Tampilkan postingan dengan label the. Tampilkan semua postingan
Tampilkan postingan dengan label the. Tampilkan semua postingan

Computer system Discover the best buy designed for Hewlett Packard D3J33UTABA Smart Buy Retail System Model Term 3100 320GB 4GB Posready 32bit

It is possible to best to buy pertaining to Hewlett Packard D3J33UTABA Smart Buy Retail System Model Term 3100 320GB/4GB Posready 32bit Cheap

Ratings: Hewlett Packard D3J33UTABA Smart Buy Retail System Model Term 3100 320GB/4GB Posready 32bit

Hewlett Packard D3J33UTABA Smart Buy Retail System Model Term 3100 320GB/4GB Posready 32bit

Hewlett Packard D3J33UTABA Smart Buy Retail System Model Term 3100 320GB/4GB Posready 32bit Low Cost

1 1 GHz 1 x RJ-12 Cash Drawer 1 x RJ-45 Network 10.7" 11.2" 2 x Powered USB 2 x RS-232 Powered Serial Port 3 Year 3.5" 3100 320GB 4GB 8.00 lb The compact and affordable HP RP3 Retail System provides retailers of all sizes with reliability and connectivity features that help maximize operating cost efficiency. Celeron D3J33UT#ABA DDR3 SDRAM Energy Star Gigabit Ethernet HP Hewlett-Packard Intel POS Terminal REACH RP3 Retail System SATA Windows Embedded POSReady 7 Yes www. hp.com

Read more »
Read More..

HOWTO The Onion Router Tor on Back Track 5

PART I : Browser



Step 1 :



nano /etc/apt/sources.list



Append the following line to the file.



deb http://deb.torproject.org/torproject.org lucid main



Step 2 :



gpg --keyserver keys.gnupg.net --recv 886DDD89

gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -



apt-get update

apt-get install tor tor-geoipdb

apt-get install privoxy




Step 3 :



nano /etc/privoxy/config



Append the following line :



forward-socks4a / 127.0.0.1:9050 .



/etc/init.d/privoxy start

/etc/init.d/tor start




Step 3a (Optional) :



If you are behind firewall or NAT as well as router, you should append the following line at the configure file.



forward 192.168.*.*/ .



Step 4 :



Go to the Tor official site to download and install Tor button for Firefox.



Tor Button Plugin for Firefox



Step 5 :



Open Firefox. Go to "Tools" -- "Add-ons" -- "Extensions". Select "Torbuttons Preferences".



(a) At "Proxy Settings", unclick "Use Polipo".

(b) At "Security Settings", On browser startup, set Tor state to:" select "Tor".

(c) At "Display Settings", select "Icon".



** Now, your Firefox will enable Tor on every launch unless you disabled the "Tor Button" on the Firefox.



Step 6 (Optional) :



To check if it works or not. Go to the following sites to check your Ip address.



http://cmyip.com



or



http://whatismyip.com



or



http://check.torproject.org



PART II : Console



Step a :



apt-get install proxychains elinks



Step b :



nano /etc/proxychains.conf



Append the following line :



socks4 127.0.0.1 9050



** It should be there.



Step c :



Usage :



proxychains nmap google.com

proxychains elinks http://cmyip.com

proxychains elinks http://www.whatismyip.com




To see your real IP address :



elinks cmyip.com



Thats all! See you.
Read More..

The security database on the server does not have a computer account for this workstation trust relationship

We recently has this error message appear when trying to log on Windows 7 workstations to our Windows 2003 domain server.
"The security database on the server does not have a computer account for this workstation trust relationship."
We trawled through the Google searches for this message and there are pages of reports of this error.
Let me give you the circumstances.
Our domain server failed. We could not get it to get through POST and BIOS to try to find and operating system. That was the first big Ouch.
So we rebuilt the server on to new hardware and configured it, as we thought, the same. We initially had some issues with DNS and NICs not doing as they should but the upshot was that our 2 Windows 7 workstations could not connect to the domain. Please note this did not affect our remaining XP workstation which logged just fine.
After looking at the Goggle responses we noticed that we had rebuilt the domain but missed off the .local on the domain name.
So we rebuilt being more careful next time. Even so we got a capital letter in the wrong place in the domain name. So we rebuilt a third time. This time we are sure we got everything right. It made not a jot of difference.
Other websites had suggested we disconnect from the domain and reconnect to the new domain. Not an iota of difference.
Finally we had to reinstall the operating system on both our Windows 7 machines.
One side effect of this, despite having installed onto completely new hard disks to preserve the data on the old disk, is that on one of the machines we have lost ALL out Outlook pst files. Some emails going back 6 years with important information.
Couple this with the total data loss of all information on the server did not make us very happy.
I will finish with this comment. Why, oh why, Microsoft is it so hard to get your systems to talk to each other. This is hardly a ringing endorsement for the improvements in Windows 7 when XP performs better in what was already a very fraught situation. Please try to do better next time.
Read More..

5 Tips to Help You Choose the Right Laser Printer Scanner

In the past, a laser printer scanner was only used in the office, but more manufacturers are making ones suitable for home use since advancing technology allows them to be smaller and more affordable. Laser printer scanners are faster and have more functions than in the past, so whether you are looking for one for your home or your business, you have many to choose from. Here are a few things you may want to think about before making your purchase.
What functions besides scanning do you need? Most all-in-one, or multifunction printers, as they are called, also copy and fax. Well, only some fax and most copy. If you need to fax, look carefully to be sure the printer you are considering has a faxing function. When copying, some printers require a computer to be connected to them, and some can copy on their own. If copying often, it is much more convenient to have the latter option since it is faster and less headache.
Know what you need to print before looking for a printer. While scanners dont vary too much, printers do. Several factors should influence which printer you choose. Will you print in color or only in black and white? If you plan to print in color, the price of the laser printer increases significantly. And laser printers are known for not being able to print great photos and other graphics that need shading, so if you plan to print these types of documents, you many want to think about getting an inkjet multifunction printer instead.

How much will you print? An office printer may need to print 1000 pages a day while a home office printer might get used only every other day. Printing speed varies, so be sure to know your needs and how fast the printer you are considering prints.
Know the weight and size of the printer you will purchase. No matter how or where you use the printer you want to be able to move it and fit it in the space you have. For home use, make sure it will fit on your desk and that you can carry it yourself. Office use printers may require a dedicated table or space and a dolly to move them.
Look around for a good deal. The multifunction printer market is very competitive, and there are often sales. All the major makers, such as Dell, Lexmark, HP, Canon, Brother, and Panasonic sell via their websites and their dealers, both online and in physical stores. You should find one at a discount. Prices vary depending on the features of the printer and range from about 120 USD to over 5000 USD.
Convenient and multifunctional a laser printer scanner is a great choice for both home and office. They offer many variations in speed, functions and price. Know ahead of time what you want so you will get one that is a great value but also meets all your needs.


Article Source: http://EzineArticles.com/6920329
Read More..

Know the Enemy – Identifying Removing the FBI Virus

What is the FBI Virus?

Also known as Reveton ransomware, the FBI virus is a form of malware - malicious software that criminals install on your computer without your consent. It provides criminals with the ability to freeze your computer from a remote location. Your computer screen is then filled with a pop-up window displaying a warning that your computer is locked by a local law enforcement agency, such as the FBI or Metropolitan Police, please read how to remove FBI Moneypak virus.

It demands that you pay a fine, claiming that you and your computer have been involved in illegal activities, such as the downloading and sharing of copyrighted files. New versions of the virus can activate your webcam and take a picture of you to display alongside the warning. Some versions now contain a dynamic configuration module which allows the hacker real time control of your browser. They can use this to create interactive pop-up boxes and responsive forms that request further personal information, such as your bank details and date of birth.




How does the FBI Virus work?

The main strategy behind the FBI virus is scare tactics and holding the victim’s computer to ransom. By persuading the victim that they are in serious trouble with the authorities the attackers hope to gain not just a one off payment but also intimidate the victim into providing payment details and other personal information. If the victim does comply and pays the fine as requested, this does not mean that the virus will be removed– the lock out screen may remain or the virus may appear to be removed but instead go into hiding and exploit other vulnerabilities using a wide range of malicious tactics.

It may be easy to assume as a knowledgeable, and security conscious, computer user that you would immediately identify this as a virus and not fall prey to ransomware. However the screenshots and tales circulating the internet show this to be convincing and threatening. By displaying an image of the victim on their screen or creating responsive pop-up boxes it becomes even more intrusive and damaging than simply locking the victim out of their computer. Even if the victim is aware that this was a scam, and not actually the FBI, the feeling of a hacker having control of your computer, capturing an image of you using your own technology and live communicating with you through a pop-up box could be considered akin to a burglar physically breaking into your home.

Detecting Infection

The FBI virus is usually installed when you click on a malicious attachment in an email or when you click on a malicious link in an instant message, email or a message on a social networking site. It could even be installed when you unknowingly pay a visit to a malicious website. When your computer becomes infected with the virus, your personal material and computer system’s functionality are put at risk. If your infected computer is switched on and connected to the Internet, the virus will have complete control over your computer and all of the data stored on it.

In addition to presenting you with an “official” warning on your frozen computer system, the FBI virus is likely to bring less obvious malware. It has been reported by the, genuine, FBI that Reveton malware is being combined with Citadel, an advanced and powerful malware that is particularly difficult to remove. If you believe that your computer has been infected by a malicious program, you should run a full system scan using trusted antivirus software.

Removing the FBI Virus

To remove the FBI virus and other types of malicious software that may be installed on your computer, you will need to have an up-to-date antivirus program on your computer. While it may be possible for you to manually remove the FBI virus, and there are several sites including this one which provide instructions on how to do this, this could result in permanent damage to your system, particularly if you are not completely confident in how to go about this.

Thus, manually removing the FBI virus is only recommended if you are confident in your ability and willing to sacrifice everything should it go wrong. For the majority of cases total removal of the FBI virus, and possibly Citadel malware, requires reinstalling your operating system from a rescue disc or master boot record. Hopefully you will be have been vigilant in your scheduled data backups and won’t suffer too much loss. It is important to remember that this virus, or any form of ransomware or malware, could have gained access to your passwords. Once you have successfully cleared your computer of infection you should ensure your accounts have not been compromised and change all passwords to something completely new, unique and, hopefully, uncrack-able. If you dont know how to create a strong password, please read this article.

Preventing FBI Virus Infection

As we all know the best cure for anything is prevention. In order to prevent infection from the FBI virus or any other form of malware, it is advised to avoid clicking on links to suspicious websites, opening spam email messages, visiting adult websites or downloading and using pirated software. It is also strongly recommended to install a reputable antivirus program, such as Kaspersky, on all your internet-enabled devices. Take the time to make a rescue disc or USB drive; you never know when you might need it.

Read More..