CS – Computer Security

contactwahyu on February 9th, 2016

COMPUTER SECURITY ASSIGNMENT! Construct a program that will be displaying some messages in your friend’s computer. Please note that please conduct a research first before put your plan to your task list, to make sure that it is doable or not. The Task List could be as follows: * The tool/ software used: Visual Basic. […]

Continue reading about Computer Science Social Engineering

contactwahyu on May 23rd, 2015

The subject inserted the flash drive containing the program. The program is masked as IB Physics Past Paper May 2015.doc. The subject deliberately ran the program. When the program ran, the antivirus rejected the program to work but then the antivirus was disabled manually and then the program ran. The program made a copy of […]

Continue reading about Computer Security: Social Engineering (Daryan)

contactwahyu on May 23rd, 2015

My victim is Ansell. At first, I lied to him about a “new game database,” that the program could search for the first until the last game, for free. Not only games, it can search for cheats, mods, maps, and any other properties that the game must have. He looks so happy that he received […]

Continue reading about Computer Security: Social Engineering (ChinHeng)

contactwahyu on May 23rd, 2015

Program detail (Final): This program is a program that will run automatically when windows starts up. The program has 2 files, one is the executable file, and one is a folder containing all the pictures and sound. Program name: Kaelproject.exe, folder name: Randomimage. The program will check if the program is already running. If it […]

Continue reading about Computer Security: Social Engineering (Kevin)

contactwahyu on May 23rd, 2015

First, I tried to convince the target that I would give him the photo of a kid. The target was extremely obsessed by the look of the kid. So I thought his photos would be very attractive for the target. I decided to make an application that acted as a photo viewer. The photo viewer […]

Continue reading about Computer Security: Social Engineering (Daniel)

contactwahyu on May 23rd, 2015

On the 12th of May 2015, I used my program to my good friend, Igna. The program that I made is an annoying virus that pops out a mathematical question every hour after the computer is turned on. The program spread is through flashdrive, but it have to be run manually through the flashdrive. The […]

Continue reading about Computer Security: Social Engineering (Clark)

contactwahyu on May 23rd, 2015

Yesterday night I send my virus to two of my friend’s email then I inform them to check it by saying that it’s my experiment for my school project. Then when they check it they thought that its just their computer cant open my file then they just click run. When they ran into my […]

Continue reading about Computer Security: Social Engineering (Grace)

contactwahyu on May 23rd, 2015

On 8th of May, I tried my program on my friend computer. His name is Richard Angga Pranata, he is in the same class with me 11IB2. My program will start when he clicks on it and then it will run the program. By using flash drive I able to copy the program into his […]

Continue reading about Computer Security: Social Engineering (Bian)

contactwahyu on May 23rd, 2015

Part 3 : Scenario The scenario for the social enginnering is as follows: Ask help from a friend which is in the same class of the target (Wilson) I give Wilson a flashdisk containing the program. He then insert the flashdisk containing the program, and copy it into the desktop during school hours. He then […]

Continue reading about Computer Security: Social Engineering (Albert)

contactwahyu on May 21st, 2015

Worms: fast spreading using wide network (internet), sometimes uncontrollable Trojan Horse: a software that hides inside another software, need user interaction to make it active. mostly give destructive impact! Places that usually used by virus to defend itself: Registry Task Manager Configuration Files (WIN.INI, SYSTEM.INI, MSConfig etc) System Directories Social Engineering: Send a copy of “important” […]

Continue reading about Computer Security Issues