Computer Security: Social Engineering (Daryan)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Daryan) , ,

The subject inserted the flash drive containing the program. The program is masked as IB Physics Past Paper May 2015.doc. The subject deliberately ran the program. When the program ran, the antivirus rejected the program to work but then the antivirus was disabled manually and then the program ran. The program made a copy of

CONTINUE READING …

Computer Security: Social Engineering (ChinHeng)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (ChinHeng) , ,

My victim is Ansell. At first, I lied to him about a “new game database,” that the program could search for the first until the last game, for free. Not only games, it can search for cheats, mods, maps, and any other properties that the game must have. He looks so happy that he received

CONTINUE READING …

Computer Security: Social Engineering (Kevin)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Kevin) , ,

Program detail (Final): This program is a program that will run automatically when windows starts up. The program has 2 files, one is the executable file, and one is a folder containing all the pictures and sound. Program name: Kaelproject.exe, folder name: Randomimage. The program will check if the program is already running. If it

CONTINUE READING …

Computer Security: Social Engineering (Daniel)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Daniel) , ,

First, I tried to convince the target that I would give him the photo of a kid. The target was extremely obsessed by the look of the kid. So I thought his photos would be very attractive for the target. I decided to make an application that acted as a photo viewer. The photo viewer

CONTINUE READING …

Computer Security: Social Engineering (Clark)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Clark) , ,

On the 12th of May 2015, I used my program to my good friend, Igna. The program that I made is an annoying virus that pops out a mathematical question every hour after the computer is turned on. The program spread is through flashdrive, but it have to be run manually through the flashdrive. The

CONTINUE READING …

Computer Security: Social Engineering (Grace)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Grace) , ,

Yesterday night I send my virus to two of my friend’s email then I inform them to check it by saying that it’s my experiment for my school project. Then when they check it they thought that its just their computer cant open my file then they just click run. When they ran into my

CONTINUE READING …

Computer Security: Social Engineering (Albert)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Albert) , ,

Part 3 : Scenario The scenario for the social enginnering is as follows: Ask help from a friend which is in the same class of the target (Wilson) I give Wilson a flashdisk containing the program. He then insert the flashdisk containing the program, and copy it into the desktop during school hours. He then

CONTINUE READING …

Computer Science: Paper 3 Predicted Questions

BY IN CS - Exam, IB Computer Science Comments Off on Computer Science: Paper 3 Predicted Questions , ,

This refers to Electronic Banking Case Study 2015 Answer all questions. 1. Outline the meaning of the following terms. (a) phishing [2 marks] (b) push/pull technology [2 marks] 2. TransEuropa is based in a European country where it has been established for many years. It also has a presence in some developing countries where its

CONTINUE READING …

Mengedit file hosts di Windows 7

BY IN Tips & Trik Comments Off on Mengedit file hosts di Windows 7

Karena sesuatu kebutuhan, beberapa waktu lalu saya ingin menambahkan satu baris di dalam file hosts, yang ternyata tidak diijinkan oleh windows. Langsung saja muncul pesan: Access to C:\Windows\System32\drivers\etc\ hosts was denied Sebenarnya nggak ada masalah sih, langsung saja ikuti langkah-langkah berikut: Pilih “Start” > “All Programs” > “Accessories“. Right-click pada “Notepad” dan pilih “Run as administrator“. Jika kita diminta

CONTINUE READING …

Computer Security Terminologies

BY IN IB Computer Science Comments Off on Computer Security Terminologies , , ,

APTs                                                      : [A]utomatically [P]rogrammed [T]ool, a computer language designed for prgramming numerically controlled tool Bots                                                       : The artificial intelligence that automatically do the task programmed Botnets                                                                : criminals distribute malicious software (also known as malware) that can turn your computer into a bot (also known as a zombie) BYOD                                                    : Bring

CONTINUE READING …