About Lina Sitinjak

Bagaimana cara membahagiakan pasangan kita ? Tentu saja banyak, maka kita harus berdoa.

Here are my most recent posts

Author Archive: Lina Sitinjak

About Lina Sitinjak

Bagaimana cara membahagiakan pasangan kita ? Tentu saja banyak, maka kita harus berdoa.

Aplikasi untuk Hacker dalam Meretas Komputer

Aplikasi Hacker

Aplikasi Hacker – Dari tahap ini, mungkin kalian sudah familiar dengan bagaimana dan apa saja bahaya hacker. Lengkap dengan apa saja yang bisa mereka lakukan. Katakan saja, melumpuhkan sistem komputer kamu beserta dengan jaringannya menjadi satu hal pertama. Kedua, mencuri identitas, entah itu data pribadi, hingga data akun bank dan paypal kamu.

Berikutnya, mencuri data file penting. Untuk yang terakhir ini paling sering dilakukan hacker pada perusahaan serta instansi pemerintah. Data penting ini tentunya memiliki banyak sekali kegunaan dan manfaat sendiri nantinya. Berikunya? Membobol akun Paypal, bank akun, hingga wallet bitcoin. Parah sekali bukan? Saking parahnya, saat ini NSA sudah menggalakan “perang” khusus untuk memerangi hacker, beserta juga penyebaran virus dan malware. Namun tahu tidak aplikasi dan software apa saja yang sebenarnya digunakan hacker untuk meretas ke dalam sebuah komputer?

1. Attacking IP

Aplikasi apa satu ini? Pengguna komputer biasa, mungkin kamu, juga tak begitu familiar dengan ini. Aplikasi Attacking IP sendiri digunakan hacker untuk masuk ke dalam jaringan sebuah sistem komputer melalui port jaringan yang lemah. Atau yang tidak mendapatkan cukup perlindungan.

Hacker menggunakan sistem rajapoker ini biasanya untuk mengacaukan jaringan sebuah sistem. Dan caranya pun mudah, yang mana hacker hanya perlu berbekalkan alamat IP sebuah server saja. Untuk mengatasinya, ada beberapa hal yang bisa dilakukan. Pertama dengan tak memberikan IP kepada sembarang orang, menggunakan VPN sehingga website atau pihak ketiga tak bisa melacak IP yang kamu gunakan, serta yang terakhir dengan rajin melakukan update driver dan juga anti virus.

2. Remoted Desktop Connection

Berikutnya yang penting untuk diperhatikan adalah Remoted Desktop Connection. Berbeda dengan Attacking IP, aplikasi ini sudah pasti familiar untuk kamu dimana Remoted Desktop Connection termasuk bagian dari Windows Utility. Fungsinya? Untuk menghubungkan satu komputer atau PC dengan PC lain yang berada di jaringan yang sama. Biasanya digunakan di kantor atau di sekolah untuk memudahkan pengaturan komputer.

Namun meski tujuannya memudahkan, bagi hacker, Remoted Desktop Connection yang aktif justru menjadi kesempatan untuk membobol suatu komputer.Untungnya saat ini, nyaris semua antivirus sudah memiliki perlindungan khusus bila ada virus atau malware yang masuk ke dalam sistem dari celah ini. Meski tak ada salahnya pastikan terus komputer atau jaringan apa saja yang terhubung ke komputer kamu dengan Remoted Desktop Connection.

3. Aplikasi email

Banyak orang yang lebih senang mengecek email dari web browser langsung. Meski tak sedikit pula yang rupanya lebih tertarik mengecek email dengan menggunakan aplikasi khusus. Entah itu Outlook, Gmail, hingga dari Mac Os. Lalu apa yang membuat aplikasi e-mail ini berbahaya? Berbeda dengan mengecek email dari website, yang biasanya sudah ada sistem spam yang aktif, seringkali aplikasi pada email justru tak memiliki sistem tersebut. Yang membuat malware atau virus yang masuk ke dalam komputer lewat email menjadi jauh lebih mudah.

Belum lagi, sering pula aplikasi email ini mudah sekali dibobol. Dengan hanya menggunakan satu atau dua serangan virus dan malware saja, hacker bisa jauh lebih mudah untuk masuk ke dalam sistem komputer kamu. Karena itu untuk mengakalinya, selalu pastikan kamu hanya membuka email dari orang yang sudah kamu kenal. Dan sama sekali tak membuka link yang diberikan melalui email di aplikasi email.

4. Key logging

Key logging merupakan sebuah aplikasi yang sering kali diberikan di komputer kantor atau komputer sekolah. Sering juga terdapat di komputer umum seperti di perpustakaan dan kampus. Gunanya? Untuk melihat dan mengontrol penggunaan komputer oleh pengguna dari apa yang mereka ketikan di keyboard.

Sayangnya dengan fungsinya tersebut, tak heran bila hacker banyak menyerang komputer dengan menggunakan aplikasi key logging. Jadi nantinya hasil rekaman pengguna bukan hanya sampai pada pemilik kompter namun juga pada hacker. Seram ya?Bahaya key logging ini parahnya beberapa kali terdapat di laptop bekas yang dijual murah loh.

Alternative Application of Windows Essential Substitute

If you are also one of them, then 5 applications and alternative software from Windows Essentials 2012 below is worth to glance.

My Techno – Ever heard of Windows Essentials 2012? Windows Essentials 2012 is a flagship program of Windows, which includes alternative a lot of applications that were then assessed by Microsoft can be useful for users. Windows Essentials 2012 also has several other types of applications such as, Family Safety, SkyDrive, Live Messenger, Outlook, Live Mail, Movie Maker, Live Writer, and Photo Gallery. Familiar with software and application above? Perhaps it is because the fact that Windows Essentials 2012 is loyal along with Microsoft and its judi poker online users until early this year 2017. Where after that, this company just decided to destroy Windows Essentials 2012 on January 10, 2017.

Admittedly, many users who have used a row of apps under Windows Essentials 2012 are feeling lost with this change. That ultimately makes them try to find other alternatives from the use of applications incorporated in Windows Essentials 2012.

If you are also one of them, then 5 applications and alternative software from Windows Essentials 2012 below is worth to glance.

1. Mozilla Thunderbird (Windows Live Mail) | Best Alternative

Before the era of Google and Gmail as it is today, Windows users are already familiar with Windows Live Mail app, which is usually combined with email from Microsoft itself. Windows Live Mail can also be used for email from other providers. Well now after Microsoft officially “turn off” Windows Live Mail, the user inevitably must start trying to find another alternative.

Windows 10, the latest series of Windows operating system already has its own application for email. But unfortunately not as perfect as Windows Live Mail. Therefore, another alternative that can be selected exactly is Mozila Thunderbird. Mozilla Thunderbird has many features and functions that are more or less the same as Windows Live Mail. Starting from sending emails, saving drafts, working offline, archiving emails, to special folders for spam.

2. Shotcut (Windows Movie Maker)

Losing Windoes Movie Maker is definitely an unexpected blow to be felt by Windows users.

Although in fact Windows Movie Maker is only able to work for the most basic video editing features and functions, such as trim video, crop, give color filters, combine image by image to get video results, add text and change transitions with anime, this app Was once a superior for novice users to make simple video content with ease.

Well if you are also looking for a video editing application with a function that is almost the same as Windows Movie Maker in Windows Essentials 2012, then the Shortcut can menjaid answer. Shotcut can convert videos, combine videos and photos, to give effect filters and animations on its transitions. And can also edit the audio anyway!

3. Open Live Writer (Windows Live Writer)

The bloggers may have to admit they are very missing Windows Live Writer applications. Although there are, most content writers do not use this application, this software application actually has the most functions and most unexpected.

From applications to writing, to editing, adding videos and photos from various sources, from camera to web, and instantly posting posts made to multiple platforms like WordPress and Blogpost. That is all? Another advantage of course there are still many. Well if you also suddenly feel the loss of Windows Live Writer, then Open Live Writer is also in Windows 10 can be an option.

4. Google Drive – SkyDrive (OneDrive)

Yes, without a lot of know actually Microsoft has completed the fate of SkyDrive or OneDrive in January. But do not worry because there are actually some other applications that can be used to replace this digital cloud storage applications.

The easiest and most familiar of course is Google Drive. Unlike SkyDrive, Google Drive is not only usable when users use Windows, but can also be accessed on android smartphone, iOS from Apple and Macintosh. In addition, the capacity is much larger. No loss right?

Tricks Maintain Data Security and Privacy

Currently, the issue of data security and privacy of internet users is becoming serious.

My Techno Currently, the issue of data security and privacy of internet users poker online terpercaya is becoming serious. And indeed this case must be considered seriously considering the magnitude of the dangers that can occur when your personal data leaked into the hands of people who are not responsible. For security in using this internet, below there are 7 steps that can be done when you use the internet.

1. Customize Browser Settings

In popular browsers that are widely used, have the feature to filter a site. These settings can be maximized to block some web that appear risky and web content with adult content. Unfortunately not all browsers have this feature. Browsers with this feature include IE (Internet Explorer), Firefox, and Safari only. Why Chrome is not yes?

2. Always Watching Children

It is true to keep an eye on children while using the internet. Why? This is because children are proving more easily leaked confidential and private data to strangers on the internet. In addition we are obliged to teach these children about which web is safe and which are not safe. Again, because it’s a big risk kids click on the web automatically, so make sure to give double time when kids use the internet.

3. Use Firewall for Data Safety

Computer users are required to always enable the firewall to suppress intruders who want to access personal data on our computer. We have the option to enable Firewalls based on hardware or software, altogether. Although it must monitor, the firewall is not secure computer safe from hackers.

4. Run Antivirus In Routine

An antivirus function is to scan the entire computer system from viruses that can be entered through a gap we do not realize. The gap is often open when we are browsing on the internet. This is the most basic reason we must use antivirus when using the internet actively.

Therefore, always make sure the antivirus works nonstop on the computer. Let the antivirus scan all files and search for the virus. Currently there are many free antivirus that can be selected according to what we need, starting from the wrong McAfee VirusScan can be made virus scanning automatically.

5. Back Up Hard Disk Routinely

Again, routine data backups are always a recommendation to maintain the security of personal data. For internet users on personal computers, it is important to have and. Data data on a regular basis. Select each important file and make it necessary, then save it to another storage. Virus to infect a computer via the internet or e mail is quite large. Viruses are easily removed and cause damage to all files that are on the hard disk. Therefore, do not forget to do regular backups for things like this.

6. Delete Unknown Identified Email and File Attachments

Recently, there is news if the virus is able to via email. The contents of the e-mail attach a Google Drive file that has a purpose so that the owner of e mail opened it. Then, it is predictable what can happen if the owner of e mail follow the instructions of the virus maker. To avoid cases like this, then we should check first e-mail originated from anywhere or anything.

After that do not originate click files that are not by strangers. Maybe we can verify the contents of e mail by contacting the sender. But now, some large e mail providers offer filter options that are capable of automatically depressing senders not listed on contacts.

7. Provide Limited Information

As much as possible as a wise internet user we should not provide important and sensitive info, such as home or office address, Info about banking account, resident data ID number, daily activities, photos of children, and others. Do not just believe with strangers, including we must always be careful when doing transactions with others and not just believe in who on behalf of certain parties, and so forth.

For the sake of Paying Debt Rp10 M, Samsung Staff Steal 8.474 Mobile Phone

Samsung Staff steal phone for paying his debt

My Techno – In order to pay off debt, a Samsung employee stole thousands of Samsung mobile phone agen domino online units. The employee managed to steal thousands of cell many phones for almost two years without getting caught. Big Company, Samsung Electronics’ former employee is Lee. He dared to take action to pay off gambling debt of US $ 800 thousand or about Rp10, 6 billion.

The phone that disappeared thanks to Lee’s action amounted to 8,474 units. Lee stole thousands of phones directly at Sammobile headquarters in Suwon, Gyeonggi, South Korea.

In just two years alone, Lee managed to snatch the money of US $ 711 thousand or about Rp9, 45 billion. The amount comes from the sale of all Samsung phones that he stole within two years. The SamMobile report says the phone Lee stole is not a phone that will be sold to the market. This mobile smart phone that he took is a test phone that is usually used by developers to test updates and new features of the system.

Samsung sniffed something went wrong when it discovered there was an unnecessary smartphone sold in Vietnam. From there, Sammobile always reported the case to the police in December last year.

Receiving Samsung’s report, police team finally arrested Lee. Unfortunate for Lee, she was arrested when her debt was still not paid off. Lee has been working for Samsung since 2010. He was accepted into a special-needs employee program and was assigned to the old mobile maintenance department used to test new features or system security updates.

He was able to outsmart the security of the company building thanks to the steel wheelchair he used. Lee say thanks to the wheelchair, he can pass through the body scanner despite secretly smuggling thousands of mobile phones for two years.

Yahoo and AOL Merger Companies Will Fired 1000 Employees

AOL and Yahoo will fired 1000 employee

My Techno – After the merger between AOL and Yahoo, according to a source, the company will soon terminate its employees’ employment on a large scale It is estimated that as many Domino online terpercaya as 1,000 workers will be dismissed. Although it looks a lot, but this amount is not up to 20 percent of the total workers AOL and Yahoo.

This step is already predicted. Therefore, both companies have redundancies of workers. Among them are personnel for human resources, finance, marketing, and general administration The merger process of both companies is expected to be completed next week. As we know, Verizon bought both companies. Combined both are expected to support technology and content on mobile telecommunications service operators in the United States.

The combined company AOL and Yahoo will get a new name, OATH. Plans to merge these two companies continue to be done in recent times This effort is quite time consuming because both companies have cohesive units with multiple assets and problems. OATH will be headed by AOL CEO Tim Armstrong, as Recode writes.

While many executives include Yahoo CEOs who quit the merger company. Marissa Mayer, former CEO of Yahoo, is one of those who will be laid off. The amount of severance he will receive is estimated at US $ 23 million (approximately Rp 306 billion), as written by Business Insider.

Some execs on Marissa Mayer’s leadership team are apparently consulting with many lawyer about what kinds of things would get them fired after the acquisition, according to another person close to the company This person believes that some of the execs are actually “trying to get fired” by Verizon Company should the deal close so they can walk with their big payday. If an exec could leave the job without walking from a lot of money, that’s appealing.

Typical Warmth of the First Apple Store in Southeast Asia

First Apple Store Located at Singapore

My Techno – The excitement of Apple’s first retail store – Apple Store – in Southeast Asia was not only felt on the first day of opening or exactly two weeks ago. A similar atmosphere is still felt today, one of which is the view of a number of people who are willing to wait for the store is opened.

We had the opportunity to visit the Apple store located at Knightsbridbe Mall, Orchard Road, Singapore. Apple Store location at the intersection makes visitors easy to find buildings consisting of two floors of it. The sight of people passing by on the sidewalks front of the store until the visitors who take pictures in front of the Apple logo become commonplace outside the store.

A number of visitors Apple Store who have been waiting in the front yard shop began to queue when the clock shows at 10 am. Service staff rushed to open the shop and warmly welcomed potential visitors. All the shopkeepers stand by the entrance to the visitor’s warm welcome, this is like meeting old friends back together.

The warmth in it became more and more intense when the shopkeepers wearing green shirts deftly helped and served every visitor. Information about the products on display, accessories, until the availability of newly released products was answered with an informative.

A number of variants of the Macbook, iPad, iPhone, until Apple Watch is displayed neatly on a table lining the ground floor of the store. While the accessories of Apple agen bola sbobet devices are arranged on the wall facing the street. Not just look around and capture the moment in the store, visitors are also given the opportunity to try out all the devices in it. In contrast to the experience of entering an electronics store in Jakarta, Apple provides warm and friendly service in its store. No officers followed where visitors stepped in while exploring the corners of the store.

The store service staff will only come over if visitors feel they need information or want to wonder about Apple devices. The rest, they will provide opportunities for visitors to look around, try and capture the moment in the store. In the corner of the store is a circular staircase that will take visitors to the workshop area and consultation by the shop assistant. A number of desks neatly lined up to welcome visitors who want to consult about Apple devices. While for visitors who bring children, Apple provides a special area child friendly which is near the consulting table. Children can take an interactive game session utilizing the iPad with a shop assisted by a shop assistant.

Upstairs there is also a large screen featuring a daily activity agenda for children. Apple took a number of artists to provide an experience for visitors to maximize their Apple devices. Similar to the wall on the first floor, the second floor of this store is also colored with various accessories for iPad, iPhone, Mac, Apple Watch. The difference in one corner of the store wall is also available a variety of supporting accessories made by other companies that can connect with Apple devices.