Gadgets Security

Keep your mobile gadget secure

Secure Your Server

We must study how to harder our servers

Internet Security

Secure your computer, Secure your browser, and enjoy to browsing to internet

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Monitor your System Network

Make your network in your hand and under control

Wednesday, September 7, 2011

Windows E-Books Reader Server.


Today WhiteCyber Team want to share how to make a simple Windows E-Books Reader Server. To make your old computer become powerfull and meaning full in your library. You could try make E-Book Reader Server from one Personal Computer.

Require System
Computer with processor Pentium IV or later.
Minimum memory 268 Mb.
Using Windows XP.



We try to make this system in SMAN 1 Salatiga's Library.
Tools :
1. XAMP : We will use this program to make Windows XP become a server. download here
2. Joomla : We will use this CMS to make web interface. download here
3. Adobe Reader : We will use adobe reader to read e-books that will installed in a server. download here
4. E-books : in Indonesia we could download all e-books from kemendiknas website. download here

How To :
1. Install XAMP to your Windows XP System
2. extract Joomla in directori C://XAMP/htdocs/
3. Setting MySQL ( make user and database, give all priviledge )
4. Place all ebooks in one directory in C://XAMP/htdocs/
5. Link all ebook from text to article
6. Now we have Library System

Saturday, July 23, 2011

Howto Crack pdf File Password

If you want to crack pdf file passwords use pdfcrack.PDFCrack is a GNU/Linux (other POSIX-compatible systems should work too) tool for recovering passwords and content from PDF-files. It is small, command line driven without external dependencies. The application is Open Source (GPL).

pdfcrack Features
Supports the standard security handler (revision 2 and 3) on all known PDF-versions
Supports cracking both owner and userpasswords
Both wordlists and bruteforcing the password is supported
Simple permutations (currently only trying first character as Upper Case)
Save/Load a running job
Simple benchmarking
Optimised search for owner-password when user-password is known

Install pdfcrack in Ubuntu
sudo aptitude install pdfcrack
This will complete the installation.

pdfcrack Syntax
pdfcrack -f filename [options]

pdfcrack Options
-b, - -bench - Perform benchmark and exit.
-c, - -charset=STRING - Use the characters in STRING as charset.
-m, - -maxpw=INTEGER - Stop when reaching INTEGER as password length.
-n, - -minpw=INTEGER - Skip trying passwords shorter than INTEGER.
-l, - -loadState=FILE - Continue from the state saved in FILENAME.
-o, - -owner - Work with the ownerpassword.
-p, --password=STRING - Uses STRING as userpassword to speed up breaking ownerpassword (implies -o).
-q, - -quiet - Run quietly.
-s, - -permutate - Try permutating the passwords (currently only supports switching
first character to uppercase).
-u, - -user - Work with the userpassword (default).
-v, - -version - Print version and exit.
-w, - -wordlist=FILE - Use FILE as source of passwords to try.

pdfcrack Examples
pdfcrack test.pdf

pdfcrack options and examples 

Top 5 Tips for protecting your mobile from phone hacking

Phone hacking can happen to anyone. Here's how to secure your phone.

As you've no doubt heard by now, phone hacking is the new ‘in' thing with newspapers and scrupulous media types.
But it's not just celebrities having affairs who need to worry; you too could be the victim of phone hacking. So it's time to tighten up security on your mobile phone and start protecting it in the same way you would protect your PC.
Here is PC Advisor's Top 5 Tips for protecting your mobile from phone hacking.
1. Change your voicemail pin 
If you have got an old phone or phone contract, then there's a good chance that your service provider originally set your voicemail up with their standard pin – 1234, 0000, 4444 etc. Therefore if a hacker called you when your phone was engaged, they would simply have to enter your service provider's standard pin and they would have free reign over your inbox. It's been suggested that this is how the majority of the celebrities' phones were hacked.

2. Turn your Bluetooth Off 
Apart from needlessly wasting your phone's battery when you're not using it, Bluetooth also gives potential hackers the opportunity to access your phone and its precious information.
If however, you do want to leave your Bluetooth on throughout the day, make sure you set your phone as 'not discoverable' and don't accept connections from phones you do not know.

3. Stop downloading untrusted Apps
It's reported that roughly one third of Apps will automatically obtain and send your phone number, device ID and sim card serial number back to the developers (along with lots of other data). Whereas iTunes Apps are thoroughly policed, the Google Android Apps have experienced some Trojan Horse attacks which are being used to send location and user information back to the hackers.

4. Take your Battery Out 
 
If you're convinced that your phone has been hacked then you should do this immediately. Taking out the battery won't stop hackers having access to your voicemails, but it will stop them gaining access to your phone (and what's stored on it). Without power to your phone, there is nothing to hack.
 
5. Don't lend your phone to people you don't know!
It takes a matter of seconds for somebody to send a SMS from your phone. From that one simple SMS a hacker can do all of the following things:
• Remotely access the phones microphone and use it as a listening device wherever you are.
• Intercept a call and listen in to it in complete secrecy.
• Automatically add a BCC to all emails and SMS messages sent from your phone.
• Use your GPS to locate where you are at all times (particularly nasty when used for organised robberies on your house.)

Friday, July 22, 2011

exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).

This is a simple Python tool to help you search for exploits in the BackTrack Exploit Database.
Features
  • Search the exploitdb archive
  • Case sensitive & insensitive
  • Change output mode
  • Automatically copy your exploits
Requirements
  • python (tested with python 2.7.1 and 2.5.2)
  • local exploitdb (pre-installed on BackTrack Linux)
Usage
exploitdbee.py [-c] [-d path]
exploitdbee.py "windows 7" remote
exploitdbee.py -c Microsoft IIS -d /tmp
You can download exploitdbee.py v1.0 here:
exploitdbee.py

Wednesday, July 20, 2011

Mengaktifkan & Menonaktifkan Regedit

Kesal kan apabila regedit hilang karena perbuatan virus?
Atau mungkin juga teman-teman anda sering mengutak-atik registry anda?
Karena itu saya ada sebuah trik nih, yang berfungsi untuk menampilkan dan menyembunyikan regedit, yaitu dengan sebuah sedikit sihiran javascript, simple, bahkan orang awam pun bisa membuat program seperti ini.
Caranya?ketik script dibawah ini di notepad.


--------------------------------------------------------
// Program Sederhana Mengamankan Regedit
// Nama Program: regedit_java.js
var vbCancel = 2;
var vbYesNoCancel = 3;
var vbYes = 6;
var vbNo = 7;
var vbQuestion = 32;
var vbInformation = 64;
var natan = WScript.CreateObject("WScript.Shell");
var pesan1 = "Pilihan Pengaman Regedit:\n\n"+
"[Yes] untuk Nonaktifkan Regedit.\n"+
"[No] untuk Aktifkan Regedit.\n"+
"[Cancel] untuk Keluar.\n\n"+
"[shinigamirulez]\n"+
"Bangkitlah TI untuk masa depan\n\n"+
"-> Nonaktifkan Regedit sekarang?"
var tanya = natan.popup(pesan1,0,"Pengaman Regedit",vbYesNoCancel+
vbQuestion);
if (tanya == vbYes)
{
natan.RegWrite("HKCU\\Software\\Microsoft\\Windows\\CurrentVersion"+
"\\Policies\\System\\DisableRegistryTools",1,"REG_DWORD");
pesan2 = "Regedit Dinonaktifkan!"
natan.popup(pesan2,0,"Pengaman Regedit",vbInformation);
}
else if (tanya == vbNo)
{
natan.RegWrite("HKCU\\Software\\Microsoft\\Windows\\CurrentVersion"+
"\\Policies\\System\\DisableRegistryTools",0,"REG_DWORD");
pesan3 = "Regedit Diaktifkan!"
natan.popup(pesan3,0,"Pengaman Regedit",vbInformation);
}
else
{
natan.popup("Thanks Bro.",0,"Pengaman Regedit",vbInformation);
}
--------------------------------------------------------



Setelah selesai diketik, jangan lupa periksa setiap kata, jangan sampai ketinggalan 1 kata pun, bahkan tanda petik (“) nya juga, karena kalo tanda petik nya kurang atu aja gag bisa jalan tuh program.
Kalo sudah yakin benar, simpan notepad tersebutdengan ektensi *.js.
Setelah disimpan jalankan javascript tersebut, klik yes untuk nonaktifkan, dan klik no untuk mengaktifkan. Apabila program tersebut tidak bisa jalan, ya koreksi ulang deh ketikan anda sampai semuanya bear…heehe..moga bermanfaat ya……