems, a group of trailers.

In a personal Jolicloud in your favor. How Google Chrome OS on the project as open source, which created the Google Web OS, but the benefits Jolicloud ... Well ... not Google. Right or wrong, some of them may be wary of Internet giants, such as delay, other companies, such as larger than life in the past, in particular, Microsoft and IBM. For these people, form Jolicloud seem netbook on Cloud Computing in full, and do not use Google brand. 

But the real success will Jolicloud "catch" the feeling like this - depends on the company partners with equipment manufacturers. Invitations may be, but nothing officially announced. Ultimately, consumers, the cost netbooks Jolicloud with - or netbooks Google Chrome OS-based act on this issue. But if companies start their bids for the equipment available for sale, there is no way of knowing how good or bad, or even voice.


Download Jolicloud here : Jolicloud OS (for netbook)
ReadMore »»  

Astaga! Nmap release Nmap 5.20 stable


Online Lifestyle Astaga.com
Astaga! Nmap release Nmap 5.20 stable since 5.00 there are More than 150 improvements looks significant, that includes :

 o Add new 30+ Nmap Scripting Engine scripts
 o Reduced consumption of memory and performance enhances.
 o More effectie UDP scanning by protocol-specific payloads
 o Traceroute engine a completely rewritten
 o Massive OS and version detection DB updates (10,000+ signatures)

Trace consolidation is more sophisticated, allowing common traces to be identified sooner and fewer probes to be sent, after performing or loading a scan, you can now filter results to just the hosts you are interested in by pressing Ctrl+L (or the "Filter Hosts" button) to open the host filtering interface. This makes it easy to select just Linux hosts, or those running a certain version of Apache, or whatever interests you like easily modify the filter or remove it to see the whole scan security again.

The ports and payloads are defined in payload.cc. The ports that have a payload are 7 (echo),53 (domain), 111 (rpcbind), 123 (ntp), 137 (netbios-ns), 161 (snmp), 177 (xdmcp), 500 (isakmp), 520 (route), 1645 and 1812 (radius), 2049 (nfs), 5353 (zeroconf), and 10080 (amanda).

Nmap submitted integrated 1,349 fingerprints (and 81 corrections), more than a thousand signatures were added, bringing the total to 8,501. SMBv2 has already suffered from at least one major security vulnerability.
Source of Nmap  tar ball (and RPMs) translations (16 languages so far) including, but however Nmap default is english.

If you like this smart security software packages for Linux, Mac, and Windows are available download the Nmap 5.00 source code at the usual place: Nmap - Free Security Scanner For Network Exploration & Security
ReadMore »»  

Network management Tool is a network Management Software


Network Management Lifestyle
Network management tool is a net work management software used for monitoring network we've built. Network security is a complex problem, because there are many gaps in it that can be used by intruders to retrieve the desired data.

This Network Management program has advantages and disadvantages. From the full version to free version, but if not supported by the ability of network administrators a powerful management software tool will be very useful to secure the net work.

Many cases of large companies that have a Network administrator who only has a high value on paper but lack of experience in network management like SEO management on ASTAGA.COM LIFESTYLE on the net.

Below are some example network management tools that can be used to secure small-scale local network rather than for large-scale net works.


Flowalyzer NetFlow Generator 1.0

Flowalyzer NetFlow & sFlow Communicator 1.0

Chily User Management 9.09.01 

CyD Network Utilities - Security Tools 2010

ReadMore »»  

DTREG Defines Implicit Global Variables In The DTL Program


Program Online
DTL is a language programing that built easy to generate new variables, transform and combine input variables and select records to be used in the analysis.

Using it, you can manage data being analyzed, generate new variables as a function of input variables and select which records are used in an analysis.
Although DTL does not have all of the features of languages such as C and Visual Basic you will find that it is a rich language unto itself and includes features not commonly found in other languages such as fully dynamic string variables and a wide selection of built-in library functions.

The syntax of the DTL language is intentionally similar to that of the C programming language.
If you have prior experience programming in C you will be able to begin using DTL almost immediately.

The following list summarizes the major differences between C and DTL:

• DTL does not have structures or pointers.
• Arguments to functions are passed by copying. On entry the values of calling arguments are copied to the receiving formal parameters. On exit, the values are copied back to the calling arguments.
• DTL supports three data types: int (32-bit integer), double (64-bit floating point), and string (variable length strings).
• The DTL string data type provides fully dynamic strings whose size is determined at execution time rather than by statement declaration. DTL strings can store binary data including the null character.
• DTL provides a substring operator for extracting or changing a portion of a string. There is also a string concatenation operator (‘$’).
• DTL supports one and two-dimensional arrays. The syntax for declaring the array size and for subscripting elements has the form “array[sub1,sub2]” rather than the C convention of “array[sub1][sub2]”. A “resize” function can be used to change the size of an array during the execution of a program. When arrays are passed to functions the size of the array in the function “conforms” to the size of the passed array. Library functions are provided to determine the actual size of an array.
• DTL is very “liberal” with regard to type conversions. Any type of variable may be assigned to any other. Any type of variable or expression may be used as an argument to a function without regard to the type of the formal parameter. String and numeric values may be used together in expressions.


 
ReadMore »»  

ClearOS For Networks Online Security


Lifestyle Online Security
ClearOS For Net works Online Security. Although the functionality and integration of services with a clear list long series of solution for web-based interface, easy configuration.

Open source software offers the industry revolution is dead clear. Other features include anti-virus, anti-spam filtering, VPN, content, and is directly integrated into the software - without the need for expensive third-party add-ons. Clear, along with the guy, you can avoid vendor lock-in and proprietary formats, but you can accept the standards and open protocols.

ClearOS is powerful net work environment and clear gateway server designed for small and distributed.
One of the most important tasks when deploying server systems is a continuous monitoring and maintenance.
ClearSDN the security system is working properly to determine if the current gateway, and DNS services provides family. Follow the links on the sidebar for more information on services ClearSDN able to read.

Directory Features

    * Integrated LDAP for User and Group Management
    * User Security Certificate Manager

Network Features

    * Multi-WAN
    * VPN - PPTP, IPsec, OpenVPN
    * DMZ and 1-to-1 NAT
    * Stateful Firewall
    * Local DHCP and DNS Servers

Gateway Features

    * Antimalware - Antivirus, Antiphishing, Antispyware
    * Antispam
    * Networks Bandwidth Management
    * Intrusion Protection, Intrusion Prevention, Intrusion Detection
    * Protocol Filtering including Peer-to-Peer Detection
    * Content Filter
    * Web Proxy
    * Access Control

Server Features

    * Windows Networking with PDC Support
    * File and Print Services
    * Flexshares
    * Groupware with Outlook Connector
    * Mail Server - POP, IMAP, SMTP, Webmail, Retrieval
    * Mail Filtering - Antispam, Antimalware, Greylisting, Quarantine
    * Mail Archiving
    * Database with MySQL
    * Web Server with PHP Support

ReadMore »»  

Lunascape New Browser Style


Want to try a browser for surf on the net that is unique? Try Lunascape.
Online Lifestyle
Lunascape are using  3 browser rendering engine style innate from the already popular browsers such as Trident (IE, Avant Browser, Maxthon), Gecko (Firefox, Thunderbird, K-Meleon, Epiphany) and the WebKit engine used by Chrome from google, Shira, Arora , and Safari.

Therefore do not be surprised if the manufacturer claims that lunascape is currently the fastest browser.

One feature is the mainstay of Lunascape Crash Protection, which serve to protect the window when one crashes.

For more details about lunascape please visit developernya site. Download Lunascape Here
ReadMore »»  

Security Software For Administrator Network


10 programs of the best for audit Network and security software tools for Linux

Linux is a h**ker’s dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning Network vulnerabilities, and detecting possible intrusions. Please always keep in mind that these tools are not meant to harm, but to protect.

1. John the Ripper

John the Ripper is a free password cracking software tool initially developed for the UNIX operating system. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL and others.

2. Nmap

Nmap is my favorite network security scanner. It is used to discover computers and services on a computer network, thus creating a "map" of the network. Just like many simple port scanners, Nmap is capable of discovering passive services on a network despite the fact that such services aren't advertising themselves with a service discovery protocol. In addition Nmap may be able to determine various details about the remote computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that product, presence of some firewall techniques and, on a local area network, even vendor of the remote network card.

Nmap runs on Linux, Microsoft Windows, Solaris, and BSD (including Mac OS X), and also on AmigaOS. Linux is the most popular nmap platform and Windows the second most popular.

3. Nessus

Nessus is a comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems such as:

-Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
-Misconfiguration (e.g. open mail relay, missing patches, etc).
-Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
-Denials of service against the TCP/IP stack by using mangled packets

Nessus is the world's most popular vulnerability scanner, estimated to be used by over 75,000 organizations worldwide. It took first place in the 2000, 2003, and 2006 security tools survey from SecTools.Org.

4. chkrootkit

chkrootkit (Check Rootkit) is a common Unix-based program intended to help system administrators check their system for known rootkits. It is a shell script using common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures and for comparing a traversal of the /proc filesystem with the output of the ps (process status) command to look for discrepancies.

It can be used from a "rescue disc" (typically a Live CD) or it can optionally use an alternative directory from which to run all of its own commands. These techniques allow chkrootkit to trust the commands upon which it depend a bit more.

There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses). Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them.

5. Wireshark

Wireshark is a free packet sniffer computer application used for network troubleshooting, analysis, software and communications protocol development, and education. In June 2006, the project was renamed from Ethereal due to trademark issues.

The functionality Wireshark provides is very similar to tcpdump, but it has a GUI front-end, and many more information sorting and filtering options. It allows the user to see all traffic being passed over the network (usually an Ethernet network but support is being added for others) by putting the network interface into promiscuous mode.

Wireshark uses the cross-platform GTK+ widget toolkit, and is cross-platform, running on various computer operating systems including Linux, Mac OS X, and Microsoft Windows. Released under the terms of the GNU General Public License, Wireshark is free software.

6. Netcat

netcat is a computer networking utility for reading from and writing to network connections on either TCP or UDP.

Netcat was voted the second most useful network security tool in a 2000 poll conducted by insecure.org on the nmap users mailing list. In 2003, it gained fourth place, a position it also held in the 2006 poll.

The original version of netcat is a UNIX program. Its author is known as *Hobbit*. He released version 1.1 in March of 1996.

Netcat is fully POSIX compatible and there exist several implementations, including a rewrite from scratch known as GNU netcat.

7. Kismet

Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b and 802.11g traffic.

Kismet is unlike most other Wireless Network detectors in that it works passively. This means that without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients, and associate them with each other.

Kismet also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks.

8. hping

hping is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de facto tools for security auditing and testing of firewalls and networks, and was used to exploit the idle scan scanning technique (also invented by the hping author), and now implemented in the Nmap Security Scanner. The new version of hping, hping3, is scriptable using the Tcl language and implements an engine for string based, human readable description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP packet manipulation and analysis in very short time.

Like most tools used in computer security, hping is useful to both system administrators and crackers (or script kiddies).

9. Snort

Snort is a free and open source Network Intrusion prevention system (NIPS) and network intrusion detection (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks.

Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. The software is mostly used for intrusion prevention purposes, by dropping attacks as they are taking place. Snort can be combined with other software such as SnortSnarf, sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data. With patches for the Snort source from Bleeding Edge Threats, support for packet stream antivirus scanning with ClamAV and Network abnormality with SPADE in network layers 3 and 4 is possible with historical observation.

10. tcpdump

tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.

In some Unix-like operating systems, a user must have superuser privileges to use tcpdump because the packet capturing mechanisms on those systems require elevated privileges. However, the -Z option may be used to drop privileges to a specific unprivileged user after capturing has been set up. In other Unix-like operating systems, the packet capturing mechanism can be configured to allow non-privileged users to use it; if that is done, superuser privileges are not required.

The user may optionally apply a BPF-based filter to limit the number of packets seen by tcpdump; this renders the output more usable on networks with a high volume of traffic.
ReadMore »»  

10 Additional Software For Linux Ubuntu 9.10


Many software can be used for debian linux distros such as Ubuntu 9.10. Below is a complementary software for your Ubuntu 9.10 that can installing on your computer.

Download source for Ubuntu 9.10 here :

1. Google Picasa 3
2. Opera 10
3. Adobe Flashplayer 10
4. Skype
5. Google Earth
6. Adobe Reader 9
7. TrueType Fonts
8. RealPlayer 11
9. Win32 codec
10.Virtual Box
ReadMore »»  

Nagios For Linux Security


Security is extremely vulnerable if a computer is connected to the network, especially online via the internet. Dangers that lurk usually happens without conscious computer owners, therefore, many security experts are trying to assess and examine the gaps that can be taken by a data thief. The best step is to ready an umbrella before it rains.
One of the software can be used to monitor traffic to our computer data is Nagios.
What is Nagios?
Nagios® is a system and network monitoring application. It watches hosts and services that you specify, alerting you when things go bad and when they get better, was originally designed to run under Linux, although it should work under most other unices as well.
Some of the many features of Nagios include:

- Monitoring of network services (SMTP, POP3, HTTP, NNTP, PING, etc.)
- Monitoring of host resources (processor load, disk usage, etc.)
- Simple plugin design that allows users to easily develop their own service checks
- Parallelized service checks
- Ability to define network host hierarchy using "parent" hosts, allowing detection of and distinction between hosts that are down and those that are unreachable
- Contact notifications when service or host problems occur and get resolved (via email, pager, or user-defined method)
- Ability to define event handlers to be run during service or host events for proactive problem resolution
- Automatic log file rotation
- Support for implementing redundant monitoring hosts
- Optional web interface for viewing current network status, notification and problem history, log file, etc.

It's licensed under the terms of the GNU General Public License Version 2 as published by the Free Software Foundation. This gives you legal permission to copy, distribute and/or modify Nagios under certain conditions.
Read the 'LICENSE' file in the Nagios distribution HERE
Get Nagios : HERE
ReadMore »»  

PetaLinux SDK


PetaLinux merupakan program tambahan di linux yang lengkap dan khusus ditujukan untuk SDK FPGA berbasis System-on-Chip desain. Berisi semua yang diperlukan untuk membangun, mengembangkan, menguji dan menggunakan Linux pada FPGA, PetaLinux akan membantu mencapai produktivitas yang tinggi untuk memaksimalkan waktu dibidang pemrograman logic.

Fitur utama dari PetaLinux termasuk

* Software
o Source kernel linux yang lengkap
o Source code userland yang lengkap, termasuk library dan utilitas standar
o Root filesystem image builder
* Hardware
o Referensi desain untuk pengembangan FPGA.
* Tools
o PetaLogix automated BSP generator untuk otomatisasi target sistem Linux tertentu yang berguna untuk kustomisasi platform hardware.
o Self-contained GCC cross-compiler toolchains termasuk standar C library Linux
o GDB cross-debugger and gdbserver target debug stub
o Aplikasi dan modul generator


Platform dan arsitektur yang didukung :

Rilis PetaLinux saat ini mendukung the MicroBlaze soft-CPU architecture dari Xilinx.
* Xilinx :
o ML505
o ML401
o Spartan3ADSP1800
o Spartan3E500 dan 3E1600

Registrasi dan Download PetaLinux : DISINI
ReadMore »»  

Ubuntu Tuxcut v.s Win NetCut



Tux Cut is a small program software written in PyQt. TuxCut running on linux machine, its function like NetCut on windows.
TuxCut have a protect to me feature, but its not like NetCut, on TuxCut there is Change Mac feature that NetCut doesn't have. Style at this tool is simple, like Astaga.com Lifestyle kontes seo on the net today.
Get Tux Cut Here :

Download TuxCut rpm
Download TuxCut deb

Get Windows NetCut Here :

NetCut Windows

Get Anti Net Cut Here :


Anti NetCut Windows
Anti NetCut Linux with tar.gz
ReadMore »»  

Audit Security Jaringan dengan Pentest



Security Jaringan merupakan permasalahan yang sangat kompleks bagi seorang administrator jaringan. Karena untuk mengamankan jaringan bukan hanya memerlukan tool-tool yang banyak bertaburan di internet dan dapat diperoleh secara gratis, namun hal ini juga memerlukan keahlian dan pengalaman dari administrator itu sendiri.

Berbagai macam gangguan yang disebabkan oleh berbagai macam program atau software jahat dapat merusak dan mencuri data dari komputer korban. Meskipun telah dipasangi berbagai macam software, seperti antivirus, firewall, proxy, dan berbagai macam program lainnya.

Jaringan yang masih mempergunakan windows sebagai OS utama masih sangat rentan terhadap terhadap serangan program jahat, terutama virus komputer yang banyak berkembang biak di sistem operasi windows.

Oleh karena itu, sangat disarankan untuk jaringan dalam kapasitas besar mempergunakan linux sebagai benteng server jaringannya, karena selain masalah keamanan linux juga menggunakan source yang kecil sehingga meringankan beban kerja dari hardware server itu sendiri.

Untuk mengaudit keamanan atau security jaringan anda, banyak tool yang dapat dipergunakan. Namun tools audit security jaringan lebih banyak bekerja secara maksimal di lingkungan unix atau Linux. Salah satu tool untuk mengetes penetrasi jaringan (Pentest) adalah backtrack.

Backtrack merupakan salah satu distribusi linux yang fokus terhadap penetrasi jaringan. Untuk dapat menggunakan backtrack ini, seorang administrator jaringan dituntut menguasai sistem operasi linux karena pentest ini bekerja di lingkungan unix.

Silahkan coba salah satu pentest terbaik ini (versi penulis, hehehe). Untuk memperoleh pentest ini langsung aja ke bt4-prefinal-iso.

Ibarat kata pepatah "Pengalaman adalah guru yang terbaik". Oleh karena itu, seringlah mencoba dan mencoba lagi mengamankan jaringan anda dari disusupi pihak-pihak yang tidak bertanggung jawab.
ReadMore »»  

KAV KIS KEY Update



Melanjuti postingan sebelumnya cara mendapatkan kis dan kav key yang agak telat updatenya maka sekarang ini ada update untuk memperoleh kav dan kis key secara gratis.

Antivirus Kaspersky merupakan antivirus yang banyak dipergunakan untuk membantu keamanan pada saat online, namun untuk memperoleh lisensi key nya yang rada sulit. Karena apabila melakukan update secara online maka key yang diperoleh tidak lama akan di block sehingga fitur protection nya menjadi disable atau tidak berfungsi. Nah, untuk tetep dapat menggunakan antivirusnya secara gratis silahkan download kaspersky key finder di sini.

Postingan ini bukannya mengajar untuk membajak software, namun hanya sekedar membantu bagi yang ingin menggunakan antivirus yang bagus namun tidak memiliki dana untuk membeli lisensi software yang hanya bertahan selama 1 tahun. Semoga membantu.
ReadMore »»  

Cara mendapatkan KIS dan KAV key


Saat ini banyak software pembasmi virus komputer yang handal, namun kalo virus stop dreaming start action jangan dibasmi yach... :-D Kaspersky adalah software antivirus yang paling saya sukai, terutama Kaspersky Internet Security. Kaspersky ini ada dua macam yaitu Kaspersky Anti Virus dan kaspersky Internet Security untuk pengamanan berselancar di jaringan internet.
Namun, kesulitan utama bagi yang tidak mampu membeli software ini adalah license key nya. Antivirus kaspersky hanya memberikan masa uji coba selama 1 bulan, setelah itu pengguna diwajibkan untuk mengaktifkan license key kembali. Nah, untuk tetap menggunakan program kaspersky ini silahkan dapatkan software key updater nya disini. Jalankan software kecil buatan anak bangsa ini, kemudian download key nya.
Untuk update cara mendapatkan kis dan kav key yang lain baca postingan selanjutnya disini
Semoga membantu.
ReadMore »»  

F-Secure Internet Security Gratis


Situs F-Secure Jerman dan Majalah Chip Jerman sedang promosi untuk menggunakan F-Secure Internet Security 2009 selama 3 bulan secara gratis dengan dukungan penuh yaitu update secara online.
Jika berniat untuk mencoba atau menikmati 3 bulan penuh perlindungan ketika berselancar di internet, apalagi berselancar dengan keyword stop dreaming start action. F-Secure ini dapat diperoleh di halaman promosi melalui link disini and dapatkan kode aktivasinya. Proses ini sangat simple. Isi alamat email yang valid dan nama pengguna yang akan digunakan untuk menerima email aktivasi key.
Sedangkan untuk memperoleh F-Secure internet security 2009 (2010) dapat didownload disini.
ReadMore »»