Pages

Subscribe:

Ads 468x60px

Sunday 30 October 2011

Facebook Chat Virus

Have you clicked a link in FaceBook chat and now your computer is infected? Have you received a strange message with a link in FaceBook chat and you don't know what is it? This is a good starting point to find more about.





How the virus works


Since December, there is a virus crawling through the FaceBook Chat: a worm, to be more accurate


What is this virus?


Pretty easy: like almost all the infections you can get through a social network, it is just a simple message you'll receive in FaceBook Chat. One of your friend will send you this message, which is something like "foto :-)", "pic :)" and a link to the photo itself. Presumably.


DON'T click it.


Whatever thing could happen, don't click that link. Never.


What to do, then? The first thing is "Don't panic". Until now, nothing bad happened: you've only received a message with a potential virus, but the virus is not in your computer, yet. Simply close that chat window and everything will be fine. And DON'T click the link.


As a second step, I'd suggest you to write a message to your friend, the one who sent you the link with the virus. It's not mandatory, but it's a nice thing from you. DON'T copy the link in the message: just write "I got a strange link from you" and explain what happened and everything will be fine. If you got the link from his/her Facebook profile, this means that your friend is already infected by that virus and now the virus itself is trying to spread, without your friend ever notice it. If you inform him/her, you'll surely do him/her a favour and you'll help avoiding that other friends will be infected by the virus


Now, what happens if you click the link?


First of all, you made a really bad move. But well, it can happen. Maybe you involuntarily clicked it, or you really trusted your friend, who knows. It would be better to be more cautious in the Web, but by now you did it. Time to find a solution. Let's see.


If you click the link, you'll be send to a fake FaceBook page, which says that the picture you were looking for has been moved, for whatever reason. If you want to see the picture, you must click on a button, which looks exactly like a common FaceBook button, like the one you usually click in order to activate an app. Have you clicked it? Great! Now, your computer has just won a new virus.



Clicking on that fake button, you haven't activated any app and you haven't seen any picture, since no picture ever existed! It was a trick, made by the one who programmed the virus: a bait, in order to make you click and install the virus in your computer. Maybe the virus has a name, which looks like a real photo from FaceBook, but the truth is that it's not a photo: it's an executable file, which will install itself in your computer as soon as you click and accept.


This kind of virus is usually called "Worm": it is a virus often hidden in a fake web page, which spreads itself through the Web, from a computer to another. Those pages are clearly fake, but very similar to an original page and they can deceive an inattentive user. After infected your computer, this virus will keep working, trying to spread through all of your contacts, using the same trick which already worked with you: fake links and fake pages.


A worm virus works like this. Their name comes exactly from it: worm, since they crawl from a computer to another, digging through fake pages.





How to remove it


You got yourselves infected. And now?


And now you must clean up your computer, in order to erase the virus and bound the damages it already did.


First of all, you must scan you whole hard disk with a good and updated antivirus. All the hard disk, folder after folder. You can never be too cautious about it.


Usually this is not enough. You need a specific software, in order to remove this kind of virus. There are many of them, as for example Malwarebytes, which is also downloadable in a free version. You can download it by clicking the link.
Notes : When you click the 'Download Now' button on the website, it will automatically go to Cnet Download page : http://download.cnet.com/
It is safe, just proceed to download it ! Trust Me :)
Download it, install it and scan all your computer with it, too: then, follow the instructions. Next time, please be more careful and avoid to blindly click any link you find.


One last thing, but very important.


Once you have removed the virus and your computer is clean, change all of your passwords. Change the answers to the questions for recovering your passwords. You can't be sure whether your passwords have already been stolen or not, but it's better to play safe. For sure, someone had a chance for putting his nose inside your computer, potentially finding and copying all of your data stored inside of it, passwords included. Maybe he did it, or maybe not, but why should you risk?


Change your passwords and you'll be safer.

New password-stealing virus targets Facebook

The emails tell recipients that the passwords on their Facebook accounts have been reset, urging them to click on an attachment to obtain new login credentials, according to anti-virus software maker McAfee Inc.

If the attachment is opened, it downloads several types of malicious software, including a program that steals passwords, McAfee said on Wednesday.

Hackers have long targeted Facebook users, sending them tainted messages via the social networking company's own internal email system. With this new attack, they are using regular Internet email to spread their malicious software.

A Facebook spokesman said the company could not comment on the specific case, but pointed to a status update the company posted on its web site earlier on Wednesday warning users about the spoofed email and advising users to delete the email and to warn their friends.

McAfee estimates that hackers sent out tens of millions of spam across Europe, the United States and Asia since the campaign began on Tuesday.

Dave Marcus, McAfee's director of malware research and communications, said that he expects the hackers will succeed in infecting millions of computers.

"With Facebook as your lure, you potentially have 400 million people that can click on the attachment. If you get 10 percent success, that's 40 million," he said.

The email's subject line says "Facebook password reset confirmation customer support," according to Marcus.


SO PLEASE BEWARE OF ANY SUSPICIOUS EMAIL !   

Facebook Virus Turns Your Computer into a Zombie

Hahahaha... The subject is quite funny, but do not takes it lightly !



If you've received a message like that through Facebook or MySpace, you may have been exposed to the "Koobface" virus. "Koobface" comes through an e-mail sent by one of your social networking site friends inviting you to scope out a video.

Once the URL is clicked, "Koobface" prompts you to update your Flash player before the video can be displayed. Therein lies the virus, cloaked in a "flash_player.exe" file. According to the Kaspersky Lab, an antivirus organization working closely with Facebook, "the worms transform victim machines into zombie computers to form botnets."

The McAfee Security Blog explains that when "Koobface" infects your computer, it prompts a downloaded service named Security Accounts Manager (SamSs) to load on start-up. SamSs then proxies all HTTP traffic, stealing results from popular search engines and hijacking them to lesser-known search sites.

A clear eye for fraud will help you avoid this mess. You can usually spot phony e-mails by their titles. Kaspersky found the following: Paris Hilton Tosses Dwarf On The Street; Examiners Caught Downloading Grades From The Internet; You must see it!!! LOL. My friend catched you on hidden cam; Is it really celebrity? Funny Moments. My own "Koobface" attack came in an e-mail entitled, lool, yoour blushingg afce is so funny! Checkk out. Obviously, Paris Hilton never threw dwarves, and in all likelihood, my 26-year-old friend knows how to spell more than two words. These are clear indicators you're being attacked.

Facebook has posted instructions about how to remove the "Koobface" virus: give your computer an antivirus scrub-down and change your Facebook password.

This attack on the world's most popular social networking site and its 120 million users comes just weeks after Facebook won an $873 million lawsuit against several people accused of hacking user accounts and spreading spam.

Browser Wars


Google Chrome 10
Chrome Instant means your Web page is ready to read before you finish typing the address. This, its speed, minimalist design, and advanced support for HTML5 have deservedly been attracting more and more users to the browser. The latest version adds an improved settings interface, and even more speed and security.

Firefox 4 gets Mozilla back into the game. This lean, fast, customizable browser can hold its own against any competitor, and it offers graphics hardware acceleration.

Microsoft's new browser is faster, trimmer, more compliant with HTML5—a major improvement over its predecessor. It also brings some unique capabilities like tab-pinning and hardward acceleration, but only Windows 7 and Vista users need apply.

Like the other current browsers Opera is fast, compliant with HTML5, and spare of interface. Long an innovator, recently it's added unique things like Unite, which turns the browser into a server, and Turbo, which speeds up the Web on slow connections through caching. Though perhaps the biggest new feature in Opera 11—extension support—actually follows other browsers, the new version also innovates with tab stacking and visual mouse gestures.

Safari is a fast, beautiful browser, but the new Reader view makes it even more enticing. Leading support for HTML 5 features will also be important, but you can already get that in other browsers, too. Safari's strong bookmarking, RSS reader, and vivid new-tab page will also appeal to many.

Saturday 29 October 2011

Gulftown

Gulftown  or Westmere-EP  is the codename of a six-core hyperthreaded Intel processor able to run up to 12 threads in parallel. It is based on Westmere microarchitecture, the 32 nm shrink of Nehalem. Originally rumored to be called the Intel Core i9, it is sold as an Intel Core i7. The first release was the Core i7 980X in the first quarter of 2010, along with its server counterpart, the Xeon 3600 and the dual-socket Xeon 5600 (Westmere-EP) series using identical chips.

First figures indicate that at equivalent clock rates, depending on the software, it has up to 50% higher performance than the identically clocked quad core Bloomfield Core i7 975. However, consumer software that utilizes six real cores is still quite rare as of 2011, and not every multithreaded program is able to take advantage of this many cores. Despite having 50% more transistors, the CPU strongly benefits from the 32-nm process, drawing the same or even less power (depending on the operating system) than its Bloomfield predecessors with merely four cores. The thermal design power (TDP) of all planned models is stated to be 130 watts.

Westmere-EP is the first six-core dual-socket processor from Intel, following the quad-core Bloomfield and Gainestown (a.k.a. Nehalem-EP) processors using the same LGA 1366 package, while the earlier Dunnington six-core processor is a Socket 604 based multi-socket processor. The CPUID extended model number is 44 (2Ch) and two product codes are used, 80613 for the UP desktop/server models and 80614 for the Xeon 5600-series DP server models. In some models, only four of the six cores are enabled.

15 Things Every PC User Should Know

1. Don't double-click everything. Windows 101: Double-clicking is how you open items in Windows. It's not how you open links in your Web browser, click buttons in dialog boxes, or do pretty much anything else--and if you reflexively double-click, you might accidentally zip right past something important or submit a form twice. If you don't need this reminder yourself, chances are you know someone who does.
2. Use slashes and backslashes in the appropriate situations. Let's get it straight: / is a slash (or forward slash, if you must), and \ is a backslash. Backslashes are conventionally used for Windows file paths (C:\Program Files\Whatever), while slashes are used for Internet addresses (http://www.pcworld.com/howto.html).
3. Record the exact error message. When your PC crashes, it'll usually try to tell you why it is doing so--albeit with a string of numbers and letters that you won't understand. Write the message down in its entirety (or take a screenshot, if possible) so you can later plug it into Google or give it to your tech support agent. If your PC didn't provide an error message, go to Action Center (in the Control Panel) and see if it shows up under 'View archived messages' or 'View problems to report'.
4. Bring deleted files back from the dead. When you delete a file from your PC or memory card, you're not wiping it off the actual hard drive. Instead, you're simply removing the index information that tells your PC where the file is, at which point the PC is free to treat the part of your disk that contain that file as empty space that it can write something else to. If you've accidentally deleted something, undelete utilities such as Recuva can help you find those files again as long as you haven't already written over that file with something new.

5. Wipe your hard drive before getting rid of it. Because your PC doesn't immediately get rid of the files you delete, you can't just reformat your hard drive before recycling or selling your old computer--because someone might be able to use an undelete app to recover your sensitive data

6. Uncheck the boxes before you install. Lots of helpful apps out there give you the option of installing search toolbars and other add-ons--and some of them are so pushy about being helpful that their installers are configured to install the uninvited extras unless you check a box saying you don't want them. Not only is each add-on another thing that your PC needs to load, but you have no idea what kind of data it could be sending out. They come bundled with the app because they make money for the app developer, not because they're particularly useful. So take a close look at what you're installing before you click Install--and in return, the installer won't change your search engine or install apps you don't need.

7. Beware of viruses living in Office docs. Experienced Microsoft Office users can take advantage of its built-in Visual Basic for Applications support to automate complex tasks with macros. However, malicious coders can use those same tools to design viruses that may interfere with your work and that of your colleagues. By default, Office is set to disable all macros and notify you when a doc you're reading contains them (to toggle this setting, in Word, select Word Options, Trust Center, Trust Center Settings, Macro Settings), so you should already be safe on this score.

8. Be skeptical of "cleaning" apps. Apps that make vague claims about improving your PC's performance and clearing out its clutter (Registry cleaners, I'm looking at you) will generally do more harm than good (if they do anything at all). To clean up your system, simply run Disk Cleanup (to reach it, select Start Menu, All programs, Accessories, System Tools); it comes with every Windows installation and it won't mess up your PC.
9. Uninstall your old apps. If you regularly download and install new apps from the Internet, you should get in the habit of pruning your collection every now and then. To do so, open the Programs and Features control panel, scroll through the list, and click Uninstall to ditch items you no longer want. You may need to take a trip into your C:/Program Files/ folder to hunt down a few additional unused apps. The less stuff you have on your PC, the less things are to go wrong.
10. Don't let a spilled drink ruin your laptop. If you keep your cool when a spill occurs, you may be able to prevent your data from disappearing and your motherboard from frying. Instead of panicking, quickly but methodically unplug the power cord and yank out the battery--don't wait for Windows to power off. Next, detach anything connected to the PC (network cables, USB devices) and pull out any readily removable components such as an optical drive. Tilt the laptop to try to drain the liquid in the direction that it spilled onto your PC, but be careful--you don't want to tilt the laptop in a direction that would allow the liquid to seep even deeper in. If you see liquid on the surface of the laptop, dab it off with a towel. At this point, unless you're comfortable disassembling your PC and cleaning it with electronics cleaner, you'll probably want to take it to a tech.
11. Turn down UAC. Both Windows 7 and Windows Vista include a security function called User Account Control, which dims the screen and flashes a dialog box whenever you install an app or change your system settings. Though this arrangement can be useful for catching sneaky apps that are trying to install or change things without your knowledge, it can also be annoying. If you use Vista, grab TweakUAC to make it less annoying without turning it off. If you use Windows 7, the default settings aren't too bad, but I recommend that you go into the User Accounts control panel, click User Account Control settings, and change the setting to the third notch down, so UAC will still warn you but it won't dim the screen.
12. Don't work in your admin account. Many PC users are accustomed to doing their everyday work while logged in to their PC's administrator account--especially in Windows XP. Doing so can save you the hassle of having to log in and out when you want to install apps or make changes, but it also leaves you much more vulnerable to viruses and malware--so don't do it.

13. Keep your Control Panel in Icon View. The Control Panel's Categories view can be useful if you're intimidated by the many different options available, but it can also make finding what you're looking for more difficult (especially if you're following detailed instructions that refer to the control panels by name). Click Classic view on the left (in Vista) or choose Large Icons from the View by dropdown menu in the upper right (in Windows 7), and you'll have ready access to all of the control panels.

14. Clear your system tray. Apps often park themselves in the system tray (the row of icons on the right side of your taskbar) and stay open without your realizing it. Take the time to clear it out occasionally. Open the Notification Area Icons control panel, and check the box on the bottom that says Always show all icons and notifications on the taskbar to get a sense of how cluttered your system tray is; then right-click each one you don't need and choose Close. Your RAM will thank you.
 
15. Manage your power settings. If you're using a laptop, you'll want to know how to change your power settings so your PC doesn't waste battery when you need to conserve it, doesn't slow down when you need to go fast, and doesn't go to sleep at an inopportune moment. Open the Power Options control panel, and choose from among several presets containing different configurations for when you're plugged in and when you're mobile--or feel free to create your own. To access the advanced settings, click Change plan settings, Change advanced settings; there you'll find detailed options related to your battery, Wi-Fi radio, graphics card, and more.

ISI KANDUNGAN BAJET 2012 | BELANJAWAN 2012


1. Antara tahun 2011-2020, kesemua program transformasi akan dilaksanakan di bawah Dasar Transformasi Nasional.
2. Bajet 2012 sediakan peruntukan RM232.8 bilion untuk melaksanakan semua rancangan Kerajaan.
3. RM181.6 bilion untuk perbelanjaan mengurus & RM51.2 bilion untuk perbelanjaan pembangunan.
4. RM29.8 bilion disediakan untuk pelaburan dalam infrastruktur, perindustrian, pertanian & pembangunan luar bandar.
5. RM13.6 bilion disediakan utk sektor sosial, termasuk pendidikan & latihan, kebajikan, perumahan serta pembangunan msykt.
6. Defisit Kerajaan Persekutuan dijangka terus berkurangan kepada 4.7% drpd KDNK, berbanding 5.4% tahun ini.
7. Tema Bajet2012 ialah “Dasar Transformasi Nasional: Bajet Membela Rakyat, Mensejahtera Negara”.
8. Rolling Plan Ke-2 (RP2) bagi RMK10 akan dilaksanakan tahun ini & diperuntukkan RM98.4 bln utk tahun 2012 & 2013.
9. Projek utama RP2 termasuk Lebuhraya Pantai Timur Jabor-Kuala T’ganu & pembinaan jalan Kota Marudu-Ranau.
10. Pada 2012, Kerajaan akan peruntuk RM978 juta utk merancakkan pembangunan di 5 wilayah koridor.
11. Peneroka FELDA akan terima “durian runtuh” yang mana jumlahnya akan diumumkan sebelum penyenaraian dilakukan.
12. Pengecualian sepenuhnya duti import & duti eksais bagi mengimport kereta hibrid & elektrik akan dilanjutkan sehingga 2013.
13. Krjn peruntukkan RM100juta utk inovasi termasuk memperkenalkan Anugerah Cipta 1Msia (C1PTA) utk iktiraf rekacipta pelajar.
14. Sektor pendidikan akan dapat RM50.2bln utk melahirkan tenaga kerja berbakat, kreatif & inovatif.
15. Buat pertama kalinya, Krjn akan mansuhkan yuran pendidikan rendah & menengah di semua sekolah2 krjn.
16. RM90juta akan diberi utk penyediaan kemudahan asas Orang Asli termasuk memperluas projek bekalan air terawat.
17. 600,000 pesara krjn akan dapat kenaikan pencen pesara sebanyak 2% setahun.
18. Mulai 2012, kenaikan Gaji Tahunan penjawat awam akan ditingkatkan antara RM80 hingga RM320 mengikut gred.
19. Dalam skim baru menikut time-based, guru akan dapat gred 44 pd tahun ke-8 & gred 48 pd tahun ke-16.
20. Krjn akan tawar bantuan yuran pengajian kpd penjawat awam, termasuk 5,000 peluang ijazah sarjana & 500 kedoktoran falsafah.
21. Satu prgm khas akan diperkenalkan utk 175,000 anggota tentera yang tidak layak menerima pencen.
22. Krjn kenang jasa polis khas &polis tambahan masa zaman darurat, akan beri RM3,000 kpd stp bekas anggota serta duda & balu mereka.
23. Dasar Agro Makanan Negara 2011-2020 akan dilaksana & RM1.1bln akan diperuntukkan utk pembangunan sector pertanian.
24. Segala subsidi, insentif & bantuan berjumlah RM33.2bln akan diteruskan dalam semangat “Rakyat Didahulukan”.
25. KAR1SMA akan memberi manfaat kpd 500,000 rakyat, dgn membantu ringankan beban sara hidup.
26. Bagi Skim Rumah Pertamaku, had maksimum harga rumah akan dinaikkan kpd RM400,000 drpd RM220,000.
27. Krjn akan terus melaksanakan Prgm Perumahan Rakyat (PPP) di seluruh negara dgn membina 75,000 unit rumah mampu milik.
28. Program Rumah Mesra Rakyat (SPNB) akan diteruskan. SPNB diminta membina 10 ribu unit Rumah Mesra Rakyat pada tahun 2012.
29. RM63 juta untuk memulihkan 1,270 rumah terbengkalai. RM40 juta utk baik pulih dan menyelenggara rumah kos rendah awam dan swasta.
30. Krjn akan wujudkan Tabung Khas Perumahan Nelayan RM300juta utk bina & baik pulih rumah.
31. Perkhidmatan kesihatan akan diperuntukkan RM15 bln utk perbelanjaan mengurus dan RM1.8bln utk pembangunan.
32. Hospital akan dinaiktaraf & dibina, krjn juga akan tambahbaik 81 klinik kesihatan luar Bandar & buka 50 klinik 1Msia.
33. KLGH, hospital tertua di msia akan dinaiktaraf menjadi sebuah hospital primer dengan sebuah sayap baru utk rawatan pesakit luar.
34. Skim Amanah Rakyat (SARA 1Msia) akan memanfaatkan 100,000 isi rumah berpendapatan bawah RM3,000 sebulan.
35. Yayasan Bantuan Guaman Kebangsaan akan memastikan setiap individu yg didakwa di mahkamah akan diberi bantuan guaman percuma.
36. RM15juta akan diperuntukkan utk bina gelanggang futsal agar matlamat “Satu Gelanggang Satu Mukim” dpt dicapai.
37. Warga emas berumur 60 thn ke atas akan dikecualikan caj pendaftaran pesakit luar di semua hospital & klinik kesihatan.
38. Rancangan Tebatan Banjir akan dilaksanakan di Perlis, Perak dan Johor utk bantu 4 juta penduduk yg masih tinggal di kws berisiko.
39. Bantuan sebanyak RM500 akan diberi kpd isi rumah berpendapatan RM3,000 ke bawah.
40. Kakitangan krjn akan dpt tambahan bonus setengah bulan gaji & bayaran bantuan RM500 kpd pesara krjn.

Wednesday 5 October 2011

I have change my blog template to technology based template. For the first time visiting my blog, you will wonder where the music come from. There were a music player on the left side of this blog. I like the music but if you find it annoying, just stop the player, ok !  Hehehe...