NOTE :
BILA ANDA BUKAN HENDAK MENGUNJUNGI INI, NAMUN AKMILIBNU.COM , SILAHKAN KUNJUNGI akmilibnuipa2.blogspot.com KARENA DOMAIN AKMILIBNU.COM SUDAH DIDIRECT KE BLOG INI. TERIMA KASIH

Tuesday, March 29, 2011

Unlimited TP mission

download one by one one file, and drag to the fiddler :
download data_library_en here http://adf.ly/116Gd
download mission_173 here http://adf.ly/116NT
download mission_172 here http://adf.ly/116Rp
download mission_171 here http://adf.ly/116TV
download mission_170 here http://adf.ly/116UF

download these file, and....play mission TP unlimited, but this cheat is not instant....but permanently
good luck...
Read more >>

Sunday, March 27, 2011

Cheat Gold permanently

cheat ninja saga this time is a cheat ninja saga permanent gold, ok can not wait to use the cheat ninja this saga, this is the steps ninja saga cheat gold permanent :

1. Cheat Engine 6.0 [Download] http://www.cheatengine.org/
2. browser (Mozilla recommended)

How to:
1. go ninja saga then playing any kind of mission (if not the mission lv13 escaped criminal who wrote because often get healing scrolls / chakra scroll)
2. if for example you get the item healing / chakras do not scroll at first ok ..
3. open cheat engine
4. open proces continues to choose which Web browser you use
5. continue to value typeya replaced text
6. scan items that you can ya list of his goods

* Item1 (smoke bomb) * item2 (healing scroll lvl 1)
* Item3 (chakras scroll lvl 1) * item4 (healing scroll lvl 3)
* Item5 (chakras scroll lvl 3) * item6 (healing scroll lvl 6)
* Item7 (chakras scroll lvl 6) * item8 (healing scroll lvl 9)
* Item9 (chakras scroll lvl 9) * item10 (chakras scroll lvl 12)
* Item11 (healing scroll lvl 12) * item12 (healing scroll lvl 15)
* Item13 (chakras scroll lvl 15) * item14 (healing scroll lvl 20)
* Item15 (chakras scroll lvl 20) * item16 (special rune scrolls)
* Item17 (healing scroll lvl 25) * item18 (chakras scroll lvl 25)
* Item19 (scroll healing lvl 30) * item20 (chakras scroll lvl 30)
* Item21 (healing scroll lvl 35) * item22 (chakras scroll lvl 35)
* Item23 (healing scroll lvl 40) * item24 (chakras scroll lvl 40)

7. for example wrote the scroll of chakra you get lvl 12 you live in CEnya wrote: item10
8. continue to scan address so you get valuenya replaced wpn155
9. After his mission is completed, refresh the game
10. continue to see in gear ...
Read more >>

Trick Reset Point Ninja Saga

Trick and tips reset point ninja saga.
this trick works 100%

please click here to learn more.

sorry this cheat has been removed
Read more >>

Cheat City Ville


Latest Cheat Ville CITY 2011
Cheat Cityville 2011

For those of you who hoby play games up, must know about this one game. Or maybe you are one of the people who play it.Cityville is a new Facebook game released by Zynga. Though stillnew, but already many who play this game. Not infrequently there isa fad and looking for ways to cheat using Cheat to be able to level up quickly.

In accordance with the post title above, I will share about the LatestCheat CityVille 2011.

Latest CityVille 2011 Cheat ikuli cheatnya steps for workingsmoothly:

Required Tools:
* Charles

Well, this cash allows you to complete your building without having to send a friends request. Cash will not be saved but the buildingwill be recorded when completed. Building Society to increase thepopulation in this cityville facebook game.

* Open Charles
* Enter CityVille [play now]
* Go to Charles's first and find the line "http://fb-client-0.cityville.zynga.com"
* Expand and you will see 'flashservices /'
* Expand and you will see many gateway.php (FlashService ...)
* Right-click one gateway.php and select "Breakpoints"
* Now, reload CityVille.
* A Breakpoint tab appears on the Charles.
* Press the EXECUTE once.
* Another Breakpoint will appear with tabs Edit Request
* Click the EDIT REQUEST AMF
* Expand everything until you can view your own profile with the number of coins and cash you have.
* Change in cash value for 100
* Return to your session tab and remove the breakpoint.
* Back to the breakpoint tab and click the Execute
* The game will now load and you will see your new cash. Spendthem on community building now because they will disappear.

 2011 Latest Cheat City Ville this can work and can be utilizedproperly.


Read more >>

Instant jutsu ninja saga

step by step:
1. Open NS
2. Open CE
3. Go to the Academy
4. Select a jutsu that will be purchased (not to be purchased in advance)
5. Scan a jutsu that will be purchased (value type text, tick ASROM)
6. If the address appears, check Enable Speedhack
7. Change Speedhack to 500.0 and then apply
8. When the time jutsumu learn to live a little, back to 1.0 and thenapply Speedhack


Good luck ...!!
Read more >>

Cheat Engine


Cheat Engine is an open source tool designed to help you with modifying single player games running under windows so you can make them harder or easier depending on your preference(e.g: Find that 100hp is too easy, try playing a game with a max of 1 HP), but also contains other useful tools to help debugging games and even normal applications.
It comes with a memory scanner to quickly scan for variables used within a game and allow you to change them, but it also comes with a debugger, disassembler, assembler, speedhack, trainer maker, direct 3D manipulation tools, system inspection tools and more.
For new users it is recommended to go through the tutorial(The one that comes with Cheat Engine, you can find it in your programs list after installing) and at least reach step 5 for basic understanding of the usage of Cheat Engine

source http://www.cheatengine.org/aboutce.php
Read more >>

Internet Security

Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusionor fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.



Types of security

Network Layer Security
TCP/IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet. These protocols include SSL and TLS for web traffic, PGP for email, and IPsec for the network layer security.

IPsec Protocol

This protocol is designed to protect communication in a secure manner using TCP/IP. It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography. To protect the content, the data is transformed using encryption techniques. There are two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and Encapsulating Security Payload (ESP). These two protocols provide data integrity, data origin authentication, and anti-reply service. These protocols can be used alone or in combination to provide the desired set of security services for the Internet Protocol (IP) layer.
The basic components of the IPsec security architecture are described in terms of the following functionalities:
  • Security protocols for AH and ESP
  • Security association for policy management and traffic processing
  • Manual and automatic key management for the internet key exchange (IKE)
  • Algorithms for authentication and encryption
The set of security services provided at the IP layer includes access control, data origin integrity, protection against replays, and confidentiality. The algorithm allows these sets to work independently without affecting other parts of the implementation. The IPsec implementation is operated in a host or security gateway environment giving protection to IP traffic.

Malicious software and antivirus
Malware
Commonly, a computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such programs are known as malware and come in many forms, such as viruses, Trojan horses, spyware, and worms. Malicious software is sometimes used to form botnets.
Viruses
Viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data.
Trojan horse
A Trojan horse (commonly known as a Trojan) is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer.
Spyware
The term spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent.
Worms
Worms are programs that can replicate themselves thoughout a computer network, performing malicious tasks throughout.
Botnet
A botnet is a network of "zombie" computers that have been taken over by a "bot" that performs large-scale malicious acts for the creator of the botnet.
Antivirus
Antivirus programs and Internet security programs are useful in protecting a computer or programmable device from malware.
Such programs are used to detect and usually eliminate viruses; however, it is now common to see security suites, containing also firewalls, anti-spyware, theft protection, and so on to more thoroughly protect users.
Traditionally, a user would pay for antivirus software; however, computer users now can, and do, download from a host of free security applications on the Internet

Read more >>

Saturday, March 26, 2011

Microsoft Security Essentials 2011


Microsoft Security Essentials (MSE) is a free antivirus software product created byMicrosoft that provides protection against different types of malware such ascomputer virusspywarerootkits and trojan horses for Windows XP (x86),Windows Vista, and Windows 7 (both x86 and x64). Microsoft Security Essentials replaces Windows Live OneCare, a commercial subscription-based antivirus service and the free Windows Defender, which only protected users fromadware and spyware. Unlike the Microsoft Forefront family of enterprise-oriented security products, Microsoft Security Essentials is geared for consumer use.
Microsoft Security Essentials received positive reviews upon its release.

In February 2010, a rogue security software package calling itself "Security Essentials 2010" appeared on the Internet. This malware, designated TrojanDownloader:Win32/Fakeinit, bears no resemblance to Microsoft Security Essentials except for the name. This malware reappeared again in November 2010, this time calling itself "Microsoft Security Essentials 2011".
A more dangerous form of these malware rogues however, appeared in October 2010. This malware, designated Rogue:Win32/FakePAV, closely resembles Microsoft Security Essentials in look and uses sophisticated social engineering to compel users into introducing malware to their systems, under the guise of five different fictional anti-malware products. This malware also terminates and prevents the launch of 156 different programs, including but not limited to Registry EditorCommand PromptInternet ExplorerMozilla FirefoxOperaSafariGoogle Chrome and other web browsers, email clients, instant messaging clients, media players and entertainment software.


source : en.wikipedia.

Read more >>

Computer Security 3


Capabilities and access control lists


Within computer systems, two security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. The semantics of ACLs have been proven to be insecure in many situations, e.g., the confused deputy problem. It has also been shown that the promise of ACLs of giving access to an object to only one person can never be guaranteed in practice. Both of these problems are resolved by capabilities. This does not mean practical flaws exist in all ACL-based systems, but only that the designers of certain utilities must take responsibility to ensure that they do not introduce flaws.
Capabilities have been mostly restricted to research operating systems and commercial OSs still use ACLs. Capabilities can, however, also be implemented at the language level, leading to a style of programming that is essentially a refinement of standard object-oriented design. An open source project in the area is the E language.
First the Plessey System 250 and then Cambridge CAP computer demonstrated the use of capabilities, both in hardware and software, in the 1970s. A reason for the lack of adoption of capabilities may be that ACLs appeared to offer a 'quick fix' for security without pervasive redesign of the operating system and hardware.
The most secure computers are those not connected to the Internet and shielded from any interference. In the real world, the most security comes from operating systems where security is not an add-on.

Applications

Computer security is critical in almost any technology-driven industry which operates on computer systems. Computer security can also be referred to as computer safety. The issues of computer based systems and addressing their countless vulnerabilities are an integral part of maintaining an operational industry.

Cloud computing Security

Security in the cloud is challenging, due to varied degree of security features and management schemes within the cloud entitites. In this connection one logical protocol base need to evolve so that the entire gamet of components operates synchronously and securely.

In aviation


The aviation industry is especially important when analyzing computer security because the involved risks include human life, expensive equipment, cargo, and transportation infrastructure. Security can be compromised by hardware and software malpractice, human error, and faulty operating environments. Threats that exploit computer vulnerabilities can stem from sabotage, espionage, industrial competition, terrorist attack, mechanical malfunction, and human error.
The consequences of a successful deliberate or inadvertent misuse of a computer system in the aviation industry range from loss of confidentiality to loss of system integrity, which may lead to more serious concerns such as data theft or loss, network and air traffic controloutages, which in turn can lead to airport closures, loss of aircraft, loss of passenger life. Military systems that control munitions can pose an even greater risk.
A proper attack does not need to be very high tech or well funded; for a power outage at an airport alone can cause repercussions worldwide.[5] One of the easiest and, arguably, the most difficult to trace security vulnerabilities is achievable by transmitting unauthorized communications over specific radio frequencies. These transmissions may spoof air traffic controllers or simply disrupt communications altogether. These incidents are very common, having altered flight courses of commercial aircraft and caused panic and confusion in the past. Controlling aircraft over oceans is especially dangerous because radar surveillance only extends 175 to 225 miles offshore. Beyond the radar's sight controllers must rely on periodic radio communications with a third party.
Lightning, power fluctuations, surges, brown-outs, blown fuses, and various other power outages instantly disable all computer systems, since they are dependent on an electrical source. Other accidental and intentional faults have caused significant disruption of safety critical systems throughout the last few decades and dependence on reliable communication and electrical power only jeopardizes computer safety.

Notable system accidents

In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horse viruses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Center, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.

source : en.wikipedia.org
Read more >>

Computer Security 2


Security architecture

Security Architecture can be defined as the design artifacts that describe how the security controls (security countermeasures) are positioned, and how they relate to the overall information technology architecture. These controls serve the purpose to maintain the system's quality attributes, among them confidentialityintegrityavailabilityaccountability and assurance.".


Hardware mechanisms that protect computers and data

Hardware based or assisted computer security offers an alternative to software-only computer security. Devices such as dongles may be considered more secure due to the physical access required in order to be compromised


Secure operating systems


One use of the term computer security refers to technology to implement a secure operating system. Much of this technology is based on science developed in the 1980s and used to produce what may be some of the most impenetrable operating systems ever. Though still valid, the technology is in limited use today, primarily because it imposes some changes to system management and also because it is not widely understood. Such ultra-strong secure operating systems are based on operating system kernel technology that can guarantee that certain security policies are absolutely enforced in an operating environment. An example of such a Computer security policy is the Bell-LaPadula model. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, to a special correctly implemented operating system kernel. This forms the foundation for a secure operating system which, if certain critical parts are designed and implemented correctly, can ensure the absolute impossibility of penetration by hostile elements. This capability is enabled because the configuration not only imposes a security policy, but in theory completely protects itself from corruption. Ordinary operating systems, on the other hand, lack the features that assure this maximal level of security. The design methodology to produce such secure systems is precise, deterministic and logical.
Systems designed with such methodology represent the state of the art[clarification needed] of computer security although products using such security are not widely known. In sharp contrast to most kinds of software, they meet specifications with verifiable certainty comparable to specifications for size, weight and power. Secure operating systems designed this way are used primarily to protect national security information, military secrets, and the data of international financial institutions. These are very powerful security tools and very few secure operating systems have been certified at the highest level (Orange Book A-1) to operate over the range of "Top Secret" to "unclassified" (including Honeywell SCOMP, USAF SACDIN, NSA Blacker and Boeing MLS LAN.) The assurance of security depends not only on the soundness of the design strategy, but also on the assurance of correctness of the implementation, and therefore there are degrees of security strength defined for COMPUSEC. The Common Criteria quantifies security strength of products in terms of two components, security functionality and assurance level (such as EAL levels), and these are specified in a Protection Profile for requirements and a Security Targetfor product descriptions. None of these ultra-high assurance secure general purpose operating systems have been produced for decades or certified under Common Criteria.
In USA parlance, the term High Assurance usually suggests the system has the right security functions that are implemented robustly enough to protect DoD and DoE classified information. Medium assurance suggests it can protect less valuable information, such as income tax information. Secure operating systems designed to meet medium robustness levels of security functionality and assurance have seen wider use within both government and commercial markets. Medium robust systems may provide the same security functions as high assurance secure operating systems but do so at a lower assurance level (such as Common Criteria levels EAL4 or EAL5). Lower levels mean we can be less certain that the security functions are implemented flawlessly, and therefore less dependable. These systems are found in use on web servers, guards, database servers, and management hosts and are used not only to protect the data stored on these systems but also to provide a high level of protection for network connections and routing services.

Secure coding


If the operating environment is not based on a secure operating system capable of maintaining a domain for its own execution, and capable of protecting application code from malicious subversion, and capable of protecting the system from subverted code, then high degrees of security are understandably not possible. While such secure operating systems are possible and have been implemented, most commercial systems fall in a 'low security' category because they rely on features not supported by secure operating systems (like portability, et al.). In low security operating environments, applications must be relied on to participate in their own protection. There are 'best effort' secure coding practices that can be followed to make an application more resistant to malicious subversion.
In commercial environments, the majority of software subversion vulnerabilities result from a few known kinds of coding defects. Common software defects include buffer overflowsformat string vulnerabilitiesinteger overflow, and code/command injection. It is to be immediately noted that all of the foregoing are specific instances of a general class of attacks, where situations in which putative "data" actually contains implicit or explicit, executable instructions are cleverly exploited.
Some common languages such as C and C++ are vulnerable to all of these defects (see Seacord, "Secure Coding in C and C++"). Other languages, such as Java, are more resistant to some of these defects, but are still prone to code/command injection and other software defects which facilitate subversion.
Recently another bad coding practice has come under scrutiny; dangling pointers. The first known exploit for this particular problem was presented in July 2007. Before this publication the problem was known but considered to be academic and not practically exploitable.[2]
Unfortunately, there is no theoretical model of "secure coding" practices, nor is one practically achievable, insofar as the variety of mechanisms are too wide and the manners in which they can be exploited are too variegated. It is interesting to note, however, that such vulnerabilities often arise from archaic philosophies in which computers were assumed to be narrowly disseminated entities used by a chosen few, all of whom were likely highly educated, solidly trained academics with naught but the goodness of mankind in mind. Thus, it was considered quite harmless if, for (fictitious) example, a FORMAT string in a FORTRAN program could contain the J format specifier to mean "shut down system after printing." After all, who would use such a feature but a well-intentioned system programmer? It was simply beyond conception that software could be deployed in a destructive fashion.
It is worth noting that, in some languages, the distinction between code (ideally, read-only) and data (generally read/write) is blurred. In LISP, particularly, there is no distinction whatsoever between code and data, both taking the same form: an S-expression can be code, or data, or both, and the "user" of a LISP program who manages to insert an executable LAMBDA segment into putative "data" can achieve arbitrarily general and dangerous functionality. Even something as "modern" as Perl offers the eval() function, which enables one to generate Perl code and submit it to the interpreter, disguised as string data.


source : en.wikipedia.org
Read more >>

Follow by Email