Kamis, 03 Juli 2008
Tutorial pasang Hit Counter di blogspot
Widget blog yang satu ini cukup diminati oleh blogger karena berguna sebagai statistik blog sekaligus sebagai asesoris blog. Ada banyak situs yang bisa kita manfaatkan untuk keperluan ini, mis kita pake Site Meter. Cara pasang di blog ikuti langkah berikut ini:
1. login ke Site Meter
2. lihat pada gambar, klik Sign Up, pilih Site Meter Basic Free, klik Sign Up
3. pada bagian "Your Site's URL:" isikan URL situs/blog anda
4. pada bagian "Your Site's Name:" isikan title situs anda atau terserah apa aja
5. pada bagian "Codename" isikan code apa saja (min 5 karakter) , kode ini nantinya akan kita gunakan sebagai user login.
6. Centang pada "By Cheking this box i agree to be bound by Site's Meter Term of Service Agreement"
7. Klik Next
8. Isikan Email pada bagian Email Address, pilih Title, isikan Kode Pos pada Postal Code, pilih Country, Can you receive HTML email? pilih aja No, pilih Gender.
9.Klik Next
10. Klik Next
11. Klik Next
12. Jika sukses akan muncul pesan "Success! Thank You"
13. Selanjutnya buka email, lihat apa email verifikasi dari sitemter udah masuk. Soalnya dalam email ini terdapat Codename & Password kita. Jika belum ada silahkan menunggu (max 24 jam), jika sudah ada lanjutkan ke langkah berikut.
14. Ketikkan Codename dan Password yang diberikan (email), klik Login
15. Klik pada menu Manager (sub menu Manager tampil sebelah kiri), klik sub menu Meter style dan klik radio meter pada style yang anda suka dan klik tombol Select.
16. Klik HTML Code (sub menu Manager) dan Copy/Paste pd bagian Site Meter Javascript HTML (misalnya ke sidebar blog).
17. Selesai :)
Untuk widget menambah sidebar blog lihat disini. Selamat mencoba dan jangan lupa komentarnya klu udah berhasil. Klu gak sukses juga ya :)
Source : lbsfighter.blogspot.com
1. login ke Site Meter
2. lihat pada gambar, klik Sign Up, pilih Site Meter Basic Free, klik Sign Up
3. pada bagian "Your Site's URL:" isikan URL situs/blog anda
4. pada bagian "Your Site's Name:" isikan title situs anda atau terserah apa aja
5. pada bagian "Codename" isikan code apa saja (min 5 karakter) , kode ini nantinya akan kita gunakan sebagai user login.
6. Centang pada "By Cheking this box i agree to be bound by Site's Meter Term of Service Agreement"
7. Klik Next
8. Isikan Email pada bagian Email Address, pilih Title, isikan Kode Pos pada Postal Code, pilih Country, Can you receive HTML email? pilih aja No, pilih Gender.
9.Klik Next
10. Klik Next
11. Klik Next
12. Jika sukses akan muncul pesan "Success! Thank You"
13. Selanjutnya buka email, lihat apa email verifikasi dari sitemter udah masuk. Soalnya dalam email ini terdapat Codename & Password kita. Jika belum ada silahkan menunggu (max 24 jam), jika sudah ada lanjutkan ke langkah berikut.
14. Ketikkan Codename dan Password yang diberikan (email), klik Login
15. Klik pada menu Manager (sub menu Manager tampil sebelah kiri), klik sub menu Meter style dan klik radio meter pada style yang anda suka dan klik tombol Select.
16. Klik HTML Code (sub menu Manager) dan Copy/Paste pd bagian Site Meter Javascript HTML (misalnya ke sidebar blog).
17. Selesai :)
Untuk widget menambah sidebar blog lihat disini. Selamat mencoba dan jangan lupa komentarnya klu udah berhasil. Klu gak sukses juga ya :)
Source : lbsfighter.blogspot.com
Selasa, 01 Juli 2008
Revenge of the IT Worker

“He said what about me?”
I said this out loud because I could not believe my eyes. A peer had sent me an email, with the lead in “I thought you should see this – but you didn’t get it from me.” This was a substantial hint that what followed wouldn’t be pleasant reading. Also setting me on alert, I noticed the subject stated “Totally Unfair Review.”
One of my team members -- we’ll call him Jimmy -- had skewered me in an email to a co-worker. The email told a story about how I had written a quarterly review about Jimmy without any input from him. Jimmy was telling tales because this simply was not the truth. I had asked him for his input and he had ignored my request.
Now the fact that he was not happy with the review was not surprising, because Jimmy had missed a project deadline and had misled the team to think he was on target. That he had falsely stated he had no input is what ate at me. Turns out the co-worker didn’t care for Jimmy and therefore shared the email with his manager. (Note – as I have stated in past articles: don’t put anything in an email you don’t want shared, even to so-called confidants)This whole episode got me thinking. What if the opinion of Jimmy was conveyed in a public forum? Not that Jimmy would have put his name to it, but even anonymously, with MY NAME attached to it. If you think it wouldn’t matter because no one would probably read it, think again. The online world is changing the way feedback is made available. It used to be if you had a bad experience with something, it was between you and that person or business. Not today. If teenagers are experiencing cyber-rumor-mongering on sites like Facebook and MySpace, why is it not conceivable for this to happen in the business world, especially with technology savvy IT workers?
Consider sites like LinkedIn where it’s mostly professionals who put up their experience for all to see. It is typical on these sites for your “connections” to write a recommendation based on their experience working with you, which is attached to your online profile.
What if the tables were turned and former co-workers could anonymously post negative reviews about their experiences with you? At least with the recommendations, you have the control to reject them. Imagine if you couldn’t even provide a rebuttal?
Still think this isn’t an imminent possibility?
Check out the site TheFunded. Not quite what we are talking about here, but bear with me because I think it is a relevant example. This Web site was created by the CEO of an early stage technology company who has had multiple experiences with venture capital firms, not all of them good experiences. This CEO anonymously created the site to allow other tech startup entrepreneurs to post their experiences, both good and bad, with venture capitalists (VCs).
Think about this for a minute. VC’s typically reject 95 percent of the entrepreneurs they meet with – that’s the nature of their business. Imagine how many entrepreneurs are left with a bad taste in their mouth! But that isn’t the point. The majority of the comments I have read aren’t just glad-handed personal attacks but instead very thoughtful insights on how an entrepreneur felt they were treated by the VC firm, whether they ended up being funded by them or not.
Create:itmanagement.earthweb.com
FakeAle-CT Trojan Creates Registry Entries
Troj/FakeAle-CT is a Trojan for the Windows platform.
When run Troj/FakeAle-CT copies itself to (Temp)\_addon.exe and attempts to download code from the internet and store it to the file (User)\Application Data\Adsl Software Ltd\Winspywareprotect.exe.
Registry entries are created under:
HKCU\Software\Adsl Software Ltd\Installer
HKCU\Software\Adsl Software Ltd\WinSpywareProtect
More information can be found at this Sophos page.
When run Troj/FakeAle-CT copies itself to (Temp)\_addon.exe and attempts to download code from the internet and store it to the file (User)\Application Data\Adsl Software Ltd\Winspywareprotect.exe.
Registry entries are created under:
HKCU\Software\Adsl Software Ltd\Installer
HKCU\Software\Adsl Software Ltd\WinSpywareProtect
More information can be found at this Sophos page.
Bdoor-AMH Trojan Edits Registry Value, Connects to Remote Host
Troj/Bdoor-AMH is a Trojan for the Windows platform.
Troj/Bdoor-AMH copies itself to either the (Windows\naver2.exe) folder or C:\naver2.exe.
Troj/Bdoor-AMH edits the registry value:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run naver2.exe
Troj/Bdoor-AMH connects to a remote host to receive information. After receiving instructions from the remote host, it will then send the data back to the remote host using SMTP.
More information can be found at this Sophos page.
Source : esecurityplanet.com
Troj/Bdoor-AMH copies itself to either the (Windows\naver2.exe) folder or C:\naver2.exe.
Troj/Bdoor-AMH edits the registry value:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run naver2.exe
Troj/Bdoor-AMH connects to a remote host to receive information. After receiving instructions from the remote host, it will then send the data back to the remote host using SMTP.
More information can be found at this Sophos page.
Source : esecurityplanet.com
Blusod Trojan Disables System Restore Upon Running File
W32/Blusod is a Windows systems Trojan.
Upon execution, the trojan creates the following files:
.tt(Two Random Characters).tmp in the %UserProfile%\Local Settings\Temp folder,
lph(Two Random Characters).exe in the %System%\system32 folder,
blph(Random Characters).scr in the %System%\system32 folder.
The trojan creates the following registry entry in order to install the screensaver:
HKEY_CURRENT_USER\Software\Sysinternals\Bluescreen Screen Saver\"EULAAccepted" = "1"
It also creates and runs the following file, which disables System Restore:
.tt(Two Random Characters).tmp.vbs in the %UserProfile%\Local Settings\Temp folder.
The Trojan then creates ph(Ramdom Characters).bmp image file in %System%\system32
The image contains the following message:
Warning!
Spyware detected on your computer!
Install an antivirus or spyware remover to clean your computer.
The trojan changes the desktop background on the computer to the above image by modifying the registry.
The trojan tries to connect the following websites in order to download more files on to the affected computer:
youpornztube.com
antivirusxp2008.com
source : esecurityplanet.com
Upon execution, the trojan creates the following files:
.tt(Two Random Characters).tmp in the %UserProfile%\Local Settings\Temp folder,
lph(Two Random Characters).exe in the %System%\system32 folder,
blph(Random Characters).scr in the %System%\system32 folder.
The trojan creates the following registry entry in order to install the screensaver:
HKEY_CURRENT_USER\Software\Sysinternals\Bluescreen Screen Saver\"EULAAccepted" = "1"
It also creates and runs the following file, which disables System Restore:
.tt(Two Random Characters).tmp.vbs in the %UserProfile%\Local Settings\Temp folder.
The Trojan then creates ph(Ramdom Characters).bmp image file in %System%\system32
The image contains the following message:
Warning!
Spyware detected on your computer!
Install an antivirus or spyware remover to clean your computer.
The trojan changes the desktop background on the computer to the above image by modifying the registry.
The trojan tries to connect the following websites in order to download more files on to the affected computer:
youpornztube.com
antivirusxp2008.com
source : esecurityplanet.com
Langganan:
Postingan
(
Atom
)