4-Step Installation CountDown Timer
by Kang Ricky on Nov.22, 2009, under free wigdets
Step installation:
1. Choose one of the four CountDown Timer skins
2. Set the time parameters for the component (the upcoming event, GMT offset, recurrence, etc)
3. Set CountDown Timer visual appearance and choose the appropriate color gamma
4. Copy the ready HTML code for pasting into your website
Perkembangan E-Commerce di indonesia
by Kang Ricky on Nov.22, 2009, under E-ECOMMERCE
Dalam perkembangan E-Commerce di indonesia,memiliki tantangan-tantangan yaitu:
1.KULTUR
.Masyarakat indonesia,yang masih belum terbiasa dengan belanja katalog.
.Masih harus melihat secara fisik atau memegang barang yang akan di jual.
.Masih senang menawarkan harga yang akan di jual.
2.KEPERCAYAAN.
.Kepercayaan antara penjual dan pembeli masih tipis.
.Kepercayaan kepada pembayaran elektronik masih kurang.
.Penggunaan masih kurang.
What is a Fraud
by Kang Ricky on Nov.22, 2009, under Fraud | Confidence tricks | Deception
a fraud is an intentional deception made for personal gain or to damage another individual; the related adjective is fraudulent.
The specific legal definition varies by legal jurisdiction. Fraud is a crime, and also a civil law violation. Defrauding people or entities of money or valuables is a common purpose of fraud, but there have also been fraudulent "discoveries", e.g. in science, to gain prestige rather than immediate monetary gain.
A hoax also involves deception, but without the intention of gain, or of damaging or depriving the victim; the intention is often humorous.
Cost of fraud
The typical organization loses 5 percent of its annual revenue to fraud, with a median loss of $160,000. Frauds committed by owners and executives were more than nine times as costly as employee fraud. The industries most commonly affected are banking, manufacturing, and government.
Types of fraudulent acts
Fraud can be committed through many media, including mail, wire, phone, and the Internet (computer crime and Internet fraud). The international dimensions of the web and ease with which users can hide their location, the difficulty of checking identity and legitimacy online, and the simplicity with which crackers can divert browsers to dishonest sites and steal credit card details have all contributed to the very rapid growth of Internet fraud.
Types of criminal fraud include:
* bait and switch
* bankruptcy fraud
* benefit fraud, committing fraud to get government benefits
* counterfeiting of currency, documents or valuable goods
* charlatanism
* confidence tricks such as the 419 fraud and Spanish Prisoner
* creation of false companies or "long firms"
* embezzlement, taking money which one has been entrusted with on behalf of another party
* false advertising
* false billing
* false insurance claims
* forgery of documents or signatures,
* fraud upon the court
* health fraud, for example selling of products known not to be effective, such as quack medicines,
* identity theft
* investment frauds, such as Ponzi schemes and Pyramid schemes
* Moving scam
* religious fraud
* marriage fraud to obtain immigration rights without entitlement
* rigged gambling games such as the shell game
* securities frauds such as pump and dump
* tax fraud, not reporting revenue or illegally avoiding taxes. In some countries, tax fraud is also prosecuted under false billing or tax forgery.
More Info: Click Here
What is a Confidence trick
by Kang Ricky on Nov.22, 2009, under Fraud | Confidence tricks | Deception
A confidence trick or confidence game (also known as a bunko, con, flim flam, gaffle, grift, hustle, scam, scheme, swindle or bamboozle) is an attempt to defraud a person or group by gaining their confidence. The victim is known as the mark, the trickster is called a confidence man, con man, confidence trickster, grifter, or con artist, and any accomplices are known as shills. Confidence men or women exploit characteristics of the human psyche such as greed, both dishonesty and honesty, vanity, compassion, credulity, irresponsibility, and naïveté. Confidence men or women have victimized individuals from all walks of life.
History
The first known usage of the term "confidence man" in English was in 1849; it was used by American press during the United States trial of William Thompson. Thompson chatted with strangers until he asked if they had the confidence to lend him their watches, whereupon he would walk off with the watch; he was captured when a victim recognized him on the street.
Vulnerability to confidence tricks
Confidence tricks exploit typical human qualities such as greed, dishonesty, vanity, honesty, compassion, credulity, irresponsibility and naïveté. The common factor is that the mark relies on the good faith of the con artist.
Just as there is no typical profile for swindlers, neither is there one for their victims. Virtually anyone can fall prey to fraudulent crimes. ... Certainly victims of high-yield investment frauds may possess a level of greed which exceeds their caution as well as a willingness to believe what they want to believe. However, not all fraud victims are greedy, risk-taking, self-deceptive individuals looking to make a quick dollar. Nor are all fraud victims naïve, uneducated, or elderly.
A greedy or dishonest mark may attempt to out-cheat the con artist, only to discover that he or she has been manipulated into losing from the very beginning. This is such a general principle in confidence tricks that there is a saying among con men that "you can't cheat an honest man."
Shills, also known as accomplices, help manipulate the mark into accepting the con man's plan. In a traditional confidence trick, the mark is led to believe that he will be able to win money or some other prize by doing some task. The accomplices may pretend to be strangers who have benefited from performing the task in the past.
More Info: click here
What is a Cryptanalysis
by Kang Ricky on Nov.22, 2009, under Cryptography
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so. Typically, this involves knowing how the system works and finding a secret key. In non-technical language, this is the practice of codebreaking or cracking the code, although these phrases also have a specialised technical meaning (see code).
"Cryptanalysis" is also used to refer to any attempt to circumvent the security of other types of cryptographic algorithms and protocols in general, and not just encryption. However, cryptanalysis usually excludes methods of attack that do not primarily target weaknesses in the actual cryptography, such as bribery, physical coercion, burglary, keystroke logging, and social engineering, although these types of attack are an important concern and are often more effective than traditional cryptanalysis.
Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like Bombes and Colossus computers in World War II, to the computer-based schemes of the present. The results of cryptanalysis have also changed — it is no longer possible to have unlimited success in codebreaking, and there is a hierarchical classification of what constitutes an attack. In the mid-1970s, a new class of cryptography was introduced: asymmetric cryptography. Methods for breaking these cryptosystems are typically radically different from before, and usually involve solving carefully-constructed problems in pure mathematics, the best-known being integer factorization.
more info: click here
What Is a Cold boot attack
by Kang Ricky on Nov.22, 2009, under Cryptography
a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine from a completely "off" state.The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents which remain readable in the seconds to minutes after power has been removed.
Description
To execute the attack, the machine is cold booted (power is cycled “off” then “on” without letting the computer shut down cleanly, or, if available, the “reset” button on the computer is pressed); a light-weight operating system is then immediately booted (e.g. from a USB flash drive), and the contents of pre-boot memory dumped to a file. Alternatively, the memory modules are removed from the original system and quickly placed in another machine under the attacker's control, which is then booted to access the memory. Further analysis can then be performed against the information that was retrieved from memory to find the sensitive keys contained in it (automated tools are now available to perform this task).
The attack has been demonstrated to be effective against full disk encryption schemes of various vendors and operating systems, even where a Trusted Platform Module (TPM) secure cryptoprocessor is used. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. While the focus of current research is on disk encryption, any sensitive data held in memory are vulnerable to the attack.
The time window for an attack can be extended to hours by cooling the memory modules. Furthermore, as the bits disappear in memory over time, they can be reconstructed, as they fade away in a predictable manner. In the case of disk encryption applications that can be configured to allow the operating system to boot without a pre-boot PIN being entered or a hardware key being present (e.g. Bitlocker in a simple configuration that uses a TPM without a two-factor authentication PIN or USB key), the time frame for the attack is not limited at all:
“ Notably, using BitLocker with a Trusted Platform Module (TPM) sometimes makes it less secure, allowing an attacker to gain access to the data even if the machine is stolen while it is completely powered off.
MORE INFO: CLICK HERE
What Is A Cryptography
by Kang Ricky on Nov.22, 2009, under Cryptography
Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.
Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved.
Terminology
Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext). Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks.
In colloquial use, the term "code" is often used to mean any method of encryption or concealment of meaning. However, in cryptography, code has a more specific meaning. It means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example, wallaby replaces attack at dawn). Codes are no longer used in serious cryptography—except incidentally for such things as unit designations (e.g., Bronco Flight or Operation Overlord)—since properly chosen ciphers are both more practical and more secure than even the best codes and also are better adapted to computers.
Cryptanalysis is the term used for the study of methods for obtaining the meaning of encrypted information without access to the key normally required to do so; i.e., it is the study of how to crack encryption algorithms or their implementations.
Some use the terms cryptography and cryptology interchangeably in English, while others (including US military practice generally) use cryptography to refer specifically to the use and practice of cryptographic techniques and cryptology to refer to the combined study of cryptography and cryptanalysis.English is more flexible than several other languages in which cryptology (done by cryptologists) is always used in the second sense above. In the English Wikipedia the general term used for the entire field is cryptography (done by cryptographers).
The study of characteristics of languages which have some application in cryptography (or cryptology), i.e. frequency data, letter combinations, universal patterns, etc., is called cryptolinguistics.
More Info: CLICK HERE
Infolinks In Text Ads
Search Now
Need Translete
Blog Archive
Labels
Add Url
(1)
Affiliate
(4)
Aplikasi Mobile
(1)
Bisnis Gratis Facebook
(1)
Bisnis Internet di Rumah
(3)
Bisnis Online
(1)
Blogging
(8)
Cara membuat Webiste
(1)
Cryptography
(5)
Cyber
(4)
Domain
(5)
E-ECOMMERCE
(4)
E-PAYMENT
(4)
Facebook
(3)
Forex
(1)
Fraud | Confidence tricks | Deception
(2)
Free Credits cards.
(1)
Free Domain
(1)
Free Hosting
(1)
Free Money Online
(3)
Free Submit Url
(1)
Free Website Builder
(1)
free wigdets
(2)
Game Facebook
(1)
google adword
(1)
Google Analytics
(1)
Hack
(2)
Handphone
(4)
Hosting
(3)
Internet
(17)
Jaringan
(1)
jaringan nirkabel
(4)
Komputer
(2)
Make Money Online
(1)
Marketing
(1)
Marketplace
(1)
Mobile
(2)
Modem
(1)
paypal
(10)
PPC
(1)
PTR
(3)
SEO
(5)
Software
(2)
Tips blog
(7)
Tips Domain
(1)
Tips Facebook
(5)
Tips Mempercantik blog
(2)
Tips Mobile
(2)
Tips Twitter
(6)
Torrent
(2)
Trojans
(1)
Tutorial Twitter
(1)
VCC (Virtual Credit Card)
(1)