5. Kevin Poulsen

Kevin Poulsen, or better known as Dark Dante. Initiate action sengan radiotelephone network hacking Kii-FM Los Angeles, this action earned him a Porsche. Poulsen FBI began hunting for hacking into the FBI database and federal computers for wiretap information. Poulsen is a hero to Hack a phone network and Poulsen was arrested at a supermarket in the rewards and punishments five years. Since the resistance, Poulsen worked as a journalist and was promoted to senior editor in a reputable newspaper (Wired News). Identify the most popular article is someone accused of sexual harassment in the 744 Myspace profile.

4. Robert Tappan Morris

Robert is the son of Robert Tappan Morris, a former scientist of the National Security Agency. Robert is the creator of the "Morris worm". This worm is the first worm that spreads via the Internet. Robert Morris created the worm just to know the size of the Internet world at that time. This worm merepropduksi himself without being able to be controlled, shutting down thousands of computers until the computer is really not working. Robert is now a Professor at the MIT Artificial INTELLIGIENCE 
INTERNATIONAL COMPUTER SCIENCE LABORATORY and the focus is computer and network architectures.

3. Jonatan James

At the age of 16 years, is the youngest hacker in jebloskan jail for hacking her action. James is the greatest action when he was hacking into the Defense Threat AGENCY REDUCTION, which is a branch of the U.S. Department of Homeland Security. Through this action, he was able to steal usernames, passwords and e mail to see e-mail confidential. James also hacked in NASA computers and stole software valued at U.S. $ 1.7 million. Justices Dapartement The United States said that software stolen by James related to the international space station, including temperature and humidity settings in space. Caused James, NASA had to close all its computer network at a cost of U.S. $ 41,000. Today James became a computer security expert at a large company

2. Adrian Lamo

Adrian Lamo is time to break down large companies such as MICROSOFT, and THE NEW YORK TIMES. Lamo using internet connection from Cafe-cafe, library and Lamo Kinko and got the nickname "The Homeless Hacker". Lamo frequently found security holes in software and menjebolnya famous. Because ulahnya network hacking into The New York Times, Lamo become the top target of security forces and are required to pay U.S. $ 65,000 as compensation. In addition, Lamo was sentenced to six months and two years of the experiment. Lamo is now a public speaker and journalist berpretasi.

1. Kevin Mitnick

Kevin Mitnick is a young man born in America, August 1963, a young man with extraordinary abilities, the family was not the one kevin was so familiar with computers and acquire capabilities in RadioShack stores and public libraries where he used to spend time, but the story of Kevin Mitnick is not the beginning of a good story- well, at the age of 17 years began to feel the chill caused by iron railings on a computer hacking Cosmos (Computer System Operation Mainstrem) owned telephone company Pacific Bell in Los Angeles,

To Change Windows 7 Icons


Microsoft has always been successful in changing the way we look at our operating systems. Right from the time of the Disk Operating System, it has been instrumental in enhancing operating systems and enhancing the user experience when it comes to Operating System. With Windows 7, it has taken the concept of Operating Systems to a whole new level.

Tricks to Help You Keep Your Laptop Functioning Normal


Laptop or computer viruses are spreading widespread among online consumers as of late mainly because it's very easy for the cyberpunk to wind up in your personal machine. Such different spy ware ailments enter the particular computer systems which enables it to truly slow your pc down or perhaps ruin it completely. Some malware are used against you that will steal your private data that you distribute on different sites.

New USB Flash Drive


USB flash drives have been a popular device by the time it is available in the market with all good demand. An USB flash drive is a storage device of small size used to transfer files from one system to other. They are compact in size and quite easy in use. It is similar to computer hard drives which can easily keep in pocket and movable from one place to other.

Keylogger


Our lives, study, and working are making a closely knit with it. Nevertheless it' s also a place where is full of both danger and predator. Stealing personal information by means varying from social security number, credit card number, and passwords to just about everything, This reality resulted in the development of many utilities. Amongst them there are the key loggers.

Protecting Your PC From Internet Dangers


If you buy items online, surf the internet or use email then here are several tips to keeping your computer and your personal information secure.

Many people find it very easy to safeguard themselves by installing antivirus protection. Most antivirus protection software protects your computer from known viruses and Trojan horses. If a new virus is detected, your virus software will automatically download the new definition so that your computer will be safe.

Safe Surfing


If you’re going to connect to the internet, you need to protect your computer, otherwise it’s like leaving your front door wide open with a big ‘Robbers Welcome’ doormat on your front step. You’ve probably heard all the terms – such as virus, hacker, firewall, spyware and a million more – but perhaps think that the anti-virus programme that came with the computer, or that your PC-savvy mate downloaded for you is enough to keep you safe, right? Wrong …

Hardware


A personal computer is made up of multiple physical components of computer hardware, upon which can be installed an operating system and a multitude of software to perform the operator's desired functions.
Though a PC comes in many different forms, a typical personal computer consists of a case or chassis in a tower shape (desktop) and the following parts:

Preventing Password Hackers

PC security and safety is always an issue nowadays thanks to the advent of computer technology and the Internet. More computer intruders are boldly coming forward and are looking for ways to attack helpless computer users with valuable information stored in their PCs. Intruders are getting their hands on the latest security measures brought out by various developers and are looking for ways to get through them.

Overcoming Program Not Responding

When using the computer, some programs that have been opened often experienced not responding. This, to slow down other programs, waiting for the program is closed. If the process fails, you have to open the Task Manager with Ctrl + Alt + Del. Will surely annoy you. It would be better if the program is not responding quickly closed automatically. Here are the steps:

1. Open Regitry Editor

2. In the Registry Editor window, click the HKEY_USERS> DEFAULT> ControlPanel> Desktop.

3. See the entry on the window right AutoEndTasks If entry is missing, then you must make the first step right-click with your mouse to the right, select New> DWORD Value and give name AutoEndTasks.

4. Double-click the entry, give the value 1 in Value Data.

5. Click Ok, refresh (F5), and close the registry and restart the computer.

Not at all easy and you will not be disappointed if your computer error

History of phreaking


The precise origins of phone phreaking are unknown, although it is believed[who?] that phreak-like experimentation began with widespread deployment of automatic switches on the telephone networks. In the United States, AT&T began introducing automatic switches for long distance and certain forms of trunking carriers in the mid-to-late 1950s. With the introduction of these switches, the general population began, for the first time, to interact with computing power on a large scale.

Blog Definition


Blog is short for "web log" is a form of web applications that resemble the writings (published as posts) in a public web pages. These writings are often published in reverse order (newest content first and then followed the older content), though not forever so. Web sites like this can usually be accessed by all Internet users according to topic and purpose of the user's blog.

History


- 1950s: amateur radio enthusiasts defined the term hacking as creatively tinkering to improve performance.
1959: hack is defined in MIT's Tech Model Railroad Club Dictionary as "1) an article or project without constructive end; 2) a project undertaken on bad self-advice; 3) an entropy booster; 4) to produce, or attempt to produce, a hack(3)." hacker is defined as "one who hacks, or makes them." Much of the TMRC's jargon is later imported into early computing culture.

Hacker



In computing, a hacker is a person in one of several distinct (but not completely disjoint) communities and subcultures :

a.  A community of enthusiast computer programmers and systems designers, originated in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory.

Combating Viruses


Two simple precautions can help keep your computer virus free - install and use software from reliable vendors and avoid opening unexpected e-mail attachments.

Almost all e-mail attachments are potential virus carriers. Some of the most famous viruses were distributed by accessing address books of infected computers and sending e-mail (with attachments) to everyone in the address book. Even those from known senders should be regarded with suspicion - e-mail addresses can easily be faked to appear to be from someone you know.

Phreaking


Phreaking is a slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems; such as equipment and systems connected to public telephone networks. As telephone networks have become computerized, phreaking has become closely linked with computer hacking.

5 Fee Domain

Hello bloggers ... for friends who want to replace the blogspot domain, wordpress or something with a decent domain name is unique and easily recognizable, below there are several domains that may need a blogger friend

domain.ne1.net
domain.co.cc
domain.uni.cc
domain.co.nr
domain.tk 


etc...

Computer Viruses And Guarding Against Them

In this modern Information Age, computers are necessities in life. Whether we use them for simple functions such as typing our homework and business reports, up to more important acts like online business meetings and transactions, one cannot deny that computers are a big part in our daily lives. Using a computer, particularly the Internet, is one task that even a ten year old can do at this particular period in time.

With the growing increase of popularity and reliance on computers, as well as the demand for it, security risks have also gone up, which is a reality that cannot be ignored. With the billions of information bits being spread across the World Wide Web, hackers and computer intruders (criminals) see the value in focusing their attention to computers and the Internet. The information they would retrieve here is (more often than not) more useful than when doing it the old-fashioned way.

As such, these intruders have devised some methods into getting information out of computer users, with or without these people knowing that they’ve been hacked into. As is the case in real life, there are some computer programs that are disguised to be innocent, but actually act as spies, providing information to the intruders. These malicious programs which are security threats are called computer viruses.

Computer viruses should not be taken lightly. They work in many different ways; one of them may be to provide data to the one who planted the virus. Other viruses can simply be annoying - slowing down your computer, building unwanted files, etc. – while some can be very disruptive, such as deleting your hard drive, compromising your operating system, etc.

As such, there are different types of viruses which normally differ in how they function and how they are spread. Examples of these include Trojan horses, worms, email viruses, and logic bombs. It would be important for you to know these kinds of viruses in order to better protect you from them, as well as to have the proper programs to get rid of them.

Trojan horses are simply computer program that cannot reproduce themselves, but can do damage anywhere from minimal to extremely dangerous. It usually disguises itself as a common file (maybe an .mp3 music file or a .jpeg picture file) but does the damage when the computer user opens it. This is why you should take extra care when opening a suspicious looking file – it could very well be a Trojan horse.

Worms are self reproducing programs that mainly use security holes in order to spread itself throughout the network. If your computer is infected with a worm and is able to replicate itself a number of times, this usually causes your computer to slow down noticeably since it uses your computer resources and memory to do so. They often use security flaws in operating systems (such as Windows) in order to self reproduce.

Email viruses are self explanatory – they spread via email. Once a user opens the infected email, what it usually does is send itself to other computer users via the email addresses found in the user’s address book. Because it uses email and a lot of people open emails without really checking or being careful, it spreads very quickly across the entire world and can cause chaos within just a few days.

Logic bombs are viruses that target specific computer applications, causing them to crash (for example, Windows). This can also be spread via email attachments or by innocently downloading it off the Internet. It can cause a great deal of harm (particularly if it infects Windows and the like), or just a small amount (small program).

Fortunately for computer users, there are anti-virus programs available anywhere, whether in the Internet or at the computer shop. These programs specifically target over thousands of viruses and wipe them clean from your system (if infected) or protect you from incoming attacks (if not yet infected).

Anti-virus programs are constantly updated (normally everyday) since there are always new virus definitions each day, and you can get infected by these new viruses. These software developers are always researching about the newest viruses to ensure you, the user, are protected from these viruses as much as possible. Your PC security and safety are always being considered.

http://www.freearticles.com

Types Of Blogs

* Political Blog: About the news, politics, activist, and all the issues-based blogs (like the campaign).

* Personal Blog: Also called an online diary which contained about someone everyday experiences,

complaints, poems or poetry, bad ideas, and conversations of friends.

* Stubs Blog: Blog which discusses about something, and focus on a particular discussion.


* Health Blog: More specific about health. Health blog mostly about the patients' complaints, the latest health news, information about health-ketarangan, etc..


* Blog of literature: Better known as litblog (Literary blog).


* Blog trip: Focus on the discussion of travel stories that tell the details about the trip / travel.


* Blog of research: The question of academic as the latest research news.


* Blog the law: The question of law or legal affairs; known as blawgs (Blog Laws).


* Blog the media: Focus on the discussion lies or ketidakkonsistensi mass media, usually only for a newspaper or television network.


* Blog of religion: To discuss about religion.


* Blog of education: Usually written by students or teachers.


* Blog of togetherness: more specific topics written by a particular group.


* Blog guide (directory): Contains hundreds of links pages.


* Blog business: Used by employees or entrepreneurs for their business promotion activities


* Blog embodiments: Focus on an object outside of human beings; like dogs.


* Blog bullies (spam): Used for business promotion affiliate, also known as splogs (Spam Blogs).

History Of The Internet And Internet Development


History of the intenet began in 1969 when the U.S. Department of Defense, U.S. Defense Advanced Research Projects Agency (DARPA) has decided to conduct research on how to connect a computer to form an organic network.

Meaning of The Internet


a.  The Internet is a network of computer circuits with a series of other computers around the world. The Internet is useful for us to communicate and exchange information, files, data, voice, image and so forth between the individual and mankind throughout the world.

b.  Every computer and network connected - directly or indirectly - to some of the main trail, called the internet backbone and are distinguished from one another using a unique name that is normal with 32-bit IP address. Contoh: 202.155.4.230 . Example: 202.155.4.230.

Mobile Intruding Water Tips


There is always a possibility of cell phone fell into the water accidentally, or soaking wet when you hit the rain. Though damaged electronic goods are particularly vulnerable if exposed to water. Before you rush to the repair technician, you should first try to save the cell phone. Who knew your cell phone recovered without the need to 'shop'. Consider the following tips, which quoted from wikiHow, Monday (03/03/2008).

* If your phone is submerged, remove the phone from the water as soon as possible to prevent the component parts of the contaminated water. In some cases, mobile phone casing it closely enough to prevent water seepage. But this will only last for a few tens of seconds.

* Immediately remove the battery from the phone. Cutting off the flow of resources is essential to minimize the possibility of damage to the phone. Several electronic circuits could otherwise survive in wet conditions, if not connected with resources.

* Immediately remove your SIM card as well to prevent possible damage or loss of data. You certainly do not want your phonebook or SMS importance vanished. Let your SIM card to dry completely before you check its condition.

* Dry the phone to dry completely. Use a cloth that can absorb water. If there is, use a hair dryer aka Hair Dryer. But be sure your phone should not be too hot. Do not also put it in the microwave. Phones that are too hot can explode reported.

* Test the condition of your phone after completely dry. If the phone error, please check whether your phone or battery is damaged, using a spare battery. If only the battery that is damaged, you simply buy a new one.

* If all these steps you have done but the phone remained undamaged, what may make, you seem to have to rely on mobile service technicians. But remember, you need to find a reliable cell phone technician. 

Source :  http://excell.xtgem.com/kemasukanair

The Story Of Blogger



 
Blogger or Blogspot what is now familiar among bloggers. This free blog service providers are large companies that compete with Wordpress so that practically a free blog provider of best-selling number one in the world. Here's the history of Bloggers :

Blogger is actually a blog publishing system (blog publishing system) that was originally created by Pyra Labs on August 23, 1999 and is a dedicated blog-publishing tool, which is applied first to help popularize the format.

In Februari2003, due to its popularity, eventually Pyra Labs was acquired by Google. This acquisition premium features previously memnyebabkan charge, then changed for free.

In 2004, Google introduced its new service "Picasa", ie an application for organizing and editing digital photos. This service then integrate with photo sharing utility Hello into Blogger, allowing a Blogger users to post their photographs made into a blog.

On May 9, 2004, "Blogger" redesign the main display, the various changes made in Blogger to add various features such as web standards-compliant templates, individual archive pages for posts, comments and posting menggunankan email.

On December 14 Agustus2006, "Blogger" launched the latest release in "beta" with code "Invader", together with the Gold release version. This makes the transfer of Blogger users to Google's servers and is accompanied with the addition of some "new features" in it.

In the month of December 2006, the latest version of Blogger is finally no longer in "beta" and the "month of May 2007", Blogger has completely moved to the Google servers.

Computer


A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format.


Although mechanical examples of computers have existed through much of recorded human history, the first electronic computers were developed in the mid-20th century (1940–1945). These were the size of a large room, consuming as much power as several hundred modern personal computers (PCs). Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space