Friday, June 19, 2009

YEah... Ubuntu Rules..



I get excited to try out the new Ubuntu version 9.04 which is also called Jaunty Jackalope. I just receive the Ubuntu CD Installer which I order last month.. It is totally free!!! I love open source.. haha... furthermore, they also included 4 ubuntu sticker.



For those who want to try Ubuntu, you can dowload from Ubuntu website: www.ubuntu.com or you just can order the free cd just like me by fill in the form here: https://shipit.ubuntu.com/ but before that, you have to sign up the launchpad account. You can go to https://launchpad.net/people/+me/+login to sign up as a member.

Try it.. You will love it..

Tuesday, May 19, 2009

Wahaha.. my blog is on the MSC facebook wall



http://www.facebook.com/pages/Kuala-Lumpur-Malaysia/MSC-Malaysia-Open-Source-Conference-2009/97810422651#/pages/Kuala-Lumpur-Malaysia/MSC-Malaysia-Open-Source-Conference-2009/97810422651?v=wall&viewas=0

Thanks to Bro Harisfazillah Jamel
http://knowledge.oscc.org.my/events/msc-malaysia-open-source-conference-2009

Monday, May 11, 2009

What are the different between virus, worms and trojan horse?

Virus, worms and trojan horse are a few example of malware. What is Malware? Malware is a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent.

Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. Malware is not the same as defective software, that is, software which has a legitimate purpose but contains harmful bugs.

So, what is the different between virus, worms and trojan horse?

What Is a Virus?



A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files.

Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.

People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.


What Is a Worm?



A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.

The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.

Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.


What Is a Trojan horse?



A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.


Reference:

http://en.wikipedia.org/wiki/Malware

http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_general_info&cPath=11&products_id=174

http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

Tuesday, May 5, 2009

The 2009 MSC Malaysia Open Source Conference



The MSC Malaysia Open Source Conference will be held at the end of this month. This event will be conducted in 4 days. The tutorial on open source such as ubuntu, fedora and opensuse also will be highlight in this event.

Date: 31 May - 3 June, 2009
Venue: Berjaya Times Square Hotel & Convention Center, Kuala Lumpur.

Who should attend?
- Business executives from MSC Malaysia and Non-MSC Malaysia Status companies
- Open Source developers, communities, inventors, evangelist, researchers, strategist
- Government officers
- Students, general public

Why you should attend?
- Provide exposure and knowledge on the importance of Open Source in enhancing competitiveness by giving freedom of choice in software usage with lower total cost of ownership, hence benefiting businesses and society at large. Over 30 session tracks are made available.
- Share amongst the open source community on new directions and latest innovations by the subject matter experts, thought leaders and industry gurus.
- Provide a platform for conference participants to actively interact, share and exchange views, ideas, and tools on the latest trends and issues of Open Source.
- Networking, learning and having great fun!


For more information: http://www.facebook.com/pages/Kuala-Lumpur-Malaysia/MSC-Malaysia-Open-Source-Conference-2009/97810422651#/pages/Kuala-Lumpur-Malaysia/MSC-Malaysia-Open-Source-Conference-2009/97810422651?v=box_3&viewas=0

Sunday, May 3, 2009

Do you recognize your own face? Try to "Manga" your Face


Do you ever wonder how is your face look like if you are in manga @ anime character? It's totally free and you will get your "manga face" through your email. You should try to click this link: http://www.faceyourmanga.com

Express yourself through your image and share it whoever you want. You will be able to use it with the most common Instant Messaging Programmes, such as Live Messenger®, Skype®, and many more.. Enjoy yourself by discovering unlimited combinations to realize your virtual alter‐ego!

Tuesday, April 21, 2009

Want a security for your folder?

Do you have some file that is secret and private such as your passwords, your private data and others? Of course you don't want anyone else know about it. I have a solution, i just download it and it is totally FREE. The software that can give a security for your file is called "Folder Access".



After you install this software, you have to transfer all your private file into a folder. Then operate the software by "right click" your mouse to the folder that you have created. The sofware will make the folder unaccessable. If you want to access the folder, you have to key in your password first by click to the software. Trust me, it is easy and your inforamtion will be keep safe in your computer. But remember!!! Don't forget your password to open the folder!!!



You can click here for more information about the software: http://www.topdownloads.net/software/view.php?id=156290

You can click here for download the software:http://download.cnet.com/Folder-Access-Pro/3000-2092_4-10254003.html

Saturday, April 18, 2009

Flashy virus!!! How to remove it?

Oh no!!! My PC has been infected with virus. The warning appeared after I start my PC.



The virus came from my thumbdrive and the folder FLASHY and RECYCLER appear. I've click the folder and the virus attacked my system. So, if the folder FLASHY and RECYCLER appear on your thumbdrive, DON'T YOU EVER TRY TO CLICK IT!!!!



After that, I've search to the internet the solution for it. Other user also got infected from this virus and he is suffered from it.

There is a virus called "flashy.exe" spreading in my company . We can delete it with AVG and bitdefender. But for the most computers , we installed norton for centralized virus updates. Norton can't get rid of it and all are infected. That virus is always quick spreading from memory stick. On the infected memory stick, all real folders are hidden. It make all read folder to .exe with their respective folder names and all icons are like normal folder and there is another folder named flashy.exe which is the main virus.

Whenever we unconsciously doubleclick the memory stick, it starts loading flashy.exe from the root folder of memory stick(flash drive)and then it is in the running process on the task manager and got into the computer. Destructions on flash drive is all.

Since it got into the computer, the first thing it does is removing folder option from Tool menu. If it becomes worse, it remove or change bultin administrator password.If much worse, it disable run/regedit and taskmanager. I am sure it has some strains. Sometimes i found with the name flashybot.exe is running in the process. Sometimes flashy.exe.

I still can't get the main source of that virus.
It also wrote in registry. I saw many points for flashy.exe in registry.
but it is not over on the infected machine.
if we restarted PC, it shows again in the registry and Process tab of taskmanager.

what i mean is to remove flashy virus on memory stick is easy.
but to remove flashy permanently from a computer is really out of question now.
because of hidden folder options , lost admin pwd, no task manager, and no regedit.

I really want to get rid of that flashy virus.

I searched all norton, bitdefender, and avg websites. They still don't offer it. How can i get my solution?? how can my PC recover from that bleeping flashy virus? any body help me? It is out of question for me to install bitdefender on all over 100 pcs and update definitions daily alone.


help me with removal tool!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

thanks

still nobody can help me!!!!!!!!!!!!!!!!!!!!!!!!!!!!


Source: http://www.bleepingcomputer.com/forums/lofiversion/index.php/t85498.html



Technical Names For Flashy.exe Given By Security Companies:-

BackDoor-DIY [McAfee]
W32/Glupzy-B [Sophos]
WORM_FLASHY.B [Trend Micro]
Trojan.Win32.Disabler.i [Kaspersky Lab]
Email-Worm.Win32.Brontok.N [Ikarus]
Win32.Virut.Gen.5 [PC Tools]
Backdoor:Win32/Glupzy.A [Microsoft]
Trojan.Win32.Disabler.al [Kaspersky Lab]
W32/Vetor-A [Sophos]
W32/Virut.gen [McAfee]
Trojan.Disabler.E [PC Tools]
Virus.Win32.Virut.n [Kaspersky Lab]
Virus:Win32/Virut.AE [Microsoft]
Win32.Dzan.A [PC Tools]
Mal/HckPk-C [Sophos]
Mal/Packer [Sophos]
PE_VIRUT.XL [Trend Micro]
PE_VIRUT.XP [Trend Micro]
PE_VIRUT.XS [Trend Micro]
TROJ_DISABLER.AD [Trend Micro]
Trojan.Disabler!sd5 [PC Tools]
Trojan.Disabler.O [PC Tools]
Trojan.Disabler.T [PC Tools]
Trojan.Win32.Agent.kkh [Kaspersky Lab]
Trojan.Win32.Disabler.i [Ikarus]
Trojan.Win32.Disabler.x [Kaspersky Lab]
Trojan:Win32/Patched.AF [Microsoft]
Virus.Win32.Virut.q [Kaspersky Lab]
Virus:Win32/Virut.AF [Microsoft]
Virus:Win32/Virut.K [Microsoft]
W32/Glupzy-C [Sophos]


I've found the solution for this problem. Just download the following flashy.exe remover and run it. You can download it here:http://www.technize.com/?dl_id=85.It is recommended that you run this tool in safe mode.


Source: http://www.technize.com/2009/01/18/how-to-remove-flashyexe-virus/comment-page-1/#comment-18707