Sunday, December 30, 2007

VirtualDub Auto Shutdown

The VirtualDub free software is very powerful video editing application. I love to use this application but fortunately VirtualDub doesn't include any shutdown function after convert or processing video editing finished.

Sometimes when the process take along time (over 2 or 3 hours) and I can't waiting the process to be complete, so I need to make my computer turn off automatically when the the process is finish.

I tried to find it on google, how to make my computer turn off after finish processing of VirtualDub and I found it the way to shutdown computer using filter within VirtualDub:
http://neuron2.net/shutdown/shutdown.html

I have another easy way to make computer turn off (shutdown) after the VirtualDub finish the processing without any special program or filter (add-in) to be installed on VirtualDub program.

I made batch script to do this automate computer turn off (shutdown):

Save this file autoshut.bat on the VirtualDub program folder location, usually c:\Program Files\VirtualDub (where is the program VirtualDub.exe exist)

Next step is, make shortcut on your desktop to autoshut.bat script or just running this batch script with windows explore.
The VirtualDub program will be lunch and you can prepare the video process (convertion) and make it all process into batch mode processing within VirtualDub application.
How to operate batch processing within VirtualDub, please read the manual or browse the google :-)


Make sure the Options-Shutdown when finished is selected.
Press Start button when you are ready to process the Jobs.
When the process finish, the VirtualDub program will be closed and next command shutdown -s -t 60 -f will be running.

Have a nice try this trick and even you can customize this script to send you message (net send) or sending you email using BLAT command line after the VirtualDub application closed.

Sunday, December 23, 2007

PayPal Hack - My PayPal Got Hacked And How I Got it Back

By Karthik Arun

This is a story about how my PayPal account got hacked and how I got it back. I had an unlucky day but with a little tinge of lady luck's blessings which helped me to get back to square one. This story gives a good advice for all the PayPal account holders on earth.

Day 1 - 8.30 PM IST

I just logged in into my gmail account to check the emails, I was shocked to see 4 emails from PayPal. 1. Password Changed, 2. Payment sent to some email address 3. Bank accounts removed 4. Primary email address changed. Oh my God!, I had $X,XXX in PayPal balance. While I was seeing these emails my gmail also got logged out. When I tried to login again, it did not. The hacker watched my every move. My primary email ID was the one which I used for all my business and personal contacts and it had 14000 archived emails and chat conversations.

I was feeling like blindfolded and left in a unknown forest. I just could not believe that this had happened to me. I had Norton anti virus + norton internet security and Spyware doctor, both of them licensed versions!! I know all about fake emails and phishing stuffs, I never clicked on suspicious links.

I realized that... "You are safe only if no one targets to attack you."

After a few minutes, someone added me to Yahoo messenger and said 'Hi'. I guessed that it was the hacker and it was. The very first sentence he told me was 'Hi, don't worry, you will get back everything within 7 days' .. He told me that he was a good guy and this is the first time he hacked someone. He also told me that he was in real need of the funds and would return my funds within 7 days. I almost believed him. I told him to give back my gmail account and told him that it was very important to me, and to my surprise he gave it back. He asked me what password I needed for the new account and he set it. I logged in and changed the password again. I was happy that I got back my gmail but was still very uncomfortable about the feeling that someone had watched me for so long!!

I was late in the night, I was sleepy but I had to hold on. I backed up all my files in my iPod and did a system recovery. After 45 minutes, my PC was as good as new. I again changed all the passwords and got back to sleep at midnight.

Day 2 - 6.00 AM IST

I saw my friend was online. I chatted with him and told him the entire story. He scolded me that I have not responded in timely fashion. He was so sure that the hacker was no good and chatted with me to make sure I don't call PayPal. The hacker did not achieve that but however he delayed me by 10 hours. I spent nearly 30 minutes waiting for PayPal representative and then some one showed up. I told PayPal, the entire story and they listened carefully. They assured me that 'I will not be held responsible for unauthorized payments sent from my account'. I felt good but not very good, I was not so sure that I would get back the money. I did what I could have done and I needed to relax. I took rest from this issue.

Day 3 - 7 PM EST

I called PayPal again. It needs a ton of patience to get connected with them. It took a few minutes to spot my account. They told me that "Your fraudulent payments were reversed, did you check your account". I just jumped right there and was so happy. But I COULD NOT LOGIN into my PayPal because the password was not with me! :(

I was not able to reset my password because the hacker also changed the security questions! They advised me to send all the documents and they will help to recover the password.

After a few minutes the hacker came online again. And LOL what nerves he got!!.. He asked me to send the documents to him because he said my account got limited and needs to be unlocked!! I refrained myself from talking abusive words and just managed the situation and logged out.

Day 4 - 6 PM EST

I logged in into yahoo messenger and I saw that the hacker had left me an offline message. Wow! he got frustrated I guess. He left me the PayPal email and password. I logged in and viola! I went inside my PP. Lovely moment it was.. The balance was intact. The four fraudulent payments were reversed. The account was limited though. I just printed the fax cover sheet and sent them the docs.

Day 4 - 3 PM IST

I got an email that my PayPal account has been restored. I immediately went in and sent 4 big payments to my friends and family members. I could breathe now again!

Now whats next?.. everything is back to square one! Now that I have learnt a good lesson. If we think something like "This can never happen to me" you actually attract that situation and within a few days you realize it... the dream comes true.. even though its a bad dream in this case.

I contacted me friends and everyone told me that I need to kick out Norton and Spyware Doctor and buy Kaspersky because thats what is best in the market. I went to that site and reviewed their products. They had anti virus and Internet Security 7.0. The anti virus comes inbuilt within Internet Security and hence its enough to buy the latter one. For one year it costs around $60 and for 2 years its around $95. I just bought it right away and installed it, activated it. Again I changed all my important passwords.

Bottom line: If you think it wont happen to you, one day it will happen, and you will think about the day when you thought that it won't happen to you.

Now that I got my money back, but it may not happen all the time to all the people. You just need to be on top of it.

Good Luck!

Reference: My PayPal Got Hacked And How I Got it Back

Top Computer Virus Threats in 2008

Computer Virus threats are neither surprising nor new on the Web. They are stepping towards newer technologies such as VoIP and instant messengers. With advancement in the features available on the Internet, hackers continue to drive malware. This underlines an importance of being aware and secure when traversing the Web. Antivirus Installation is must in each and every computer attached to Internet.

Predictions for top security threats in 2008 are:

• Increase in Password Staling Websites: There will certainly be a rise in the number of attacks seeking to capture a user's ID and password by displaying fake sign-in pages. Online services will primarily be targeted to spread virus and malware. As opposed to this, the attacks on ISPs are likely to decline, while those aimed at the financial sector will move with the same pace.

• Increase in Spamming: Spamming will continue to grow, accounting for 40 per cent of the total spam received as compared to 10 per cent a year ago. There has been a significant rise in the incidence of image spam and others such as pump-and-dump stocks, pharmacy, and degree spam.

• Increase in IM Attacks: Instant messaging client is gaining wide popularity among Internet-savvy. They are always in search of better messengers to communicate on the web. Since instant messengers feature a number of exclusive features such as file transfer & webcam support, the virus attacks on these applications may increase in near future.

• Increase in Online Gaming Attacks: Online gaming is both the source of entertainment and money for several companies which allow their registered members to buy virtual goods to continue the game. The computer virus attackers may try to target these virtual goods to make real money.

• Increase in Windows Vista Attacks: The attackers and hackers generally seek to take advantage of flaws present in the operating systems. Since Windows Vista, the latest version of Microsoft Windows is believed to be affected by critical vulnerabilities, the hackers may try to inject virus into the affected systems.

• Increase in Phishing Attacks: Phishing attacks are expected to be one of the top 10 threats in 2008. With growth in number of incidence of using copies of original websites to trick the users to get their sensitive data, the phishing attacks can increase.

Reference: Top Computer Virus Threats in 2008

Friday, December 21, 2007

Be better than James Bond 007

In Casino Royale, Bond chooses a password to protect a multi-million pound money transfer. What does he choose? His girlfriend's name - doh! Why bother torturing him when you could just guess his cunning plans? We can all do better than that. For most situations a password should be 8 characters long and be a mixture of letters, numbers and other characters and it should conform to company policy. It should not be a word you would find in a dictionary, the name of your spouse, partner, child, pet, favorite band or any of these followed by a single digit. Use common sense - Razorlight1 isn't a good choice if you have a poster of the band behind your desk.

Reference: www.sans.org

Make your password long

At least eight characters long, and the longer the better. Passwords shorter than 8 characters are easy to crack. Follow these password rules. Avoid common words and proper names. Use both uppercase and lowercase letters, numbers, and symbols. Trouble is, who can remember a password like Fm79$#Xk? Try a passphrase instead: When I was 7, my dog Dolly went to Heaven. This contains 42 easy-to-remember characters, follows all the rules, and is in plain English. (Not every system will accept passphrases; when in doubt, try it out.) The odds against anyone cracking it even with the help of a supercomputer are astronomical. Make your passphrase original. Don't use familiar or famous quotations. Don't use any real names especially your own, your family members, or your pets. Nonsensical passphrases are the hardest to crack.

Reference: www.sans.org

Thursday, December 20, 2007

Great Bus Design


Reference: Great Bus Design

Fake Dog Picture :-)

Reference: Fake Dog

Youtube Costume Joke



Reference: Youtube Costume Joke

PRESIDENT

Nixon: Watergate
Clinton: Waterbed

The President`s biggest fear....
Nixon: The Cold War
Clinton: The Cold Sore

Complaints toward the President.....
Nixon: Carpet-Bombing
Clinton: Carpet-Burns

Their Vice-Presidents...
Nixon: His was Greek
Clinton: His is a Geek

Presidential qualities.....
Nixon: Couldn`t stop Kissinger
Clinton: Couldn`t stop kissing her

Things the President couldn`t explain....
Nixon: The missing 18-minutes on the tapes
Clinton: The 36D bra in his briefcase

Presidential Nicknames....
Nixon: Tricky Dick
Clinton: Slick Willy

and finally, Presidential excuses....
Nixon: I am not a crook
Clinton: I didn`t get in her nook

Wednesday, December 19, 2007

SIZE ???

`In the xxx store, have one Man want to buy condom, but he confused`.

Salesgirl: `May I help you sir??`
Man: `I would like to buy condom, but i din`t know about this thing??`
Salesgirl: `Ok, May I hold your penis for size?`
Man answer: `sure`.
Salesgirl: `give him a `M`!`, said Salesgirl to her assistant. `Wait, give him `L`! Wait, give him `XL`! Oh shit! Give me a tissue.`

Tuesday, December 18, 2007

How to generate Dormant User ID Report for Windows?

Windows Active Directory Dormant ID Review

Some of you maybe as security administrator know and have the same experience that we should do dormant id review every month to maintenance our system and to ensure that our system is clean from dormant ID as recommended by IT auditor.

Usually, I have generated the report using DumpSec to produce windows ID report (truelastlogon) and review it whether any user id that never login below to 90 days (base on company policy) or over 90 days.

How can we easily review if we have thousand user id and several companies separately by organization unit (OU)?
For this reason, I have made clone DumpSec function (Dump Users as Table) using visual basic script (VBS) to access Windows Active Directory (ADSI) and exported to text file delimited format with tab.

The Advantage:

  1. With this script you can generate user list base on OU that you have specified
  2. If you have limited network connection between primary domain controller and backup domain controller and also you have many backup domain controller, this script will be generate report faster than DumpSec because the script will be collect information from specific domain controller name as your specified on the configuration header within the script.
How to using this script?
Please read the header script for more information.

Download script:
http://aarreessuu.googlepages.com/dormant-id-review.vbs

A TRUE STORY FROM JAPANESE EMBASSY IN USA

Prime Minister Mori was given some basic English conversation training before he visits Washington and meets with President Bill Clinton. The Instructor told Mori `Prime Minister, when you shake hand with president Clinton,Please say `How are You`. Then Mr.Clinton should say ` I`m fine, and you?` Now you should say `me too` . Afterwards we translators will do all the work for you.` It looks quite simple,but the truth is...

When Mori met Clinton, he mistakenly said ` Who are you? ` . Mr. Clinton was a bit shocked but still managed to react with humor : Well,I am Hilary`s husband,ha ha...` Then Mori replied confidently ` Me too,ha ha ha...`
Then there was a long silent moment in the meeting room

Sunday, December 16, 2007

Identity Theft

What is Identity Theft?
Identity theft is a catch-all term for crimes involving illegal usage of another individual's identity. The most common form of identity theft is credit card fraud. While the term is relatively new, the practice of stealing money or getting other benefits by pretending to be a different person is thousands of years old.
Reference: http://en.wikipedia.org/wiki/Identity_theft

Identity Theft is a crime in which an imposter obtains key pieces of personal identifying information (PII) such as Social Security numbers and driver's license numbers and uses them for their own personal gain. This is called ID Theft. It can start with lost or stolen wallets, pilfered mail, a data breach, computer virus, phishing, a scam, or paper documents thrown out by you or a business (dumpster diving). This crime varies widely, and can include check fraud, credit card fraud, financial identity theft, criminal identity theft, governmental identity theft, and identity fraud.
Reference: http://www.idtheftcenter.org/

Who should know about Identity Theft?
Below is the right answer:
Everyone must know the Identity Theft, including teenagers.

How we prevent from Identity Theft victim?
  1. Buy a cross-cut type shredder (you can purchase cross-cut type shredder very cost effectively for approximately $60 - $70.) Shred all your important papers and especially pre-approved credit applications received in your name and other financial information that provides access to your private information. Don't forget to shred your credit card receipts.
  2. Be careful of "Dumpster Diving." Make sure that you do not throw anything away that someone could use to become you. Anything with your identifiers must be shredded (cross-cut) before throwing away.
  3. Be careful at ATM's and using Phone Cards. "Shoulder Surfers" can get your "Pin Number" and get access to your accounts.
  4. Get all of your checks delivered to your bank - not to your home address.
  5. Do not put checks in the mail from your home mailbox. Drop them off at a U.S. Mailbox or the U.S. Post Office. Mail theft is common. It's easy to change the name of the recipient on the check with an acid wash.
  6. When you order new credit cards in the mail, or your previous ones have expired, watch the calendar to make sure that you get the card within the appropriate time. If it is not received by a certain date, call the credit card grantor immediately and find out if the card was sent. Find out if a change of address was filed if you don't receive the card or a billing statement.
  7. Cancel all credit cards that you do not use or have not used in 6 months. Thieves use these very easily - open credit is a prime target.
  8. Put passwords on all your accounts and do not use your mother's maiden name. Make up a fictitious word.
  9. Get a post office box or a locked mailbox, if you possibly can.
  10. Ask all financial institutions, doctors' offices, etc., what they do with your private information and make sure that they shred it and protect your information. Tell them why.
  11. Empty your wallet of all extra credit cards and social security numbers, etc. Do not carry any identifiers you do not need. Don't carry your birth certificate, social security card, or passport, unless necessary.
  12. Memorize social security numbers and passwords.
  13. When a person calls you at home or at work, and you do not know this person, never give out any of your personal information. If they tell you they are a credit grantor of yours call them back at the number that you know is the true number, and ask for that party to discuss personal information. Provide only information that you believe is absolutely necessary.
  14. Do not put your social security number on your checks or your credit receipts. If a business requests your social security number, give them an alternate number and tell them why. They do not need that to identify you. If a government agency requests your social security number, there must be a privacy notice accompanying the request.
  15. Do not put your telephone number on your checks.
  16. Get credit cards and business cards with your picture on them.
  17. Do not put your credit card account number on the Internet (unless it is encrypted on a secured site.) Don't put account numbers on the outside of envelopes, or on your checks.
  18. When you are asked to identify yourself at schools, employers, or any other kind of institutional identification, ask to have an alternative to your social security number. Unfortunately, your health insurance carrier often uses your social security number as your identification number. Try to change that if you can.
  19. In conjunction with a credit card sale do not put your address, telephone number, or driver's license number on the statement.
  20. Monitor all your bank statements from every credit card every month. Check to see if there is anything that you do not recognize and call the credit grantor to verify that it is truly yours.
  21. Order your credit report at least twice a year (I have enclosed the addresses for you on the sample letter.) Review it carefully. If you see anything that appears fraudulent, immediately put a fraud alert on your reports by calling the numbers below.
  22. Immediately correct all mistakes on your credit reports in writing. Send those letters Return Receipt Requested, and identify the problems item by item with a copy of the credit report back to the credit reporting agency. You should hear from them within 30 days.
  23. Take your name off all promotional lists. Call the three credit reporting agency numbers to opt out of pre-approved offers.

Reference: http://www.identitytheft.org/protect.htm

What should we do now?
From now, let we learn it and hear from somebody experiences and don't forget to share it with your family, friend, etc.

Fight it! Do it now!

THE NEW BARBIE DOLL

A guy walks into the Toys-R-Us toy shop in downtown New York and says to the assistant: `Could you please show me your Barbie dolls?`
She says, `Certainly, sir. Here, we have: Fashion Barbie at $15.95 Vacation Barbie at $15.95 Housewife Barbie at $15.95 and Divorcee Barbie at $215.95!`
The guy asks in astonishment, `Why is divorcee Barbie so much? She looks the same to me.`
The assistant answers, `Well, sir, divorcee Barbie comes complete with Ken`s car, Ken`s house, Ken`s etc. etc.

Saturday, December 15, 2007

Made In Japan

Here was a Japanese who went to America for sightseeing. On the last day, he hailed a cab and told the driver to drive to the airport.

During the journey, a Honda drove past the taxi. Thereupon, the Japanese leaned out of the window excitedly and yelled, `Honda, very fast! Made in Japan!`

After a while, a Toyota sped past the taxi. Again, the Japanese leaned out of the window and yelled, `Toyota, very fast! Made in Japan!`

And then a Mitsubishi sped past the taxi. For the third time, the Japanese leaned out of the window and yelled, `Mitsubishi, very fast! Made in Japan!`

The driver was a little angry, but he kept quiet. And this went on for quite a number of cars.

Finally, the taxi came to the airport. The fare was US$300. The Japanese exclaimed, `Wah... so expensive!`

Thereupon, the driver yelled back, `Meter, very fast! Made in Japan!

SUM TING WONG

Sum Ting Wong went for a job in one factory. She went to a cars factory. Before she work, the Manager test her. When the first time the manager saw her, the manager was surprise because of her colorful hair and clothes. The manager said in his heart `not this women, this women cannot work in this favtory. But If she can make a sentence with the word : Green, Pink, Yellow Blue, White, Purple, and black.
Then the manager said to her ` If you can make a sentence with the word : Green, Pink, Yellow, White, Purple, and black, maybe I will give an excuse for you.
Then Sum Ting Wong think for a minute. After that she said like this : I hear the phone Green-green-green..., so I Pink up the phone, then I said `Yellow.., Blues this... Aaa.., wrong number lah. Don`t Purplely call me or I will kill you and do not call black.
After that the manager was fainted, Then Sum Ting Wong asked the manager ` Sum Ting Wong... `.
Sum Ting wong is a Japanese girl that came to America.
Actually she don`t understand English language

Back from silent

Hi Readers,

Finaly, I have back from silent to begin writing my blogs from today.
I hope i will write and write everyday to make my blogs rich as google company that have so much dollar :-)If you like my blogs, come in everyday, I will update this blogs frequently.
Ok let say, this is the first post for today.
I will give you another tips to discover anything.

Ciauw.