ComputerSecurity

contactwahyu on May 23rd, 2015

The subject inserted the flash drive containing the program. The program is masked as IB Physics Past Paper May 2015.doc. The subject deliberately ran the program. When the program ran, the antivirus rejected the program to work but then the antivirus was disabled manually and then the program ran. The program made a copy of […]

Continue reading about Computer Security: Social Engineering (Daryan)

contactwahyu on May 23rd, 2015

My victim is Ansell. At first, I lied to him about a “new game database,” that the program could search for the first until the last game, for free. Not only games, it can search for cheats, mods, maps, and any other properties that the game must have. He looks so happy that he received […]

Continue reading about Computer Security: Social Engineering (ChinHeng)

contactwahyu on May 23rd, 2015

Program detail (Final): This program is a program that will run automatically when windows starts up. The program has 2 files, one is the executable file, and one is a folder containing all the pictures and sound. Program name: Kaelproject.exe, folder name: Randomimage. The program will check if the program is already running. If it […]

Continue reading about Computer Security: Social Engineering (Kevin)

contactwahyu on May 23rd, 2015

First, I tried to convince the target that I would give him the photo of a kid. The target was extremely obsessed by the look of the kid. So I thought his photos would be very attractive for the target. I decided to make an application that acted as a photo viewer. The photo viewer […]

Continue reading about Computer Security: Social Engineering (Daniel)

contactwahyu on May 23rd, 2015

On the 12th of May 2015, I used my program to my good friend, Igna. The program that I made is an annoying virus that pops out a mathematical question every hour after the computer is turned on. The program spread is through flashdrive, but it have to be run manually through the flashdrive. The […]

Continue reading about Computer Security: Social Engineering (Clark)

contactwahyu on May 23rd, 2015

Yesterday night I send my virus to two of my friend’s email then I inform them to check it by saying that it’s my experiment for my school project. Then when they check it they thought that its just their computer cant open my file then they just click run. When they ran into my […]

Continue reading about Computer Security: Social Engineering (Grace)

contactwahyu on May 23rd, 2015

On 8th of May, I tried my program on my friend computer. His name is Richard Angga Pranata, he is in the same class with me 11IB2. My program will start when he clicks on it and then it will run the program. By using flash drive I able to copy the program into his […]

Continue reading about Computer Security: Social Engineering (Bian)

contactwahyu on May 23rd, 2015

Part 3 : Scenario The scenario for the social enginnering is as follows: Ask help from a friend which is in the same class of the target (Wilson) I give Wilson a flashdisk containing the program. He then insert the flashdisk containing the program, and copy it into the desktop during school hours. He then […]

Continue reading about Computer Security: Social Engineering (Albert)

contactwahyu on March 20th, 2015

This refers to Electronic Banking Case Study 2015 Answer all questions. 1. Outline the meaning of the following terms. (a) phishing [2 marks] (b) push/pull technology [2 marks] 2. TransEuropa is based in a European country where it has been established for many years. It also has a presence in some developing countries where its […]

Continue reading about Computer Science: Paper 3 Predicted Questions

contactwahyu on March 19th, 2015

Karena sesuatu kebutuhan, beberapa waktu lalu saya ingin menambahkan satu baris di dalam file hosts, yang ternyata tidak diijinkan oleh windows. Langsung saja muncul pesan: Access to C:\Windows\System32\drivers\etc\ hosts was denied Sebenarnya nggak ada masalah sih, langsung saja ikuti langkah-langkah berikut: Pilih “Start” > “All Programs” > “Accessories“. Right-click pada “Notepad” dan pilih “Run as administrator“. Jika kita diminta […]

Continue reading about Mengedit file hosts di Windows 7

contactwahyu on October 4th, 2014

APTs                                                      : [A]utomatically [P]rogrammed [T]ool, a computer language designed for prgramming numerically controlled tool Bots                                                       : The artificial intelligence that automatically do the task programmed Botnets                                                                : criminals distribute malicious software (also known as malware) that can turn your computer into a bot (also known as a zombie) BYOD                                                    : Bring […]

Continue reading about Computer Security Terminologies