Wednesday, December 10, 2008

The Evolution of Spam


The Evolution of Spam
In the beginning

Spam (unsolicited bulk advertising via email) made its first appearance in the mid 1990s, i.e. as soon as enough people were using email to make this a cost-effective form of advertising. By 1997, spam was regarded as being a problem, and the first Real-Time Black List (RBL) appeared in the same year.

Spammer techniques have evolved in response to the appearance of more and better filters. As soon as security firms develop effective filters, spammers change their tactics to avoid the new spam blockers. And this leads to a vicious circle, with spammers re-investing profits into developing new techniques to evade new spam filters. The situation is spiralling out of control.
The development of spammer techniques
Direct mailing

Initially, spam was sent directly to users. In fact, spammers didn't even need to disguise the sender information. This early spam was easy enough to block: if you black listed specific sender or IP addresses, you were safe. In response, spammers began spoofing sender addresses and forging other technical information.
Open Relay

In the mid-1990s all email servers were open relay - any sender could send an email to any recipient. Spam and other security issues led administrators to start reconfiguring mail servers worldwide. However, the process was relatively slow, and not all mail server owners and administrators were willing to cooperate. Once the process was well underway, security analysts began scanning for the remaining open relay mail servers. These DNS RBLs were made available, making it possible for,security conscious administrators to block incoming mail from listed servers. However, open relay servers are still used for mass mailing.
Modem Pool

As soon as sending spam via open relay became less efficient, spammers began to use dial up connections. They exploited the way in which ISP providers structured dial up services and utilized weaknesses in the system:

* As a rule, ISP mail servers forward incoming mail from clients.
* Dial-up connections are supported by dynamic IP addresses. Spammers can therefore use a new IP address for every mailing session.

In answer to spammer exploitation, ISP providers began to limit the number of emails a user could send in any one session. Lists of suspect dial-up addresses and filters which blocked mail from these addresses appeared on the Internet.
Proxy servers

The new century saw spammers switching to high-speed Internet connections and exploiting hardware vulnerabilities. Cable and ADSL connections allowed spammers to send mass mailing cheaply and quickly. In addition, spammers rapidly discovered that many ADSL modems had built-in socks servers or http proxy servers. Both are simply utilites that divide an Internet channel between multiple computers. The important feature was that anybody from anywhere in the world could access these servers since they had no protection at all. In other words, malicious users could use other people's ADSL connections to do whatever they pleased, including, naturally, sending spam. Moreover, the spam would look as if it had been sent from the victim's IP address. Since millions of people worldwide had these connections, spammers had a field day until hardware manufacturers began securing their equipment.
Zombie or bot networks

In 2003 and 2004 spammers sent the majority of mailing from machines belonging to unsuspecting users. Spammers use malware to install Trojans on users' machines, leaving them open to remote use. Methods used to penetrate victim machines include:

* Trojan droppers and downloaders injected into pirate software which is distributed via file sharing P2P networks (Kazaa, eDonkey etc.).
* Exploiting vulnerabilities in MS Windows and popular applications such as IE & Outlook.
* Email worms

Anyone who has the client part of a program which controls the Trojan that has infected a victim machine controls the machine or network of victim machines. The resulting networks are called bot networks, and are sold and traded among spammers.

Analysts estimate that Trojans are installed on millions of machines worldwide. Modern Trojans are sophisticated enough to download new versions of themselves, download and execute commands from specified websites or IRC channels, send out spam, conduct DDoS attack and much more.
The development of spam content
Content Analysis

Many spam filters work by analysing the content of a message: the message subject, body, and attachments. Spammers today expend significant resources on developing content which will evade content filters.
Simple text and HTML

Originally, spam was simple: identical messages were sent to everyone on a mailing list. These emails were laughably easy to filter out due to the quantity of identical texts.
Personalised mail

Spammers then began to include a greeting based on the recipient's address. Since every message now contained a personalised greeting, filters which blocked identical messages did not detect this type of spam. Security experts developed filters that identified unchanging lines, which would then be added to filtration rules. They also developed fuzzy signature matching, which would detect text which only had minor changes, and statistic based self-modifying filtration technologies such as Bayesian filters.
Random text strings and invisible text

Spammers now often place either text strings from legitimate business emails, or random text strings at the beginning or end of emails in order to evade content filters. Another method used to evade filters is to include invisible text in HTML-format emails: the text is either too tiny to see or the font color matches the background.

Both methods are fairly successful against content and statistical filters. Analysts responded by developing search engines that scanned emails for such typical texts, which also conducted detailed HTML analysis and sophisticated content analysis. Many antispam solutions were able to detect such tricks without even analysing the content of individual emails in detail.
Graphics

Sending spam in graphics format makes it very hard to detect. Analysts are developing methods for extracting and analyzing text contained in graphics files.
Paraphrasing texts

A single advertisement can be endlessly rephrased, making each individual message appear to be a legitimate email. As a result, antispam filters have to be configured using a large number of samples before such messages can be detected as spam.
Summary

Currently, spammers usually use the last three methods in a variety of combinations. Many antispam solutions are incapable of detecting all three. As long as spamming remains profitable, users with poor-quality antispam software will continue to find their mailboxes clogged with advertising.

Contemporary Spammer Technologies


Spammers use dedicated programs and technologies to generate and transmit the billions of spam emails which are sent every day. This requires significant investment of both time and money.

Spammer activity can be broken down into the following steps:

1. Collecting and verifying recipient addresses; sorting the addresses into target groups
2. Creating platforms for mass mailing (servers and/or individual computers)
3. Writing mass mailing programs
4. Marketing spammer services
5. Developing texts for specific campaigns
6. Sending spam

Each step in the process is carried out independently of the others.
Creating address databases
Collecting and verifying addresses; creating address lists

The first step in running a spammer business is creating an email database. Entries do not only consist of email addresses; each entry may contain additional information such as geographical location, sphere of activity (for corporate entries) or interests (for personal entries). A database may contain addresses from specific mail providers, such as Yandex, Hotmail, AOL etc. or from on-line services such as PayPal or eBay.

There are a number of methods spammers typically use to collecting addresses:

* Spoofing addresses using common combinations of words and numbers - john@, destroyer@, alex-2@
* Spoofing addresses by analogy - if there is a verified joe.user@yahoo.com , then it's reasonable to search for a joe.user@hotmail.com, @aol.com etc.
* Scanning public resources including web sites, forums, chat rooms, Whois databases, Usenet News and so forth for word combinations (i.e. word1@word2.word.3, with word3 being a top-level domain such as .com or .info)
* Stealing databases from web services, ISPs etc.
* Stealing users' personal data using Trojans

Topical databases are usually created using the third method, since public resources often contain information about user preferences along with personal information such as gender, age etc. Stolen databases from web services and ISPs may also include such information, enabling spammers to further personalize and target their mailings.

Stealing personal data such as mail client address books is a recent innovation, but is proving to be highly effective, as the majority of addresses will be active. Unfortunately, recent virus epidemics have demonstrated that there are still a great many systems without adequate antivirus protection; this method will continue to be successfully used until the vast majority of systems have been adequately secured.
Address verification

Once email databases have been created, the addresses need to be verified before they can be sold or used for mass mailing. Spammers send a variety of trial messages to check that addresses are active and that email messages are being read.

1. Initial test mailing. A test message with a random text which is designed to evade spam filters is sent to the entire address list. The mail server logs are analysed for active and defunct addresses and the database is cleaned accordingly.
2. Once addresses have been verified, a second message is often sent to check whether recipients are reading messages. For instance, the message may contain a link to a picture on a designated web server. Once the message is opened, the picture is downloaded automatically and the web site will log the address as active. Most email clients no longer download pictures automatically, so this method is on the wane.
3. A more successful method of verifying if an address is active is a social engineering technique. Most end users know that they have the right to unsubscribe from unsolicited and/or unwanted mailings. Spammers take advantage of this by sending messages with an 'unsubscribe' button. Users click on the unsubscribe link and a message purportedly unsubscribing the user is sent. Instead, the spammer receives confirmation that the address in question is not only valid but that the user is active.

However, none of these methods are foolproof and any spammer database will always contain a large number of inactive addresses.
Creating platforms for mass mailing

Today's spammers use one of these three mass mailing methods:

1. Direct mailing from rented servers
2. Using open relays and open proxies - servers which have been poorly configured, and are therefore freely accessible
3. Bot networks - networks of zombie machines infected with malware, usually a Trojan, which allow spammers to use the infected machines as platforms for mass mailings without the knowledge or consent of the owner..

Renting servers is problematic, since antispam organizations monitor mass mailings and are quick to add servers to black lists. Most ISPs and antispam solutions use black lists as one method to identify spam: this means that once a server has been blacklisted, it can no longer be used by spammers.

Using open relay and open proxy servers is also time consuming and costly. First spammers need to write and maintain robots that search the Internet for vulnerable servers. Then the servers need to be penetrated. However, very often, after a few successful mailings, these servers will also be detected and blacklisted.

As a result, today most spammers prefer to create or purchase bot networks. Professional virus writers use a variety of methods to create and maintain these networks:

1. Exploiting vulnerabilities in Internet browsers, primarily MS Internet Explorer. There are number of browser vulnerabilities in browsers which make it possible to penetrate a computer from a site being viewed by the machine's user. Virus writers exploit such holes and write Trojans and other malware to penetrate victim machines, giving malware owners full access to, and control over, these infected machines.
For instance, porn sites and other frequently visited semi-legal sites are often infested with such malicious programs. In 2004 a large number of sites running under MS IIS were penetrated and infected with Trojans. These Trojans then attacked the machines of users who believed that these sites were safe.
2. Using email worms and exploiting vulnerabilities in MS Windows services to distribute and install Trojans:
1. Most recent virus outbreaks have been caused by blended threats, which included installation of a backdoor on infected machines. In fact, nearly all email worms have a Trojan payload.
2. MS Windows systems are inherently vulnerable, and hackers and virus writers are always ready to exploit this. Independent tests have demonstrated that a Windows XP system without either a firewall and antivirus software attacked within approximately 20 minutes of being connected to the Internet.
3. Pirate software is also a favorite vehicle for spreading malicious code. Since these programs are often spread via file-sharing networks, such as Kazaa, eDonkey and others, the networks themselves are penetrated and even users who do not use pirate software will be at risk.

Spammer Software

An average mass mailing contains about a million messages. The objective is to send the maximum number of messages in the minimum possible time: there is a limited window of opportunity before antispam vendors update signature databases to deflect the latest types of spam.

Sending a large number of messages within a limited timeframe requires appropriate technology. There are a number of resources developed and used by professional spammers available. These programs need to be able to:

1. Send mail via a variety of channels including open relays and individual infected machines.
2. Create dynamic texts.
3. Spoof legitimate message headers
4. Track the validity of an email address database.
5. Detect whether individual messages are delivered or not and to resend them from alternate platforms if the original platform has been blacklisted.

These spammer applications are available as subscription services or as a stand alone application for a one-off fee.
Creating the message body

Today, antispam filters are sophisticated enough to instantly detect and block a large number of identical messages. Spammers therefore now make sure that mass mailings contain emails with almost identical content, with the texts being very slightly altered. They have developed a range of methods to mask the similiarity between messages in each mailing:

* Inclusion of random text strings, words or invisible text. This may be as simple as including a random string of words and/or characters or a real text from a real source at either the beginning or the end of the message body. An HTML message may contain invisible text - tiny fonts or text which is colored to match the background.
All of these tricks interfere with the fuzzy matching and Bayesian filtering methods used by antispam solutions. However, antispam developers have responded by developing quotation scanners, detailed analysis of HTML encoding and other techniques. In many cases spam filters simply detect that such tricks have been used in a message and automatically flag it as spam.
* Graphical spam. Sending text in graphics format hindered automatic text analysis for a period of time, though today a good antispam solution is able to detect and analyze incoming graphics
* Dynamic graphics. Spammers are now utilizing complicated graphics with extra information to evade antispam filters.
* Dynamic texts. The same text is rewritten in numerous ways so that it is necessary to compare a large number of samples before it will be possible to identify a group of messages as spam. This means that antispam filters can only be updated once most of the mailing has already reached its target.

A good spammer application will utilize all of the above methods, since different potential victims use different antispam filters. Using a variety of techniques ensures that a commercially viable number of messages will escape filtration and reach the intended recipients.
Marketing spammer services

Strangely enough, spammers advertise their services using spam. In fact, the advertising which spammers use to promote their services are a separate category of spam. Spammer-related spam also includes advertisements for spammer applications, bot networks and email address databases.
The structure of a spammer business

The steps listed above require a team of different specialists or outsourcing certain tasks. The spammers themselves, i.e. the people who run the business and collect money from clients, usually purchase or rent the applications and services they need to conduct mass mailings.

Spammers are divided into professional programmers and virus writers who develop and implement the software needed to send spam, and amateurs who may not be programmers or IT people, but simply want to make some easy money.
Future Trends

The spam market today is valued at approximately several hundred million dollars annually. How is this figure reached? Divide the number of messages detected every day by the number of messages in a standard mailing. Multiply the result by the average cost of a standard mailing: 30 billion (messages) divided by 1 million (messages) multiplied US $100 multiplied by 365 (days) gives us an estimated annual turnover of $1095 million.

Such a lucrative market encourages full-scale companies which run the entire business cycle in-house in a professional and cost-effective manner. There are also legal issues: collecting personal data and sending unsolicited correspondence is currently illegal in most countries of the world. However, the money is good enough to attract the interest of people who willing to take risks and potentially make a fat profit.

The spam industry is therefore likely to follow in the footsteps of other illegal activities: go underground and engage in a prolonged cyclic battle with law enforcement agencies.

Spam - What exactly is it?


Spam - What exactly is it?

In order to combat spam effectively it is necessary to define exactly what spam is.

Most people believe that spam is unsolicitied email. However, this definition is not entirely correct and confuses some types of legitimate business correspondence with true spam.

Spam is anonymous, unsolicited bulk email.

This is the description that is being used today in the USA and Europe as a basis for the creation of anti-spam legislation. Let's take a closer look at each component of the definition:

* Anonymous: real spam is sent with spoofed or harvested sender addresses to conceal the actual sender.
* Mass mailing: real spam is sent in mass quantities. Spammers make money from the small percentage of recipients that actually respond, so for spam to be cost-effective, the initial mails have to be high-volume.
* Unsolicited: mailing lists, newsletters and other advertising materials that end users have opted to receive may resemble spam but are actually legitimate mail. In other words, the same piece of mail can be classed as both spam and legitimate mail depending on whether or not the user elected to receive it.

It should be highlighted that the words 'advertising' and 'commercial' are not used to define spam.

Many spam messages are neither advertising nor any type of commercial proposition. In additon to offering goods and services, spam mailings can fall into the following categories:

* Political messages
* Quasi-charity appeals
* Financial scams
* Chain letters
* Fake spam being used to spread malware

Unsoliticited but legitimate messages

A legitimate commercial proposition, a charity appeal, an invitation addressed personally to an existing recipient or a newsletter can certainly be defined as unsolicited mail, but not as spam. Legitimate messages may also include delivery failure messages, misdirected messages, messages from system administrators or even messages from old friends who have previously not corresponded with the recipient by email. Unsolicited - yes. Unwanted - not necessarily.
How to deal with spam

Because unsolicited correspondence may be of interest to the recipient, a quality antispam solution should be able to distinguish between true spam (unsolicited, bulk mailing) and unsolicited correspondence. This kind of mail should be flagged as 'possible spam' so it can be reviewed or deleted at the recipient's convenience.

Companies should have a spam policy, with system administrators assessing the needs of different departments. Access to different unsolicited mail folders should be given to different user groups based on this assessment. For instance, the travel manager may well want to read travel ads, whereas the HR department may wish to see all invitations to seminars and training sessions.

Wednesday, December 3, 2008

Menghadapi Tuntutan Teknologi "Generasi Y"

Menghadapi Tuntutan Teknologi "Generasi Y"

CITRIX
Yaj Malik, Area Vice President, Citrix Systems, ASEAN

Kamis, 27 November 2008 | 06:03 WIB
Oleh Yaj Malik,
Area Vice President, Citrix Systems, ASEAN

DAPAT dipastikan semua orang pernah membaca tentang Generasi Y (Gen Y). Bisa dikatakan mereka seakan mendominasi hampir semua jenis lapangan pekerjaan yang ada di dunia dan mereka dikenal sebagai generasi yang mampu membuat para pemimpin bisnis dan eksekutif tercengang akan semangat dan kemampuan berkreasi mereka miliki.

Akibat dari segala bentuk kreatifitas baru, cara perfikir yang berbeda, bakat tinggi serta tingkah laku mereka yang sudah demikian maju dan berani, Gen Y otomatis membutuhkan cara-cara melakukan bisnis dan pekerjaan yang juga berbeda dari cara tradisional.

Namun, sebelum saya menguraikan lebih jauh mengenai kebutuhan Gen Y di tempat kerja, lebih dulu saya ingin menjelaskan siapa saja yang termasuk Gen Y, atau yang juga dikenal sebagai Generasi Digital, ‘Echo Boomers’ atau Generasi Millennium.

Kelompok Gen Y adalah mereka yang berusia antara 13 hingga 29 tahun atau biasa disebut anak-anak yang lahir di jaman 'digital'. Mereka tidak mengenal yang namanya telepon putar dan bagi mereka tidak terbayangkan bagaimana orang berkomunikasi sebelum ada yang namanya pesan instan, SMS, e-mail atau Facebook.

Saat ini tercatat sebanyak 66 persen Generasi Millennium secara rutin mengakses Facebook atau MySpace, dan hampir 75 persen dari generasi ini melakukan sendiri berbagai kebutuhan Teknologi Informasi (TI) mereka, mulai dari men-down-load hingga meng-instal sendiri berbagai software yang diinginkan untuk komputer mereka.

Gen Y cenderung bersikap mandiri, sangat visual dan tidak sabaran terhadap hal-hal yang tidak sesuai dengan selera dan kepribadian mereka yang unik. Misalnya saja jika mereka tidak suka dengan aplikasi yang disediakan oleh tempat kerja mereka, mereka akan mencari sendiri aplikasi lain yang mereka inginkan dari website. Jika tidak puas dengan komputer (PC) yang disediakan kantor, mereka akan membawa laptop kepunyaan mereka sendiri untuk bekerja tanpa peduli dengan aturan dan kebijakan keamanan data yang diterapkan di kantor mereka. Ini adalah hal yang oleh orang-orang departemen TI sangat ditakutkan dari generasi ini, meskipun sebenarnya ketakutan tersebut tidak beralasan.

Terdapat 72 juta atau sekitar 30 persen dari populasi Gen Y yang kini telah memasuki dunia kerja. Penggunaan teknologi canggih secara pribadi, serta tendensi alami yang mengaburkan batasan antara kebutuhan TI di lingkungan kerja dan kebutuhan pribadi akan menjadi tantangan sendiri bagi orang-orang TI di perusahaan, karena Gen Y dapat mengancam cara-cara lama yang telah digunakan mereka.

Banyak departemen TI perusahaan yang telah mengimplementasikan kebijakan tradisional dan standar aplikasi serta OS dengan variasi yang kurang beragam karena dua alasan utama yaitu, menjaga keamanan data serta kontrol biaya. Di lain pihak, Gen Y akan melakukan berbagai perubahan TI di kantor demi memenuhi kesenangan dan kenyamanan mereka. Menurut Gartner, sekarang makin banyak karyawan yang lebih memilih menggunakan laptop pribadi mereka di tempat kerja, atau dikenal dengan istilah "BYOPC" (Build Your Own PC).

Menurut hemat saya, sebenarnya ini adalah sesuatu yang sangat alami, karena anak-anak Gen Y menggunakan teknologi untuk hampir semua aktifitas dan komunikasi mereka sehari-hari. Mereka jadi lebih memilih cara mereka sendiri, dan tuntutan agar mereka tetap menggunakan standar tradisional akan berimbas buruk pada kinerja dan produktivitas mereka.

Untuk mengakomodasi kebutuhan karyawan yang berasal dari kelompok Gen Y, saya melihat adanya kebutuhan untuk melakukan perubahan dari kebijakan TI perusahaan yang kaku ke sistem yang lebih fleksibel dan dapat disesuaikan dengan kebutuhan setiap karyawan. Untuk itu dibutuhkan teknologi dan strategi 'pintar' yang mendukung kedua kepentingan yaitu aplikasi data untuk perusahaan dan kebutuhan pribadi.

Jadi, konsep utamanya adalah 'ketersediaan' karena Generasi Millennium menuntut semua aplikasi tersedia sesegera mungkin, aman dan berkinerja tinggi. Jika perusahaan melakukan strategi pintar tersebut, maka departemen TI dapat melakukan keseimbangan antara keamanan data perusahaan sekaligus memuaskan kebutuhan para Generasi Millennium.

Citrix misalnya telah mengeluarkan seperangkat produk dengan formasi 'Citrix Delivery Centre' yang memungkin fleksibilitas sebagaimana yang diinginkan Generasi Millennium. Dengan strategi penyediaan yang pintar, teknologi ini mampu menjaga keamanan data dan aplikasi yang digunakan untuk perangkat komputer pribadi seperti laptop melalui pemisahan antara perangkat lunak dan keras; kebutuhan desktop dapat disediakan dengan aman; tingkat keamanan yang lebih tinggi untuk berbagai aplikasi Web dan Windows; instalasi yang dapat dilakukan dengan cepat; dan yang terpenting adalah kemampuannya dalam menjaga data-data penting perusahaan yang sensitif melalui pertahanan kuat yang sudah tersedia (built-in) untuk menghadapi berbagai ancaman keamanan.

Intinya, demi menjaga kepuasan semua karyawan dalam perusahaan yang dating dari generasi yang berbeda-beda, perusahaan bersama departemen TI perlu melakukan fleksibilitas dalam menyediakan kebutuhan teknologi mereka; namun karena dibutuhkan biaya yang besar akan menyulitkan perusahaan untuk memenuhi setiap kebutuhan. Untuk itu sangat penting untuk membuka mata dalam mencari solusi dan strategi pintar menghadapi serbuan Gen Y.


Share on Facebook A A A

Wednesday, November 19, 2008

Restoration

Restoration
file undelete utility

Our Rating: 3.5 stars (Good!)

Restoration is an easy to use and straight forward tool to undelete files that were removed from the recycle bin or directly deleted from within Windows, and we were also able to recover photos from a Flash card that had been formatted. Upon start, you can scan for all files that may be recovered and also limit the results by entering a search term or extension. In addition, it also provides the option to wipe the found files beyond simple recovery. The program is small and standalone, it does not require installation and can also run from a Floppy disk. Restoration works with FAT and NTFS as well as digital cameras cards.

Pros: Standalone, no install needed

Cons: Limited recovery capabilities works with many but not all deleted files; simple interface lack user friendly features
Download Restoration
Freeware

4 Tools Gratis Mengembalikan File yang Terhapus

Tips & Tricks
4 Tools Gratis Mengembalikan File yang Terhapus
Dewi Widya Ningrum - detikinet

Tombol delete di keyboard (ist.)

Jakarta - Pernah menghapus file-file penting di komputer tanpa disengaja? Kasus seperti ini mungkin pernah menimpa Anda, terkadang terjadi karena kita tengah terburu-buru atau dikejar waktu.

Namun jangan khawatir, Anda bisa menggunakan tools khusus untuk mengembalikan file-file tadi. Berikut ini ada 4 tools yang bisa Anda gunakan untuk mengembalikan file yang terhapus. Tools ini dapat di-download secara gratis di internet.

1. Undelete Plus
Di antara aplikasi-aplikasi gratis yang beredar di luaran untuk mengembalikan file yang terhapus, Undelete Plus salah satu yang dapat digunakan. User interface-nya (antar muka) tergolong sangat simpel. Anda dapat mengembalikan file-file yang terhapus dengan mudah sesuai dengan tipe file, misalnya Application, GIF graphics, HTML Documents, PDF.

Tools ini beroperasi pada sistem operasi Windows 95, Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP, Windows 2003 dan Windows Vista. Anda dapat men-download Undelete Plus di: http://www.undelete-plus.com/

2. Restoration
Restoration adalah salah satu aplikasi untuk mengembalikan file yang terhapus. Tools ini juga sangat mudah digunakan dan tidak perlu diinstal di komputer. Cukup download toolsnya di: http://www.snapfiles.com/get/restoration.html, lalu jalankan file executable-nya untuk mengembalikan file yang terhapus.

3. PC Inspector File Recovery
Meski user interface PC inspector File Recovery tidak begitu user friendly, aplikasi ini tergolong sangat ampuh untuk mendeteksi dan mengembalikan file yang terhapus. Sesudah dilakukan proses scanning, akan tersaji file-file yang terhapus dalam folder dengan struktur pohon (tree structure) untuk mempermudah pencarian. Dengan begitu, Anda dengan mudah dapat mencari dan memilih file/folder yang terhapus, lalu klik icon "save" untuk mengembalikan file. Tools ini dapat di-download di: http://www.pcinspector.de/Sites/file_recovery/info.htm?language=1

4. Recuva
Recuva sering disebut juga sebagai "Recover". User interface-nya sangat sederhana. Pada mode basic, tools ini akan menampilkan daftar file-file yang terhapus yang bisa dikembalikan. Jika Anda menggantinya ke mode advanced, maka proses scanning ulang akan dilakukan dan muncul pilihan untuk menampilkan informasi berisi daftar file-file yang terhapus. Tools ini dapat di-download di: http://www.recuva.com/ ( dwn / dwn )

Thursday, November 6, 2008

Intel Core i7

Intel Siap Luncurkan Core i7
Kamis, 6 November 2008 - 18:17 wib
text TEXT SIZE :
Stefanus Yugo Hindarto - Okezone
(Foto: Ist)

SAN FRANSISCO - Perusahaan pembuat prosesor asal Amerika Serikat, Intel bakal meluncurkan prosesor generasi Nehalem, Core i7. Prosesor yang ditargetkan untuk komputer desktop high-end tersebut rencananya bakal diluncurkan 17 November mendatang.

Seperti dilansir PC World, Kamis (6/11/2008) Core i7 memiliki kecepatan 2.66 GHz hingga 3.20 GHz. Intel rencananya akan meluncurkan beberapa jenis prosesor, antara lain Core i7 920, 940 dan 965 dengan kecepatan masing-masing 2.66 GHz, 2.93 GHz, dan 3.2 GHz.

Sementara itu, harga yang ditawarkan untuk prosesor yang diklaim tercepat itu rata-rata berada pada USD1.000. Core i7 920 dibanderol dengan harga USD329, i7 940 dibanderol USD639 sedangkan i7 965 ditawarkan USD 1.149

Nehalem merupakan chip prosesor upgrade dari intel Core 2 yang telah digunakan di laptop dan desktop. Diperkirakan pada 2009 Core i7 bakal menjangkau seluruh pengguna komputer dunia. Prosesor generasi Nehalem juga akan menggunakan teknologi QuickPath Interconnect (QPI) yang terintegrasi dengan controller memori.
(srn)