Laman

Tampilkan postingan dengan label Security. Tampilkan semua postingan
Tampilkan postingan dengan label Security. Tampilkan semua postingan

Jumat, 27 April 2012

How To Protect Your Identity Online


Surfing the Internet is a daily occurrence for an increasing number of people these days, as technology expands and online services continue to grow. Many people go online to carry out banking transactions, shop, check e-mail, and catch up on news. That's why it's more important than ever to protect your identity while surfing the web. As identity theft becomes more prevalent, it's necessary for everyone to be extra vigilant in protecting personal information – before it gets into the wrong hands.

Every time you go online and conduct some type of transaction, whether it is monetary or an exchange of information, you put your identity at risk. Unfortunately, criminals use the Internet too, making use of the technology to perpetrate identity theft. This type of cyber-criminal gathers personal information online and either sells it to others for profit, or uses it to his/her own purpose.

Luckily, there are many things you can do to stay one step ahead of these "bandits" and keep your identity as safe as possible. The Internet landscape is always changing, so you need to keep on top of things if you want to remain as safe as possible.

The first thing you need to do is learn how to avoid phishing scams. Phishers use fake e-mails and websites to pretend they are actual, trustworthy companies and institutions, such as banks and insurance companies. When people receive a fake e-mail or are directed to a counterfeit website, they are tricked into revealing passwords, credit card numbers, and other such information. Be warned: the criminals are good at what they do, so you must be very careful when dealing with e-mails from your bank or other organization. The key thing to remember is that real institutions never ask you to verify personal information online – be cautious and contact the sender directly, over the phone, to authenticate the request and, if necessary, provide any information they might actually require.

Because many phishers use spam e-mail as a way to obtain your personal passwords and information, install a good spam filter to keep out as much spam as possible. If you strain out most of the problem e-mails from the get-go, you won't have to worry about dealing with too many suspicious messages on your own. Also, avoid sending any sensitive information via e-mail or instant messengers. Scam artists are notorious for intercepting e-mails and IMs. Use common sense when dealing with e-mail as well. For instance, avoid opening e-mail or IM attachments that you deem suspicious. Only open files from someone if you know the sender and what they are sending you.

And NEVER send your social security number over the Internet. No one should be requesting it, but if you are asked for it, confirm who is requesting it and send it directly to that person.
Another great way to prevent ID theft is by password protecting all your computers, laptops, and PDAs. For each item, come up with a unique user name and password. The same rule should be followed when selecting passwords for any online activity. Why? If one password is discovered by an individual with ill intentions, and all your bank accounts, credit cards, and other private logins use the same password, he/she could gain access to everything. When selecting passwords, create them with letters, numbers, special characters, and make up nonsense character strings not found in the dictionary. These will be much more difficult to decipher by a potential scammer.

Keep the amount of personal data present on your computer to a minimum. In the event that your computer is hacked or your laptop is stolen, you will be much less prone to ID theft because you won't be giving the thief much to work with. Another good idea is to install a personal firewall program. Although systems such as Windows already contain a basic firewall program, setting up another program will ensure that your computer is hidden from hackers, stop intruders from reaching sensitive information, and let you control Internet traffic.

Purchase antivirus software and keep it updated. A high-quality virus protection package can help prevent and eliminate viruses, Trojan horses, and other dangerous items designed to steal your personal information. It will also scan e-mail and IM attachments for viruses.

In addition to antivirus software, be sure to equip your PC with the latest in anti-spyware protection. Although a great many of the spyware programs out there simply monitor your online actions for the purposes of marketing, some have been created for malicious reasons, including keystroke logging and, of course, identity theft.

One last tip: when you decide to update your computer and throw away or sell your old one, remember to remove all your data from the hard disk. Many people mistakenly believe that simply deleting files makes them disappear – but this is not the case. When you delete files they are still present on your hard drive, and have to be erased prior to handing the machine over to another person. Software known as wipe programs or shredders can be used to overwrite data with zeroes or random patterns making it completely unreadable.

It's well worth the effort to take the precautions necessary for keeping your personal information under lock and key. Trying to clean up the mess left behind by an identity thief can take years, and will cause you a headache or two. So take charge and protect your personal information, using common sense and a few good tech tools to keep the cyber-thieves at bay.

Can Web Service Companies Do Without 24x7 Dotcom-Monitor support?


 The background
Enterprises worldwide have embraced 'Web services' as the preferred middleware technology for integrating their Web-enabled, e-business applications. Hundreds of Web service sites offer very useful services that provide essential components for running B2B or B2C e-business applications. Many enterprises outsource items ranging from security services for their plants and offices to outsource packing and forwarding, or even cleaning services. Specialized Web service companies provide the latest exchange rates for any combination of the 100+ countries they cater to. Web service companies have hundreds of B2B or B2C e-commerce/e-business clients who need their services (on a 24x7 basis) for running their non-stop global businesses.

Some examples of Web services include:

* Providing access to FedEx tracking information by taking a tracking number and returning shipment status from FedEx
* Credit card maintenance and management
* Providing authentication
* Returning real-time flight information for flights in the air, given an airline code and flight number, using current information from online service.
* Calculating and providing postage requirements in any currency
* A monthly lease payment calculator service
* Sending text messages to mobile phones, when provided a list of countries and their international dialing codes
* Providing Internet time
* Retrieving news headlines from sites like CNN, CBS, or MSNmoney and supplying them to news portals
* Providing up-to-the-minute sports updates to various channels
* Offering Web site management system by providing 100+ functions
* … and many more!

Vital Issues involved in Web services business
As Web service companies integrate with hundreds of important B2B/B2C clients, they become vital components in hundreds of billions of dollars of international trade and e-commerce, manufacturing, and service business. Since a transaction cannot be completed without their service input, any disruption of service, delayed response, or system error could spell disaster and incalculable loss from deferred shipments, cancellations, and even business operations stoppage. Thus, it is imperative that Web services work correctly and efficiently every time.

Web service companies therefore must consistently perform within acceptable framework. There is little margin for error. That is why Web service companies typically have SLA agreements signed with clients for proper functional and performance delivery. Any deviations could mean attracting censure, penalties, or both.

What must be done to prevent exposure?
Clearly, automatic and constant monitoring of the functionality and performance of a Web service site is necessary. This website monitoring should not only check that correct functionality is delivered, but also, how efficiently it is being delivered. If the turnaround time is consistently beyond the SLA norms, it must be recorded and the service company notified of the anomalies, so that the company can examine inside and outside of their firewall to rectify the situation.

Dotcom-Monitor.com has the solution.
Dotcom-Monitor.com can provide customized monitoring through its highly respected and acclaimed Dotcom Monitoring Service. This automated, non-stop (24x7) service caters to a site's specific functional and performance monitoring needs, automatically alerting and reporting deviations to site management, in real time, through the built-in Dotcom-Monitor reporting system. This prompts site management for immediate remedial action.

How Dotcom-Monitor works
Dotcom-Monitor has remote agents strategically positioned around the world, each acting as an Internet browser. After a customer creates an account, he or she supplies the URLs of the Web service site, along with functions to be monitored with inputs, algorithms, expected results, and performance norms. Then, the process starts immediately. Dotcom-Monitor's global agent checks the Web service(s) to ensure that it is accessible and maintaining acceptable levels of performance. If any of these fall outside the specified parameters, the customer is notified
1. Functional Monitoring: Dotcom-Monitor constantly checks the functionality of the service by making specifically tailored, functional calls to the site (application) server to monitor the accuracy of the results obtained in real time. It uses representative input from transactions/messages, algorithms, and results provided by the Web service company for this purpose. The monitor performs Dotcom-Monitor's service at pre-defined intervals. Any deviations from the supplied results are promptly reported for appropriate action.

2. Performance Monitoring: Most Web service companies use SOAP (Simple Object Access Protocol) technology to architect service transactions' receipt, de-serialization, processing, serialization, and delivery. SOAP is a lightweight, stateless, XML communication protocol that lets applications exchange structured messages/transactions across the Internet. Most current SOAP implementations use HTTP binding due to SOAP's wide availability and ability to pass through firewalls.

One of Dotcom-Monitor's features is to determine the level of performance available from SOAP implementations using appropriate test transactions/messages. First, Dotcom-Monitor checks for latency, the round-trip time taken to send and receive a single transaction/message from the monitor server to the service server and back. High resolution timers are used to measure the time taken for each round-trip. Dotcom-Monitor repeats this check at a defined interval. For throughput, Dotcom-Monitor conducts checks to find the peak throughput available from each SOAP implementation using a number of concurrent driver threads, records the number of round-trips completed per second, and compares it to supplied norms.
Dotcom-Monitor conducts a separate exercise to measure SOAP serialization and de-serialization overheads. The test driver sends a number of customer detail records to the server. The monitor captures the times required by the server to perform serialization and de-serialization of SOAP transactions/messages. Any overall performance degradation beyond the Web service-defined boundaries are recorded and reported. A proper log of the checks made is maintained for later analysis.

In Conclusion
Just as business is vital to economy, Web services are crucial to e-business. Web services must consistently perform with absolute integrity and deliver sustained, non-stop performance to B2B or B2C e-business sites. Since these sites are concurrently concatenated with hundreds of e-business Web sites providing functions vital to each business they serve, there is no margin for error or for failure.

Web service sites must plan for zero tolerance. While it is easy to plan and implement redundant hardware and network infrastructure, exposure lies in making flawless functional delivery within desired turnaround time, every single time. That is only possible if constant monitoring for correct functional output(s) and response time performance are maintained, and any deviations highlighted in real time for remedial action. A 24x7 website monitoring solution from Dotcom-Monitor.com is the real answer. 

Jumat, 13 April 2012

What You Have Been Dying To Know About Fraud



For this reason, authorities had been trying to suppress the growing trend of various frauds that are currently affecting thousands, if not millions of people.

Basically, fraud is a kind of trickery that is used for the individual's benefits, mostly on the financial aspect. These kinds of frauds are absolutely punishable by law, though, its implementation and intensity may vary from one place to another.

In Criminal Law

In the context of criminal law, a fraud is absolutely punishable under certain circumstances that will constitute the deception of a certain individual from which personal gain of the fraudulent person is achieved.

Some of the common frauds that are abhorred by the law are:

1. False advertising

This refers to the achievement of some personal gains of the person concerned by give the wrong impression about a particular service, product, or a business. This can be executed by providing deceptive information projected in unreliable forms of advertisements.

2. Identity theft

In the credit card industry, identity theft is the common type of fraud. This is when the identity of the credit card user is stolen for the personal benefit of the person who wants to gain some financial access to the user's finances.

There are instances that the criminal may use the identity of the credit card user to make some purchases, in which, the victim's credit card is used. In turn, the victim will receive billing statements containing such purchases that he or she did not personally created.

There are also some cases wherein the identity of the victim is used to create some crimes, in which, after establishing such acts, they contact the person and blackmail him by asking some money in exchange of eliminating any criminal acts that were constituted through his name.


This is also one type of frauds where the documents are obtained and processed with the purpose of using them to deceive other people or institution.

In this process, the person who ant to deceive other people will obtain documents that are fake, reproduced, replicas, or explicit reproductions of the original material. There are also some documents that may be originally done but the signatures that should have signified the authenticity of the document is forged.

The very concept of this kind of fraud is to modify an object to suit the personal gains of the offender.

4. False billing

This refers to the fraudulent undertaking of charging or creating billing statements to a particular person or an institution. Here, the criminals will extract money from these people, in which, the concerned person will think that it is part of his or her subscription on a certain company.

In this way, people may be deceived that they have been issued some renewal of their subscriptions, for example, but in reality, the true owner of such establishment that issues subscriptions are not aware of it.

5. Insurance claims

These refers to the act of deceiving the insurance provider under the guise of claiming the due claims and benefits.

For instance, there are some people who create "fake deaths" in order to claim the insurance benefits provided by the individual's insurance provider.

These are just some of the many examples of frauds. All of which are punishable under the law.

Hence, if you think that you have been victimized based on the examples given, it is best to take some actions properly, otherwise, you will be left hanging on the brink of disaster.

Sabtu, 07 April 2012

The Business Of Identity Theft


Q: I use PayPal to accept credit cards for my online collectibles business. I recently received an email that my PayPal account was going to expire in five days if I didn't click a link in the email and give them my PayPal account information. Being naturally paranoid I decided not to give this information and I'm happy to say that my PayPal account did not expire. Was this a scam? -- Brenda A.

A: Be thankful that your paranoia kicked in, Brenda, because you were about to fall victim to the scam of the week, this one aimed at the 35 million merchants and individuals who use http://Paypal.com as their online payment processor.

The email you received was not from PayPal, but from an Internet bad guy behind a forged email address using the http://PayPal.com domain. You should understand that no reputable online company will ever ask you to provide your account information. Think about it. They already have this information. Why would they ask you to provide it.

Since I use PayPal for several of my online ventures, I, too, received the email in question. The email first seeks to instill fear in you by saying that your PayPal account will be closed if you do not provide personal information. You are then directed to open an attached executable file and enter your PayPal account information and other personal information that PayPal doesn't even require, including your social security number, checking and savings account information, driver's license number, and other personal information that can be used to clean out your PayPal account and perhaps even steal your identity.

If you're not familiar with PayPal, it is a hugely successful, web-based company (purchased by eBay in 2002) that many online retailers and eBay sellers use to accept electronic payments for everything from newsletter subscriptions to consulting services to just about any product for sale on eBay.

The allure of PayPal is that it does not require the seller to have a bank merchant account through which to process credit cards. Anyone with a verifiable email address and bank account can use PayPal and the service can be implemented almost immediately after registering.

When someone places an order on a website that uses PayPal for online payments, that customer is directed to http://PayPal.com to complete the payment process using a credit card or electronic check. The merchant can transfer the money collected in his PayPal account to his checking account any time he likes. Since many larger merchants make this transfer just once a week or so, their PayPal accounts are ripe for the picking from those who have the cunning and lack of ethics required to gain access.

The shear number of PayPal customers is one reason it has become a popular target of scam artists trying to steal personal information from individuals and businesses alike.

Identify theft is on the rise. Thanks to the Internet stealing someone's identity has never been easier. At any given moment, there are any number of Internet thieves using all manner of high tech wizardry to steal personal and business information from unsuspecting souls, and many times they can gain access to this information simply by asking the person to provide it through fraudulent means.

The PayPal scam is just the latest in a long line of sophisticated attempts to steal personal information through online means, Amazon, eBay, Dell Computer, and many others have been the brunt of many such scams in recent years
Identity theft is what's known as a knowledge crime, which means that the criminal doesn't have to break into your house to rob you blind. If you have a bank account and a social security number, you are susceptible to identity theft.

While most people are familiar with identity theft, most business men and women never think about it happening to them, at least on a professional level. Consider this: if a criminal can learn your business checking account number or the number of your company credit card, they can steal far more from your business than if they had simply knocked down the door and carted off your desk.

The Internet aside, most business and personal identity theft is still the result of stolen wallets and dumpster diving. You should guard your business records closely and be very careful what you throw away. Stop and think for a moment what a criminal might find in the dumpster behind your office.

There's a good chance that dumpster has, at various times, contained scraps of paper with your social security number, driver's license number, credit card number, old ATM cards, telephone calling cards, and other pieces of vital business information like bank statements, invoices, and purchase orders. A dumpster-diving thief could literally rob your business blind in a matter of hours.

Here are a few ways to protect yourself from business and personal identity theft.

* Never give out your first name, last name, business name, email address, account passwords, credit card numbers, bank account information, PIN number, social security number, or driver's license number.

* Change your online account passwords every 30 days. Believe it or not, a hacker who steals your personal information can guess your online account passwords in about two minutes. If your Charles Schwab online account password is your birthday or the name of your first born or family pet, count on a hacker cracking that code faster than you can say 'Bill Gates.'

* Never provide personal information in response to an email or telephone call. Just because someone calls and says they are from Dunn & Bradstreet and need to confirm your business information does not mean they are really from Dunn & Bradstreet.

* Never give your business credit card number over the phone to place an order with someone who has called you unsolicited. If you are interested in what they are selling get their number, check out their company, then call them back to place the order.

If you think that you have become the victim of identity theft or think someone is trying to steal your identity or personal information you should report them immediately to the Federal Trade Commission. You will find more information on their website at http://www.consumer.gov/idtheft/. For more information on what to do if identity theft happens to you visit http://www.privacyrights.org/fs/fs17a.htm.

So, if you ever receive an email from PayPal, Amazon, eBay, or any other ecommerce website asking you to update your account information by email you can pretty much bet the farm that it is a scam.

In business, as in life, a little paranoia is a good thing. 

Senin, 26 Maret 2012

mengembalikan Facebook yang di Hack ( kena Hack)


Facebook temen2 kena hack?!! bagaimana caranya membuka Facebook yang terkena Hack / di Hack oleh orang yang tak bertanggung jawab atau para hacker-hacker yang bersaing untuk merusak dunia Informatika tanpa pandang bulu!!! Penasaran gimana caranya… Mau!! ga usah pusing, Stress, bimbang, binun ato yang ada kaitanya sama penyakit depresi!! nih saya akan memberitahu caranya.. langsung aja yach…..

- Buka URL dibawah ini:

http://www.facebook.com/help/contact.php?show_form=account_hacked

- Isikan form tersebut, kalau sudah selesai klik Kirim

- dalam beberapa hari akan ada balasan dari pihak Facebook melalui email, mungkin anda harus sering cek email anda untuk konfirmasi.

selamat mencoba :)

mungkin untuk saat ini trik ini masih berlaku atau tidak saya belum tahu,, jadi carilah referensi lain untuk mencoba trik lain, atau buat teman2 bloger yang tau caranya,, silahkan share caranya di komentar ini,, terimakasih :)




Senin, 03 Januari 2011

Internet Melalui VPN


Cyberghost sebagai salah satu layanan VPN (Virtual Private Network) dari perusahaan Jerman memberikan keamanan untuk menyembunyikan IP address dengan standar enkripsi 256-AES.

Pertama kali saya menggunakannya langkah pertama yang saya lakukan adalah melakukan downloading installer dari situs Cyberghost dan melakukan downloading akhir.

Setelah saya mendaftar dan log in, kita diberikan pilihan apakah kita akan surfing melalui server yang disediakan atau tidak sama sekali. Kalian akan mengetahui secara langsung bagaiman cara melakukan pengaturan dengan cyberghost setelah kalian mencobanya.

Bagi kalian yang belum mengetahui kenapa kita harus menyembunyikan IP address saya akan memberitahukannya:
1. Kita dapat menghindari penyadapan yang dilakukan dari para cracker (Black Hat sebutan untuk perusak sistem keamanan) sehingga data-data pribadi kita selama melakukan surfing di internet tetap aman.
2. Hal ini bisa menguntungkan kita apabila kita ingin surfing secara anonim untuk mengunjungi situs yang kita inginkan. Terserah apa yang ingin kalian lakukan terhadap situs itu.

Tidak lupa juga ada kabar baik untuk kalian yang bosan dengan internetan di warnet. Selain mahal karena hitungannya per jam, kita juga tidak bisa leluasa karena sekali kita diwarnet, kita harus duduk disitu, kalau ditinggal ada resikonya, misalkan barang hilang.

Dengan internet melalui VPN dan software yang dibutuhkan, kalian bisa berinternet dengan murah. Saya sudah menyediakan list yang kalian butuhkan.

http://www.kaskus.us/showthread.php?p=302943393
http://order.best-vpn.com/aff.php?aff=097