10:40 PM | Posted in
Firm anti Sophon klaim's notable virus have found first one virus contaminates to pass through document OpenOffice.org.
That virus is so-called can show off at Windows platform, MAC, and Linux at a swoop.
Even such Sophos declares for that until now that virus is not threat because was spread and raising hell outside there.
Named if this virus only proof of concept (probe).

Worm who given by SB / Badbunny's name a. that, utilizing script macro StarBasic that integrated deep OpenOffice to carry on its action with makes script any other at victim computer.
“Worm that will try to download and features JPEG'S image improper of a man which put on dress bunny while classy doing sexual relationship activity ”, according to APC.

Worm SB / Badbunny a. that will infektion victim while they open OpenOffice Draw's file by the name of badbunny.odg. Macro that lurking at deep that file will carry on different action to be hung platform which that utilized by that time (Windows, MacOS or Linux):
Windows: Worm will make file by the name of drop.bad is next disalinkan will go to system.ini's file on folder mIRC (if is found on victim computer) and making and carries on badbunny.js's file that constitutes one Javascript virus that will on call as duplikator worm's file.
MacOS: Worm will make two files script virus utilizes Ruby's languages (its file given by badbunny.rb's name or badbunnya.rb)
Linux: Worm will make badbunny.py's file as script XChat and also make badbunny.pl's file that constitute little virus gets Perl's language basis menularkan's commisioned on Perl's file another.

script XChat's file and mIRC on call as virus that menduplikasi and distributes OpenOffice's file already most infects worm: badbunny. odg passes through DCC'S protocol passes Internet band / chatting irc.
Even such descries this virus will be hard for amends because still needful user's interaction overdose and still pending in many particular condition.
Example: at MacOS x and Linux Is virus is still rely user's interaction to decide that mengeksekusi script Ruby / script Xchat will or not, one that of course will be cancelled for many user which is aware about security problem.
But at eksekusi's Windows Javascript can be done by worm automatically without interaction with user that of course wills be threat that dangerously.
SB / Badbunny a. is worm proof of concept that descries at sends over direct enamel go to Sophos's team with intent strictly for point out probe to weigh intention to overspread and does action wreck.
To its safe, better You don't carry on aught macro in one OpenOffice.org's file until quite a confident if that file clear and comes from abiding source.

source: Linux's magazine Online
Category:
��
10:39 PM | Posted in
mount & unmount partition Windows (NTFS)

Sometimes afters installation Linux's therefore default just partition linux just that most reads meanwhile partition is Windows not.
But you make a abode can read partisi that windows.

One that has you do:
Input goes to konsole/terminal then comes in as root. Cheque first where partition's position windows lies with types

fdisk -l

therefore will perform partisi partisi those are on harddisk is information therewith another as system's file that is utilized, used room, and free room.
Then makes directory at /media/ place windows where partisi windows will at mount.

mkdir /media/windows

Assumed that /dev/hda1 is partisi's location windows (NTFS). Therefore for mount partisi windows:

mount /dev/hda1/media/windows/ -t ntfs -o nls=utf8,umask=0222

Now partisi your windows can at access and at reads by linux. To unmount partisi windows:

umount /media/windows
Category:
��
10:37 PM | Posted in
Linux's installation tips

To install Linux basically is easily and rejoicing although sometime appears hard. But divides that have never been menginstall may will say elaborate, at a stand, fuss, and distress. But not all along be.

I will give severally tips which shall at looking at in menginstall Linux at Your PC.

1. Vote for distro Linux what do That You will install, and cheque what corresponds to hardware Your PC. Since if out of character Linux what does You install cannikin won't clear a root as necessarily.

2. Provide harddisk's room gawps that haven't dipartisi whatever.

3. To desktop the need minimal shall have two partisi which is" / " and" swap".

4. Partisi is swap shall big have two-time of memory / RAM. Example: 256MB's RAM therefore partisi swap that 512MB shall.

5. Partisi / can at makes to accord Your requirement. But at suggests minimal 5GB.

6. There is file kind sort system at Linux as reiserfs, ext. ext., ext3 etc.. But I suggest to utilize ext3, since having a lot of top at compares system's file another.

7. To bootloader You can choose LILO or GRUB. And install bootloader at MBR (Master Boot Record) on harddisk. Myself utilizes GRUB because kostumisasi what do be easily.

8. Process installation will eat time at longest 1 hour and quickest 30 minutes. Ensure that Linux that Your install suits with hardware You and don't press or switch off PC upon process installation.

Ok.. little bit tips upon hopefully gets to help friends in do Linux's installation. Good Luck
Category:
��
10:20 PM | Posted in

The Jargon File contains a bunch of definitions of the term ‘hacker’, most having to do with technical adeptness and a delight in solving problems and overcoming limits. If you want to know how to become a hacker, though, only two are really relevant.

There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.

The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too — and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.

There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end.

The basic difference is this: hackers build things, crackers break them.

If you want to be a hacker, keep reading. If you want to be a cracker, go read the alt.2600 newsgroup and get ready to do five to ten in the slammer after finding out you aren't as smart as you think you are. And that's all I'm going to say about crackers.

Category:
��
10:14 PM | Posted in

Free and open source software, also F/OSS, FOSS, or FLOSS (for Free/Libre/Open Source Software) is software which is liberally licensed to grant the right of users to study, change, and improve its design through the availability of its source code. This approach has gained both momentum and acceptance as the potential benefits have been increasingly recognized by both individuals and corporate players.

'F/OSS' is an inclusive term generally synonymous with both free software and open source software which describe similar development models, but with differing cultures and philosophies. 'Free software' focuses on the philosophical freedoms it gives to users and 'open source' focuses on the perceived strengths of its peer-to-peer development model. Many people relate to both aspects and so 'F/OSS' is a term that can be used without particular bias towards either camp.

Free software licenses and Open-source licenses are used by many software packages. The licenses have important differences, which mirror the differences in the ways the two kinds of software can be used and distributed and reflect differences in the philosophy behind the two.

Category:
��
4:48 AM | Posted in
Masih ad-Dajjal (Arabic: الدّجّال, literally "The Impostor"), is an evil figure in Islamic eschatology. He is to appear pretending to be Allah at a time in the future, before Yawm al-Qiyamah (The Day of Resurrection, Judgment Day). It is said that he will have one eye damaged and the other will be working. Dajjal is a common Arabic word, used in the sense of "false prophet", but al-Masih ad-Dajjal, with the definite article, refers to "the impostor", a specific end-of times deceiver. The term al-Masīḥ ad-Dajjāl (Arabic for "the false messiah") is a literal translation of the Syriac term Mšīḥā Daggālā, which had been in the common vocabulary of the Middle East and adapted into the Arabic language 400 years prior to the Qur'an via the Peshitta (which uses that term instead of the Greek "Antichristos"). The belief is based around the events prior to the Day of Judgment around the Second Coming of The Christ, when ad-Dajjal who is blind in his right eye, shall gather an army of those he has deceived and lead them in a war against Imam Mahdi, who shall be accompanied by an army of the righteous.
He will appear somewhere between Syria and Iraq, at which time Jesus will return and he will defeat ad-Dajjal in Palestine. Ad-Dajjal will travel the whole world in forty days preaching his falsehood but will be unable to enter Makkah or Madinah.
Muhammad had given many signs of the appearance of the Dajjal and exhorted his followers to recite the first and the last ten verses of Sura Al-Kahf, as protection from the trials and mischief of the Dajjal. The Qur'an doesn't mention the Dajjal by name, like the Hadith. A couple of hadith describe the Dajjal as follows:
The Prophet mentioned the Massiah Ad-Dajjal in front of the people saying, Allah is not one eyed while Messiah, Ad-Dajjal is blind in the right eye and his eye looks like a bulging out grape. While sleeping near the Ka'ba last night, I saw in my dream a man of brown color the best one can see amongst brown color and his hair was long that it fell between his shoulders. His hair was lank and water was dribbling from his head and he was placing his hands on the shoulders of two men while circumambulating the Ka'ba. I asked, 'Who is this?' They replied, 'This is Jesus, son of Mary.' Behind him I saw a man who had very curly hair and was blind in the right eye, resembling Ibn Qatan (i.e. an infidel) in appearance. He was placing his hands on the shoulders of a person while performing Tawaf around the Ka'ba. I asked, 'Who is this? 'They replied, 'The Masih, Ad-Dajjal.' "
Once Allah's Apostle stood amongst the people, glorified and praised Allah as He deserved and then mentioned the Dajjal saying, "l warn you against him (i.e. the Dajjal) and there was no prophet but warned his nation against him. No doubt, Noah warned his nation against him but I tell you about him something of which no prophet told his nation before me. You should know that he is one-eyed, and Allah is not one-eyed."
Allah's Apostle said, "Shall I not tell you about the Dajjal a story of which no prophet told his nation? The Dajjal is one-eyed and will bring with him what will resemble Hell and Paradise, and what he will call Paradise will be actually Hell; so I warn you (against him) as Noah warned his nation against him."

Article from : http://en.wikipedia.org/wiki/Dajjal
Category:
��
4:44 AM | Posted in



The Bermuda Triangle, also known as the Devil's Triangle, is a region of the northwestern Atlantic Ocean in which a number of aircraft and surface vessels have disappeared or are alleged to have disappeared. Some people have claimed that these disappearances fall beyond the boundaries of human error or acts of nature. Popular culture has attributed some of these disappearances to the paranormal, a suspension of the laws of physics, or activity by extraterrestrial beings. Though a substantial body of documentation exists showing numerous incidents to have been inaccurately reported or embellished by later authors, and numerous official agencies have gone on record as stating the number and nature of disappearances to be similar to any other area of ocean, many have remained unexplained despite considerable investigation.


The boundaries of the Triangle vary with the author; some stating its shape is akin to a trapezoid covering the Straits of Florida, the Bahamas and the entire Caribbean island area and the Atlantic east to the Azores; others add to it the Gulf of Mexico. The more familiar, triangular boundary in most written works has as its points somewhere on the Atlantic coast of Florida; San Juan, Puerto Rico; and the mid-Atlantic island of Bermuda, with most of the accidents concentrated along the southern boundary around the Bahamas and the Florida Straits.

The area of the Triangle varies by author.
The area is one of the most heavily-sailed shipping lanes in the world, with ships crossing through it daily for ports in the Americas, Europe, and the Caribbean Islands. Cruise ships are also plentiful, and pleasure craft regularly go back and forth between Florida and the islands. It is also a heavily flown route for commercial and private aircraft heading towards Florida, the Caribbean and South America from points north.
The Gulf Stream ocean current flows through the Triangle after leaving the Gulf of Mexico; its current of five to six knots may have played a part in a number of disappearances. Sudden storms can and do appear, and in the summer to late fall hurricanes strike the area. The combination of heavy maritime traffic and tempestuous weather makes it inevitable that vessels could founder in storms and be lost without a trace – especially before improved telecommunications, radar and satellite technology arrived late in the 20th century.



Article from: http://en.wikipedia.org/wiki/Bermuda_Triangle

Category:
��
4:34 AM | Posted in




Mona Lisa (also known as La Gioconda) is a 16th century portrait painted in oil on a poplar panel by Leonardo da Vinci during the Italian Renaissance. The work is owned by the French government and hangs in the Musée du Louvre in Paris, France with the title Portrait of Lisa Gherardini, wife of Francesco del Giocondo.
The painting is a half-length portrait and depicts a woman whose expression is often described as enigmatic. The ambiguity of the sitter's expression, the monumentality of the half-figure composition, and the subtle modeling of forms and atmospheric illusionism were novel qualities that have contributed to the painting's continuing fascination. Few other works of art have been subject to as much scrutiny, study, mythologizing and parody.





Leonardo da Vinci began painting the Mona Lisa in 1503 (during the Italian Renaissance) and, according to Vasari, "after he had lingered over it four years, left it unfinished...."He is thought to have continued to work on it for three years after he moved to France and to have finished it shortly before he died in 1519.Leonardo took the painting from Italy to France in 1516 when King François I invited the painter to work at the Clos Lucé near the king's castle in Amboise. Most likely through the heirs of Leonardo's assistant Salai, the king bought the painting for 4,000 écus and kept it at Fontainebleau, where it remained until given to Louis XIV. Louis XIV moved the painting to the Palace of Versailles. After the French Revolution, it was moved to the Louvre. Napoleon I had it moved to his bedroom in the Tuileries Palace; later it was returned to the Louvre. During the Franco-Prussian War (1870–1871) it was moved from the Louvre to a hiding place elsewhere in France.
Mona Lisa was not well known until the mid-19th century when artists of the emerging Symbolist movement began to appreciate it, and associated it with their ideas about feminine mystique. Critic Walter Pater, in his 1867 essay on Leonardo, expressed this view by describing the figure in the painting as a kind of mythic embodiment of eternal femininity, who is "older than the rocks among which she sits" and who "has been dead many times and learned the secrets of the grave."

Mona Lisa is named for Lisa del Giocondo,[8][9][10] a member of the Gherardini family of Florence and Tuscany and the wife of wealthy Florentine silk merchant Francesco del Giocondo.[7] The painting was commissioned for their new home and to celebrate the birth of their second son, Andrea.[11]
The sitter's identity was ascertained at the University of Heidelberg in 2005 by a library expert who discovered a 1503 margin note written by Agostino Vespucci.[8] Scholars had been of many minds, identifying at least four different paintings as the Mona Lisa[12][13][14] and several people as its subject. Leonardo's mother Caterina in a distant memory, Isabella of Naples or Aragon, Cecilia Gallerani, Costanza d'Avalos—who was also called the "merry one" or La Gioconda, Isabella d'Este, Pacifica Brandano or Brandino, Isabela Gualanda, Caterina Sforza, and Leonardo himself had all been named the sitter. Today the subject's identity is held to be Lisa, which was always the traditional view.

A margin note by Agostino Vespucci from October 1503 in a book in the library of the University of Heidelberg identifies Lisa del Giocondo as the subject of Mona Lisa
The painting's title stems from a description by Giorgio Vasari in his biography of Leonardo da Vinci published in 1550, 31 years after the artist's death. "Leonardo undertook to paint, for Francesco del Giocondo, the portrait of Mona Lisa, his wife...." (one version in Italian: Prese Lionardo a fare per Francesco del Giocondo il ritratto di mona Lisa sua moglie).In Italian, ma donna means my lady. This became madonna, and its contraction mona. Mona is thus a polite form of address, similar to Ma’am, Madam, or my lady in English. In modern Italian, the short form of madonna is usually spelled Monna, so the title is sometimes Monna Lisa, rarely in English and more commonly in Romance languages such as French and Italian.
At his death in 1525, Leonardo's assistant Salai owned the portrait named in his personal papers la Gioconda which had been bequeathed to him by the artist. Italian for jocund, happy or jovial, Gioconda was a nickname for the sitter, a pun on the feminine form of her married name Giocondo and her disposition. In French, the title La Joconde has the same double meaning.

Article from: http://en.wikipedia.org/wiki/Mona_Lisa
Category:
��