Sabtu, 19 Mei 2012

Cybercrime

cybercime as defined as : "Offense that are commited againt individual or group of individuals with a criminal motive to intentionally harm the reputation of victim or cause or physical or mental harm to the victim directly or indirectly, using modem telecommunication network suck as internet (Chat rooms, emails, notice boards and groups) and mobile phone.


Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nationstate is sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.
Types cybercrime
A. cybercrime is based targeting crime. cybercrime can be devided become 3 types : 
1. Cybercrime Against Person : 
This type of crimes, targeted attacks directed against individuals or individuals who have given their nature or according to objective criteria such attacks
2.  Againts Property
Cybercrime committed to disrupt or attack the property of others. Some examples of these types crimes such as illegally accessing a computer through the cyber world, possession of unauthorized electronic information / information theft, carding, cybersquating, hijacking, data forgery, and all activities that are detrimental to other people's property
3. Againts Government
Cybercrime Against Government done with special purpose attacks against the government. These activities such as cyber terrorism as an act that threatens the government as well as cracking to the official website of the government or military sites. 
B. Based on the pattern of activities that do, cybercrime can be classified into two types as follows: 

1. Cybercrime as a purely criminal act
 
Pure evil is a crime is a crime committed because of criminal motives. Crimes of this type typically use the Internet only as a means of crimes. Examples of these crimes is Carding
2. Cybercrime as a crimes "gray"
 
On the type of crimes on the internet are included in the "gray", is quite difficult to determine whether it is a criminal offense or not the activities are sometimes not given a motive for the crimes. One example is probing or portscanning
C. Based on the type of activities done, cybercrime can be classified into several types as follows :
1. unauthorized Access
 
A crime that occurs when a person entering or breaking into a computer network system illegally, without permission, or without the consent of the owner of the computer network system that entered
 
2. illegal Contents
 
Committed a crime by entering the data or information to the internet about something that is untrue, unethical, and may be unlawful or disturbing public order
 
3. Deliberate spread of virus
 
The spread of the virus is generally carried out using email. Often times people are exposed to the email system does not recognize this virus. The virus is then transmitted to another place via email
4. data Forgery
These types of crimes carried out with the aim of falsifying data on important documents on the Internet. These documents are usually owned by the institution or agency that has a web-based database sites
 
5. Cyber ​​Espionage, Sabotage, and Extortion
 
Cyber ​​Espionage is a crimes that utilizes the Internet to conduct espionage against the other party, to enter the target networked systems
 
6. cyberstalking
 
This type of crime to interfere with or harass a person by using a computer
 
7. carding
 
Carding is a crime committed for stealing credit card numbers belonging to others and used in commercial transactions on the internet
 
8. Hacking and Cracker
 
The term hacker is usually refers to someone who has great interest to study in detail the computer systems and how to improve capabilities. As for those who frequently take strong action on the net destruction is typically called a cracker. Arguably this cracker is a hacker who is actually the ability to utilize things that are negative
 
9. Cybersquatting and Typosquatting
 
Cybersquatting is a crime committed by registering the domain name of the company of others and then try to sell them to companies with higher price
 
10. hijacking
 
The crimes of piracy hijacking other people's work.
 
11. cyber terrorism
 
An act of cybercrime including cyber terrorism if it threatens the government or citizens, including cracking into government or military sites

Business Continuity Planning

Business Continuity Management (BCM) is the process of planning to ensure that your business can return to "business as usual" as quickly and painlessly as possible in the event of a major disruption. 

We’ve pulled together some simple information on how to plan for business disruptions - whether you’re a micro-business or an international company, you should find the information you need to help keep your business running.

Why should I plan for business disruptions?

A disaster can strike any organisation, large or small. It can arrive in the shape of storm, flood, fire, a terrorist bomb, action by pressure groups, or product contamination.

How should I plan for business disruptions?

This is a five-step guide to get you started on business continuity planning - use the links below to go to each section

Step 1: Analyse your business
Step 2: Assess the risks
Step 3: Plan and prepare
Step 4: Communicate your plan
Step 5: Test your plan 

How should I respond to a business disruption?

Check out our information on responding to business disruption, and what actions you can take in the short and long term to minimise the impact on your business.

It is not the 'headline-making' major disasters that are responsible for the majority of business continuity problems. More mundane and common occurrence can have a potentially costly effect.

These include:-

- Information security incidents

- Data loss or integrity issues
- IT equipment or system loss
- Communication services failure
- Availability of key staff

Selasa, 15 Mei 2012

Install Emoticons Like Yahoo Messenger In Kopete

Kopete is application to chat messaging. icon smiley have been provided kopete still standard. We can add icon smiley in kopete so that its icon can be same with icon smile yahoo messenger. So we can enjoy chatting using icon smile in kopete like yahoo messenger

you can download emoticon library from here

Open your kopete, select Setting - Configure, select Chat Window - Emoticons


Select Manage Emoticons



On Emoticons Themes Manager click Install Theme file and you will choose library emoticon from your computer which has have been you download. Click apply then ok


Now your emoticons in kopete same with icon smile yahoo messenger

Good Luck :-)

Senin, 14 Mei 2012

Configuration Chatting With Webcam in Kopete

Kopete can be used to chatting with multi-account on different messaging service, like Yahoo Messenger, for fun i try chatting using webcam but it didn't can used. Before i have installed camera and this can be used. i searching in google how to using webcam in kopete finally i found that to use webcam in kopete needed jasper and the library

For configuration webcam so can be used in kopete on KDE4 in linux then you can follow the following steps

1. Make sure webcam have been installed. To make sure that webcam have been installed or not yet you can be used webcam application like cheese or etc

2. After make sure webcam can be run well, then install jasper and libjasper using YaST. Click Yast - Administration Setting - Software - Software Management. On Software Management typing word jasper in search field. Check jasper and libjasper in checkbox which indicates you will install this software. Then click Accept button. Like usually do installation


 Installation Jasper and libjasper on OpenSuse KDE


3. Open your kopete and try chatting with your friends on messaging Service Yahoo Messenger. Invite your friends to view your webcam. And finally chatting with webcam can be run in kopete. And don't have to push yourself to using Yahoo Messenger application. Enjoy your chatting with webcam.

good luck :-)

Minggu, 06 Mei 2012

Installation Fonts In Libre Office

Arial, Times New Roman, Impact and Verdana are some of the most commonly used fonts. They are so widely used in fact that whenever you open a Word document from any computer, you immediately expect to find their presence. However, on your newly installed Ubuntu (and many other Linux distros), you will find that there is absolutely no trace of any of these fonts.
Unix Operation System by default, does not include the commonly used Microsoft core fonts in its installation. The set of fonts that it uses is not supported in Windows or Mac. This means that if you create a document and send to your partner for editing, he/she will not be able to view it in the way that it was originally formatted. Vice versa, you won’t be able to view the document that your friend sends you in the way that it was formatted, unless he/she is using the same fonts as you.
Luckily, installing the Microsoft core fonts package (and any other new fonts) in Unix Operation System is easy. Here’s how you can do it on your own:

Installing a single font

Double click on the font. Click “Install Font” in the lower right hand corner. Congratulations, your font has been installed!

More than one font

  1. Move all your fonts to the ~/ Directory. The ~/ Directory is your home folder. So if you were logged in as cruddpuppet, the directory would be /home/cruddpuppet/ .
  2. Open up the terminal. I’m assuming you’ve already extracted the font to the ~/ directory. Type: “cd /usr/local/share/fonts/truetype” without the quotes (the path is “/usr/share/fonts/truetype” on some distros). What this does is changes the directory to the truetype fonts directory.
  3. Type in “sudo mkdir myfonts” also without quotes. Assuming you’re not logged in as root, this will ask you for your password. Anything you type will not be seen, but it is there. Just type in your password, press enter, and the directory ‘myfonts’ will be created.
  4. Type in “cd myfonts” . Then type in “sudo cp ~/fontname.ttf .” . These will get your font in the /myfonts directory.
  5. In order to install the font, ownership has to belong to root, so type in “sudo chown root fontname.ttf” and after that “sudo mkfontdir” which makes a directory for your font.
  6. Now your font is installed, but it will disappear the next time unix operation system starts up, so you just need to type “cd ..” and after that “fc-cache -v -f” .
  7. Note: If you don’t have root/sudo privileges on the machine. You can put the TTF files in the ~/.fonts directory.

Kamis, 03 Mei 2012

Make Login Page With Php

Learn to create a simple login system with php + mysql script, this tutorial easy to follow, teach you step by step.

Overview

In this tutorial create 4 files

1. form_login.php

2. checklogin.php

3. login_success.php

4. logout.php

Step

1. Create table "members" in database "login".

2. Create file form_login.php.

3. Create file checklogin.php.

4. Create file login_success.php.

5. Create file logout.php

1. First time create new database with name login and create table table member

CREATE TABLE `members` (
`id` int(4) NOT NULL auto_increment,
`username` varchar(50) NOT NULL default '',
`password` varchar(50) NOT NULL default '',
PRIMARY KEY (`id`)
)

insert data to table members

INSERT INTO `members` VALUES (1, 'herri', '1234');

 2. Create form_login.php, use the following code

<html>
<head><title>Login Page</title>
</head>
<body>
<table width="300" border="0" align="center" cellpadding="0" cellspacing="1" bgcolor="#CCCCCC">
    <tr>
        <form name="form1" method="post" action="checklogin.php">
        <td>
            <table width="100%" border="0" cellpadding="3" cellspacing="1" bgcolor="#FFFFFF">
                <tr>
                    <td colspan="3"><strong>Member Login </strong></td>
                </tr><tr>
                    <td width="78">Username</td>
                    <td width="6">:</td>
                    <td width="294"><input name="myusername" type="text" id="myusername"></td>
                </tr><tr>
                    <td>Password</td>
                    <td>:</td>
                    <td><input name="mypassword" type="text" id="mypassword"></td>
                </tr><tr>
                    <td colspan="3"><input type="submit" name="Submit" value="Login"></td>
                </tr>
            </table>
        </td>
        </form>
    </tr>
</table>
</body>
</html>

view in browser :

3. Create file checklogin.php, use the following code :

<?php
$host="localhost"; // Host name
$username="root"; // Mysql username
$password=""; // Mysql password
$db_name="LoginPage"; // Database name
$tbl_name="members"; // Table name

// Connect to server and select databse.
mysql_connect("$host", "$username", "$password")or die("cannot connect");
mysql_select_db("$db_name")or die("cannot select DB");

// username and password sent from form
$myusername=$_POST['myusername'];
$mypassword=$_POST['mypassword'];

// To protect MySQL injection (more detail about MySQL injection)
$myusername = stripslashes($myusername);
$mypassword = stripslashes($mypassword);
$myusername = mysql_real_escape_string($myusername);
$mypassword = mysql_real_escape_string($mypassword);

$sql="SELECT * FROM $tbl_name WHERE username='$myusername' and password='$mypassword'";
$result=mysql_query($sql);

// Mysql_num_row is counting table row
$count=mysql_num_rows($result);
// If result matched $myusername and $mypassword, table row must be 1 row

if($count==1){
// Register $myusername, $mypassword and redirect to file "login_success.php"
    session_register("myusername");
    session_register("mypassword");
    header("location:login_success.php");
}
else {
    echo "Wrong Username or Password";
}
?>

4. Create file login_success.php, use the following code :

<?
// Check if session is not registered , redirect back to main page.
// Put this code in first line of web page.

session_start();
if(isset($_session['myusername'])){
    header("location:form_login.php");
}
?>

<html>
<body>
Login Successful<br>
<a href="logout.php">Logout</a>
</body>
</html>

view the browser :


5. Create file logout.php, use the following code :

<?
//If you want to logout, create this file

// Put this code in first line of web page.
session_start();
session_destroy();
header("location:form_login.php");
?>


Download Tutorial :

Good Luck :-)