learn to succeed with internet business,Find quality articles about online business, internet marketing, marketing and motivation Devid blog. Do not forget to come back here often since we are always publishing new articles every week.
Tuesday, July 31, 2012
Spy chief asks hackers to help government secure Internet
LAS VEGAS (Reuters) - The head of the government's secretive National Security Agency took the unprecedented step on Friday of asking a convention of unruly hackers to join him in an effort to make the Internet more secure.
In a speech to the 20th annual Def Con gathering in Las Vegas, four-star General Keith Alexander stressed common ground between U.S. officials and hackers, telling them privacy must be preserved and that they could help by developing new tools.
"You're going to have to come in and help us," Alexander told thousands of attendees.
Alexander rarely gives speeches of any kind, let alone to a crowd of hackers, professional defenders, and researchers whose discoveries of software and hardware vulnerabilities are used by both sides.
Conference founder Jeff Moss, known in hacking circles as The Dark Tangent, told the conference that he had invited Alexander partly because he wanted them to learn about one of the world's "spookiest, least known" organizations.
Attendees were respectful and gave modest applause, though several said they were concerned about secret government snooping and the failure of authorities thus far to stop foreign-backed attacks.
"Americans pay taxes so that federal agencies can defend them," said a researcher who asked not to be named. "I see it as a hard sell asking a business entity to spend money for the common good."
Alexander won points by wearing the hacker "uniform" of jeans and a tee shirt, wandering the halls and praising specific hacking efforts, including intrusion detection tools and advances in cryptology.
He also confronted civil liberties concerns that are a major issue for many researchers devoted to the Internet.
The NSA sponsored a booth at the convention for the first time, which organizers placed next to one from the Electronic Freedom Foundation (EFF). The EFF has sued the government, claiming that it illegally tapped conversations of Americans.
Alexander spoke with staff at the EFF booth, telling them he believes the U.S. government can secure the nation and also protect civil liberties. They did not discuss the pending litigation.
Panels at the conference include a discussion of government tracking of individuals through cell phone data.
Taking questions screened by Moss, Alexander adamantly denied that the NSA has dossiers on millions of Americans, as some former employees have suggested.
"The people who would say we are doing that should know better," he said. "That is absolute nonsense."
Alexander used the speech to lobby for a cyber security bill moving through the Senate that would make it easier for companies under attack to share information with the government and each other as well as give critical infrastructure owners some reward for adhering to future security standards.
"Both parties see this as a significant problem," he said, adding that the experts like those at Def Con should help in the process. "What are the standards that we should jointly set that critical networks should have?"
In addition to conducting electronic intelligence gathering, primarily overseas, the Defense Department-controlled NSA is charged with protecting the U.S. military from cyber attacks.
Increasingly, it has been sharing its findings with the Federal Bureau of Investigation to aid in criminal cases and with the Department of Homeland Security, which warns specific industries of new threats.
Displaying a slide with the logos of several dozen of companies breached by criminals or spies in the past two years, Alexander said that only the most competent even knew they had been hacked.
"There are 10 times, almost 100 times more companies that don't know they've been hacked," he said.
As he walked the convention floor, he repeatedly asked hackers, including children attending a "Def Con Kids" conference, to consider joining the NSA once they have honed their skills.
"Keep working on this. We need you in the future," he said.
Many of the more than 10,000 hackers who crowded into the Rio casino conference center did not seem particularly interested in the presence of the head of the biggest U.S. spy agency, who was flanked by an entourage of plain-clothes guards and Def Con's own red-shirted security force who call themselves "goons".
"Nice to meet you," he said to several dozen hackers in line to buy lock picking equipment at one crowded booth. "How can I help you?"
The crowd did not respond, and the booth's organizers politely chatted with Alexander.
When he approached a hacker preparing for a "capture the flag" computer-takeover contest, the hacker waved casually, then returned to his laptop. A teammate later explained: "We were just too busy to chat."
(Reporting by Joseph Menn and Jim Finkle)
Sources by :http://news.yahoo.com
"Internet Doomsday" virus fizzles, web traffic flows
BOSTON (Reuters) - Fears that a computer virus might cut Internet access around the world appeared to be overblown on Monday after U.S. authorities removed a safety net that had protected infected machines for months.
Shortly after midnight EDT, the authorities cut off computer servers in New York City that had been put in place to direct traffic for infected computers, which would have been unable to access the Internet without their help.
Some blogs and news reports had warned that the shutdown of the servers could trigger a potential "blackout" and described the malicious software as the "Internet Doomsday" virus.
But that did not happen.
"All quiet," said Barry Greene, a security consultant who volunteers with the DNS Changer Working Group, an ad-hoc group of experts who teamed up to help fight the virus and educate the public about how to eradicate it.
The working group was using the incidence of service calls to Internet providers as a barometer for measuring the impact of the sever shutdowns.
As of Monday afternoon New York time, providers had seen no increase in call volume.
"The outreach campaign has reached everyone humanly possible," Greene said.
Victims of the virus originally required assistance because the virus had changed settings on their PCs, diverting Internet traffic through rogue servers that showed them advertisements. Police shut them down in November.
Infected machines would have been unable to access the Web unless they were repaired, so authorities put the backup system in place as a stopgap measure.
As of Sunday, the number of machines using the clean servers was down to 211,000, with about 42,000 in the United States, according to the FBI.
That is a tiny fraction of the world's more than 1 billion Internet users, said Luis Corrons Granel, technical director with the research lab of anti-virus software maker Panda Security. "Not a big impact," he said.
The number of users who actually lost Internet service was likely far fewer than the 211,000 who accessed the temporary server on Sunday, said Hypponen, of F Secure.
That is because many Internet service providers, including AT&T Inc and Time Warner Cable, set up their own servers so their customers with infected machines could continue to access the Internet.
"It's the 9th of July, and the Internet has not exploded into bits and pieces," remarked one Twitter user.
The United States has charged seven people with orchestrating the worldwide Internet fraud. Six were arrested in Estonia, while the seventh, who was living in Russia, is still at large. Estonia has extradited two of the men to New York, where they appeared in Manhattan federal court.
The case is USA v. Tsastsin et al, U.S. District Court for the Southern District of New York, No. 11-cr-878.
(Reporting by Jim Finkle in Boston; Additional reporting by Basil Katz in New York and Niklas Pollard in Stockholm; Editing by Dan Grebler and Sofina Mirza-Reid)
Sources by:http://news.yahoo.com/
Labels:
account,
hacker,
hacking,
security,
technology
Internet shutdown looms for some as US fix expires
Tens of thousands of computer users around the world infected with malware last year may lose their Internet access on Monday with the expiration of a fix by US authorities, security experts say.
The problem stems from malware known as DNS Changer, which was created by cybercriminals to redirect Internet traffic by hijacking the domain name systems of Web browsers.
The ring behind the DNS Changer virus, discovered in 2007, was shut down last year by the US Federal Bureau of Investigation (FBI), Estonian police and other law enforcement agencies.
Because the virus controlled so much Web traffic, authorities obtained a court order to allow the FBI to operate replacement servers which allow traffic to flow normally, even from infected computers.
But that order expires Monday, when experts say infected computers will face an "Internet doomsday."
The FBI, Facebook, Google, Internet service providers and security firms have been scrambling to warn users about the problem and direct them to fixes.
According to a working group set up by experts, more than 300,000 computers remained infected as of June 11.
The largest number were in the United States (69,000), but more than a dozen countries -- including Italy, Germany, India, Britain, Canada, France and Australia -- are also believed to have infected computers.
Security experts say it's not clear how many of those computers are active.
"Reaching victims is a very hard problem, and something we have had issues with for years," said Johannes Ullrich, a researcher with the SANS Security Institute.
But he said he expected the impact to be "minimal" because many of these systems are no longer used or maintained.
Users who think they are infected may perform a test at the DNS Changer Working Group's website http://www.dcwg.org/ or others operated by various security firms.
The security firm Internet Identity said last week that at least 58 of all Fortune 500 companies and two out of 55 major government entities had at least one computer or router that was infected with DNS Changer.
That's an improvement over January, when half of Fortune 500 companies and US federal agencies were infected.
"DNS Changer is an insidious form of malware affecting everyone from the everyday consumer to a large chunk of the Fortune 500," said IID chief executive Lars Harvey.
IID said that the malware also compromises computers by preventing antivirus software updates.
"This enables criminals to view any data, messages exchanged and more on a victim's computer, depending on what the victims' machines are infected with," the company said.
The security firm McAfee, which also offers a diagnostic tool at http://www.mcafee.com/dnscheck, said users must act before Monday to clean their computers.
"If users' computers have the wrong DNS settings for the servers, they will not be able to access websites, send e-mail or use Internet services," a McAfee statement said Thursday.
Google said in May it was seeking to notify 500,000 users of likely infections who were using the FBI servers.
Google spokesman Jay Nancarrow said Thursday it was not clear how many remain infected.
"We've notified many people and have seen some clean-up as a result, but we expect others with affected devices will likely encounter problems after the deadline passes," he told AFP.
For computers affected, the blackout will be total, experts say.
"Connectivity will be lost to the Internet PERIOD," said a blog posting from the security firm Symantec.
"If your computer is still using DNS entries that are pointing to the FBI servers on July 9, you will lose TOTAL access to the Internet. No connecting to the office from home, no updating Facebook, nothing until the DNS settings are fixed."
Six Estonians and a Russian were charged last November with infecting computers, including NASA machines, with the malware as part of an online advertising scam that reaped at least $14 million.
The Internet fraud, which took place between 2007 and October 2011, involved redirecting users searching for websites such as iTunes, Netflix and even the US tax collection agency.
At least four million computers located in over 100 countries may have been infected.
Sources by:http://news.yahoo.com/
Labels:
account,
hacker,
hacking,
security,
technology
DNS Malware: Check If Your Internet Won't Work Monday
A nasty piece of malware called DNSChanger will kick thousands of Mac and PC users off the Internet on Monday, and there's a chance you could be one of them.
[More from Mashable: ]
The FBI is shutting down domains that have been affected by the DNSChanger malware, which has been circulating the web since as far back as 2007. The malware redirected Internet traffic to sites with paid advertisements where cybercriminals reaped profit from unsuspecting visitors.
The trojan's creators -- six Estonian nationals -- shut down their services when they were caught and arrested about eight months ago.
[More from Mashable: ]
Although the FBI has been urging consumers for months to check if their systems have been affected by DNSChanger, about 275,000 computers are still at risk of not having Internet access on Monday, July 9.
SEE ALSO:
The good news is that it's easy to see if your system has been infected and fix it if needed. The DNS Changer Working Group (DCWG) -- if you click on the link and the box is green, your computer is clean (If the box is read, your Internet will be dead).
Meanwhile, not only checks if you have the malware but it takes the challenging part out of manually updating Internet settings to correct the issue.
A list of other check tools are also listed on the official .
Has your computer been affected? Let us know in the comments.
Image courtesy of ,
This story originally published on Mashable .
Sources by :http://news.yahoo.com
8.7 million mobile customers hacked in S.Korea
South Korean police have arrested two hackers who stole personal data of 8.7 million customers of the nation's second-biggest mobile operator, the company said.
KT said the hackers -- formally arrested on Sunday -- had stolen data such as customers' names, phone numbers and residential registration numbers for five months since February and sold the information to telemarketing firms.
"The number of affected people account for nearly a half of about 17 million customers of ours," a KT spokesman told AFP, adding the company had alerted police on July 13 after detecting traces of hacking attacks.
Yonhap news agency, citing police, said the duo -- including a former veteran programmer at a local IT company -- had earned at least 1 billion won (about $880,000) by selling the stolen data.
Seven other people were also booked for buying the leaked data for telemarketing purposes, Yonhap said.
"We deeply bow our head in apology for having your precious personal information leaked... we'll try our best to make such things never happen again," KT said in a statement to customers.
Hacking attacks on major companies aimed to gain access to the personal data of their customers is a frequent occurence in South Korea, one of the world's most-wired nations.
Seoul authorities said in July last year hackers using an Internet address registered in China had gained access to South Korean major websites including web portal Nate.com and may have stolen the private data of 35 million users.
In November 2011, Seoul's top games developer Nexon saw personal information of 13 million users of its popular online game MapleStory stolen by hackers.
In March 2010, authorities launched a probe into the security systems of major retailer Shinsegae and 24 other companies after private data on 20 million customers was leaked.
Sources by :http://news.yahoo.com
Hackers Race to Steal Your Data Via Social Media During Olympics
As the 2012 Summer Olympics in London gears up to become , hackers and cybercriminals are expected to pose a huge concern for users on sites such as , and .
[More from Mashable: ]
"Social media will be a major vehicle for Olympics-related fraud this year," Angel Grant, senior manager at anti-fraud solutions company RSA, told Mashable. "Thousands of people already follow the games via social channels, and fraudsters worldwide are eager to leverage the interest around the Olympics to launch cyber attacks with the goal of stealing personal information."
To prevent social media accounts from being comprised, security firms are urging users to use caution when clicking on links that are allegedly sent from the site itself.
[More from Mashable: ]
"Avoid directly responding to email alerts that appear to come from Facebook, Twitter and othersocial networking sites and even your bank," Grant said. "Instead, go directly to these sites by typing their URLs directly into your browser or using a browser bookmark."
Meanwhile, Olympic-themed phishing emails will be among the most popular tactics used to steal your information, according to RCA. In fact, some of these scams have already started to circulate the web -- Internet users earlier this month were led to believe that they won tickets to the Olympic Games and needed to fill out a form with personal information to claim their prize.
"If it's too good to be true, it probably is," Grant added.
Fake ticketing sites will also be set up, luring unsuspecting web users looking especially for tickets to popular events such as swimming and track and field into a trap.
"The market for scalped tickets is one of the biggest around, and it’s full of fake sites trying to scam you out of not just your money, but your financial information as well," RCA said.
The official London2012.com site has a “Ticket Checker” where fans can check the URL of the site on which they are considering buying tickets to determine if it’s real, as well as a list of known fraudulent ticketing sites.
"Avoid directly responding to email alerts that appear to come from Facebook, Twitter and other social networking sites and even your bank," RSA advises. "Instead, go directly to these sites by typing their URLs directly into your browser or using a browser bookmark."
Image courtesy of ,
This story originally published on Mashable .
Sources by:http://news.yahoo.com
Hackers topple Huawei routers
Hackers at an infamous Def Con gathering were shown how to easily slip into computer networks through some routers made by Chinese electronics colossus Huawei Technologies.
"For the 20th anniversary of Def Con the gift is China," Recurity Labs chief Felix "FX" Lindner said as he opened his presentation.
"Nobody needs a back door; this is plausible deniability," he quipped as he detailed weaknesses in three small Huawei routers that could be exploited using basic hacking techniques. "You get what you pay for. Sorry."
Huawei routers, equipment that connects networks to the Internet, are widely used in Asia, Africa and the Middle East and the company has been striving to gain ground in US and European markets, according to Germany-based Recurity.
Lindner and his teammate Gregor Kopf were particularly troubled that Huawei has not issued any security advisories about its routers to warn users to take precautions.
"These machines have serious security issues," Kopf told AFP. "In my eyes, the greatest danger is that you don't know how vulnerable it is; you're left in the dark."
Kopf referred to the routers studied by Recurity as having technology reminiscent of the 1990s and said that once attackers slipped in they could potentially run amok in networks.
"It looks pretty bad," Kopf said. "To be fair, we only looked at three routers. But based on this sample, chances are other equipment they offer is very vulnerable."
Recurity did not examine "big boxes," large routers Huawei makes for businesses and telecom networks.
Huawei, founded by a former People's Liberation Army engineer, has established itself as a major force in the global telecoms industry where its technology is widely used to build mobile phone networks.
Huawei is battling an image problem in the broader technology market due to its perceived close ties with the Chinese military and government.
It was recently blocked from bidding for contracts on Australia's ambitious national broadband project, reportedly due to concerns about cyber-security.
The company has in the past also run afoul of US regulators and lawmakers because of worries over its links with the Chinese military and Beijing -- fears that Huawei has dismissed.
"It doesn't really matter how much intention is behind the quality that we see," said Lindner. "If you can take over people's routers you can get into their stuff. People need to verify what they are dealing with before they buy."
Sources by:http://news.yahoo.com/
Saturday, July 28, 2012
Apple 'considering investment' in Twitter
Computer and smartphone maker Apple has been discussing with social media company Twitter the possibility of making a significant investment in it, The New York Times reported.
Citing unnamed "people briefed on the matter", the newspaper late Friday said Apple was considering investing into Twitter hundreds of millions of dollars, which could increase Twitter's valuation from $8.4 billion to more than $10 billion.
The contacts between the two companies' executives were not formal negotiations, and there were no assurances the two sides will come to an agreement, the report said.
Apple has already incorporated Twitter features into its software for phones, tablets and computers, The Times said.
Meanwhile, Twitter has assigned more resources into managing its relationship with Apple, the paper noted.
Apple's share of the US smartphone market was expected to inch up one percentage point to 31 percent this year, while the share for handsets powered by Google-backed Android software was expected to hit 41 percent, according to eMarketer.
On Tuesday, the company reported a rise in its quarterly profit to $8.8 billion on hot iPad sales but the results came up short of lofty Wall Street expectations, prompting its shares to dive.
The profit in the fiscal quarter to June was up 20.5 percent from a year earlier and amounted to $9.32 dollars a share, well below the consensus forecast of $10.36 dollars.
Revenues rose 22.5 percent to $35 billion, also below expectations of more than $37 billion.
Twitter, which allows its members to post brief comments, links or pictures, claims to have more than 140 million active users, with the largest number being in the United States.
A recent survey found one in seven Americans who go online use Twitter and eight percent do so every day.
Sources by:http://news.yahoo.com
Labels:
technology
Galaxy phones drive Samsung to record profit again
SEOUL, South Korea (AP) — Samsung, the world's largest technology company by revenue, reported another record-high quarterly profit as customers flocked to Galaxy smartphones, helping it outdo rivals at a challenging time for the global tech industry.
Samsung Electronics Co. said Friday its net profit swelled to 5.2 trillion won ($4.5 billion) in the April-June quarter, a 48 percent jump from a year earlier.
The earnings were lower than a median forecast of 5.6 trillion won in a poll of seven analysts by Yonhap Infomax. But Samsung shares jumped 5.2 percent to close at one-month high in Seoul as investors expect its earnings to continue growing strongly.
Samsung, the world's largest maker of mobile phones, televisions and memory chips, benefited from runaway demand for its Android-powered smartphones as rivals including Apple Inc. were yet to release new models.
The robust sales of smartphones such as the company's flagship Galaxy S3 helped Samsung paper over a slowdown in other consumer electronics sectors such as televisions and personal computers that has been painful for its rivals and component suppliers.
Its second quarter operating profit spiked 79 percent over a year earlier to 6.7 trillion won and its revenue rose 21 percent to 47.6 trillion won, matching Samsung's guidance released earlier this month. The operating profit, also at an all-time high, was up 15 percent from the previous quarter.
Despite nagging worries about debt-crippled Europe, analysts are expecting Samsung to achieve a record-high profit in the third quarter when Galaxy S3 sales are expected to reach a peak before Apple unveils its new iPhone, anticipated in October.
"The third quarter is expected to be marginally positive as demand for consumer electronics goods, including smartphones and tablets, remains strong and a stream of new products hit the market. Supply for display panels is also expected to increase, as TV makers prepare for the year-end holiday season," Samsung said in a statement.
In a conference call, Samsung's mobile communications vice president Kim Hyun-joon said growth in global smartphone sales will not be affected by an economic slowdown. Sales of Samsung's smartphones in China increased significantly and the company expects to sustain mobile growth through expansion in emerging markets, he said.
The increase in smartphone sales, the S3 as well as the Galaxy Note, will also boost sales of Samsung's mobile processors, helping the company counter weak demand for computer memory chips, analysts said.
In the second quarter, Samsung's mobile division, which makes smartphones, personal computers and network equipment, contributed 63 percent of Samsung's entire operating profit by generating 4.2 trillion won profit.
Although the company does not release its mobile sales figures, Samsung probably outperformed competitors in the top-end smartphone market, while having a tougher time competing with Chinese brands such as ZTE and Huawei in low-end smartphones, analysts said.
Unlike Apple, which makes a limited number of smartphone models, Samsung boasts a wide range of mobile phones with various screen sizes, designs and price ranges. Industry watcher say Samsung might unveil a new version of the Galaxy Note at a German trade fair in the fall to fend off competition from Apple's new iPhone launch.
Research firm IDC said Samsung shipped 50.2 million smartphones in the April-June quarter, widening its lead over Apple. Apple, which earlier this week reported earnings that fell short of expectations, sold 26 million iPhones in the three month stretch.
The two companies, which together control around half of the world's smartphone market, are scheduled to meet on July 30 in a San Jose court for a U.S. trial on mobile patents.
An epic legal battle between the two companies started in April 2010 when Apple accused the South Korean firm of copying its iPhone and iPad designs and has expanded to about a dozen lawsuits in North America, Asia and Europe. Samsung in turn accuses Apple of violating its wireless technology patents.
Despite the legal battles, the two companies continue to have a close business relationship. Samsung is a key supplier of mobile processors for Apple's iPhone and iPad and Samsung's component divisions also make display screens and mobile chips for Apple.
Outside the mobile market, Samsung made improvements in flat-screens and TVs but semiconductor profit declined on weak global demand for personal computers.
Sources by :http://news.yahoo.com
Labels:
technology
Thursday, July 19, 2012
After IBM Australia, Qantas now turn to Pull BlackBerry from Employees
BlackBerry diminishing the prestige of making some big companies pull rollicking BlackBerry Smartphone from Smartphone employees and replace them with others.
After IBM Australia which attracted about 500 of its employees BlackBerry devices and may save more than $ 1.4 million of reimbursement Smartphone for these employees, Qantas is now turn attracts more than 1,300 of its employees BlackBerry devices.
The same reasons given by Qantas. According to its Chief Information Officer, Paul Jones, by pulling the BlackBerry from its employees, Qantas could save millions of dollars each year.
Previously Qantas has also surveyed its employees and it turns out most of Qantas employees would prefer to use the iPhone than the BlackBerry. That is why the company pulled the BlackBerry from its employees and replace it with the iPhone which, according to Qantas management has an easier interface than the BlackBerry.
Source by : http://www.beritateknologi.com
Labels:
account,
blogger,
facebook,
technology,
twitter
Wednesday, July 18, 2012
Tips Change Email Settings in Facebook
Some time ago, the number one social networking world, Facebook has changed the email users using alamat@facebook.com. It was they did without pemberihauan.
Thanks to these measures, many facebooker who was troubled. Not only that, the new email delivery to mobile users rose up mess. However, it turns out you can also change the email addresses with ease. The following are the steps you have to do.
Access your Facebook timeline.
Go to About page
There, you will melinat Contact Info. There, you will see there an email with alamat@facebook.com. You can edit the address.
On the Contact Info page, you will be able to see two email addresses. You can choose to hide or display the email address in the timeline.
Unfortunately, you will not be able to delete the email from Facebook. However, you can change the name of the email as you wish. And, these changes can only be changed once.
sources by : http://www.beritateknologi.com
Monday, July 9, 2012
Ten Haram emblazoned on Facebook
Facebook, jejaring sosial terbesar di dunia, kini menjadi mesin pencarian identitas. Facebook, the world's largest social network, is now an identity search engine. Baik dari perusahaan, pengintai, maupun aparat hukum. Both of the companies, surveillance, and law enforcement agencies. Tak lupa peretas yang ingin membuat identitas palsu. Do not forget to hackers who want to create a false identity. Wahai pemilik akun di jejaring besutan Mark Zuckerberg, perhatikan 10 hal terlarang untuk muncul di Facebook. Dear owner of the account on the website made by Mark Zuckerberg, watch 10 things forbidden to appear on Facebook. 1. A. Tanggal lahir Date of birth Mengungkap tanggal lahir itu berbahaya. Uncover the date of birth is dangerous. Sebab institusi keuangan biasanya membutuhkan informasi tanggal lahir untuk kartu kredit atau pernyataan di bank. For financial institutions usually require date of birth information for a credit card or bank statement. Membiarkan tanggal lahir terlihat, sama saja membuka pintu untuk pencurian identitas. Letting date of birth shown, the same open door to identity theft. 2. 2. Nama tengah Ibu Mother's middle name Ingat banyak situs yang menggunakan jawaban nama tengah sebagai pertanyaan keamanan untuk mengingat kata kunci. Remember a lot of sites that use the middle name as an answer security questions to remember the key word. Waspadalah apa yang anda tulis tentang Ibu di dunia maya Beware of what you wrote about my mother in cyberspace 3.Alamat rumah 3.Alamat home Tidak perlu membagi informasi ini dengan teman, kenalan atau mantan rekan kerja. No need to share this information with friends, acquaintances or former coworkers. Pencuri sekarang juga tahu cara menggunakan Facebook. Thieves now know how to use Facebook. Apalagi jika Anda menulis status sedang bepergian sekeluarga, sudah tinggal tunggu masa saja isi rumah dikuras si penjahat ini. Especially if you write a status're traveling as a family, it's just wait for the house just drained the contents of these criminals. 4. 4. Status pergi dari rumah dalam waktu lama Status away from home for long periods Menulis status pergi dari rumah dalam jangka waktu lama berarti mengumbar informasi kepada dunia maya bahwa rumah Anda kosong. Write status away from home in the long term mean spit to the virtual world of information that your house is empty. Jika Anda memang harus mempublikasikan status ini, maka bisa ditambahkan bahwa ada penjaga, anjing atau alarm pencuri di rumah. If you do have to publish this status, it may be added that there is a guard, a dog or a burglar alarm at home. 5. 5. Status pergi dari rumah dalam waktu singkat Status away from home in no time Meski cuman singkat, kalau Anda terus-terusan menulis check-in di tempat yang berada di luar rumah, pencuri tentu awas kalau kediaman Anda kosong. Cuman though brief, if you keep writing the check-in at a place outside the house, the thief would alert you when the residence is empty. 6. 6. Foto tak sopan Photo disrespectful Anda mungkin sudah membaca bahwa ada orang yang kehilangan pekerjaan karena mereka bersikap rasis atau menampilkan foto yang tak sopan di dunia maya. You may have read that there are people who lost their jobs because they are being racist or offensive showing photos in cyberspace. Jadi jangan lakukan! So do not do it! 7. 7. Mengeluh atau marah Complaining or angry Jangan bilang ke Facebook atau Twitter jika Anda marah kepada bos, mengaku mabuk, dan memiliki obat-obatan terlarang. Do not tell me to Facebook or Twitter if you are angry with the boss, admitted being drunk and had illegal drugs. Atau mengaku pura-pura sakit. Or malingering claims. Screenshoot status Anda bisa jadi bukti yang membahayakan reputasi, klien dan nasib profesi. Screenshot of your status may be evidence that harm the reputation, the client and the fate of the profession. Di Singapura, bahkan remaja yang menulis status berbau rasis bisa ditangkap. In Singapore, even the teenager who wrote the racist status could be arrested. Di bawah UU Penghasutan, siapa pun yang terbukti bersalah menyebarluaskan kebencian antar ras atau kelas dalam populasi di Singapura dapat di denda 5 ribu dolar Singapura (Rp 37 juta) dan penjara maksimal tiga tahun. Under the sedition law, anyone found guilty of spreading hatred between races or classes of the population in Singapore can be fined five thousand Singapore dollars (USD 37 million) and a maximum of three years in prison. 8. 8. Nomor telepon Phone number Memasang nomer telepon, maka dipastikan Anda akan dihubungi banyak telemarketer, pengintai dan temannya teman yang sok kenal. Installing a phone number, then certainly you will be contacted by a lot of telemarketers, scouts and friends of friends who know tomorrow. 9. 9. Status hitung mundur jelang liburan Countdown status ahead of holiday Lebih baik menulis status setelah liburan. Better to write status after the holidays. Sebab kalau sebelum liburan beresiko diketahui penjahat yang sudah siap menguras isi rumah Anda selagi kosong. For if before the holidays are at risk are known criminals who are ready to drain the contents of your home while empty. 10. 10. Foto interior rumah Interior photo Mengunggah foto isi rumah Anda menjadi jalan mulus pencuri untuk menilai perabot yang Anda miliki. Upload a photo of your house contents into a smooth road thieves to assess the furniture you have
sources by:http://id.berita.yahoo.com/
Subscribe to:
Comments (Atom)








