Minggu, 28 September 2008

Kumpulan Update dari Microsoft file dan masalahnya

ini merupakan beberapa Kumpulan Update dari Microsoft file dan masalahnya mungkin dapat membantu anda dengan ini

File download nama masalah atau lubang
* KB873339 - Vulnerability in HyperTerminal could allow code execution
* KB884575 - Battery power may be drained more quickly than expected on Windows XP-based laptop
* KB885836 - Vulnerability in WordPad could allow code execution
* KB886677 - DBCS characters appear corrupted when browsing site using Shift-JIS encoding
* KB887472 - Security update to Microsoft Windows Messenger
* KB887606 - Microsoft XML Parser (MSXML) uses cached credentials incorrectly
* KB888111 - Universal Audio Architecture High Definition Audio Class Driver Version 1.0a
* KB889016 - Cannot obtain debug information about the resource objects of Application Verifier stop errors
* KB889320 - Computer Browser service stops and Event ID 7023 is logged after Windows Firewall service disabled
* KB889673 - DEP-enabled computer may unexpectedly quit after resuming from standby or hibernation
* KB892489 - Antivirus scan may increase the number of open handles for the svchost.exe process
* KB893008 - PAL format digital video cameras are incorrectly detected as NTSC format digital video cameras
* KB893756 - Vulnerability in Telephony service could allow remote code execution
* KB894395 - IME Composition or Candidate window remains visible even after losing focus when using Japanese IME
* KB896344 - Can't transfer files and settings from computer running 32-bit Windows XP to computer running Windows XP x64
* KB896358 - Vulnerability in HTML Help could allow remote code execution
* KB896423 - Vulnerability in Print Spooler service could allow remote code execution
* KB896428 - Vulnerability in Telnet client could allow information disclosure
* KB896626 - Windows XP TV tuner program stops responding or displays corrupted video
* KB897338 - New language locales for Windows XP Service Pack 2
* KB897663 - Exception may not show up in the Windows Firewall GUI the exception is created by modifying the registry
* KB898461 - Permanent copy of the Package Installer for Windows version 6.3.13.0
* KB898543 - Cannot correctly install security fixes in Windows XP Starter Edition
* KB899271 - Updated USB Video Class (UVC) driver for Windows XP
* KB900485 - 0x0000007E stop error in Windows XP SP2
* KB901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution
* KB901190 - Vulnerability in the Korean Input Method Editor (IME) could allow elevation of privilege
* KB901214 - Vulnerability in Microsoft Color Management Module could allow remote code execution
* KB902149 - FTP client may echo account information back to the screen
* KB902845 - Computer stops responding during text-mode Setup when you try to install Windows XP
* KB902853 - An unnecessary restore operation may be started on a RAID group when computer is put in hibernation
* KB903250 - Song titles are copied to a recordable CD after cancelling a burn operation in Windows Media Player 10
* KB905414 - Vulnerability in Network Connection Manager could allow denial of service
* KB906472 - Cannot format a Memory Stick removable media device by using the FAT32 file system
* KB906569 - Update to add the Tools tab to the System Configuration utility in Windows XP Service Pack 2
* KB907865 - IPSec Policy Agent update
* KB908519 - Vulnerability in embedded Web fonts could allow remote code execution
* KB908531 - Vulnerability in Windows Explorer Could Lead to Remote Code Execution
* KB908536 - Horizontal scroll bar used in forms may not respond to mouse controls or actions when using themes
* KB909441 - In Control Panel, "Sounds and Audio Devices" does not correctly display the setting in "Speaker Setup" list
* KB909520 - Software update for Base Smart Card Cryptographic Service Provider
* KB909608 - Access violation when using /integrate switch to integrate KB900725 into Windows XP SP2 installation source files
* KB909667 - Computer stops responding during standby or hibernation operations or trying to use the Shut Down command
* KB910437 - Access violation error occurs when Windows Automatic Updates tries to download updates
* KB911280 - Vulnerability in Routing and Remote Access could allow remote code execution
* KB911562 - Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution
* KB911564 - Vulnerability in Windows Media Player plug-in with non-Microsoft Internet browsers could allow remote code execution
* KB911927 - Vulnerability in WebClient could allow remote code execution
* KB911990 - Connection to the Sony Media Changer/Recorder is lost
* KB912024 - Update Rollup 2 for eHome Infrared Receiver
* KB912461 - Cannot obtain information about specific events when you program against the DVD Nav control in Windows XP
* KB913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service
* KB913808 - The embedded resource version of the LIP MUI files is incorrect in Windows XP
* KB914388 - Vulnerability in the DHCP Client Service could allow remote code execution
* KB914440 - Network Diagnostics for Windows XP
* KB914463 - WMI causes object access failure events when an SACL is applied to the HKEY_USERS registry subkey
* KB914841 - Simplify the creation and maintenance of Internet Protocol security filters
* KB914906 - "Unsupported State(2)" error message when a Windows XP Starter Edition-based computer continuously restarts
* KB915377 - Slow performance when trying to access shared resources using Windows Explorer
* KB915378 - Update for Add New Hardware Control Panel
* KB915865 - XmlLite update package for Windows XP Service Pack 2
* KB917140 - Microsoft Application Compatibility Toolkit detailed log entries cannot be logged
* KB917275 - Windows Rights Management Services for Windows XP
* KB917730 - You cannot create a network connection when you are starting a Windows XP SP2-based computer
* KB918439 - Vulnerability in ART image rendering could allow remote code execution
* KB920213 - Vulnerability in Microsoft Agent could allow remote code execution
* KB920342 - Upgrade PNRP to PNRP version 2.0
* KB920670 - Vulnerabilities in Microsoft Windows Hyperlink Object Library could allow remote code execution
* KB920683 - Vulnerability in DNS resolution could allow remote code execution
* KB920685 - Vulnerability in Indexing Service could allow cross-site scripting
* KB920872 - Audio playback does not play file from correct position after pausing, and Stop error message randomly received when trying to play audio files
* KB922120 - Network Map in Windows Vista does not display computers that are running Windows XP
* KB922668 - Windows XP COM+ Hotfix Rollup Package 14
* KB923154 - EAP reauthentication may not occur and the Wireless Zero Configuration service may not work correctly when using a third-party application
* KB923191 - Vulnerability in Windows Explorer could allow remote code execution
* KB923414 - Vulnerability in Server Service could allow denial of service
* KB923689 - Vulnerability in Windows Media Format 9 could allow remote code execution
* KB923845 - Update package for Background Intelligent Transfer Service (BITS)
* KB923980 - Vulnerability in Client Service could allow remote code execution
* KB924667 - Vulnerability in Microsoft Foundation Classes could allow for remote code execution
* KB924941 - Update to resolve timing issues resulting in race conditions when using Bluetooth devices connected via USB
* KB925398 - Vulnerability in Windows Media Player 6.4 could allow remote code execution
* KB925720 - Windows CardSpace hotfix rollup package
* KB925902 - Vulnerability in GDI could allow remote code execution
* KB926436 - Vulnerability in Microsoft OLE Dialog could allow remote code execution
* KB926646 - Can't increase the limit concurrent SMB command in the Windows XP Professional Server service
* KB927544 - Can't create an AVI larger than 512GB and can't play an AVI larger than 800 GB using DirectX
* KB927779 - Vulnerability in Microsoft Data Access Components could allow remote code execution
* KB927880 - Can't log on to a device that has both a blank user name and password using Internet Explorer 7
* KB927891 - Access violation received when trying to install an update from Windows Update
* KB928255 - Vulnerability in Windows Shell could allow elevation of privilege
* KB928595 - An access violation occurs and the installation process stops responding when trying to migrate hotfixes
* KB929123 - Cumulative security update for Outlook Express (June, 2006)
* KB929280 - Microsoft Management Console 3.0 does not correctly display 32-bit color snap-in icons
* KB931125 - Microsoft Root Certificate Update (May 2008)
* KB931261 - Vulnerability in UPnP could allow remote code execution
* KB932168 - Vulnerability in Microsoft Agent could allow remote code execution
* KB932590 - Windows-based applications that use the TZ environment variable may not work as expected because of changes to DST
* KB932662 - An access violation occurs in a program that uses the DirectShow DV Mux filter
* KB932716 - Image Mastering API v2.0 (IMAPIv2.0) update
* KB933062 - Update that improves the stability of the Windows Management Instrumentation repository
* KB933215 - Symantec AntiVirus cannot detect viruses after installing KB922582 hotfix
* KB933729 - Vulnerabilities in RPC could allow denial of service
* KB934161 - "Windows cannot calculate the effective permissions for User_Name" error when trying to view permissions for domain-migrated user account
* KB935708 - USB telephony device that is installed on a Windows XP-based computer is unexpectedly set as the default audio device
* KB935840 - Vulnerability in Schannel could allow remote code execution
* KB935879 - Some imaging applications cannot open .tif files that are generated by the Scanner and Camera Wizard
* KB936021 - Security update for Microsoft XML Core Services 3.0
* KB936357 - Microcode update to improve the reliability of systems with Intel processors
* KB936678 - A PDF file that created in Word 2007 uses the default font instead of the font specified
* KB936782 - Vulnerability in Windows Media Player 9 could allow remote code execution
* KB937894 - Vulnerability in Message Queuing Service could allow remote code execution
* KB937930 - Unable to switch between displays on a portable computer
* KB938127 - Vulnerability in Vector Markup Language could allow remote code execution
* KB938464 - Security update for GDI+
* KB938596 - Add new functionality to suppress Plug and Play-related UI messages
* KB939252 - The domain controller locator cannot find an appropriate domain controller
* KB939450 - The GetCharacterPlacement function unexpectedly returns zero for a string that uses an OpenType font
* KB939780 - 0x000000D1 DRIVER_IRQL_NOT_LESS_OR_EQUAL stop error when a multiprocessor computer uses driver battc.sys
* KB939786 - An application that is started by a non-administrative user cannot listen to the HTTP traffic of the computer on which the application is running
* KB939850 - Prompted for authentication when accessing resources that require NTLM authentication after using a smart card to unlock a computer
* KB940350 - "Illegal System DLL Relocation" error when deploying KB935448 update using SMS or another update deployment product
* KB940541 - The private bytes of an application increase after calling the WlanGetAvailableNetworkList function and the WlanFreeMemory function
* KB940648 - "You might not have permission to use this network resource" error when trying to open My Documents folder after resuming from hibernation
* KB941036 - Computer may stop responding after the wireless connection to a USB device is dropped
* KB941077 - "ApplicationName has encountered a problem and needs to close" error message when performing a copy-and-paste or drag-and-drop operation
* KB941133 - The Properties dialog box of a DFS share takes several minutes to appear
* KB941569 - Vulnerability in Windows Media file format 9 could allow remote code execution
* KB941837 - A computer with an Intel processor may experience high power consumption when the processor is idle
* KB942288 - Windows Installer 4.5
* KB942603 - Windows background music does not play as expected when the OOBE Wizard is running after using the Sysprep utility
* KB943055 - Vulnerability in OLE Automation could allow remote code execution
* KB943092 - Custom actions fail when installing an MSI package that runs Custom Action Type 2 in the system account or in the service account
* KB943232 - An application that uses the Sxs.dll file crashes when running the application
* KB943303 - "An access violation has occurred in Services.exe" error message
* KB943326 - Overlapping layered windows are not displayed in the correct order
* KB943729 - New Group Policy preferences in Windows Server 2008
* KB943854 - Batch files for which you create a hash rules do not work
* KB944043 - Windows Server 2008 read-only domain controller compatibility pack
* KB944340 - Time stamps are incorrect after applying KB928388 update and changing time settings to a year earlier than 2007
* KB944505 - DFS clients may access the DFS root server in the remote site even though the DFS root server in the local site is available
* KB944939 - The first logon to a computer through terminal services is not denied even though the user is not a member of the Remote Desktop Users group
* KB945015 - An extra forward slash mark is appended to the query path of a WebDAV PROPFIND request when visiting a SharePoint Portal Server site
* KB945553 - Vulnerability in DNS client could allow spoofing
* KB946629 - Some Secure Digital (SD) cards do not work correctly
* KB946648 - Security update for Windows Messenger 4.7
* KB947100 - After a COM application handles an access violation, the COM application stops responding
* KB947460 - ": is not accessible" error when trying to open a mapped DFS folder after coming out of standby
* KB948046 - A Word document is not printed as expected after installing the Windows European Union Expansion Font pack
* KB948590 - Vulnerability in GDI could allow remote code execution
* KB948720 - Cannot install device drivers in a Windows Server 2008 cluster environment if the drivers contain LZ-compressed files
* KB949033 - Severe video degradation and a Stop error when connecting a USB Webcam to the computer
* KB949127 - Cannot establish a wireless connection using EAP authentication if the Service Set Identifier (SSID) includes a comma
* KB949483 - 0x1000007E stop error when resuming computer from hibernation
* KB949900 - The RunOnce.exe process may stop responding during the driver installation process
* KB950162 - Computer becomes unresponsive after the driver load and unload operation is repeated many times
* KB950312 - "The application failed to initialize properly (0xC0000142)" error when trying to start a console-based application
* KB950616 - An audio application that uses the Portcls.sys file may stop responding
* KB950749 - Vulnerability in the Microsoft Jet Database Engine could allow remote code execution
* KB950762 - Vulnerabilities in Pragmatic General Multicast (PGM) could allow denial of service
* KB950974 - Vulnerability in Event System could allow remote code execution
* KB951066 - Security update for Outlook Express
* KB951072 - August 2008 cumulative time zone update
* KB951126 - Multiprocessor computer stops responding on a black screen after resuming from hibernation
* KB951163 - When trying to connect to the local computer using the MSTSC command, a black screen may appear for several minutes
* KB951376 - Vulnerability in Bluetooth stack could allow remote code execution
* KB951410 - Devices that stream data over more than two isochronous channels using IEEE 1394 connections have choppy or distorted output
* KB951531 - The W32Time service does not synchronize the CMOS clock time to the Internet time after the W32Time service stops
* KB951618 - A black screen occurs when upgrading the operating system on a computer that has Onekey Recovery 5.0 installed
* KB951624 - A 30-second delay occurs during the initialization of some network-based applications
* KB951698 - Vulnerabilities in DirectX could allow remote code execution
* KB951709 - Event ID 26 when attaching two IDE ATA/ATAPI devices as master and subordinate IDE devices
* KB952020 - "The necessary security algorithm is not supported" error when trying to open a clear-text signed message in Outlook 2007
* KB952079 - Cannot use the Backup Utility to restore certain EFS-encrypted files and data corruption occurs
* KB952155 - Remote Desktop Client 6.1
* KB952206 - Printer-driver upgrade fails on printer clients when multiple printer queues are upgraded at the same time
* KB952287 - An application that uses the ADO interface may malfunction or data loss may occur when the application connects to SQL Server
* KB952954 - Vulnerabilities in Microsoft Windows Image Color Management could allow remote code execution
* KB953028 - An application experiences an access violation and then crashes if the computer has more than four cores or more than four logical processors
* KB953323 - Windows Explorer leaks handles when browsing shared folders on remote computers by using network shortcuts
* KB953609 - "At least one of your changes was not applied successfully to the wireless configuration" error when adding a wireless network
* KB953838 - Cumulative security update for Internet Explorer (August, 2008)
* KB953839 - Cumulative security update for ActiveX (August, 2008)
* KB954193 - Jet 4.0 Database Engine cumulative hotfix package: July 2, 2008
* KB954232 - On-Screen Keyboard behavior does not mimic the physical keyboard behavior in certain scenarios
* KB954494 - Can't view XPS or XBAP files in Internet Explorer
* KB955043 - A memory leak may occur when running an application that uses the DHTML Edit control
* KB955109 - 0xC0000005 (Access Violation) error when running an application that uses the Application Desktop Toolbar (AppBar) component
* KB955417 - Protected storage (PStore) uses a lower-quality cryptographic function when the system locale is set to French (France)
* KB955535 - Server Message Block (SMB) redirector functions time out more quickly than expected on a computer that has multiple processors
* KB955576 - TAPI-based applications stop responding, and you cannot disconnect telephone calls on a Windows XP-based telephony server
* KB955843 - An ADO-based application may stop responding when it uses the adAsyncExecute option to open a Recordset object
* KB955988 - The Win32_Environment WMI class doesn't return the value of the PATH environment variable if it contains more than 1,024 characters
* KB956072 - Terminal server does not allow RDP connections whose encryption level is set to Low

Memasang Konektor Usb Di kabel belden

Tutorial kali ini Merupakan Simulasi Memasang Konektor Usb Dengan menggunakan kabel belden.Kali ini saya akan menggunakan kabel belden untuk membuat kabel usb dengan kabel usb konektor cewe dan cowonya dibagi dua dan disambung secara manual dengan menggunakan kabel belden cdt jaringan.

Gambaran warna tembaga kabel belden/jaringan.



Gambar barang Kabel Usb yang dibagi dua



Berikut Cara susunan kabel usb



Lihat Gambaran Pemasangannya



Berikut adalah gambaran kabel yang telah saya praktekan dan hasilnya berhasil ,yang pernah saya coba paling panjang 10 meter itu sudah agak sedikit lambat mungkin tergantung kabel belden yang kita pakai,warna kabel usb bermacam2 seperti kabel belden saja tetapi warna ini hanyalah sebagai patokan dasar yang didalam praktek dilapangan kemungkinan berbeda tetapi menurut logiknya sama.
Cukup sekian tutorial dari saya kritik saran kirim ke ibaskorn@gmail.com,terima kasih wasalam.

Jumat, 26 September 2008

Libur Lebaran Telah Tiba - TelahTiba (Iddul fitri didepan mata)

Lebaran telah tiba,libur pun telah tiba,Sebentar lagi idul fitri nan suci,hapus dosa lama buka lembaran baru,Mudah mudahan diwaktu yang akan datang tuturial blog ini semakin bertambah banyak dan bermanfaat untuk kita semua.Selaku pemilik blog ini saya Mohamad Basuki Mengucapkan Mohon maaf Lahir dan Batin yang sebesar-besarnya.

Kamis, 25 September 2008

Contoh Simulasi Dasar Crimping Kabel LAN

Sekarang saya akan membahas dasar2 dan simulasi contoh untuk mengcrimping kable jaringan LAN, simulasi gambar ini mengikuti standart warna yang dipakai kebanyakan para teknisi jaringan,jika ada yang beranggapan warna yang lain,boleh saja jika mengikuti konsep pengcrimpingan kabel sesuai contoh2 yang beredar dibuku2 atau literaur2.Di tulisan ini saya tidak membahas sebegitu detailnya hanya pempraktekannya dengan cara digambarkan oleh gambar berdasarkan hapalan warna,jadi berpatokan dengan warna seperti dibawah ini:

Pada Crimping Memerlukan:

1.Tang Crimping
2.Konektor RJ-45 disarankan ( memakai konekor AMP original)
3.Kabel Belden /kabel jaringan dengan 8 tembaga (disankan pakai yang belden USA)


Penjelasan warna kabel tembaga


a.kabel tembaga kabel jaringan terdiri dari tiga 8 tembaga yang masing warna warnanya berbeda-beda saya akan coba sebutkan acak yaitu:

1.orange putih
2.orange
3.hijauputih
4.hijau
5.biru putih
6.biru
7.cokelat putih
8.cokelat

Untuk warna kabel diatas memang berpasang warna – warnanya,dan sekali lagi jika terdapat kabel yang warna tembaganya saya tidak sebutkan tidak apa2 ,tidak semua kabel jaringan sama semua,sekali lagi warna yang saya jelaskan hanya warna yang dipakai standarisasi yang dipakaii oleh kebanyakan teknisi jaringan.

Contoh simulasi pemasangan seperti sebagai berikut



ika anda sudah berhasil memasukan kabel tembaga ke konektor RJ -45 tolong di cek:
1.Priksa lagi urutan warna tembaga yang telah terpasang apakah sudah benar urutannnya?
2.Priksa kekuaatan tancap tembaga ke konektor rj-45 apakah sudah kuat di cek dengan cara ditarik kabel dan konektor pelan2 apakah kuat ?
3.Priksa kuningan di bawah konektor RJ-45 apakah sejajar bentuk masuknya kedalam?
4.Cek ujung konektor Rj-45 apakah rata atau terlihat ujung tembaganya jika terlihat ujung tembaganya lebih bagus?

Jika anda telah mengikuti petunjuk diatas anda telah berhasil mengcrimping kabel jaringan tinggal melanjutkan dengan membuat variasi crimping sesuai dengan kegunaannya.

Ada dua tipe Crimping yang UMUM sering dipakai:
1.Strech

Strech adalah Model crimping yang digunakan untuk menghubung komp ke denga hub jadi susunannya sebagai berikut:
Tiap 1 kabel pasti mempunyai dua ujung oleh karena dijelaskan digambar sebagai berikut:



2.Cross
Cross adalah tipe crimping yang digunakan bilamana menghubungkan dengan cara 2 komputer/atau per to peer panjang maksimal kabel 10 meter tidak boleh lebih.



Untuk kabel cross memang agak sedikit berbeda dari kabel strech diatas sesuai dengan gambar diatas:
Demikian sedikit tutorial dari saya seperti biasa kritik dan saran kirim ke ibaskorn@gmail.com

mengkonversi fat atau fat 32 ke ntfs di winxp

mengkonversi system fat atau fat 32 ke ntfs di winxp

masuk ke command promp
klik-start-run-cmd-enter


convert d: /fs:ntfs

this command would convert your d: drive to ntfs.

if the system cannot lock the drive, you will be prompted to convert it during next reboot.

Normally you should select yes.

Conversion from fat/fat32 to ntfs is non-destructive, your data on the drive will NOT be lost.

Be aware that converting to ntfs will make that partition of your
drive unreadable under dos unless you have ntfs utilites to do so.

setelah ini komputer akan meminta restart dan akan dijalankan pada mode underdos.

Rabu, 24 September 2008

Mencegah Virus local Masuk kekomp dengan menonaktifkan Autorun di Windows

Salah satu cara pencegahan yang patut dicoba untuk mengurangi atau dapat juga mencegah masuknya virus ke computer dengan cara salah satunya yaitu: menonaktifkan fungsi Autorun di windows xp.
Klik start-run-ketik regedit trus klik ntombol enter
Akan terbuka tampilan regedit
Sebelum melakukan langgkah dibawah sebainya export regedit terlebih dahulu dengan mengklik di
File-Export
Berinama file backup trus save baru anda bisa melakukan langkah di bawah.



Jika gambar kurang jelas sebaiknya gambar ini di save as trus di preview di perbesar,krn dibawah terdapat alamat untuk meubah konfigurasi regedit.
Cara diatas berguna sekali biasanya virus local menginfeksi korban computer melalui media autorun yang dijalankan melalui flashdisk atau disk yang sudah terinfeksi jangan lupa setelah seting restart computer anda.
Cukup Tutorial singkatnya dari saya,kritik dan saran hubungi ibaskorn@gmail.com

Senin, 22 September 2008

Membuat Sharing Windows XP seperti keluarga Win2000

Membuat Sharing Windows XP seperti keluarga Windows 2000

Pada tulisan kali ini saya bertolak belakang dengan yang saya tulis sebelumnya base on linux,Sekarang saya mulai bersikap adil untuk sedikit menguak/mengingat kembali base on windows xp yang mayoritas dipakai user didunia.
Sekarang saya akan menerangkan bagaimana cara supaya windows xp sharingnya seperti keluarga windows 2000 seperti dibawah ini:
Cara2 di bawah dilakukan di user administrator windows xp
1 Langkah pertama
Rubah windows logon menjadi setingan classic fungsinya ialah supaya user yang didaftarkan di computer saya tidak ditampilkan di windows logon,
Caranya seperti dibawah :
Klik start-setting-controlpanel-user accounts





Untuk menceknya logoff computer dengan catatan user dan password yang diinput di windows logon klasik anda jangan sampai lupa
Catatan:user dan password harus diisi untuk masuk ke menu.

2.Langkah Kedua.
To the point?

Buka windows explorer-klik tools-folder options



Perbedaan setelah dilakukan konfigurasi di atas
Jelas sekali melalui gambar di bawah perbedaaannya ialah bertambanya menu security diatas dan permission di bawah
Langkah seting security tinggal di klik saja akan muncul gambar dibawah ini,






Untuk konfigurasi security tidak jauh berbeda dengan menu permission kurang lebih sama jadi setalah ini dilakukan anda bisa mentesnya dari komp lain.
Catatan:user yang ada di groups users names merupakan nama user dan password yang telah di daftarkan baik sebagai admin atau user biasa di computer yang ingin disharing datanya,jadi anda harus benar mendaftarkan username dan password secara benar agar tidak terjadi kecolongan data yang berharga.
Cukup sekian tutorial dari saya seperti biasa kritik dan saran ke ibaskorn@gmail.com.

Jumat, 19 September 2008

Sekilas Perintah Command2 Periksa Hardware di Linux Fedora 8

1.)cek hardisk komputer free dan no free

a.cara priksa 1 hardisk

#df -h ==> enter

hasilnya:===============================================

Filesystem Size Used Avail Use% Mounted on
/dev/sda1 222G 6.3G 204G 3% /
tmpfs 1012M 0 1012M 0% /dev/shm
========================================================
Pengertian2 hasilnya:
========================================================
filesystem= sda1 bearti satu partisi yang dipakai sistem
size=jumlah 222 GB
used=jumlah yang dipakai 6.3 GB
========================================================

b.Cek seluruh partisi yang dipakai di komp linux

#cat /proc/partitions

hasilnya:================================================
8 0 244198584 sda
8 1 239513053 sda1
8 2 4610655 sda2

=========================================================

2.)cek memori komputer linux

#free ==> enter

hasilnya:================================================================
total used free shared buffers cached
Mem: 2071828 1316032 755796 0 66780 1024300
-/+ buffers/cache: 224952 1846876
Swap: 4610644 0 4610644
=========================================================================

Pengertian2 hasilnya:

mem=2 gb memori fisik
swap=4 gb memori buatan

=========================================================================
3.)Cek Prosesor Komputer

a.cara 1 lewat printah dmidecode

#dmidecode | more ==> enter

hasil:===================================================================

#dmidecode 2.7
SMBIOS 2.4 present.
43 structures occupying 1659 bytes.
Table at 0x7FBF4000.

Handle 0x0000, DMI type 4, 35 bytes.
Processor Information
Socket Designation: Intel(R) Genuine processor
Type: Central Processor
Family:
Manufacturer: Intel(R) Corporation
ID: FD 06 00 00 FF FB EB BF
Version: Intel(R) Core(TM)2 Duo CPU E4500 @ 2.20GHz
Voltage: 1.6 V
External Clock: 200 MHz
Max Speed: 4000 MHz
Current Speed: 2200 MHz
Status: Populated, Enabled
Upgrade: Other
L1 Cache Handle: 0x0002
L2 Cache Handle: 0x0001
L3 Cache Handle: Not Provided
Serial Number: Not Specified
==========================================================================
Pengertian2 hasilnya:

prosesor tipe:intel
Ghznya :2.20 GHZ
dan lain2
=========================================================================

b.cara 2

#cat /proc/cpuinfo
hasilnya:=================================================================
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 15
model name : Intel(R) Core(TM)2 Duo CPU E4500 @ 2.20GHz
stepping : 13
cpu MHz : 1200.000
cache size : 2048 KB
physical id : 0
siblings : 2
core id : 0
cpu cores : 2
fdiv_bug : no
hlt_bug : no
f00f_bug : no
coma_bug : no
fpu : yes
fpu_exception : yes
cpuid level : 10
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe nx lm constant_tsc arch_perfmon pebs bts pni monitor ds_cpl est tm2 ssse3 cx16 xtpr lahf_lm
bogomips : 4401.89
clflush size : 64
=============================================================================


4.)Mengecek Ethernet card dan lain2
#lspci

00:00.0 Host bridge: Intel Corporation E7230/3000/3010 Memory Controller Hub
00:1c.0 PCI bridge: Intel Corporation 82801G (ICH7 Family) PCI Express Port 1 (rev 01)
00:1c.4 PCI bridge: Intel Corporation 82801GR/GH/GHM (ICH7 Family) PCI Express Port 5 (rev 01)
00:1c.5 PCI bridge: Intel Corporation 82801GR/GH/GHM (ICH7 Family) PCI Express Port 6 (rev 01)
00:1d.0 USB Controller: Intel Corporation 82801G (ICH7 Family) USB UHCI Controller #1 (rev 01)
00:1d.1 USB Controller: Intel Corporation 82801G (ICH7 Family) USB UHCI Controller #2 (rev 01)
00:1d.2 USB Controller: Intel Corporation 82801G (ICH7 Family) USB UHCI Controller #3 (rev 01)
00:1d.3 USB Controller: Intel Corporation 82801G (ICH7 Family) USB UHCI Controller #4 (rev 01)
00:1d.7 USB Controller: Intel Corporation 82801G (ICH7 Family) USB2 EHCI Controller (rev 01)
00:1e.0 PCI bridge: Intel Corporation 82801 PCI Bridge (rev e1)
00:1f.0 ISA bridge: Intel Corporation 82801GB/GR (ICH7 Family) LPC Interface Bridge (rev 01)
00:1f.1 IDE interface: Intel Corporation 82801G (ICH7 Family) IDE Controller (rev 01)
00:1f.2 IDE interface: Intel Corporation 82801GB/GR/GH (ICH7 Family) SATA IDE Controller (rev 01)
00:1f.3 SMBus: Intel Corporation 82801G (ICH7 Family) SMBus Controller (rev 01)
========================
03:00.0 Ethernet controller: Intel Corporation 82573E Gigabit Ethernet Controller (Copper) (rev 03)
========================
03:00.3 Serial controller: Intel Corporation Active Management Technology - SOL (rev 03)
03:00.4 Serial bus controller [0c07]: Intel Corporation 82573E KCS (Active Management) (rev 03)
04:04.0 VGA compatible controller: ATI Technologies Inc ES1000 (rev 02)
========================
04:05.0 Ethernet controller: Intel Corporation 82541GI Gigabit Ethernet Controller (rev 05)
========================

pengertiannya ada 2 ethernet card di komp
Intel Corporation 82541GI Gigabit & Intel Corporation 82573E Gigabit****
Sekian tutorial dari saya seperti biasa kritik dan saran hub ibaskorn@gmail.com

Selasa, 16 September 2008

Shutdown otomatis Komputer pada linux fedora 8

1.Perintahnya Menggunakan service crond / Crondtab

Cron / Crontab merupakan tool untuk melakukan Penjadwalan, sehingga kita dapat melakukan eksekusi program pada background sesuai jadwal yang kita tentukan. baik itu melakukan reboot system, running script dan lain sebagainya, Cron daemon menggunakan file konfigurasi crontab dan masing² user dapat membuat jadwal prosesnya sendiri yang berada di /var/spool/cron/crontab , contoh file crontab secara default berada di /etc/crontab secara umum format crontab sebagai berikut :

* * * * * * *

Penjelasan :
Baris 1 itu menandakan Menit dimana formatnya 0-59
Baris 2 itu menandakan Jam dimana formatnya 0-23 (0 = dini hari)
Baris 3 itu menandakan Hari dimana formatnya 1-31
Baris 4 itu menandakan Bulan dimana formatnya 1-12
Baris 5 itu menandakan Mingguan dimana formatnya 0-6 (0 = Minggu)
Baris 6 itu menandakan User yang menjalankan Crontab ( Optional )
Baris 7 itu menandakan Command Yang akan di Eksekusi

Di fedora 8 formatnya seperti ini dan yang sudah sy buat
# run-parts
01 * * * * root run-parts /etc/cron.hourly
02 4 * * * root run-parts /etc/cron.daily
22 4 * * 0 root run-parts /etc/cron.weekly
42 4 1 * * root run-parts /etc/cron.monthly
05 20 * * * root /sbin/shutdown -h now



Penjelasan:
05 = menit ke 5
20 = jam 8 malam
* * * = hari,bulan,minggu (saya tidak isi karena saya shutdown komp tiap hari tdk memerlukan tanggal)
root = user yang menjalan kan perintah / eksekusi shutdown
/sbin/shutdown -h now = merupakan perintah command untuk shutdown komputer

jadi saya buat seperti ini:
05 20 * * * root /sbin/shutdown -h now


Langkah2 diatas ubah file crontab yang berada pada

/etc/crontab

akan muncul seperti ini setelah di open:

SHELL=/bin/bash
PATH=/sbin:/bin:/usr/sbin:/usr/bin
MAILTO=root
HOME=/

# run-parts
01 * * * * root run-parts /etc/cron.hourly
02 4 * * * root run-parts /etc/cron.daily
22 4 * * 0 root run-parts /etc/cron.weekly
42 4 1 * * root run-parts /etc/cron.monthly

05 20 * * * root /sbin/shutdown -h now =>>>>>>>>>>>script yang saya tambahkan


Kemudian save dokumen
masuk terminal
ketik:

chkconfig crontab on => untuk membuat crondtab setiap kali komputer dinyalakan service nya selalu aktif
service crond restart => merestart service crondtab sehabis di edit tadi

saya telah mencobanya di user root dan berhasil.

Trimakasih cukup sekian tutorial dari saya kritik dan saran ke ibaskorn@gmail.com

Selasa, 02 September 2008

Cara Pemakaian Putty dan Winscp di Windows

A.Putty

Putty adalah software remote console/ terminal yang digunakan untuk meremote komp dengan terhubungnya menggunakan port ssh atau sebagainya, Pada bahasan disini diterang cara unutk meremote komp sistem operasi linux dengan menggunakan komp sisem operasi windows tentunya putty disini diinstall diwindows jadi digunakan putty versi windows.
Putty merupakan software berbasis open source yang dapat di download di
Download Putty terbaru 64bit dilink ini http://scapognel.com/1oct
Deonload Putty terbaru 32bit dilink ini  http://scapognel.com/1oiA
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html atau


Sebelum melakukan langkah di bawah port ssh di komp tujuan harus aktif dengan cara diaktifkan servicenya melalui terminal
=> di fedora=> service sshd start “untuk mengaktifkan por ssh”
=> chkconfig sshd on “servis aktif terus berjalan”
jika untuk mengatahui sshd sudah terinstall belum ==>service sshd status
jika faelid berarti lom terinstall berarti harus diinstal dulu opensshnya
Cara pakai putty sesudah didownload
Software putty tidak memerlukan installasi putty versi ini langsung klik2 saja akan muncul sebagai berikut:


merupakan versi yang dipakai pada waktu membuat tutorial ini.

Langkah awal menggunakannnya






Langkah kedua
untuk mengisi login as harus benar passwordnya juga harus tepat sesuai yang terdaftar pada komp yang di remote.






Langkah 3
Anda berhasil masuk hal yang terpenting disini jika kita ingin akses full administrator komputer linux yang di remote tadi harus masuk sebagai root.



B.Winscp

winscp adalah program remote direktori explorer komputer dengan perantara port ssh pada komputer yang diremote.winscp dapat mengedit file conf juga dan mngkopi file dari tempat direktori explorer komp yang meremote ke komp yang di remote.
Anda bisa langsung mendapatkan winscp dengan mendownload link http://scapognel.com/1okU
Winscp software opensource yang dapat di download langsung di http://winscp.net/eng/download.php

sebelum melakukan langkah di bawah port ssh di komp tujuan harus aktif dengan cara diaktifkan servicenya melalui terminal
=> di fedora=> service sshd start “untuk mengaktifkan port ssh”
=> chkconfig sshd on “servis aktif terus berjalan”
jika untuk mengatahui sshd sudah terinstall belum ==>service sshd status
jika faelid berarti lom terinstall berarti harus diinstal dulu opensshnya
winscp tidak memerlukan installasi tinggal klik kiri 2kali langsung jalan seperti sebagai berikut:

gambar winscp setelah di klik merupakan tampilan awal:



Langkah pertama masukan ip tujuan komp linux yang akan di remote trus klik login:



Setelah login isi username dan password user tujuan komp yang telah terdaftar di sistem linux tersebut:



Tampilan menu pembuka winscp sebelum digunakan.



Dengan winscp anda dapat mendelete rename edit copy file atau folder semaunya di winscp tanpa harus menggunakan editor vi,perintah - perintah console yang membingunkan dengan sarat anda remote harus sebagai root di komp linux yang diremote.
Cukup sekian Tutorial Trima kasih.
Demikian tutorial dari saya kritik dan saran harap hub:ibaskorn@gmail.com

Jumat, 29 Agustus 2008

Daftar Berbagai macam - macam port - port dan fungsinya

Daftar Berbagai macam - macam port - port dan fungsinya
sumber artikel hacker blackbox 2008


Guide:
port 0 REx
port 1 (UDP) - Sockets des Troie
port 2 Death
port 5 yoyo
port 11 Skun
port 16 Skun
port 17 Skun
port 18 Skun
port 19 Skun
port 20 Amanda

port 21 ADM worm, Back Construction, Blade Runner, BlueFire, Bmail, Cattivik FTP Server, CC Invader, Dark FTP, Doly Trojan, FreddyK, Invisible FTP, KWM, MscanWorm, NerTe, NokNok, Pinochet, Ramen, Reverse Trojan, RTB 666, The Flu, WinCrash, Voyager Alpha Force

port 22 InCommand, Shaft, Skun
p
ort 23 ADM worm, Aphex's Remote Packet Sniffer , AutoSpY, ButtMan, Fire HacKer, My Very Own trojan, Pest, RTB 666, Tiny Telnet Server - TTS, Truva Atl

port 25 Antigen, Barok, BSE, Email Password Sender , Gip, Laocoon, Magic Horse, MBT , Moscow Email trojan, Nimda, Shtirlitz, Stukach, Tapiras, WinPC

port 27 Assasin
port 28 Amanda
port 30 Agent 40421
port 31 Agent 40421, Masters Paradise, Skun
port 37 ADM worm
port 39 SubSARI
port 41 Deep Throat , Foreplay
port 44 Arctic
port 51 f**k Lamers Backdoor
port 52 MuSka52, Skun
port 53 ADM worm, li0n, MscanWorm, MuSka52
port 54 MuSka52
port 66 AL-Bareki
port 69 BackGate Kit, Nimda, Pasana, Storm, Storm worm, Theef
port 69 (UDP) - Pasana
port 70 ADM worm
port 79 ADM worm, Firehotcker

port 80 711 trojan (Seven Eleven), AckCmd, BlueFire, Cafeini, Duddie, Executor, God Message, Intruzzo , Latinus, Lithium, MscanWorm, NerTe, Nimda, Noob, Optix Lite, Optix Pro , Power, Ramen, Remote Shell , Reverse WWW Tunnel Backdoor , RingZero, RTB 666, Scalper, Screen Cutter , Seeker, Slapper, Web Server CT , WebDownloader

port 80 (UDP) - Penrox
port 81 Asylum
port 101 Skun
port 102 Delf, Skun
port 103 Skun
port 105 NerTe
port 107 Skun
port 109 ADM worm
port 110 ADM worm
port 111 ADM worm, MscanWorm
port 113 ADM worm, Alicia, Cyn, DataSpy Network X, Dosh, Gibbon, Taskman
port 120 Skun
port 121 Attack Bot, God Message, JammerKillah
port 123 Net Controller
port 137 Chode, Nimda
port 137 (UDP) - Bugbear, Msinit, Opaserv, Qaz
port 138 Chode, Nimda
port 139 Chode, Fire HacKer, Msinit, Nimda, Opaserv, Qaz
port 143 ADM worm
port 146 Infector
port 146 (UDP) - Infector
port 166 NokNok
port 170 A-trojan
port 171 A-trojan
port 200 CyberSpy
port 201 One Windows Trojan
port 202 One Windows Trojan, Skun
port 211 One Windows Trojan
port 212 One Windows Trojan
port 221 Snape
port 222 NeuroticKat, Snape
port 230 Skun
port 231 Skun
port 232 Skun
port 285 Delf
port 299 One Windows Trojan
port 334 Backage
port 335 Nautical
port 370 NeuroticKat
port 400 Argentino
port 401 One Windows Trojan
port 402 One Windows Trojan
port 411 Backage
port 420 Breach
port 443 Slapper
port 445 Nimda
port 455 Fatal Connections
port 511 T0rn Rootkit
port 513 ADM worm
port 514 ADM worm
port 515 MscanWorm, Ramen
port 520 (UDP) - A UDP backdoor
port 555 711 trojan (Seven Eleven), Phase Zero, Phase-0
port 564 Oracle
port 589 Assasin
port 600 SweetHeart
port 623 RTB 666
port 635 ADM worm
port 650 Assasin
port 661 NokNok

port 666 Attack FTP, Back Construction, BLA trojan, NokNok, Reverse Trojan, Shadow Phyre, Unicorn, yoyo

port 667 NokNok, SniperNet
port 668 Unicorn
port 669 DP trojan , SniperNet
port 680 RTB 666
port 692 GayOL
port 700 REx
port 777 Undetected
port 798 Oracle
port 808 WinHole
port 831 NeuroticKat
port 901 Net-Devil, Pest
port 902 Net-Devil, Pest
port 903 Net-Devil
port 911 Dark Shadow, Dark Shadow
port 956 Crat Pro
port 991 Snape
port 992 Snape
port 999 Deep Throat , Foreplay
port 1000 Der Späher / Der Spaeher, Direct Connection, GOTHIC Intruder , Theef

port 1001 Der Späher / Der Spaeher, GOTHIC Intruder , Lula, One Windows Trojan, Theef

port 1005 Pest, Theef
port 1008 AutoSpY, li0n
port 1010 Doly Trojan
port 1011 Doly Trojan
port 1012 Doly Trojan
port 1015 Doly Trojan
port 1016 Doly Trojan
port 1020 Vampire

port 1024 Latinus, Lithium, NetSpy, Ptakks

port 1025 AcidkoR, BDDT, DataSpy Network X, Fraggle Rock , KiLo, MuSka52, NetSpy, Optix Pro , Paltalk, Ptakks, Real 2000, Remote Anything, Remote Explorer Y2K, Remote Storm, RemoteNC

port 1025 (UDP) - KiLo, Optix Pro , Ptakks, Real 2000, Remote Anything, Remote Explorer Y2K, Remote Storm, Yajing

port 1026 BDDT, Dark IRC, DataSpy Network X, Delta Remote Access , Dosh, Duddie, IRC Contact, Remote Explorer 2000, RUX The TIc.K

port 1026 (UDP) - Remote Explorer 2000
port 1027 Clandestine, DataSpy Network X, KiLo, UandMe
port 1028 DataSpy Network X, Dosh, Gibbon, KiLo, KWM, Litmus, Paltalk, SubSARI
port 1028 (UDP) - KiLo, SubSARI
port 1029 Clandestine, KWM, Litmus, SubSARI
port 1029 (UDP) - SubSARI
port 1030 Gibbon, KWM
port 1031 KWM, Little Witch, Xanadu, Xot
port 1031 (UDP) - Xot
port 1032 Akosch4, Dosh, KWM
port 1032 (UDP) - Akosch4
port 1033 Dosh, KWM, Little Witch, Net Advance
port 1034 KWM
port 1035 Dosh, KWM, RemoteNC, Truva Atl
port 1036 KWM
port 1037 Arctic , Dosh, KWM, MoSucker
port 1039 Dosh
port 1041 Dosh, RemoteNC
port 1042 BLA trojan
port 1042 (UDP) - BLA trojan
port 1043 Dosh
port 1044 Ptakks
port 1044 (UDP) - Ptakks
port 1047 RemoteNC
port 1049 Delf, The Hobbit Daemon
port 1052 Fire HacKer, Slapper, The Hobbit Daemon
port 1053 The Thief
port 1054 AckCmd, RemoteNC
port 1080 SubSeven 2.2, WinHole
port 1081 WinHole
port 1082 WinHole
port 1083 WinHole
port 1092 Hvl RAT
port 1095 Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT
port 1097 Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT
port 1098 Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT
port 1099 Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT
port 1104 (UDP) - RexxRave
port 1111 Daodan, Ultors Trojan
port 1111 (UDP) - Daodan
port 1115 Lurker, Protoss
port 1116 Lurker
port 1116 (UDP) - Lurker
port 1122 Last 2000, Singularity
port 1122 (UDP) - Last 2000, Singularity
port 1133 SweetHeart
port 1150 Orion
port 1151 Orion
port 1160 BlackRat
port 1166 CrazzyNet
port 1167 CrazzyNet
port 1170 Psyber Stream Server , Voice
port 1180 Unin68
port 1183 Cyn, SweetHeart
port 1183 (UDP) - Cyn, SweetHeart
port 1200 (UDP) - NoBackO
port 1201 (UDP) - NoBackO
port 1207 SoftWAR
port 1208 Infector
port 1212 Kaos
port 1215 Force
port 1218 Force
port 1219 Force
port 1221 f**k Lamers Backdoor
port 1222 f**k Lamers Backdoor
port 1234 KiLo, Ultors Trojan
port 1243 BackDoor-G, SubSeven , Tiles
port 1245 VooDoo Doll
port 1255 Scarab
port 1256 Project nEXT, RexxRave
port 1272 The Matrix
port 1313 NETrojan
port 1314 Daodan
port 1349 BO dll
port 1369 SubSeven 2.2
port 1386 Dagger
port 1415 Last 2000, Singularity
port 1433 Voyager Alpha Force
port 1441 Remote Storm
port 1492 FTP99CMP
port 1524 Trinoo
port 1560 Big Gluck, Duddie
port 1561 (UDP) - MuSka52
port 1600 Direct Connection
port 1601 Direct Connection
port 1602 Direct Connection
port 1703 Exploiter
port 1711 yoyo
port 1772 NetControle
port 1772 (UDP) - NetControle
port 1777 Scarab
port 1826 Glacier
port 1833 TCC
port 1834 TCC
port 1835 TCC
port 1836 TCC
port 1837 TCC
port 1905 Delta Remote Access
port 1911 Arctic
port 1966 Fake FTP
port 1967 For Your Eyes Only , WM FTP Server
port 1978 (UDP) - Slapper
port 1981 Bowl, Shockrave
port 1983 Q-taz
port 1984 Intruzzo , Q-taz
port 1985 Black Diver, Q-taz
port 1985 (UDP) - Black Diver
port 1986 Akosch4
port 1991 PitFall
port 1999 Back Door, SubSeven , TransScout

port 2000 A-trojan, Der Späher / Der Spaeher, Fear, Force, GOTHIC Intruder , Last 2000, Real 2000, Remote Explorer 2000, Remote Explorer Y2K, Senna Spy Trojan Generator, Singularity

port 2000 (UDP) - GOTHIC Intruder , Real 2000, Remote Explorer 2000, Remote Explorer Y2K

port 2001 Der Späher / Der Spaeher, Duddie, Glacier, Protoss, Senna Spy Trojan Generator, Singularity, Trojan Cow

port 2001 (UDP) - Scalper
port 2002 Duddie, Senna Spy Trojan Generator, Sensive
port 2002 (UDP) - Slapper
port 2004 Duddie
port 2005 Duddie
port 2023 Ripper Pro
port 2060 Protoss
port 2080 WinHole
port 2101 SweetHeart
port 2115 Bugs
port 2130 (UDP) - Mini BackLash
port 2140 The Invasor
port 2140 (UDP) - Deep Throat , Foreplay , The Invasor
port 2149 Deep Throat
port 2150 R0xr4t
port 2156 Oracle
port 2222 SweetHeart, Way
port 2222 (UDP) - SweetHeart, Way
port 2281 Nautical
port 2283 Hvl RAT
port 2300 Storm
port 2311 Studio 54
port 2330 IRC Contact
port 2331 IRC Contact
port 2332 IRC Contact, Silent Spy
port 2333 IRC Contact
port 2334 IRC Contact, Power
port 2335 IRC Contact
port 2336 IRC Contact
port 2337 IRC Contact, The Hobbit Daemon
port 2338 IRC Contact
port 2339 IRC Contact, Voice Spy
port 2339 (UDP) - Voice Spy
port 2343 Asylum
port 2345 Doly Trojan
port 2407 yoyo
port 2418 Intruzzo
port 2555 li0n, T0rn Rootkit
port 2565 Striker trojan
port 2583 WinCrash
port 2589 Dagger
port 2600 Digital RootBeer
port 2702 Black Diver
port 2702 (UDP) - Black Diver
port 2772 SubSeven
port 2773 SubSeven , SubSeven 2.1 Gold
port 2774 SubSeven , SubSeven 2.1 Gold
port 2800 Theef
port 2929 Konik
port 2983 Breach
port 2989 (UDP) - Remote Administration Tool - RAT
port 3000 InetSpy, Remote Shut, Theef
port 3006 Clandestine
port 3024 WinCrash
port 3031 MicroSpy
port 3119 Delta Remote Access
port 3128 Reverse WWW Tunnel Backdoor , RingZero
port 3129 Masters Paradise
port 3131 SubSARI
port 3150 Deep Throat , The Invasor, The Invasor
port 3150 (UDP) - Deep Throat , Foreplay , Mini BackLash
port 3215 XHX
port 3215 (UDP) - XHX
port 3292 Xposure
port 3295 Xposure
port 3333 Daodan
port 3333 (UDP) - Daodan
port 3410 Optix Pro
port 3417 Xposure
port 3418 Xposure
port 3456 Fear, Force, Terror trojan
port 3459 Eclipse 2000, Sanctuary
port 3505 AutoSpY
port 3700 Portal of Doom
port 3721 Whirlpool
port 3723 Mantis
port 3777 PsychWard
port 3791 Total Solar Eclypse
port 3800 Total Solar Eclypse
port 3801 Total Solar Eclypse
port 3945 Delta Remote Access
port 3996 Remote Anything
port 3996 (UDP) - Remote Anything
port 3997 Remote Anything
port 3999 Remote Anything
port 4000 Remote Anything, SkyDance
port 4092 WinCrash
port 4128 RedShad
port 4128 (UDP) - RedShad
port 4156 (UDP) - Slapper
port 4201 War trojan
port 4210 Netkey
port 4211 Netkey
port 4225 Silent Spy
port 4242 Virtual Hacking Machine - VHM
port 4315 Power
port 4321 BoBo
port 4414 AL-Bareki
port 4442 Oracle
port 4444 CrackDown, Oracle, Prosiak, Swift Remote
port 4445 Oracle
port 4447 Oracle
port 4449 Oracle
port 4451 Oracle
port 4488 Event Horizon
port 4567 File Nail
port 4653 Cero
port 4666 Mneah
port 4700 Theef
port 4836 Power
port 5000 Back Door Setup, Bubbel, Ra1d, Sockets des Troie
port 5001 Back Door Setup, Sockets des Troie
port 5002 Shaft
port 5005 Aladino
port 5011 Peanut Brittle
port 5025 WM Remote KeyLogger
port 5031 Net Metropolitan
port 5032 Net Metropolitan
port 5050 R0xr4t
port 5135 Bmail
port 5150 Pizza
port 5151 Optix Lite
port 5152 Laphex
port 5155 Oracle
port 5221 NOSecure
port 5250 Pizza
port 5321 Firehotcker
port 5333 Backage
port 5350 Pizza
port 5377 Iani
port 5400 Back Construction, Blade Runner, Digital Spy
port 5401 Back Construction, Blade Runner, Digital Spy , Mneah
port 5402 Back Construction, Blade Runner, Digital Spy , Mneah
port 5418 DarkSky
port 5419 DarkSky
port 5419 (UDP) - DarkSky
port 5430 Net Advance
port 5450 Pizza
port 5503 Remote Shell
port 5534 The Flu
port 5550 Pizza
port 5555 Daodan, NoXcape
port 5555 (UDP) - Daodan
port 5556 BO Facil
port 5557 BO Facil
port 5569 Robo-Hack
port 5650 Pizza
port 5669 SpArTa
port 5679 Nautical
port 5695 Assasin
port 5696 Assasin
port 5697 Assasin
port 5742 WinCrash
port 5802 Y3K RAT
port 5873 SubSeven 2.2
port 5880 Y3K RAT
port 5882 Y3K RAT
port 5882 (UDP) - Y3K RAT
port 5888 Y3K RAT
port 5888 (UDP) - Y3K RAT
port 5889 Y3K RAT
port 5933 NOSecure
port 6000 Aladino, NetBus , The Thing
port 6006 Bad Blood
port 6267 DarkSky
port 6400 The Thing
port 6521 Oracle
port 6526 Glacier
port 6556 AutoSpY
port 6661 Weia-Meia
port 6666 AL-Bareki, KiLo, SpArTa
port 6666 (UDP) - KiLo

port 6667 Acropolis, BlackRat, Dark FTP, Dark IRC, DataSpy Network X, Gunsan, InCommand, Kaitex, KiLo, Laocoon, Net-Devil, Reverse Trojan, ScheduleAgent, SlackBot, SubSeven , Subseven 2.1.4 DefCon 8, Trinity, Y3K RAT, yoyo

port 6667 (UDP) - KiLo
port 6669 Host Control, Vampire, Voyager Alpha Force
port 6670 BackWeb Server, Deep Throat , Foreplay , WinNuke eXtreame
port 6697 Force

port 6711 BackDoor-G, Duddie, KiLo, Little Witch, Netkey, Spadeace, SubSARI, SubSeven , SweetHeart, UandMe, Way, VP Killer

port 6712 Funny trojan, KiLo, Spadeace, SubSeven
port 6713 KiLo, SubSeven
port 6714 KiLo
port 6715 KiLo
port 6718 KiLo
port 6723 Mstream
port 6766 KiLo
port 6766 (UDP) - KiLo
port 6767 KiLo, Pasana, UandMe
port 6767 (UDP) - KiLo, UandMe
port 6771 Deep Throat , Foreplay
port 6776 2000 Cracks, BackDoor-G, SubSeven , VP Killer
port 6838 (UDP) - Mstream
port 6891 Force
port 6912 Shit Heep

port 6969 2000 Cracks, BlitzNet, Dark IRC, GateCrasher, Kid Terror, Laphex, Net Controller, SpArTa, Vagr Nocker

port 6970 GateCrasher
port 7000 Aladino, Gunsan, Remote Grab, SubSeven , SubSeven 2.1 Gold, Theef
port 7001 Freak88, Freak2k
port 7007 Silent Spy
port 7020 Basic Hell
port 7030 Basic Hell
port 7119 Massaker
port 7215 SubSeven , SubSeven 2.1 Gold
port 7274 AutoSpY
port 7290 NOSecure
port 7291 NOSecure
port 7300 NetSpy
port 7301 NetSpy
port 7306 NetSpy
port 7307 NetSpy, Remote Process Monitor
port 7308 NetSpy, X Spy
port 7312 Yajing
port 7410 Phoenix II
port 7424 Host Control
port 7424 (UDP) - Host Control
port 7597 Qaz
port 7626 Glacier
port 7648 XHX
port 7673 Neoturk
port 7676 Neoturk
port 7677 Neoturk
port 7718 Glacier
port 7722 KiLo
port 7777 God Message
port 7788 Last 2000, Last 2000, Singularity
port 7788 (UDP) - Singularity
port 7789 Back Door Setup
port 7800 Paltalk
port 7826 Oblivion
port 7850 Paltalk
port 7878 Paltalk
port 7879 Paltalk
port 7979 Vagr Nocker
port 7983 (UDP) - Mstream
port 8011 Way
port 8012 Ptakks
port 8012 (UDP) - Ptakks
port 8080 Reverse WWW Tunnel Backdoor , RingZero, Screen Cutter
port 8090 Aphex's Remote Packet Sniffer
port 8090 (UDP) - Aphex's Remote Packet Sniffer
port 8097 Kryptonic Ghost Command Pro
port 8100 Back streets
port 8110 DLP
port 8111 DLP
port 8127 9_119, Chonker
port 8127 (UDP) - 9_119, Chonker
port 8130 9_119, Chonker, DLP
port 8131 DLP
port 8301 DLP
port 8302 DLP
port 8311 SweetHeart
port 8322 DLP
port 8329 DLP
port 8488 (UDP) - KiLo
port 8489 KiLo
port 8489 (UDP) - KiLo
port 8685 Unin68
port 8732 Kryptonic Ghost Command Pro
port 8734 AutoSpY
port 8787 Back Orifice 2000
port 8811 Fear
port 8812 FraggleRock Lite
port 8821 Alicia
port 8848 Whirlpool
port 8864 Whirlpool
port 8888 Dark IRC
port 9000 Netministrator
port 9090 Aphex's Remote Packet Sniffer
port 9117 Massaker
port 9148 Nautical
port 9301 DLP
port 9325 (UDP) - Mstream
port 9329 DLP
port 9400 InCommand
port 9401 InCommand
port 9536 Lula
port 9561 Crat Pro
port 9563 Crat Pro
port 9870 Remote Computer Control Center
port 9872 Portal of Doom
port 9873 Portal of Doom
port 9874 Portal of Doom
port 9875 Portal of Doom
port 9876 Rux
port 9877 Small Big Brother
port 9878 Small Big Brother, TransScout
port 9879 Small Big Brother
port 9919 Kryptonic Ghost Command Pro
port 9999 BlitzNet, Oracle, Spadeace
port 10000 Oracle, TCP Door, XHX
port 10000 (UDP) - XHX
port 10001 DTr, Lula
port 10002 Lula
port 10003 Lula
port 10008 li0n
port 10012 Amanda
port 10013 Amanda
port 10067 Portal of Doom
port 10067 (UDP) - Portal of Doom
port 10084 Syphillis
port 10084 (UDP) - Syphillis
port 10085 Syphillis
port 10086 Syphillis
port 10100 Control Total, GiFt trojan, Scalper
port 10100 (UDP) - Slapper
port 10167 Portal of Doom
port 10167 (UDP) - Portal of Doom
port 10498 (UDP) - Mstream
port 10520 Acid Shivers
port 10528 Host Control
port 10607 Coma
port 10666 (UDP) - Ambush
port 10887 BDDT
port 10889 BDDT
port 11000 DataRape, Senna Spy Trojan Generator
port 11011 Amanda
port 11050 Host Control
port 11051 Host Control
port 11111 Breach
port 11223 Progenic trojan, Secret Agent
port 11225 Cyn
port 11225 (UDP) - Cyn
port 11660 Back streets
port 11718 Kryptonic Ghost Command Pro
port 11831 DarkFace, DataRape, Latinus, Pest, Vagr Nocker
port 11977 Cool Remote Control
port 11978 Cool Remote Control
port 11980 Cool Remote Control
port 12000 Reverse Trojan
port 12310 PreCursor
port 12321 Protoss
port 12321 (UDP) - Protoss
port 12345 Ashley, BlueIce 2000, Mypic , NetBus , Pie Bill Gates, Q-taz , Sensive, Snape, Vagr Nocker, ValvNet , Whack Job
port 12345 (UDP) - BlueIce 2000
port 12346 NetBus
port 12348 BioNet
port 12349 BioNet, The Saint
port 12361 Whack-a-mole
port 12362 Whack-a-mole
port 12363 Whack-a-mole
port 12623 ButtMan
port 12623 (UDP) - ButtMan, DUN Control
port 12624 ButtMan, Power
port 12631 Whack Job
port 12684 Power
port 12754 Mstream
port 12904 Rocks
port 13000 Senna Spy Trojan Generator, Senna Spy Trojan Generator
port 13013 PsychWard
port 13014 PsychWard
port 13028 Back streets
port 13079 Kryptonic Ghost Command Pro
port 13370 SpArTa
port 13371 Optix Pro
port 13500 Theef
port 13753 Anal FTP
port 14194 CyberSpy
port 14285 Laocoon
port 14286 Laocoon
port 14287 Laocoon
port 14500 PC Invader
port 14501 PC Invader
port 14502 PC Invader
port 14503 PC Invader
port 15000 In Route to the Hell, R0xr4t
port 15092 Host Control
port 15104 Mstream
port 15206 KiLo
port 15207 KiLo
port 15210 (UDP) - UDP remote shell backdoor server
port 15382 SubZero
port 15432 Cyn
port 15485 KiLo
port 15486 KiLo
port 15486 (UDP) - KiLo
port 15500 In Route to the Hell
port 15512 Iani
port 15551 In Route to the Hell
port 15695 Kryptonic Ghost Command Pro
port 15845 (UDP) - KiLo
port 15852 Kryptonic Ghost Command Pro
port 16057 MoonPie
port 16484 MoSucker
port 16514 KiLo
port 16514 (UDP) - KiLo
port 16515 KiLo
port 16515 (UDP) - KiLo
port 16523 Back streets
port 16660 Stacheldraht
port 16712 KiLo
port 16761 Kryptonic Ghost Command Pro
port 16959 SubSeven , Subseven 2.1.4 DefCon 8
port 17166 Mosaic
port 17449 Kid Terror
port 17499 CrazzyNet
port 17500 CrazzyNet
port 17569 Infector
port 17593 AudioDoor
port 17777 Nephron
port 18753 (UDP) - Shaft
port 19191 BlueFire
port 19216 BackGate Kit
port 20000 Millenium, PSYcho Files, XHX
port 20001 Insect, Millenium, PSYcho Files
port 20002 AcidkoR, PSYcho Files
port 20005 MoSucker
port 20023 VP Killer
port 20034 NetBus 2.0 Pro, NetBus 2.0 Pro Hidden, Whack Job
port 20331 BLA trojan
port 20432 Shaft
port 20433 (UDP) - Shaft
port 21212 Sensive
port 21544 GirlFriend, Kid Terror
port 21554 Exploiter, FreddyK, Kid Terror, Schwindler, Sensive, Winsp00fer
port 21579 Breach
port 21957 Latinus
port 22115 Cyn
port 22222 Donald Dick, G.R.O.B., Prosiak, Ruler, RUX The TIc.K
port 22223 RUX The TIc.K
port 22456 Clandestine
port 22554 Schwindler
port 22783 Intruzzo
port 22784 Intruzzo
port 22785 Intruzzo
port 23000 Storm worm
port 23001 Storm worm
port 23005 NetTrash, Oxon
port 23006 NetTrash, Oxon
port 23023 Logged
port 23032 Amanda
port 23321 Konik
port 23432 Asylum
port 23456 Clandestine, Evil FTP, Vagr Nocker, Whack Job
port 23476 Donald Dick
port 23476 (UDP) - Donald Dick
port 23477 Donald Dick
port 23777 InetSpy
port 24000 Infector
port 24289 Latinus
port 25002 MOTD
port 25002 (UDP) - MOTD
port 25123 Goy'Z TroJan
port 25555 FreddyK
port 25685 MoonPie
port 25686 DarkFace, MoonPie
port 25799 FreddyK
port 25885 MOTD
port 25982 DarkFace, MoonPie
port 26274 (UDP) - Delta Source
port 26681 Voice Spy
port 27160 MoonPie
port 27184 Alvgus trojan 2000
port 27184 (UDP) - Alvgus trojan 2000
port 27373 Charge
port 27374 Bad Blood, Fake SubSeven, li0n, Ramen, Seeker, SubSeven , SubSeven 2.1 Gold, Subseven 2.1.4 DefCon 8, SubSeven 2.2, SubSeven Muie, The Saint
port 27379 Optix Lite
port 27444 (UDP) - Trinoo
port 27573 SubSeven
port 27665 Trinoo
port 28218 Oracle
port 28431 Hack´a´Tack
port 28678 Exploiter
port 29104 NETrojan, NetTrojan
port 29292 BackGate Kit
port 29559 AntiLamer BackDoor , DarkFace, DataRape, Ducktoy, Latinus, Pest, Vagr Nocker
port 29589 KiLo
port 29589 (UDP) - KiLo
port 29891 The Unexplained
port 29999 AntiLamer BackDoor
port 30000 DataRape, Infector
port 30001 Err0r32
port 30005 Litmus
port 30100 NetSphere
port 30101 NetSphere
port 30102 NetSphere
port 30103 NetSphere
port 30103 (UDP) - NetSphere
port 30133 NetSphere
port 30303 Sockets des Troie
port 30331 MuSka52
port 30464 Slapper
port 30700 Mantis
port 30947 Intruse
port 31320 Little Witch
port 31320 (UDP) - Little Witch
port 31335 Trinoo
port 31336 Butt Funnel
port 31337 ADM worm, Back Fire, Back Orifice (Lm), Back Orifice russian, BlitzNet, BO client, BO Facil, BO2, Freak88, Freak2k, NoBackO
port 31337 (UDP) - Back Orifice, Deep BO
port 31338 Back Orifice, Butt Funnel, NetSpy (DK)
port 31338 (UDP) - Deep BO, NetSpy (DK)
port 31339 Little Witch, NetSpy (DK), NetSpy (DK)
port 31339 (UDP) - Little Witch
port 31340 Little Witch
port 31340 (UDP) - Little Witch
port 31382 Lithium
port 31415 Lithium
port 31416 Lithium
port 31416 (UDP) - Lithium
port 31557 Xanadu
port 31745 BuschTrommel
port 31785 Hack´a´Tack
port 31787 Hack´a´Tack
port 31788 Hack´a´Tack
port 31789 Hack´a´Tack
port 31789 (UDP) - Hack´a´Tack
port 31790 Hack´a´Tack
port 31791 Hack´a´Tack
port 31791 (UDP) - Hack´a´Tack
port 31792 Hack´a´Tack
port 31887 BDDT
port 32000 BDDT
port 32001 Donald Dick
port 32100 Peanut Brittle, Project nEXT
port 32418 Acid Battery
port 32791 Acropolis, Rocks
port 33270 Trinity
port 33333 Prosiak
port 33545 G.R.O.B.
port 33567 li0n, T0rn Rootkit
port 33568 li0n, T0rn Rootkit
port 33577 Son of PsychWard
port 33777 Son of PsychWard
port 33911 Spirit 2000, Spirit 2001
port 34312 Delf
port 34313 Delf
port 34324 Big Gluck
port 34343 Osiris
port 34444 Donald Dick
port 34555 (UDP) - Trinoo (for Windows)
port 35000 Infector
port 35555 (UDP) - Trinoo (for Windows)
port 35600 SubSARI
port 36794 Bugbear
port 37237 Mantis
port 37651 Charge
port 38741 CyberSpy
port 38742 CyberSpy
port 40071 Ducktoy
port 40308 SubSARI
port 40412 The Spy
port 40421 Agent 40421, Masters Paradise
port 40422 Masters Paradise
port 40423 Masters Paradise
port 40425 Masters Paradise
port 40426 Masters Paradise
port 41337 Storm
port 41666 Remote Boot Tool , Remote Boot Tool
port 43720 (UDP) - KiLo
port 44014 Iani
port 44014 (UDP) - Iani
port 44444 Prosiak
port 44575 Exploiter
port 44767 School Bus
port 44767 (UDP) - School Bus
port 45092 BackGate Kit
port 45454 Osiris
port 45632 Little Witch
port 45673 Acropolis, Rocks
port 46666 Taskman
port 46666 (UDP) - Taskman
port 47017 T0rn Rootkit
port 47262 (UDP) - Delta Source
port 47698 KiLo
port 47785 KiLo
port 47785 (UDP) - KiLo
port 47891 AntiLamer BackDoor
port 48004 Fraggle Rock
port 48006 Fraggle Rock
port 48512 Arctic
port 49000 Fraggle Rock
port 49683 Fenster
port 49683 (UDP) - Fenster
port 49698 (UDP) - KiLo
port 50000 SubSARI
port 50021 Optix Pro
port 50130 Enterprise
port 50505 Sockets des Troie
port 50551 R0xr4t
port 50552 R0xr4t
port 50766 Schwindler
port 50829 KiLo
port 50829 (UDP) - KiLo
port 51234 Cyn
port 51966 Cafeini
port 52365 Way
port 52901 (UDP) - Omega
port 53001 Remote Windows Shutdown - RWS
port 54283 SubSeven , SubSeven 2.1 Gold
port 54320 Back Orifice 2000
port 54321 Back Orifice 2000, School Bus , yoyo
port 55165 File Manager trojan, File Manager trojan
port 55555 Shadow Phyre
port 55665 Latinus, Pinochet
port 55666 Latinus, Pinochet
port 56565 Osiris
port 57163 BlackRat
port 57341 NetRaider
port 57785 G.R.O.B.
port 58134 Charge
port 58339 Butt Funnel
port 59211 Ducktoy
port 60000 Deep Throat , Foreplay , Sockets des Troie
port 60001 Trinity
port 60008 li0n, T0rn Rootkit
port 60068 The Thing
port 60411 Connection
port 60551 R0xr4t
port 60552 R0xr4t
port 60666 Basic Hell
port 61115 Protoss
port 61337 Nota
port 61348 Bunker-Hill
port 61440 Orion
port 61603 Bunker-Hill
port 61746 KiLo
port 61746 (UDP) - KiLo
port 61747 KiLo
port 61747 (UDP) - KiLo
port 61748 (UDP) - KiLo
port 61979 Cool Remote Control
port 62011 Ducktoy
port 63485 Bunker-Hill
port 64101 Taskman
port 65000 Devil, Sockets des Troie, Stacheldraht
port 65289 yoyo
port 65421 Alicia
port 65422 Alicia
port 65432 The Traitor (= th3tr41t0r)
port 65432 (UDP) - The Traitor (= th3tr41t0r)
port 65530 Windows Mite
port 65535 RC1 trojan
-------------------------

Please observe that the ports 34555 and 35555 concerns the Windows version of Trinoo, not the Sun version.

Kamis, 28 Agustus 2008

Membuat Load/Save Extensi Openoffice SepertiOffice dari Microsoft.

Membuat Load/Save Extensi Openoffice Sama Seperti Office dari Microsoft.

Agar dokumen yang kita kerjakan di aplikasi open office dapat dibaca langsung formatnya oleh aplikasi Micorosoft Office itu perlu dilakukan perubahan seting di Load/Save pada aplikasi openoffice.
Langkah pertama buka aplikasi openoffice writer setelah dibuka kemudian ikuti gambar dibawah:



settelah dibuka kemudian saya akan merubah exstensi default open office seperti :
opennoffice writer *.odt to *.doc Microsoft World
Openoffice Calculate *.ods to *.xls Microsoft Excel
Openoffice Imppress *.odp to *.ppt Microsoft Powerpoint

dengan cara sebagai berikut.



Lalu klik Ok.

Dokumen anda telah dapat langsung dibuka di Microsoft Office,dan dapat mengurangi kekurangan tadi tetapi ingat openoffice itu tidak sama persis seperti microsoft office,langkah diatas tadi dilakukan supaya terjadi keselarasan dokumen kerja yang dihasilkan dalam satu kantor,disamping mempercepat efisiensi kerja juga,Sekian Tutorial dari saya Kritik dan saran ke ibaskorn@gmail.com,Trima kasih Wasalam.

Cara memblok situs tanpa menggunakan software di windows xp

Cara memblok situs tanpa menggunakan software di windows xp
mode komputer standalone,local

Caranya:

1] buka file "HOST" di C:\WINDOWS\system32\drivers\etc
2] gunakan editor notepad
3] lihat gambar dibawah



selanjutnya tes seperti gambar dibawah

Rabu, 27 Agustus 2008

Mengetahui Password ODBC yang Telah Dibuat di Windows XP.

Mengetahui Password ODBC yang Telah Dibuat di Windows XP.

ODBC itu adalah salah satu cara mengkoneksikan database dengan program agar program dapat terhubung secara langsung kedatabase,ODBC ini adalah fasilitas yang telah disediakan khusus oleh Microsoft( letaknya di control panel-administrative tool-datasource (odbc)).Cara mengetahui password ODBC di windows xp dengan masuk ke system registry windows.
Ada dua Tipe ODBC dibuat bisa di System dan di User.
Ya aku anggap semua sudah bisa membuat odbc di windows,ini odbc yang saya sudah buat lihat gambar menggunakan database Microsoft acces:



Langsung saja untuk mengetahui passwordnya buka regedit
Klik Start-Run-regedit-enter
Akan terbuka tampilan System Regtistry Windows anda seperti dibawah




Saya rasa sudah cukup jelas untuk melihat odbc yang dibuat di user.

Sekarang saya buat di System



Lalu masuk ke registry windows kita



Saya rasa sudah sangat jelas ya jadi perbedaan kalo kita buat odbc di user letaknya di hkey c user sedangkan kalo kita buat di system letaknya di local machine itu saja sedikit dari saya,kritik dan saran kirim ke ibaskorn@gmail.com ,Terima kasih wasalam.

Sabtu, 23 Agustus 2008

Mentest PowerSupply Komputer tanpa menggunakan PC

Salah satu cara untuk mentest power supply komputer adalah dengan cara tidak memakai pc mainboard,langsung saja caranya adalah dengan menyiapkan satu tembaga polos mirip tembaga kabel jaringan,panjang kabel pendek saja karena fungsi kabel ini sebagai penghubung saja ,kemudian anda cari dilubang power supply yang 24 pin biasanya terdapat kabel hijau dan hitam cari kabel hijau dan hitam setelah dapat lubangnya anda siap - siap menghubungkan lubang dengan warna kabel hitam dihubungkan dengan lubang warna hijau,tetapi tunggu dulu kabel power jangan di tancapkan ke listrik dulu ingat melakukan aktifitas ini berbahaya pastikan kabel power untuk power supply jangan terhubung ke listrik dulu nah setelah lubang yang tadi ketemu anda sambung lubang satu hijau dengan tembaga ke lubang satu hitam ( biasanya untuk kabel hitam sama semua tetapi pilih hitam yang terdekat dengan kabel warna hijau) lalu anda hubungkan dengan tembaga tadi yg telah kita siapkan ingat jauhkan tangan anda dari power supply dan tembaga tadi agar aman selanjutnya anda langsung tancapkan saja kabel power ke listrik nah cukup mudahkan, oh ya untuk warna hitam dan hijau adalah warna yg biasanya di pakai di banyak power supply bilamana ada warna kabel yang berbeda mohon maaf karena trik ini untuk mayoritas saja power supply yg dipakai selebihnya mungkin warnanya beda,terima kasih cukup sekian wasalam.

Jumat, 22 Agustus 2008

VMWARE freeware di Windows yaitu VirtualBox dari Sun

VMWARE freeware di Windows yaitu VirtualBox dari Sun

Virtuakbox adalah software yang fungsinya sama dengan vmware virtualbox merupakan versi gratisnnya vmware tetapi hanya fungsinya saja sama kalau produsennya pastilah beda,memang sun seperti biasa selalu membuat gebrakan - gebrakan di dunia it dengan membuat software tandingan – tandingan dengan versi yang gratis, mari kita beri nilai A plus untuk sun supaya lebih banyak membuat yang gratis lagi,he2 maunya gratisan mulu ya ya tetapi kalau kualitas ya virtualbox masih kalah dengan vmware yang semakin lama –semakin canggih saja untuk versi – versi terbarunya tetapi untuk mendukung Indonesia open source ya anda harus memilih virtual box yang kemampuannya tidak terlalu jauh kalah dengan vmware.
Virtualbox dapat di download dengan gratis di http://www.virtualbox.org secara Cuma – Cuma .

Berikut cara Instalasinya saya menginstall versi untuk windows yaitu VirtualBox-2.0.4-38406-Win_x86 untuk ukurannya sekitar 32 mb.






Versi yang saya install ini adalah berbahasa Indonesia berikut tampilan yang telah say install seperti gambar dibawah ini

Meningkatkan Performance Openoffice.org

Buka aplikasi openoffice,terserah bisa calc,writer dan lain – lain,setelah dibuka aplikasi openoffice.writer ==> klik Tools => klik Options sebanyak satu kali , lalu muncul menu options dan selan jutnya ikuti gambar dibawah ini:

1.Rubah Memory


2.Non aktifkan aplikasi java dimenu java



setelah klik ok selesai,cara ini memang mempengaruhi loading dalam membuka aplikasi openoffice,disarankan dilakukan supaya dapat lebih sedikit membantu anda.

Kamis, 21 Agustus 2008

Command2 Jaringan di DOS

micr*soft DOS datang dengan beberapa tool tersembunyi yang akan saya diskusikan disini. Tool ini dapat ditemukan pada direktori c:\\windows jika anda menggunakan win98 dan jika anda menggunakan winxp maka tool ini berada pada C:\\winxp\\system32. WinXP, Win2000 dan WinNT dirilis dengan beberapa tool internet tambahan. Jadi jika anda masih menggunakan win98 maka saya menyarankan agar menggantinya dengan WinXP. Yang tentunya memiliki fitur securiti tambahan dan perintah dos internet yang bagus. Dalam manual ini saya akan membahas mengenai beberapa perintah yang ditemukan pada Win98 dan winXP

Jadi bagi pengguna window, berikut ini perintah-perintah yang tersembunyi pada DOS.

1. ping
2. tracert
3. telnet
4. ftp
5. netstat

OK, inilah keterangannya.

1. ping

Utiliy ini digunakan untuk mencari keberadaan remote host. Yan gmengirmkan sebuah signal SYN ke remote host dan jika remote host membalas maka berarti memang ada suatu remote machine.

Cobalah anda ketik perintah ini:

C:\\windows>ping/?

*************
Newbie tip: mengetik \'/?\' setelah perintah dos menampilkan helpnya. Jadi bagaimana anda belajar aneka perintah dos. Bukankah WinXP, WinNT dan Win2000 juga memiliki perintah ‘help’ untuk menampilkan seluruh perintah dos.
*************
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] destination-list

Options:
-t Ping the specified host until stopped.


To see statistics and continue - type Control-Break;
To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don\'t Fragment flag in packet.
-i TTL Time To Live.
-v TOS Type Of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.
-j host-list Loose source route along host-list.
-k host-list Strict source route along host-list.
-w timeout Timeout in milliseconds to wait for each reply.

Jadi saya dapat melakukan ping ke ip address apapun atau domain name untuk memeriksa keberadaannya di internet. Sebagai contoh saya mengetik “ping localhost” maka saya mendapatkan.


Pinging chintan [127.0.0.1] with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 timemput *.*
sends all files from C:\\windows to /etc
5. \'mget\' to get multiple files from remote machine.
contohnya. ftp>mget *.*
gets all files from /etc to C:\\windows
6. \'open\' to establish a connection with remote host.
contohnya. ftp>open www.target.com
7. \'bye\' closes the connection and quits from ftp

Untuk perintah lainnya dari ftp silakan lihat help mereka.

Sekarang pada yang port FTP (prot 21) adalah membuka www.nosecurity.com. Seorang hacker akan terhubung ke situs tersebut menggunakan “ftp www.nosecurity.com” pada dos prompt. Kemudian dia akan mencoba login secara anonymous. Dengan anggapan bahwa www.nosecurity.com menggunakan linux server, maka hacker tersebut akan mengtikkan perintah “get /etc/apsswd” untuk mendaptkan file password dan mengcracknya. Jika anda adalah seorang hacker, maka jangan lupa untuk menghapus log tersebut.





5. netstat

Anda dapat menentukan suatu koneksi dengan remote machine pada port tertentu, hanya saat port tersebut dibuka pada remote machine. Sebagai contoh, jika anda ingin menentukan sebuah koneksi dengan www.target.com pada port 23 (telnet) maka port tersebut seharusnya terbuka pada www.target.com. Dan seluruh aktifitas hacking umumnya menggunakan port yang terbuka. Mengetikkan “netstat /?” pada dos prompt memberikan:


Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s
option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the -p option may be used to specify
a subset of the default.
interval Redisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.

Opsi akan menjelaskan fungsinya masing-masing. Dan yang terpenting adalah opsi –a dan –n. Opsi –a menampilkan seluruh port yang terbuka pada mesin tersebut. Dan jika saya menggunakan opsi –n maka akan menunjukkan ip address sebagai ganti dari domain. Saya mendapatkan hal berikut ini jika saya mengetik “netstat –a” pada command prompt.


Active Connections

Proto Local Address Foreign Address State


TCP chintan:1027 0.0.0.0:0 LISTENING
TCP chintan:80 0.0.0.0:0 LISTENING
TCP chintan:135 0.0.0.0:0 LISTENING
TCP chintan:6435 0.0.0.0:0 LISTENING
TCP chintan:1025 0.0.0.0:0 LISTENING
TCP chintan:1026 0.0.0.0:0 LISTENING
TCP chintan:1028 0.0.0.0:0 LISTENING
TCP chintan:1309 0.0.0.0:0 LISTENING
TCP chintan:1310 0.0.0.0:0 LISTENING
TCP chintan:1285 rumcajs.box.sk:80 ESTABLISHED
TCP chintan:1296 l an-202-144-78-3.maa.sify.net:80 CLOSE_WAIT
TCP chintan:1297 lan-202-144-65-14.sify.net:80 ESTABLISHED
TCP chintan:1310 cdn-v13.websys.aol.com:80 ESTABLISHED
TCP chintan:1220 aiedownload.cps.intel.com:ftp ESTABLISHED

”Proto” menyatakan nama protocol tersebut, “localaddress” memberikan ipaddress kita dan port yang terbuka. “Foreign Address” menyatkaan ipaddress dengan namor port yang terhubung ke kita. “State” menyatakan pernyataan saat ini jika suatu koneksi “established” atau listening atau hanya “waiting”.

Sebagai contoh jika saya membuka
http://www.yahoo.com maka saat saya menjalankan “netstat –a” saya akan mendapatkan masukan seperti ini:

\"TCP 203.43.50.81:2034 www.yahoo.com:80 ESTABLISHED\"

Komputer saya dengan ip 203.43.50.81 melalui port 2034 terhubung dengan yahoo pada port 80

*************
Newbie tip: Dengna cara ini anda bisa mendapatkan ip seseorang yang chatting dengan ada. Pertama kali jalankan “netstat –an” dan lihat dibawah foreign ip address. Sekarang mulailah private chating dengan orang lain. Juga jalankan “netstat –an” dan anda akan mendapatkan satu lagin foreign ip pada akhirnya. Inilah ip orang tersebut.
*************






all dos commands
ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes

BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info

CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSVDE Import or Export Active Directory data

DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders


DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory

ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the CMD shell
EXPAND Uncompress files
EXTRACT Uncompress CAB files

FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR Conditionally perform a command several times
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations

GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line

HELP Online Help
HFNETCHK Network Security Hotfix Checker

IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP



KILL Remove a program from memory

LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file

MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC micr*soft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files

NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)