Sunday, January 17, 2010 at 9:10 AM | 0 comments  

The following is a fairly practical steps to remove the files: autorun.inf is not detected:
1. Boot the computer with safemode mode.
2. Start the Command Prompt (Start> Run> cmd.exe) can also (Start> All Programs> Accessories> Command Prompt)
3. Type the USB drive (eg E: and press [Enter])
4. Type attrib-R-A-S-H AUTORUN.INF, then press [Enter]
5. Type DEL AUTORUN.INF then press [Enter]
When finishejavascript:void(0)d, restart the computer can be in Normal mode.
description:
Attrib is a module that is used to change the attributes of a file.
-R is a command to remove mode "Read Only"
-A is the command to remove mode "Archive"
-S is the command to remove mode "System"
-H is the command to remove mode "Hidden"
DEL is a command to delete files
So, hopefully this information can help.
1. What is a virus
Virus a program that is very annoying, may not know what it was a virus, do not be so annoying, now I will explain what it was a virus. A computer virus is a computer program that can duplicate or copy themselves. The purpose of manufacture to damage computer systems. Viruses are programs that can disguise himself into video files, audio files, word documents, and can be disguised in any form to deceive computer users. Aims to disguise computer users interested in clicking so the virus is active. The virus will multiply as much as possible in the computer and a variety of media, eg floppy disks, flash disks, etc.
Some features of computers infected with the virus, namely:
operating system running very slow
frequent restart
folder duplication
etc.
Do not be afraid! We can use anti-virus that circulated in the market to drive "The Virus", but do not forget to frequently update the antivirus from the internet.
Rare creative above do that .. I think if the scan is less creative .. hahaha.

Now we will discuss where the beginning of the virus ..
No doubt many who do not know that computer virus from where?

The virus, which first appeared in this world named [Elk Cloner] was born circa 1981 at TEXAS A & M. Spread through Apple II floppy disk that is operating the system. The destroyer was mendisplay message on the screen: "It will get on all your disks, It will infiltrate your chips-yes it is Cloner!-It will stick to you like glue, It will modify RAM too-send in the Cloner!" Hi ... ... ... ... ... ....
The name "virus" itself is only revealed after 2 years of his birth by Len Adleman on 3 November 1983 in a meeting to discuss how to create viruses and protect yourself from viruses. But people often assume that the virus, which first appeared is a virus [Brain] which was born in 1986. Naturally, because this virus is most shocking and most widely spread spread through DOS diskette that time again rise. Birth is also the same with [PC-Write Trojan] and [Vindent]
From then on, `the virus began to dominate the world. Development really horrible! one year ago came the first virus to infect files. Usually the attack is the file *. exe berekstensi virus is named [suriv] one of the classic virus "Jerusalem". The speed of its spread is 'thrilling' for the moment. But the virus is not too bad just be quiet, 'cause this virus hit and beat the IBM mainframe was not for long, just a year.
In 1988, BIG attacks appeared to Machintosh by viruses [MacMag] and [scores] and the Internet beaten-out by Robert Morris-made virus. In 1989 a prankster who sent the file "AIDS information programs" and unfortunately, so this file is opened, instead obtained the information about AIDS, but the virus that hurt the hard drive and to charge for opening the code. That's all I know .. hehehe ..

Since then, the spread of the virus keitung not anymore. However, its impact is not too large. 1995 new year comes a massive attack. No half-hearted, they attacked large companies such as Griffith Air Force Base, Korean Atomic Research Institute, NASA, IBM and many other giant companies who are persecuted by the "INETRNET Liberation Front" on Thanksgiving Day ~ ~. Because of the courage and the magnitude of the attack, in the year 1995 dubbed as the Hacker and Cracker.
The Cracker's never satisfied. Each operating system appears or a new program, they were ready with a new virus. You are often typed in MS Word may have found the virus Titassic. This original Indonesian local virus ... and unique, this virus made the prayer reminds us just in time (waw, virus Muslims) But make no mistake, macro viruses have a title [concept] can also be evil, and vicious really. Because the Muslims are going to be this evil enemy 80% of data files and programs victim.

in line with technological developments, the first virus appeared to combine macro viruses and worms. His name is sweet [Melissa]. But not as sweet as its name, this virus going to spread to others through E-Mail and the most painful, he was going to spread to all e-mail addresses in your address book. And now comes the millions of viruses in the wild roaming the Internet.
Perhaps this is because it had the knowledge I could today, about the virus ..
Hopefully useful.
Posted by SCIENCE

hi, I iqbal akramullah, nice to meet you,!!
I am a very foolish, in any field, but I am happy with my stupidity.
so stupid of me, my breathing slammed my favorite laptop, because I was annoyed same breath that I use the computer, the motion is very slow.huhuhu ... until I realized he was slow not because of outdated computer, she slowly caused me not true friends never noticed the computer (windows), after I learned it many sets of information windows we have to optimize.
here we will discuss about how to speed up windows boot .. we started from scratch before it ...!!! No hard to ..
The following tutorial tips speed up booting windows.
try the following trick to emergency Windows boot faster and not boring
1. Click / "Start", Run / then type regedit.
2. Go to the sub key "HKEY_LOCAL_MACHINE-SYSTEM-CurrentControlSet-Control-Windows-".
3. Click the right mouse button on the right side window, then select "New> DWORD (32 bit) Value".
4. Rename the new DWORD value that you created with the name "NoPopUpsOnBoot".
5. Double-click DWORD Value NoPopUpsOnBoot, then click the radio button "Decimal" and fill it with Value 1 value.
6. Close the Registry Editor, restart your computer, and see the results.
is easier? ... not have to worry about not going to kill .. hehehe
"GOOD LUCK"
Posted by SCIENCE
Wednesday, January 13, 2010 at 9:15 AM | 0 comments  

Many excellent books for parents or expectant parents. The book-themed children's education. lately many similar themed book about child education. Clever producers saw an opportunity. All the ethical and moral problems that plagued the world today has succeeded in creating worry for parents. They worried that one educates children to become difficult to control. Moreover, the trend of today's parents want to make her champion. Champion in every way. So all things taken for the realization of these desires. Many parents seek ambitious sanagt any information about how to realize the dream has a super-intelligent children, and full of achievements. This is what I am saying intelligence producers. The publishers take the opportunity to publish a book themed on children's education.
SECRET TIPS SMART FORM A GOOD CHILD AND RICH. "How WHERE EDUCATIONAL CHILDREN BECOME A Champion," SUPER CHILD HOW SMART EDUCATIONAL ", etc. SO MANY THEMES others, which presented by the publishers a reliable and propesional.
which we discuss here is the book "The Secret helps Good, Smart, & Rich"., where the parents did not want her son Diligent. It's Good, smart and rich too. Less what to try?
I even do not have kids, I enjoy reading books related to the theme of children's education. I hope one day when god gave me baby my GOD willing, I apply this knowledge to my children, too.
Now we share the story, actually a little knowledge I can from the books I have read it already applied in my part of my life, I am grateful now to be the result,
I apply this knowledge to the child's brother me, I did everything not to educate, who continue to educate? Yes .. parents.
But at least the kid brother I would not forget the breathing super-great uncle was.
Hehehe.
Books Authored by Jaya Triwidia Novian tend easy to read. In my opinion, but .. There is also a theory and not miss how to apply. The first part of this book provides solutions on how to build closeness with your child. Quite a lot of ways are offered. The way that I think is interesting LOVE LANGUAGES. Apparently, each child can have a different love language is different. And each has a love language approach different. For example, children with a different love language services to children with the love language of words of support. Children with language services so glad love helping others. However, sometimes they express it in a way the opposite of wanting to be served. The child so, then we helped him occasionally when he did not ask. While helpful, we would say "Umm glad to help you. You like Ummi help? Everyone must help each other, but not by way of force. We asked him very well. If he does not want, then we should not be forced. So, how do you ask for help your friend? ". This is quite different from the child who has a love language of words of support. They like to give praise to others. However, sometimes there is also a reverse manner menampakkannya as mocking people. Children who liked taunting actually show that they need support and praise from their environment. So, we need to know that their actions (mocking others) is not good and we do not like it. Then, do not forget to add the words of support from us. For example, "I'm so glad if you love him with helping brother, taught him. I love you ". Sound rather trite, but I think it effective to approach the child. previously, with simple questions, we can know what love language so that our children have to approach it with the right approach.
The next section of this book with the title. After successfully building denan child attachment, the reader's time to learn to educate children to be diligent child, Smart, and Rich. our discussion regarding long enough
so I suggest to you to buy this book yes. Insha Allah useful. Many new facts you might not know is presented here. Insha Allah, may help us educate the children into the Good Son, Smart and Rich. Who would not want to try?
Happy reading ...
Posted by SCIENCE


Remember the Aksika virus? Virus "open source" is one that does have a lot of variants. No wonder because the source code is not provided free on the Internet, so anyone can easily modify and compile the source code and be a new variant.

Starting from the ease of that, many viruses maker or a beginner programmers trying to make a virus without the need to bother. Most needed is knowledge about the operating system and programming.

But convenience is not how, when compared to using the program Virus Generator. From the name alone, we can expect the use of the program. Yes, Virus Generator is a program to be able to make the virus easily and instantly.

Starting from a sample of a virus that pretty much sent by readers to us. PC Media Antivirus Gen.FFE know her name, Dawn, but other antivirus which is also called by the name Brontok.D. With a simple investigation finally note that the virus was made using a Virus Generator.

Fast Firus Engine (FFE)
Generator makers are calling the program with a homemade Firus Fast Engine. As seen in the program or site creators, he told me that this program is only for learning purposes and not for destructive actions. Still, if this program had fallen into the wrong hands, would be used for destruction.

Generator virus was created using Visual Basic language and in-compress using tELock packer. In the package there are two files, namely Fast Firus Engine.exe and data.ex_. Fast Firus Engine. exe is the main program in the making of the virus and while the file is actually a body data.ex_ original virus that has not dimodifi kasi.

When Firus Engine.exe Fast file is run, the user will be confronted with an interface. You just told to fill in the name of the virus, the name of manufacturer, and his message. Then by pressing the Generate button, it will be your virus.

The workings of the generator is actually very simple. He just added the data you enter this file to the end of the original virus (data.ex_). Later this information is used by the virus in the process of infection.

How virus infect?
Virus creation FFE does look simple. Just as the generator, he also created using the Visual Basic language to be compiled with Native-Code method. Then the tELock to compress using the smaller size. This virus has the original size of 55,296 bytes.

When the virus is executed first time, he will make some master files in several locations. Like in the directory \% WINDOWS% \, will have a file with nama.exe, Win32 exe, activex.exe, and% virusname% (the name of the virus according to the manufacturer filled by the Generator). In \% WINDOWS% \% system32% \ will have copy.pif files, _default.pif, and surif.bin. In addition, he also alter or create a Oeminfo.ini file that is part of the System Properties. So if your computer is infected by the virus results generated from FFE, then the System Properties will have the words "Generated by Fast Firus Engine".

In the directory \% WINDOWS% \% System% \'ll have some more master files that use the same name as the file system of Windows, such as csrss.exe, winlogon.exe, lsass.exe, smss.exe, svchost. exe, and winlogon.exe.

And do not forget, the root drive will have a file named "read euy.txt" which contains the messages from the creator of the virus. So when creating a virus using the generator, then the manufacturer will be served some input boxes, such as the Author of the virus, Name of the virus, and Messages. Now, the contents of this message box that will appear in the file "read euy.txt" it.

After the virus managed to copy a file to their parent in the system, he will run the main file before, so that the memory process will have some viruses, such as csrss.exe, winlogon.exe, LSASS. exe, smss.exe, svchost.exe, and winlogon.exe. Process names similar to the process / services of Windows is probably on purpose to deceive users. To distinguish them, you can see the path or the location of the executed process. Process virus usually run on System directory as the process / services are running Windows property usually comes from System32 directory.

Changing Registry
This virus adds a startup item on the registry so when he can start running Windows automatically or to change the settings of Windows to suit his desires. Information about the registry that the reversal will not be able to easily see that the encrypted condition.

What he changed was the way the value of Userinit items by adding parameters to the parent file. At key HKEY_CURRENT_ USER \ Software \ Microsoft \ Windows NT \ CurrentVersion \ Windows \ Load item will also be changed to point to a file with the name of the parent Activex.exe. In the HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run \ will have a new item with a present. Key HKEY_ LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run \ will have new items as well with the default name and% username%, username here is the name of the current user at the time.

Virus generated from the FFE results also change the shell extension for the file. Exe, namely by changing the type of information from the Application to File Folder. Setting the Options folder is also modified to not show the extension and each fi le with hidden attributes. And that can be active at the safe-mode, he also changed the value of the item SafeBoot.

By using the help of registry Image File Execution Options, the virus also adds a new item on the section with the name of cmd.exe, msconfi g.exe, regedit.exe and taskmgr.exe. The point is that every user who accesses the program with the file name like that, it will be bypassed by Windows and transferred to the main file of the virus.

How Viruses Spread?
This virus can spread through the data storage media such as flash disks. When you plug the flash disk on the infected computer, then the flash disk will have some new files, like explorer.exe,% virusname%. Exe, and msvbvm60.dll. Also some support files such as desktop.ini, autorun.inf running so that he could automatically when accessing the flash disk.

Another virus files were stored in a new directory in the flash disk with the name of the file containing the Recycled Firus.pif and Folder.htt. All of these virus files hidden in conditions that are not visible.

Virus Action
To survive, the virus will try to block any program that he did not want such tools or programs, including antivirus PCMAV. Just as the modified registry data, data about what programs are blocked by it is also present in the body in a state encrypted.

So, when the virus was stay in memory, he will monitor each program accessed by the user, ie by reading the file name and window caption. Some of the files are tested for antiviral dibloknya is nav.exe, avgcc.exe, njeeves.exe, ccapps.exe, ccapp.exe, kav.exe, nvcoas.exe, avp32.exe, and many others. Including some or installer setup program can not run on the infected computer.

Prevention and Control
PC Media Antivirus RC19 was able to clean infected computer completely and accurately 100% of each virus that is made by using Firus Fast Generator. To avoid action by the virus to block PCMAV, please rename the file first instance PCMAV PCMAV-CLN.EXE be MERDEKA.EXE.
Posted by SCIENCE
Monday, January 11, 2010 at 10:54 PM | 0 comments  

Computer science or computing science (sometimes abbreviated CS) is the study of the theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems It is frequently described as the systematic study of algorithmic processes that create, describe and transform information. According to Peter J. Denning, the fundamental question underlying computer science is, "What can be (efficiently) automated? Computer science has many sub-fields; some, such as computer graphics, emphasize the computation of specific results, while others, such as computational complexity theory, study the properties of computational problems. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describing computations, while computer programming applies specific programming languages to solve specific computational problems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to people.
The general public sometimes confuses computer science with vocational areas that deal with computers (such as information technology), or think that it relates to their own experience of computers, which typically involves activities such as gaming, web-browsing, and word-processing. However, the focus of computer science is more on understanding the properties of the programs used to implement software such as games and web-browsers, and using that understanding to create new programs or improve existing ones.
Posted by SCIENCE