Komputer Made In Aceh siap Memasuki Pasar

BANDA ACEH | ACEHKITA.COM — Untuk pertama kalinya, Aceh berhasil memproduksi komputer dengan harga terjangkau. Hadir perdana dalam tiga tipe dengan prosesor Intel, PC Get siap bersaing.

Sebagai produk lokal, target pertama adalah menguasai pasar komputer di Aceh. Selain akan berkerjasama dengan Pemerintah Daerah, mereka juga bermitra dengan Intel Indonesia Corp, Linux, Blackberry, dan komunitas layanan IT (Information Technology) lainnya, untuk menjadi leader market.

Komisaris PC Get, Amir Faisal, dalam jumpa pers peluncuran resmi PC Get di Hotel Hermes Palace, Banda Aceh, Senin (26/10), mengatakan, untuk menggaet pasar mereka akan melakukan promo market show ke daerah-daerah.

PC Get hadir dalam tiga tipe, yakni, PC Get Keluarga (prosesor Intel Atom), PC Get Keluarga super (prosesor Intel Core Duo), PC Get Keluarga Smart (prosesor Intel Pentium).

Meski baru di-launching, PC Get hingga kini sudah laku 120 unit.

PC Get hadir berkat kerjasama apik PT. Global Interpreneur Technology dan Intel Indonesia Corp. Dirakit di Aceh dengan bantuan teknisi luar.



Country Meneger Intel Indnesia Corp mengatakan, ide pertama memproduksi PC Get adalah untuk menghadirkan komputer buatan dalam negeri dengan harga murah dan berkualitas.

Ini juga segaris dengan visi Pemerintah Aceh yang menggagas ‘satu keluarga satu komputer’ tahun lalu.

Namun, kurangnya pasokan listrik akhir-akhir ini di Aceh diakui pihak PC Get akan mempengaruhi promo mereka. Amir meminta Pemerintah Aceh memperhatikan hal ini

Sumber : ACEHKITA.COM
READ MORE»

How to Make Your Posting Published Automatically at Blogger (blogspot)

Hi, all blogger friends!, on the posting this time I will try to make a blog posting about posting automatically. This automatically posting is very important I think, because this is will help the blogger on making the blog post on the Scala.

the important is posting blog will published routinely as we want, we can arrange posting date, time.

Features a blog posting in automatic is very important for you that can not be online 24 hours. so, you can create multiple job postings at once, then set your date and time you want to published it or out posting in your blog.

interest!!. lets follow the following step for making the automatically posting at blogger (blogspot).











1. LOg in to your blogger account, and the write your posting, as the picture above

2. If you have finish your posting, then arrange the open at "post option", it get at the left corner.








3. Then, you look at the right corner, "post date and time", you can arrange it, arrange the date posting and the time for displaying the posting.


READ MORE»

How to Overcome Computer Virus

Steps of Virus Prevention, Prevent Better Than Treat. This practice should be a priority computer users. Between the initial steps are;

1. Do not use a floppy disk or any storan not in the know came from
. Unknown disks may have been contaminated with the virus. deeds write-protect disks should always be done to ensure that the virus can not write himself into the floppy disk.

2. Do not open emails that have attachments
. Internet technology has been fully utilized by the virus writer. The virus is now able to spread via email readings that have been contaminated. Most of these emails will contain an attachment files. At times he still contain the virus, although send by people you recognize.

Make sure you call your friends, to make sure there really he has led the email contains an attachment to your files. between viruses that use this technology is;

Anna Kournikova, Sircam, Code Red, Nimda and ILoveYou.

3. Use anti-virus software.
anti-virus software is a utility to detect and destroy viruses. There is software available for free on the Internet including;

a. AVG Anti-Virus
b. Free Anti-Virus
c. Innoculate IT (OS is available for Windows95 and above and also Palm OS)

While anti-virus software that is sold in market;
a. Smadav -- indonesia anti virus
b. Ansav anti virus
c. Norton Anti-Virus
d. PC-Cillin
e. Armor Anti Virus
f. VBuster
g. Virus Rx (for Apple computers)
h. Mc Afee Anti-Virus

Most anti-virus software can be upgraded to ensure it is in the database contains the latest anti-virus software. It is also sometimes offer immediate assistance to registered users.

VBuster eg anti-virus software is very popular but it is used by NASA. It was created by Dr.. Looi Hong Thong from Penang, Malaysia.

READ MORE»

Computer Viruses Types

A computer virus is a computer program that can duplicate or copy itself and spread by inserting copies of itself into other programs or documents. Computer viruses can be analogous to biological viruses that spread by inserting itself into living cells. Computer viruses can be destructive (for example by destroying the data on the document), making computer users feel annoyed, or no effect at all.

To further refine our knowledge about the virus, I will try to give an explanation of the types of viruses that often roam in cyberspace.


1. Virus Macro

This type of virus must have been very often we hear. The virus is written in a programming language of an application rather than the programming language of an Operating System. This virus can walk if its constituent applications can run well, that is if the computer can run applications mac word then this virus works on Mac OS bersistem computer.


virus samples:

* W97M variant, for example W97M.Panther

Size: 1234 bytes,

work: It infects the Normal.dot and infected when the document is opened.

* WM.Twno.A; TW

Size: 41,984 bytes,

work: infect documents of Ms. Word's that using macro language, usually DOT and *. DOC *. extension.


2. Virus Boot Sector

Boot sector viruses are spread is very common. The virus is in the doubles he would move or replace the original boot sector virus boot program. So when there is booting the virus will be loaded into memory and then the virus will have the ability to control the standard hardware (ex:: monitor, printer, etc.) and from this memory is also the virus will spread into other existing drives and connected to computer (ex: floppy, drive other than drive c).


virus samples:

*-Variant virus wyx

ex: wyx.C (B) to infect the boot record and floppy;

length: 520 bytes;

characteristics: memory resident and encrypted)

* Variant V-sign:

infect: Master boot record;

520 bytes long;

characteristics: living in the memory (memory resident), encrypted, and polymorphic)


* Stoned.june 4th / bloody!:

infect: Master boot record and floppy;

520 bytes long;

characteristics: living in the memory (memory resident), encrypted and display

message "Bloody! june 4th 1989" after booting the computer as much as 128 times.


3. Stealth Virus

This virus will dominate the table with DOS interrupt table that often we know the "Interrupt interceptor". This virus capable to control the DOS level instruction instructions and they are usually well hidden as a full name or size.

virus samples:

*-Yankee.XPEH.4928,

infect files *. COM and *. EXE;

4298 bytes long;

characteristics: living in memory, the size of the hidden, has a trigger

*-WXYC (which includes any category because the boot record into stealth category also included here)

infect the floppy mother boot record;

520 bytes long;

settled in memory; size and hidden viruses.

*-Vmem (s):

infects files *. EXE, *. SYS and *. COM;

fie 3275 bytes long;

characteristics: living in memory, the size of the hidden, in the encryption.


4.Polymorphic Virus

The virus is designed for misleading anti virus program, meaning the virus is always trying to avoid being recognized by the anti virus with the way the fox is always changing its structure after each infects files / other programs.

virus samples:

* Necropolis A / B,

infect files *. EXE and *. COM;

file 1963 bytes long;

characteristics: settled in memory, the size and viruses hidden, encrypted, and can be changed to change the structure

* Nightfall,

infect files *. EXE;

file 4554 bytes long;

characteristics: settled in memory, the size and hidden viruses, has a trigger, encrypted, and can change the structure.


5. Virus File / Program

This virus infects files that can be executed directly from the operating system, whether application files (*. EXE), as well as *. com are also the result of infection from this virus can be determined by changing the file size is attacked.

6. Multi Partition Virus

This virus is a combination of boot sector viruses and file viruses: it means the work performed resulted in two, that he can infect files *. EXE and also infect the Boot Sector.
READ MORE»

Known computer viruses | Mengenal Virus Komputer

The first time the term "virus" is used by Fred Cohen in 1984 in the United States. A computer virus called "virus" because it has some fundamental similarities with the virus at a medical term (biological viruses). Computer viruses can be interpreted as an ordinary computer program. But it has fundamental differences with other programs, which created the virus to infect other programs, change, manipulate and even to damage it. There is to be noted here, the virus will infect only if the trigger program or programs that have been infected earlier executed, this is where the difference with the "worm".

Origin computer virus appears
1949, John von Neumann, expressed "self altering automata theory" which is the result of research mathematicians.

1960, Bell Labs (AT & T), the experts in the lab BELL (AT & T) to experiment the theory expressed by John von Neumann, by making a type of game / game. They create a program that can reproduce itself and can destroy your opponent artificial programs. The program is able to survive and destroy all other programs, would be considered the winner.

CRITERIA Of VIRUS

A program can be called as a virus if it meets the following minimum of 5 criteria:


1. The ability to get information.
2. The ability to check a file.
3. The ability to multiply and infect themselves.
4. The ability of manipulation.
5. The ability to hide themselves.

Now will try to explain briefly what is meant by each of the skills and why this is necessary. Now will try to explain briefly what is meant by each of the skills and why this is necessary:

The ability to obtain information on a virus generally requires a list of file names that exist in a directory. For what? So that he can get a list of files that can he damage. For example, the macro virus will infect all the data files MS Word, will find a list on extension *. doc files.

The ability to check a program, a virus must also be able to check a file to be infected, for example, the program served to infect the extension *. doc, then he should check whether the document files have been infected or not, because if it is, it will infect another useless .

The ability to reproduce themselves from the virus core is the ability to reproduce itself by infecting other files. A virus has been discovered when the victim so she would recognize him with a look. If not infected then the virus will begin transmission action by writing bytes to the file identifier, and copied / write the object code file viruses on the target.

Some common ways by the virus to infect / reproduce itself is: who will be infected files deleted or renamed. Then created a file containing the virus program itself using file names that origin. Program viruses have been executed / loaded into memory will be directly infect other files by entering all the existing files.

A manipulation capabilities, Routine (routine) owned by a virus will be executed after the virus infects a file. The contents of this routine can range from the harmless to the conduct impairment. This routine is generally used to manipulate files or even popularizing the manufacturer. These routines use the ability of an operating system (Operating System), which has the same ability to those of the operating system. For example:

* Create a picture or message on the monitor.
* Replacing / changing the label of each file, directory, or the label of the drive on your PC.
* Manipulate the infected files.
* Damaging files.
* Disrupting the work printer, etc..

Hiding self-ability, ability to hide it should be owned by a virus that all the good work from the beginning to the success of transmission can be done. The usual steps taken is:

* A virus program code stored in the form of machinery and combined with other programs that are considered useful by the user.

* A virus program is placed on Boot Record or the tracks on the disc are rarely noticed by the computer itself.

* The program is made as short as possible viruses, and the infected file is not too much change in size.

The virus does not change the description/information when a file, and others.

VIRUS LIFE CYCLE

viral life cycle in general, through 4 stages:

1. Dormant phase (Phase Rest / Sleep), In this phase the virus is not active. The virus will be activated by a particular condition, such as: the date set, the presence of other programs / execution of other programs, etc.. Not all virus through this phase.

2. Propagation phase (phase distribution), In this phase the virus will copied itself to a program or to a place of storage media (both hard drives, RAM, etc.). Each program will be infected with the "cloning" the virus (depending on how the virus infect it).

3. Trigerring phase (Phase Active), In this phase the virus will be active and this is also the trigger by some conditions such as the dormant phase.

4. Execution phase (execution phase), in this phase of active virus has been to perform its functions. Such as deleting files, display messages, etc..

resource: http://mumtaz-anas.com
READ MORE»
Copyright 2011 Looking News - Template by Kautau Dot Com