Language

5.10.2011

History About Hacker

Now start flying the Indonesian flag in the world of the Internet because the hacker community that Indonesia is very compact, attractive, advanced, innovative and open. Therefore, let us continue the struggle of the unders / ups ground Indonesia Hacker.
For the progress of informatics technology world today let's all Hacker Indonesia supports the development of technology and open source.

Here's a little review that I can describe about The history of Hack, Hackers, and Hacking :

Before the formation of the communication on the Internet, in the 1960's some computer science student at the Massachusetts Institute of Technology (MIT) who likes to perform engineering and re-engineering of the hardware and software often do open discussions of what there is to discuss issues :

    * The ideas about the development of hardware and software
    * The ideas about the transformation of technology and information

Signification of the word "Hack" is actually a word that at that time not yet have specific meaning and truth. Habits of saying "I Hack Stuff This" as if to give the sense that the term Hack is an activity that is and get the result after doing development against everything done. Developments that are specifically given to the minicomputer and microcomputer tersebutlah term "Computer Hacker" is formed.
In other words, Computer Hacker is someone who is applying the skills in the scope of computer software, computer hardware, computer architecture, computer design, and administration contained therein. A hacker has to have ability in terms of programming for the level of software, and expertise in hardware. Demands that such a breadth to the side of safety systems and network applications, providing a motivation for hackers to develop these skills so that the results of research conducted will provide a positive impact on the continuity of IT itself.
By seeing a bit of explanation above, we can give the conclusion that Hacking is not limited to illegal activity that is identical with the destruction of a system and applications, or limited to the activities of the theft of an important data, but to act to make fundamental changes or improvements improvements to the system and applications, whether in the form of software or hardware.

HACKER GROUP BY MOTIVE:

    * Black Hat Hackers who becomes the cracker / attacker who uses his ability for criminal purposes and are likely to jeopardize the interests of other parties. In general, people who joined in this group are moving individually or according to certain ideals and not bound in the interests of certain parties.
    * Grey Hat Hackers who provide information obtained to the attacker as well as vendors, to obtain certain rewards. This group is also known as crackers, ie, those who do not have any partiality on the part and sell a variety of information required according to existing needs.
    * White Hat (true hacker) People who do hacking activity in order to obtain information about the vulnerabilities, as well as the weaknesses that have to be given back to the parties concerned for an enhanced return.
    * Blue Hat who have capabilities such as white hat, but engaged in the world of education.

HACKER GROUP BASED ON ABILITY PROFILE:

Distribution of hackers based on their professional skills profile is divided into seven groups. This was as described by Marc Rogers MA, a professor of psychology at the University of Manitoba Hawaii, namely:

    * Tool Kids / Newbies The people who learn new hacking activity, but the ability of computer skills and programming techniques is relatively limited and were only able to create basic programs. Hacking activities that do, generally use the help found on the internet application to not rely purely individual capacity.
    * Cyber ​​Punk People who have the knowledge and computer engineering is higher than the newbies. They've been able to understand the characteristics of the network system or systems they are attacking. Their knowledge of programming languages ​​more reliable, because it is able to define the general characteristics. With this ability, he was able to create a tool of infiltration itself, to no longer use the auxiliary programs that are available on the internet. The activities undertaken have a tendency to crime, such as defacing web, carding, or spamming.
    * Internals People who still join or never (former) with IT companies, with the ability of your computers and programming. And perform various hacking activities by relying on various combinations of internal and external resources available for various purposes. For example, the most frequent violation is breaking over privilege activity, ie, all activities that violate the limits owned rights.
    * Coders Group this is also known as resources, ie people who sell a variety of information available on the internet to those in need. Technical programming skills and very reliable and this group malakukan infiltration activities in order to obtain various data or information which can be sold. Coders also help create a variety of applications that need help hacking by the hacker or attacker / cracker in need.
    * Old Guard Hackers (Idealism Gate Keepers) The true hacker-pure kativitas hacking activity in order for scientific purposes and the good of all parties. The amount is relatively very small group, because idealism which upheld forcing them to use a code of ethics upheld by the hackers, the ability above all else.
    * Professional Criminals of the attacker / cracker that moves on behalf of groups or individuals and do various activities of cyber crime as its main source of life. Abilities possessed by this group is perfect because it combines a variety of hardware and programming knowledge you can rely assisted data / information obtained from Coders. Activities crimes no longer in the classroom cyber punk more on individual targets, but instead on the corporate by way of robbing the available funds by transferring the hidden.
    * Cyber ​​Terrorist group of people or individuals acting on the basis of sentiment to a certain group or party, and do various activities that aim to demonstrate their existence in the world environment. Depth capabilities of this group is the highest because it combines various existing resources, level of ability, even the use of infrastructure assistance from the sponsors who help such as satellite communications.

Whatever the reason "hacking" is the action does not violate the law, but is called "cracking" when used to destroy, eliminate data / something that does not belong to us. But we all know - just that there is no guarantee that ensures the data or information we have is 100% safe and condition is what people used to start the "job" damaging than initially fun to professional. The most important thing we can do is close all the possible vulnerabilities that are open and always update the data / information [alert].


[How About You? What Type Of Hackers You Want? Ready To Hack? ]
Let us lift the red and white Indonesian flag on Cyber ​​World!
We are Indonesian Hacker (We are Hacker Indonesia)
That Pancasila High Respect and Unity in Diversity.
Viva Hacker Indonesia - Indonesian Hacker Onward.
^_^

Download Files Without Loading

Want to share a little about how to download files without the need for a long wait. 
Regular has a lot of downloading from mediafire, RAPIDSHARE, HOTFILE, MEGAUPLOAD. But wait 30-60 seconds for each click, even much longer:)
And actually also quite easy really, live use the following plugins in Mozilla Firefox you. Only some 1-5 seconds, you can download your heart's content.

 
Download File Here For Mozilla Firefox:

CLICK HERE



Each time you visit the website for download, then this screen will appear (this only drawback only).
These are support tools that include in it:

     * RapidShare (do not click! it's automatic!)
     * Megaupload (captcha action coming soon!)
     * Mediafire
     * Uploaded.to
     * zShare (now with a "listen-first" option!)
     * Sharebee
     * depositfiles
     * sendspace
     * Divshare
     * Linkbucks
     * Link-Protector

Okay, please enjoy downloading & no longer need to wait.

5.05.2011

Say One Sentence This is Currently Argue


Argue with your spouse does not have to always end badly. There are many ways you can do to re-warm relations after the fight occurred.

The quarrel is natural for each partner. But most important is how you and your partner through the process and return to the relationship.

Here are 22 sentences you can express, to calm the emotions, as reported from Shine. 

Let's say one of the following sentence during an argument with the couple to calm the situation and relations warmed again.

1. Try to understand my point of view
2. Wait, can I appeal again?
3. You do not have to finish it, enough for me to talk to you.
4. This is very important for me, please listen.
5. Sorry, I overreacted.
6. I saw you in a difficult position.
7. I can see my share in this.
8. I do not think like that before.
9. I could be wrong.
10. We can agree or disagree on this.
11. It's not just your problem, but our problem.
12. I do not feel appreciated.
13. We've been out of the main problems.
14. You've convinced me.
15. Please, keep talking to me.
16. I realize this is not your fault.
17. Everything looks wrong sometimes.
18. I also make the problem bigger.
19. Actually what we are debating?
20. How can so I can make things better?
21. Forgive me.
22. I love you.


- May be useful yes -



Crop Circles UFO The Weird


Aka Alien UFO seemed to care Gayus and Nurdin, crop circle phenomenon found in Berbah, Sleman, Yogyakarta, was moving the imagination of some people to lift the current situation. They make engineered crop circle photos with image-smelling criticism or satire.

The characters are used as objects are those that are much discussed by the community. In this case Gayus Tambunan and Chairman of PSSI, Nurdin Halid. The photos were widely circulated in cyberspace. On the social networking site Facebook, circulating a satirical photo crop circle Chairman PSSI, Nurdin Halid.

If this work "UFO", of course they also care about the actual problems of this country. However, this UFO could have been interpreted as "nosy photography" because it is quite nosy and flicked engineering photography. In the virtual world, the UFO was interpreted in many ways, not Unidentified flying object as it should. There is interpreted UFO Unidentified football organization, unofficial football organization, and so forth.



In the photograph there is a symbol of PSSI and underneath there are the words "LOWER NURDIN". Whoever made ​​that clear photos spread quickly on the network up.

In some photos, there is a description "Apparently famous Nurdin up into space, '' hwahahaha .... it must UFO lost the bet time AFF Cup yesterday ...."

In addition to on Facebook, photos are also scattered in Microblogging Twitter. Clearly, this picture is only part of the creativity of society which is saturated with Nurdin leadership in the PSSI.

Previously, Nurdin was also once quipped in a video on YouTube with the title song "Nurdin Turun Downk..." sung by a beautiful girl.

Then, the video is also circulating satirical style of leadership of Adolf Hitler Nurdin. This video is entitled "Hitler's mad because Nurdin Not Want Down".

Not only Nurdin, Gayus was also to be filmed "UFO".
Just for laughs -