Pray For MH370

Pray For MH370


Pejabat yang terletak di 2A, Jln. Bayu Tinggi 8/KS6, Batu Unjur,Klang, Selangor telah dipecah masuk pada malam Jumaat lepas 21Hb Mac 2009 dan insident disedari oleh Pembantu beliau Sarah Devaraj pada pagi Sabtu 23 Mac 2009.

Kerugian dianggarkan sekitar RM15 ribu sahaja dari kerosakan yang berlaku kepada sistem pintu eletronik. Dua Sistem komputer telah hilang. Perbuatan ini mungkin dilakukan oleh PRO kerana pendawaian eletrik telah dipotong untuk melumpuhkan sistem pintu magnetik.

Laporan Selanjutnya di SINI

Comments :

Munawir Bin Haji Hassan said...

Every year about 400,000 computers are stolen in the United States. Only 3 percent are ever recovered. But after his sister's iMac was taken during a burglary, a Houston man was able to get it back using remote-control software, expert help from friends on the Net, a large dose of luck and some incredible naiveté on the thief's part.
In a story that is probably unique, R.D. Bridges recovered his sister's stolen iMac using Netopia's Timbuktu Pro, a program that allows computers to be remotely controlled and is widely used by computer-help technicians. Bridges, who lives in Clear Lake, a suburb of Houston, had installed the software to help his sister, who lives across town, when she ran into problems.
The iMac and a printer were stolen last October. Foolishly, the thief didn't erase the hard drive. When they connected to the Net, Timbuktu alerted Bridges the iMac was online.
Horrified his sister's résumé, tax files and other sensitive files were still on the hard drive, Bridges hoped to install a "suicide script" to erase everything. Using Timbuktu, he figured he could put a script into the Mac's startup folder, which would be automatically executed the next time the machine was turned on.
"My sister didn't want a crook going through all that stuff," Bridges said. "You know what it's like, you have tax returns, letters, your résumé, telephone numbers, addresses. There's so much personal and private stuff on your computer. You don’t want crooks going through all that and then paying a late-night call on your in-laws and friends."
For help, Bridges turned to a Usenet newsgroup, alt.comp.lang.applescript. AppleScript, the scripting software built into the Mac's OS, can be set up to perform all sorts of functions -- including trashing files.
Marc Myers, an AppleScript expert who runs, responded with a clever script that moved everything to the trash except the System Folder, emptied the trash and shut the machine down. Myer's "Death Script" excluded the System Folder because any attempt to erase it would prompt an error message, stopping the process in its tracks.
Shortly after Myer's script was posted to Usenet, Bridges was alerted that the iMac was online. He copied the script over and surreptitiously erased some of his sister's most sensitive files.
Unfortunately, the stolen iMac was connected using his sister's ISP, her login and password, which gave Bridges no identifying information about them at all -– no names, phone numbers, anything. He hoped maybe the police could get an IP address or phone number from the ISP, but he later found out the company didn't log incoming calls.
Starting to doubt he would track down the stolen machine, Bridges changed the startup screen –- the graphic displayed when the machine boots up -– to show a Jolly Roger branded with an Apple logo, and emblazoned with "Stolen iMac" in big yellow letters.
"I was kind of desperate at that point," he said. "I couldn't figure out where it was. They were using my sister's ISP."
A user on the Applescript newsgroup suggested writing another script to launch a pop-up reading, "You have won a special $500.00 prize. Your machine has run for 3,000 hours without a major problem!" The script would prompt for a name, address and phone number to redeem the prize.
But Bridges was skeptical. "It seemed kind of ambitious and also relied too heavily on them being both gullible and honest in their answers," he wrote.
Instead, he came up with the idea of a script instructing the iMac to call him or his sister. He would then get the thief's phone number from his Caller ID. "The advantage ... is it takes the human factor out of it," he wrote. "(I) don't have to rely on their greed to get the info.





Popular Posts


View My Stats

pautan lain

  • - Mesyuarat Agung Khas AMALNITA perihatin Pelancaran Tabung PDS AMALNITA dan anda
    2 years ago
  • "Paciaru" atau breakfast. - Yb Meru bersama Mr.Maniam turun padang memantau jalan2 berlubang di susur keluar highway Setia Alam ke Jln Meru dan Jln Korporat Kawasan Meru ...
    2 years ago

Ab myspace graphic comments



Recent Comment



Search in the Quran
Download | Free Code