Pages

Thursday, June 28, 2007

How to remove a Trojan, Virus, Worm, or other Malware

Dialers, Trojans, Viruses, and Worms Oh My!

If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.

Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.

This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.

Before we continue it is important to understand the generic malware terms that you will be reading about.

Adware - A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware. There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.

Backdoor - A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.

Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.

Hijackers - A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.

Spyware - A program that monitors your activity or information on your computer and sends that information to a remote computer without your knowledge.

Trojan - A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.

Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.

Worm - A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.

How these infections start

Just like any program, in order for the program to work, it must be started. Malware programs are no different in this respect and must be started in some fashion in order to do what they were designed to do. For the most part these infections run by creating a configuration entry in the Windows Registry in order to make these programs start when your computer starts.

Unfortunately, though, in the Windows operating system there are many different ways to make a program start which can make it difficult for the average computer user to find manually. Luckily for us, though, there are programs that allow us to cut through this confusion and see the various programs that are automatically starting when windows boots. The program we recommend for this, because its free and detailed, is Autoruns from Sysinternals. When you run this program it will list all the various programs that start when your computer is booted into Windows. For the most part, the majority of these programs are safe and should be left alone unless you know what you are doing or know you do not need them to run at startup.

At this point, you should download Autoruns and try it out. Just run the Autoruns.exe and look at all the programs that start automatically. Don't uncheck or delete anything at this point. Just examine the information to see an overview of the amount of programs that are starting automatically. When you feel comfortable with what you are seeing, move on to the next section.

How to remove these infections

We have finally arrived at the section you came here for. You are most likely reading this tutorial because you are infected with some sort of malware and want to remove it. With this knowledge that you are infected, it is also assumed that you examined the programs running on your computer and found one that does not look right. You did further research by checking that program against our Startup Database or by searching in Google and have learned that it is an infection and you now want to remove it.

If you have identified the particular program that is part of the malware, and you want to remove it, please follow these steps.

  1. Download and extract the Autoruns program by Sysinternals to C:\Autoruns
  2. Reboot into Safe Mode so that the malware is not started when you are doing these steps. Many malware monitor the keys that allow them to start and if they notice they have been removed, will automatically replace that startup key. For this reason booting into safe mode allows us to get past that defense in most cases.
  3. Navigate to the C:\Autoruns folder you created in Step 1 and double-click on autoruns.exe.
  4. When the program starts, click on the Options menu and enable the following options by clicking on them. This will place a checkmark next to each of these options.
    1. Include empty locations
    2. Verify Code Signatures
    3. Hide Signed Microsoft Entries
  5. Then press the F5 key on your keyboard to refresh the startups list using these new settings.
  6. The program shows information about your startup entries in 8 different tabs. For the most part, the filename you are looking for will be found under the Logon or the Services tabs, but you should check all the other tabs to make sure they are not loading elsewhere as well. Click on each tab and look through the list for the filename that you want to remove. The filename will be found under the Image Path column. There may be more than one entry associated with the same file as it is common for malware to create multiple startup entries. It is important to note that many malware programs disguise themselves by using the same filenames as valid Microsoft files. it is therefore important to know exactly which file, and the folder they are in, that you want to remove. You can check our Startup Database for that information or ask for help in our computer help forums.
  7. Once you find the entry that is associated with the malware, you want to delete that entry so it will not start again on the next reboot. To do that right click on the entry and select delete. This startup entry will now be removed from the Registry.
  8. Now that we made it so it will not start on boot up, you should delete the file using My Computer or Windows Explorer. If you can not see the file, it may be hidden. To allow you to see hidden files you can follow the steps for your operating system found in this tutorial: How to see hidden files in Windows
  9. When you are finished removing the malware entries from the Registry and deleting the files, reboot into normal mode as you will now be clean from the infection.

How to protect yourself in the future

In order to protect yourself from this happening again it is important that take proper care and precautions when using your computer. Make sure you have updated antivirus and spyware removal software running, all the latest updates to your operating system, a firewall, and only open attachments or click on popups that you know are safe. These precautions can be a tutorial unto itself, and luckily, we have one created already:

Simple and easy ways to keep your computer safe and secure on the Internet

Please read this tutorial and follow the steps listed in order to be safe on the Internet. Other tutorials that are important to read in order to protect your computer are listed below.

Understanding Spyware, Browser Hijackers, and Dialers

Understanding and Using Firewalls

Safely Connecting a Computer to the Internet

Using Spybot - Search & Destroy to remove Spyware from Your Computer

Using Ad-Aware SE to remove Spyware & Hijackers from Your Computer

Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware

Using IE-Spyad to enhance your privacy and Security Conclusion

Now that you know how to remove a generic malware from your computer, it should help you stay relatively clean from infection. Unfortunately there are a lot of malware that makes it very difficult to remove and these steps will not help you with those particular infections. In situations like that where you need extra help, do not hesitate to ask for help in our computer help forums. We also have a self-help section that contains detailed fixes on some of the more common infections that may be able to help. This self-help section can be found here:

Spyware & Malware Self-Help and Reading Room

How do you delete the virus on C System Volume Information restore EXE?

Answer

First, see if you have another PC or somewhere where there is a good copy of _restore.exe

run AVG and remove the file from the vault from within the AVG program shut down and restart in DOS mode ( or safe mode and run MS Dos prompt) CD to this Volume directory and delete the file using del _restore.exe

Any screw-ups just reinstall windows, its easier that way as long as the virus can be eliminated, thats the main thing!

Answer

Access is denied to this folder by default. To fix:

Right click on My Computer Select properties Select System restore Check turn off system restore Apply and reboot computer

This will delete all restore points including viruses backed up there. Remeber to turn system restore back on.

Answer

All Trojan horses are hidden files so you would need to go to the Files Option (click the View tab)at Control Panel and uncheck both the *Hide file extension for known file types & *Hide protected operating system files (Recommended)-boxes, then OK yourself out. You will then need to restart your computer and and go into Safe Mode by holding the F8 key down -(kind of at the beginning of bootup). When you're at the DeskTop screen go to Start/ Search/ For Files and Folders and type up the NAME OF THE FILE & EXT (not PSW.Briss.C) but the actual name of the file, which would have shown up on your Anti-Virus software. You can delete this file from here, also make sure to empty your Recycle Bin.

I have had 4 trojan horses on my C drive and kinda figured out the above method a week ago. I deleted the Temp file (as these keep putting the same files back into your system) from the Restore folder after unchecking the hidden files boxes, then went to SafeMode to delete what virus files that were still there. My computer is now absolutely FREE of these pests!

P.S. I also have AVG 6.0 (the free one) & also the Ad-aware 6 and I use them every day as my kids love to play games from the Internet.

Answer

I have Windows XP. This worked for me.

Open Control Panel Tools Folder Options View Uncheck "Hide protected operating system files" OK Start Search Files and Folders Enter all or part of trojan file. Search Right click file when found Delete Empty Recycle Bin

Answer

Your virus scanner may not be able to access the folder because it does not have permission to do so. See this article for info on how to gain access to the System Volume Information folder:

http://support.microsoft.com/default.aspx?scid=KB;en-us;q309531

Answer

try this - If the virus is in the system volume information Download AVG from Grisoft.com, it is free. AVG will not pick it up straight away though. Follow the steps in this page and run AVG complete test. AVG should have picked up your virus this time. (You have the option in AVG to run a custom scan where you can set it to scan the system volume information only).

Answer

I am running Windows XP Pro (build 2600) w/SP2 and on this system I am running Avast Antivirus 4.5 Home Edition, ( I alternate between this and Avast Professional when I reformat which is 2x a year) this is an exceptional program as well as it's brother Avast Professional 4.5, upon a daily scan the Home version found this: C:\System Volume Information\_restore{992476EB-89EC-4BBA-ACF9-063EFCB49378}\RP35\A0003426.exe Avast 4.5 Home Edition found and deleted this file, however to be sure I went ahead and did the following: Restart/Safe Mode/Administrator/Desktop/Start/Control Panel/Tools/View/Uncheck both 'hide extensions for known file types' and 'hide protected Operating System files (recommended)' click 'apply' then select 'ok' move towards start/search/all files and folders/*A0003426.exe search yielded nothing after Avast had initially deleted the file in 'normal' startup. I ran Avast Antivirus while in safemode and it came back after scanning the SVI Folder with clean results. Replaced the checkmarks back into the "hide extensions for known file types" and "hide protected Operating System files (recommended)", applied and ok'd, restarted and re-entered normal start-up. Scince I was still bored I re-scanned in normal mode and again Avast found nothing. Well the bottom line is that I didn't have to do much other than carry out this exercise for when I may need to do so again and really have to work. Avast did most if not all the work for me from the get-go.

Answer

incase you are unfamiliar with SVI as I am relatively so, here is a cutout from microsoft website:

SUMMARY This article describes how to gain access to the System Volume Information folder. The System Volume Information folder is a hidden, system folder that the System Restore tool uses to store its information and restore points. There is a System Volume Information folder on every partition on your computer. You might need to gain access to this folder for troubleshooting purposes. MORE INFORMATION To gain access to the System Volume Information folder, use the steps in the appropriate section. Windows XP Professional or Windows XP Home Edition Using the FAT32 File System 1. Click Start, and then click My Computer. 2. On the Tools menu, click Folder Options. 3. On the View tab, click Show hidden files and folders. 4. Clear the Hide protected operating system files (Recommended) check box. Click Yes when you are prompted to confirm the change. 5. Click OK. 6. Double-click the System Volume Information folder in the root folder to open it.

Windows XP Professional Using the NTFS File System on a Domain 1. Click Start, and then click My Computer. 2. On the Tools menu, click Folder Options. 3. On the View tab, click Show hidden files and folders. 4. Clear the Hide protected operating system files (Recommended) check box. Click Yes when you are prompted to confirm the change. 5. Click OK. 6. Right-click the System Volume Information folder in the root folder, and then click Sharing and Security. 7. Click the Security tab. 8. Click Add, and then type the name of the user to whom you want to give access to the folder. Choose the account location if appropriate (either local or from the domain). Typically, this is the account with which you are logged on. Click OK, and then click OK. 9. Double-click the System Volume Information folder in the root folder to open it.

Windows XP Professional using the NTFS File System on a Workgroup or Standalone Computer 1. Click Start, and then click My Computer. 2. On the Tools menu, click Folder Options. 3. On the View tab, click Show hidden files and folders. 4. Clear the Hide protected operating system files (Recommended) check box. Click Yes when you are prompted to confirm the change. 5. Clear the Use simple file sharing (Recommended) check box. 6. Click OK. 7. Right-click the System Volume Information folder in the root folder, and then click Properties. 8. Click the Security tab. 9. Click Add, and then type the name of the user to whom you want to give access to the folder. Typically, this is the account with which you are logged on. Click OK, and then click OK. 10. Double-click the System Volume Information folder in the root folder to open it.

NOTE: The System Volume Information folder is now accessible in normal mode to users of Windows XP Home Edition.

Using CACLS with Windows XP Home Edition Using the NTFS File System In Windows XP Home Edition with the NTFS file system, you can also use the Cacls tool, which is a command-line tool, to display or modify file or folder access control lists (ACLs). For more information about the Cacls tool, including usage and switches, search the Help and Support Center for "cacls." 1. Click Start, click Run, type cmd, and then click OK. 2. Make sure that you are in the root folder of the partition for which you want to gain access to the System Volume Information folder. For example, to gain access the C:\System Volume Information folder, make sure that you are in the root folder of drive C (at a "C:\" prompt). 3. Type the following line, and then press ENTER: cacls "driveletter:\System Volume Information" /E /G username:F Make sure to type the quotation marks as indicated. This command adds the specified user to the folder with Full Control permissions. 4. Double-click the System Volume Information folder in the root folder to open it. 5. If you need to remove the permissions after troubleshooting, type the following line at a command prompt: cacls "driveletter:\System Volume Information" /E /R username This command removes all permissions for the specified user.

The following steps also work if you restart the computer to Safe mode because simple file sharing is automatically turned off when you run the computer in Safe mode. 1. Open My Computer, right-click the System Volume Information folder, and then click Properties. 2. Click the Security tab. 3. Click Add, and then type the name of the user to whom you want to give access to the folder. Typically, this is the account with which you are logged on. 4. Click OK, and then click OK. 5. Double-click the System Volume Information folder to open it.

AntiVir Personal 7.00.04.15

The AntiVir Personal Edition offers the effective protection against computer viruses for the individual and private use on a single PC-workstation. In order to make possible an easy operation, the AntiVir Personal Edition is developed to the essential points.

You'll be amazed how thoroughly AntiVir protects:

  • detects and removes more than 150,000 viruses
  • always among the winners of comparison test featured in computer journals
  • the resident Virus Guard serves to monitor file movements automatically, e.g. downloading of data from the internet
  • scanning and repair of macro viruses
  • protection against previously unknown macro viruses
  • safeguard against cost generating dial-up program
  • protection against trojaner, worms, backdoors, jokes and other harmful programs
  • easy operation
  • Internet-Update Wizard for easy updating
  • Protection against previously unknown boot record viruses and master boot record viruses
Screenshots (Click image to view)
Screenshot 1Screenshot 2Screenshot 3
Latest updates to filehippo.com 27 Jun 07 - Picasa 2.7 Build 36.60 27 Jun 07 - RealPlayer 11.0.0.167 Beta 27 Jun 07 - K-Lite Codec Pack 3.25 (Full) 27 Jun 07 - K-Lite Mega Codec Pack 2.25 27 Jun 07 - WindowBlinds 5.51 AntiVir Personal 7.00.04.15 (DOWNLOAD)

Updating your AVG Free Edition

In order to provide the highest level of antivirus protection for users of AVG Free, GRISOFT continuously develops information about new viruses. This information, as well as product improvements, is provided to the users of AVG Free in the form of Updates. Timely virus database updates are the critical component for the effectiveness of any antivirus program. In order to ensure that your AVG is providing the maximum amount of antivirus protection, your AVG Free System must be kept up-to-date. Download updates for your AVG Free system below.

Tip: Manually update is NOT recommended. You can use automatic update available at AVG Free Menu. Clicking on the Check for Updates button, AVG Free will download the appropriate update file and will perform the update for your AVG system.

AVI: 269.9.10 min. AVI: 269.9.0 Added detection of new variant of I-Worm/Stration, Worm/VB, new variants of trojans Backdoor.Hupigon, PSW.Agent.June 27, 200767.7 kB
aviAVI: 269.9.10 min. AVI: 269.0.0 Added detection of new variant of I-Worm/Stration, Worm/VB, new variants of trojans Backdoor.Hupigon, PSW.Agent.June 27, 2007293.6 kB
aviAVI: 269.9.10 Added detection of new variant of I-Worm/Stration, Worm/VB, new variants of trojans Backdoor.Hupigon, PSW.Agent.June 27, 20075.6 MB
aviIAVI: / 874 Added detection of new variant of I-Worm/Stration, Worm/VB, new variants of trojans Backdoor.Hupigon, PSW.Agent.June 27, 20079.6 MB
os: wAntispy DB: 7.5.2612 min. Antispy DB: 7.5.2246Anti-Spyware DB incrementalJune 27, 20074.2 MB

Ansav Full Version

Ansav (06-07) Full Ansav Ansav Latest Release Ansav [KEYGEN] 26 Juni 2007

Spyware Doctor with AntiVirus™ 5.0 for Windows® - New Version!

"the first and only antispyware product to be 100% effective in detecting spyware"

Start Spyware and Virus Scan!

Designed for Windows® Vista™, XP and 2000.

Editor's Choice Anti-Spyware now with AntiVirus

Don't compromise your security with second best!

  • Recommended by experts and editors around the world.
  • Complete AntiVirus and AntiSpyware capabilities in one application.
  • FREE customer support for all users.
  • Frequent advanced updates ensure that you are always protected.
  • Detects, removes and blocks all types of Spyware, Adware, Viruses, Trojans, Worms, Keyloggers and other threats.
  • Easiest to use with intelligent automatic protection.
  • 100% Money Back Guarantee.

Best Spyware Protection. Used by Millions World Wide.

Spyware Doctor has been downloaded over 100 Million times; with a million more downloads every week. Millions of people worldwide use Spyware Doctor to protect their identity and PC security.

Spyware Doctor has consistently been awarded Editors' Choice, by leading PC magazines and testing laboratories around the world, including United States, United Kingdom, Sweden, Germany and Australia. All current versions of Spyware Doctor have won Editors' Choice awards from PC Magazine in United States. In addition, after leading the market in 2005, Spyware Doctor was awarded the prestigious Best of the Year at the end of 2005.

Spyware Doctor continues to be awarded the highest honors by many of the worlds leading PC publications such as PC Pro, PC Plus, PC Authority, PC Utilities, PC Advisor, PC Choice, Microdatorn, PC Answers Magazine plus number of reputable 5-star ratings including CNET's Download.com and Tucows.

Note : If you are choosing Anti-Spyware make sure you choose one that is proven and has genuine awards from one or more world leading research labs such a PC Magazine, PC World, CNET, PC Pro Magazine, PC Authority, PC Answers and other trusted labs. More importantly do not use ratings from unknown review websites, as often these are designed to mislead you into purchase of affiliated, inferior or rogue product.

Detects, removes and blocks Spyware and Viruses.

Did you know that numerous programs tested against Spyware Doctor detected only small fraction of Spyware and completely removed an even smaller amount? Also most of them were unable to effectively block Spyware in real time from being installed on users PC in the first place.

Spyware Doctor with AntiVirus has the most advanced update feature that continually improves its Spyware and Virus fighting capabilities on a daily basis. As Spyware gets more complex to avoid detection, Spyware Doctor responds with new technology to stay one step ahead.

Easiest to Use

Spyware Doctor's advanced OnGuard technology only alerts users on a true Spyware and Virus detection. This is significant because you should not be interrupted by cryptic questions every time you install software, add a site to your favorites or change your PC settings. Such messages can be confusing and may result in undesirable outcomes such as program errors, lost favorites or even spyware and viruses being allowed to install on the system. We've done the research so you don't have to.

Spyware Doctor with AntiVirus Full Version Information

Current Version:5.0
File Size:34,319 KB
Operating System:Designed for Windows® Vista™, XP and 2000. Windows® 98 users click here.
Release Date:March 15, 2007
Protection Against:Spyware, Adware, Trojans, Viruses, Worms, Keyloggers, Identity Theft, Hijackers, Tracking Threats, Rogue Anti-Spyware, Unwanted Software, Phishing, Popups and Bad Websites.
Trial Limitations:The trial offers time unlimited real-time protection (free spyware blocking), but does not remove threats detected during on-demand scans.
Starter Edition:The Starter Edition offers full scan and removal of threats, and basic real-time protection, is available for free as part of the Google Pack.
Start Spyware and Virus Scan!

BitDefender - Anti Virus

Bit Defender 10 is a great "install and forget about it for a year antivirus product". At $29.95 this is one of the best antivirus values on the market today. Virus updates can be done manually or are preset for your convenience. You get to preset updates and scans to your convenience. Scans are fast and effective and easy drag and drop if you want to scan specific files … along with nice reporting after scanning.

BitDefender 10 comes with a lot of bells and whistles, some of which can be annoying but can easily be turned off. Various notifications via popups and email tell you that BitDefender has found a virus. I found it a little overkill but again, you can simply go into settings and turn those components off (last year we commented that you never knew the product was working, so this is a dramatic change in our opinion). The website isn't the greatest but is simple enough to get through the ordering process.

What's New?

  • Special Limited Time Offer - $39.95 for 2 PC's 2 years

Highlights:

  • low system usage
  • fast scans
  • simple interface
  • easy installation
  • good "install and forget"
This year BitDefender has included a Rootkit Detection software which is an "up and coming" threat. This is definitely a nice bonus.

The Shield Deluxe - Anti Virus

The Shield Deluxe 2007 is a simple to use anti-virus software and antispyware program and a perfect program for the less computer savvy. Right from the beginning you can see that this is going to be a program that is simple to download, install and use. The Shield Deluxe comes with an installation utility that notified us that there were remnants of other anti-virus software that could interfere with its operation. This was a rather nice way to start out and one that we liked a lot. The Shield Deluxe 2007 updates and weekly scans areAnti-Virus Software all pre-scheduled in which they have an intuitive interface. As we like to say, a very high "install and forget" rating.

What’s new with Shield Deluxe Antivirus?

  • 6Star Double Guarantee - See Chart for details on this amazing guarantee.
  • New low price for 6Star Anti-virus customer's only!
  • Receive 12 issues of Computer Shopper when you order online today.

Shield Deluxe Highlights:

* Protection from both viruses and spyware * Low cost * Free technical support

The website itself is nothing special but does have an antivirus Threat Matrix which we thought was nice and will definitely help identify users needs. The site is simple and easy to get through to place an order. The Shield Deluxe 2007 gets a 5.5 Star Rating (Top Rated) for its overall ease of use and price and mostly because of its free customer support (a real person actually picked up our call)…as we say over and over, if you have a real person answering the phone ... that wins major points from us.

The Shield Deluxe is powered by Kaspersky Anti-virus Software, which we also have rated very high but their customer service and technical support is not as strong as for The Shield Deluxe. The interface of The Shield Deluxe is a very intuitive interface splitting out the various components of protection.

Saturday, June 23, 2007

PC Media Antivirus (PCMAV) 1.0 RC17 + RTP Beta7

pcmav-rc17

Langsung saja, berikut alamat download-nya:

Silahkan baca file Readme.txt yang disertakan. Informasi mengenai rilis ini juga dapat dilihat di website VirusIndonesia.com.

Download Anti Virus Lokal Indonesia

Virus-virus lokal buatan anak dalam negeri selalu membuat kesal karena antivirus mapan buatan luar negeri kadang/ sering terlambat mendeteksi virus-virus tadi. Akhirnya komputer menjadi acak-acakan.

Sampai saat ini, untuk urusan virus lokal, saya masih mempercayai kemampuan dua buah antivirus buatan dalam negeri yang menurut saya bagus. Mereka adalah PCMAV (RC14 ) dan ANSAV. Akan tetapi, saya belum memiliki niat untuk unistall AVAST Antivirus yang selama ini saya pakai. Jadi, dalam komputer saya terdapat tiga buah antivirus yaitu AVAST, PCMAV dan ANSAV. Toh misalnya kita jalankan AVAST dan PCMAV atau AVAST dan ANSAV tidak kemudian terjadi sesuatu yang buruk seperti crash atau BSOD (Blue Screen of Death). Hingga sekarang, menurut saya AVAST, PCMAV dan ANSAV bisa saling melengkapi. Salah satu hal yang terbaik adalah semuanya GRATIS …

PCMAV diupdate sebulan sekali, jika anda menggabungkannya dengan ClamAV, database ClamAV diupdate setiap hari. ANSAV diupdate kurang lebih sebulan sekali tetapi sayangnya dengan jadwal yang tidak tetap. Sedangkan AVAST, tentu saja update bisa ditemukan setiap hari.

Bagaimana cara mendapatkan antivirus lokal tersebut.

1. PCMAV

PCMAV-RC14 bisa didownload di website “maseko” di http://dl.maseko.com atau di http://divshare.com/download/303477-1dd

Update main database untuk ClamAV bisa didownload di http://db.local.clamav.net/main.cvd

Update daily database untuk ClamAV bisa didownload di http://db.local.clamav.net/daily.cvd

2. ANSAV

ANSAV 2.4.3 memiliki official website di www.ansav.com sementara untuk hosting file antivirusnya dia bekerjasama dengan softpedia.

Halaman download ANSAV terletak di http://www.ansav.com/index.php/download/ dengan direct download di http://www.ansav.com/files/ansav_pe_beta.zip

Sunday, June 17, 2007

Delapan Antivirus Terhebat di Dunia

Berikut ini adalah delapan antivirus paling ngetop dan tangguh di dunia, berdasarkan PC World

1. Kaspersky Anti Virus 6

• Download price when reviewed: $50 ($35 renewal) • Malware detection rate: 96% • Proactive detection: 51% • System slowdown: 10% • Ease of use: Superior • False-positive detections: 6

Merupakan antivirus terefektif dalam memerangi malware, mudah digunakan namun sayang harganya lumayan mahal.

2. Symantec Norton AntiVirus 2007

• Download price when reviewed: $40 ($39 renewal) • Malware detection rate: 96% • Proactive detection: 49% • System slowdown: 10% • Ease of use: Superior • False-positive detections: 3

Merupakan program yang solid bagus dalam deteksi dan pembersihan virus, namuan untuk renewal mahal

3. BitDefender Antivirus 10

• Download price when reviewed: $30 ($22 renewal) • Malware detection rate: 96% • Proactive detection: 61% • System slowdown: 124% • Ease of use: Superior • False-positive detections: 14

Bagus dalam deteksi virus, lumayan murah, sayang berat di sistem, bisa menurunkan performa komputer

4. ESET NOD32

• Download price when reviewed: $39 ($27 renewal) • Malware detection rate: 90% • Proactive detection: 79% • System slowdown: 5% • Ease of use: Very Good • False-positive detections: 6

No coment

5. Panda Antivirus 2007

• Download price when reviewed: $30 ($30 renewal) • Malware detection rate: 90% • Proactive detection: 56% • System slowdown: 4% • Ease of use: Very Good • False-positive detections: 3

This competitively priced option provides good proactive protection, average overall malware detection, and a poor disinfection rate. (Last Rated: April 23, 2007)

6. Alwil Avast 4 Antivirus Professional Edition

• Download price when reviewed: $40 ($28 renewal) • Malware detection rate: 92% • Proactive detection: 37% • System slowdown: 4% • Ease of use: Good • False-positive detections: 5

This program has decent overall malware detection, but poor proactive protection and an awkward interface. It also lacks U.S. phone support. (Last Rated: April 23, 2007)

7. Grisoft AVG 7.5 Anti-Virus Professional

• Download price when reviewed: $30 ($15 renewal) • Malware detection rate: 91% • Proactive detection: 34% • System slowdown: 2% • Ease of use: Good • False-positive detections: 1

berkemampuan rata-rata untuk pendeteksian dan pembersihan virus

8. Trend Micro AntiVirus Plus AntiSpyware 2007

• Download price when reviewed: $40 ($40 renewal) • Malware detection rate: 82% • Proactive detection: 43% • System slowdown: 9% • Ease of use: Very Good • False-positive detections: 0

jadi dari kesekian antivirus yang menduduki rangking pertama software antivirus adalah

Kaspersky

Top 10 Virus Terbaru

1. HTML.Phishing.Azon-19 2. HTML.Phishing.Auction-226 3. Phishing.Email.SSL-Spoof 4. HTML.Phishing.Bank-1134 5. Worm.Mydoom.M 6. HTML.Phishing.Pay-122 7. Worm.SomeFool.P 8. HTML.Phishing.Pay-172 9. HTML.Phishing.Bank-1127 10. HTML.Phishing.Auction-165 Sumber : Free Anti Virus ClamAV For Unix,Linux,FreeBSD,Windows

Klez.E

Perhatian bagi seluruh pengguna komputer Indonesia, Klez.E akan beraksi pada tanggal 6 Juli 2002 dan berbeda dengan aksinya pada bulan ganjil lain seperti Maret dan Mei 2002 Klez.E hanya menghancurkan file dengan ekstensi : txt, htm, htm, wab, doc, xls, jpg, cpp, c, pas, mpg, mpeg, bak, mp3 Pada tanggal 6 Juli 2002 Klez.E akan menghancurkan semua file di komputer anda dan direktori yang terhubung ke komputer anda melalui jaringan. Kebetulan tanggal 6 Juli adalah hari Sabtu dan kebanyakan komputer dimatikan, tetapi ada beberapa hal yang perlu menjadi perhatian : Server yang selalu dinyalakan, sehingga tepat pada tanggal 6 Juni server ini akan menjadi korban Klez.E dan dikhawatirkan semua file di server akan dihancurkan oleh Klez.E. Mapped Network Drive, walaupun komputer anda tidak terinfeksi virus tetapi terhubung ke komputer lain yang terinfeksi virus, maka seluruh file yang anda share ini akan di hancurkan oleh Klez.E juga. Klez.E yang tidak aktif pada tanggal 6 Juni 2002 karena komputer tersebut tidak dinyalakan dikhawatirkan aktif pada hari Senin 8 Juli 2002. Cara kerja Klez.E menghancurkan file juga sangat jahat karena ia tidak mendelete file anda tetapi mengisi file anda dengan karakter acak sehingga file tersebut tidak dapat di undelete atau di restore karena memang tidak dihapus tetapi dirubah isinya. Dalam aksi Klez.E di bulan Maret dan Mei 2002 Vaksin.com dapat merecover data yang dihancurkan oleh Klez.E dengan menggunakan jasa recovery Ontrack, tetapi tingkat keberhasilannya sangat tergantung kepada kerjasama korban Klez.E dimana harddisk yang telah terinfeksi disarankan untuk jangan dicoba untuk direcover sendiri karena akan menurunkan tingkat keberhasilan recovery. Klez.E perlu mendapatkan perhatian khusus dari Vaksin.com karena ternyata korban Klez.E di Indonesia cukup tinggi, hal ini terbukti pada bulan Maret dan Mei 2002 menurut data Vaksin.com korban aksi amukan klez.E mencapai 2.000 komputer. Sedangkan menurut Trendmicro, http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_KLEZ.E&VSect=S Indonesia masuk dalam 10 besar negara yang menjadi korban Klez.E dan berada diurutan 8 setelah Malaysia dan Portugal. Klez.E adalah worm terganas di tahun 2002 dan paling banyak memakan menghancurkan dokumen Microsoft Office terutama MS Word (.doc) dan MS Excel (.xls) dan variannya, yaitu Klez.H yang tidak mengandung rutin yang menghancurkan data sampai saat ini menduduki peringkat tertinggi sebagai virus yang paling banyak menyebar di jagad internet. Keluarga Klez sampai pertengahan tahun 2002 berhasil menjadi virus yang paling ganas di tahun 2002, Klez mengadopsi beberapa prinsip virus dari pendahulunya dan menambahkan beberapa variasi baru dalam penyebarannya sehingga sangat sulit dibasmi dari jaringan dan memiliki variasi pesan yang sangat banyak. Klez.E mempunyai kemampuan yang harus diwaspadai sebagai berikut : Mematikan program virus dan antivirus. Klez.E yang aktif di komputer korbannya akan menghentikan aksi virus pendahulunya seperti Nimda, funlove, codered dan Sircam. Sedangkan aksinya menghentikan software antivirus sangat berbahaya karena akan menyebabkan program antivirus komputer yang terinfeksi menjadi "mandul" dan kehilangan kemampuan mendeteksi virus. Klez.E tidak memanfaatkan address book saja untuk menyebarkan dirinya. Ia akan melakukan scanning atas semua alamat email tidak hanya dari Address Book MS Outlook saja, tetapi juga dari ICQ dan temporary internet files sehingga saran untuk tidak menggunakan MS Outlook dan menggunakan program email lain seperti Eudora atau Netscape Messenger agar terhindar dari amukan virus sudah tidak berlaku lagi. Klez.E mempunyai kemampuan mencari SMTP sendiri untuk menyebarkan dirinya dan ia memiliki rencana cadangan yang sangat baik jika SMTP yang ditemukannya tidak berjalan dengan baik. Jika SMTP yang ditemukan dikomputer tidak ada yang berhasil digunakan untuk mengirimkan dirinya, Klez.E mempunyai daftar SMTP sendiri yang akan digunakan untuk mengirimkan dirinya. Memanfaatkan Iframe exploit. Iframe exploit merupakan celah yang paling sering dimanfaatkan oleh worm terakhir seperti Nimda, Badtrans dan Yaha.E. Dengan memanfaatkan hal ini, virus yang masuk ke komputer anda akan langsung menginfeksi secara otomatis ketika di sorot tanpa perlu diklik attachmentnya. Aplikasi yang mengandung Iframe Exploit adalah Internet Explorer dan Outlook Express versi 5.1 dan 5.5. Vaksin.com menyarankan para pengguna komputer untuk menerapkan pola berkomputer yang baik agar terhindar dari kerusakan / kerugian yang diakibatkan oleh virus. Bersama ini kami lampirkan tips dan trik dalam menghadapi ancaman virus.

EXPLOREZIP

Bagi para pecandu virus, selama ini Anda mungkin berpikir bahwa virus itu hanya bisa ditularkan melalui : file program (PrettyPark.exe, Happy99.exe), file dokumen (Prilissa), maupun melalui e-mail (Bubbleboy). Namun saat ini sudah keluar virus yang canggih pula yang agak susah untuk medeteksinya karena dalam bentuk file yang terkompresi. (McAfee memberitahukan bahwa virus ini tidak bisa dideteksi oleh scan engine versi 3.xx mereka, untuk mengetahui bagaimana cara mengupdate Scan McAfee Anda silakan klik di sini). Pada bulan Juni 1999, virus ini pernah menyebar dengan nama julukan ExploreZip atau ExploreZip.worm. Saat ini kembali virus tersebut muncul dengan julukan : Explorezip Junior atau ExploreZip.worm.park. Empat perusahaan antivirus terkenal (McAfee. Symantec , Network Assiciates, dan Trend Micro) telah menerima salinan virus Zip yang aktif saat ini. Dan menurut informasi terakhir, McAfee telah berhasil membuat deteksi dan antivirusnya pada tanggal 2 Desember 1999. Jika virus baru ini masih mengikuti pola yang sama dengan virus ExploreZip yang pernah mewabah maka ciri khasnya :
  • Menular melalui e-mail yang berisi/body/message : I received your email and I shall send you a reply ASAP. Till then, take a look at the attached zipped docs.
  • attachmentnya berupa file : zipped_files.exe
  • jika kita mengklik file exe ini maka : virus ini akan menghapus file-file : *.c, *.cpp, * .asm, * .doc, * .xls, * .ppt. menjadi nol Kb, dan secara otomatis mengirim e-mail dengan isi dan attachment seperti yang disebutkan pada point a dan b di atas. Mail dikirim ke e-mail address yang terdapat di address book pada sistem yang berbasis Microsoft (Outlook, Outlook Express, dan Exchange).
Cara infeksi : Virus akan membuat 2 file yaitu EXPLORE.EXE dan _SETUP.EXE yang secara otomatis akan ditempatkan di folder : Explore.exe di folder C:\Windows\System _Setup.exe di folder C:\Windows Kemudian Win.ini akan dimodifikasi dengan :
[windows]

run=c:\windows\explore.exe  (atau)  _setup.exe
Setiap reboot, file explore.exe akan diganti menjadi _setup.exe dan sebaliknya. Pada system Windows NT, registri dimodifikasi dengan tambahan :
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows
run = explore.exe  (atau)  _setup.exe
Setiap reboot, file explore.exe akan diganti menjadi _setup.exe dan sebaliknya. Virus ini tidak melalukan pencegahan terhadap infeksi yang berulang. Jadi bisa terjadi infeksi yang berulang-ulang. Pencegahan :
  1. Jangan mengklik/mengekstrak attachment file dengan nama : zipped_files.exe.
  2. Khusus untuk yang menggunakan Scan McAfee : update dat file Anda dengan 4054dat file.
Deteksi dan pengobatan manual Prinsipnya, menghentikan semua program/aplikasi yang dijalankan, kemudian deteksi dan hapus file-file yang merupakan bagian dari aktifitas virus ini seperti yang telah dijelaskan di atas. Jika Anda kesulitan menghentikan program/aplikasi, tekanlah CTL-ALT-DEL. Langkah yang perlu dilakukan pada Windows 95/98 :
  1. Jalankan System Configuration Editor Start | Sysedit.exe
  2. Pilih jendela C:\WINDOWS\WIN.INI
  3. Pada baris run=, hapus baris yang berisi : run=C:\WINDOWS\SYSTEM\EXPLORE.EXE run=C:\WINDOWS\_SETUP.EXE
  4. Kemudian pilih : File | Save | Exit
  5. Start | Shut Down | Restart in MS-DOS mode (berguna untuk mengnonaktifkan Explore.exe dari RAM)
  6. Dalam MS-DOS mode, kembali ketik Exit untuk kembali ke MS Windows (berguna untuk menjalankan Windows tanpa Explore.exe di memori komputer)
  7. Kemudian cari file Explore.exe, _Setup.exe dan Zipped_Files.exe di seluruh folder dan hapus. Yang dicari BUKAN : _setup.dll, atau _setup32.lib. atau iexplore, melainkan Explore
Carilah seluruh file ini dan hapus hingga benar-benar bersih. Gunakan fungsi Find dari Start menu, hingga sudah tidak ditemukan lagi. Ingat, kemungkinan file ini akan Anda temukan lebih dari satu. Tambahan untuk pengguna Dr. Solomon (bukan Dr. Erik !!) Karena ada yang menanyakan mengenai antivirus Dr Solomon, perlu diinformasikan bahwa Datfiles dari McAfee tersebut tidak kompatibel dengan produk dari Dr Solomon. Pemilik antivirus Dr. Solomon bisa mengunjungi websitenya yang alamatnya bisa dilihat Referensi di bawah. Referensi : Scan McAfee http://www.mcafee.com/viruses/explorezip.pak Trend Micro: http://www.antivirus.com/ Network Associates: http://www.nai.com/ Dr Solomon : http://www.drsolomon.com/ Jangan lupa Tiramisunya yang for Worm ExploreZip download programnya: http://www.mikrodata.co.id/download/avirus/twez.zip Ikuti perkembangan virus terbaru di Virus Clinic: Erik's Pages http://dokter.indo.net.id/

Pretty Park

Nama virus : W32/Pretty.Worm Date Added : 8 Juni 1999

Karakteristik virus : Merupakan bentuk virus worm yang menginfeksi file-file yang berjalan di Windows 9x/NT. Distribusinya melalui e-mail dari pengguna yang telah terinfeksi. Tanda-tanda infeksi : Pada saat virus ini aktif akan menayangkan screen saver 3D Pipe dan kemudian akan menggandakan sendiri ke FILES32.VXD dalam folder WINDOWS\SYSTEM. Kemudian mengubah nilai kunci registri (registry key value) command yang berlokasi di : HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open dari "%1" %* ke FILES32.VXD "%1" %*. Hal ini menyebabkan FILES32.VXD akan aktif pada saat mengjalankan sembarang file exe. Worm/virus ini akan mencoba mengirim email secara otomatis setiap 30 menit kepada alamat yang terdapat di address book. Kerja yang lain dari virus ini adalah mencoba connect ke server IRC (internet relay chat) dan bergabung dengan channel IRC tertentu. Sementara koneksi tersebut, virus akan berusaha mengirim informasi ke channel IRC dan mengambil beberapa komando dari channel IRC tersebut. Kerjaan ini mengakibatkan penulis virus ini bisa memperoleh informasi seperti : nama komputer, nomor registrasi, system root path, dan Dial Up Networking username dan passwords. Cara penularan : Terjadi jika menjalankan file "Pretty Park.exe". Cara pengobatan : (silakan hubungi saya jika memerlukan bantuan) Secara manual : Gunakan informasi registri berikut untuk memperbaiki registri sistem. Buka Notepad dan cut serta paste info di bawah ini ke file Notepad. Pastikan bahwa selesai isinya dipaste ke notepad, tidak dalam satu baris. Save file ini dengan nama "undo.reg". Double click file undo.reg ini.

----------begin,cut after this line----------
REGEDIT4

[HKEY_CLASSES_ROOT\exefile\shell\open\command]
@="\"%1\" %*"

[HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command]
@="\"%1\" %*"
----------end,cut before this line---------

* AVERT Note * Pada Notepad jika Anda meng-cut and paste sesuai petunjuk, maka akan nampak seperti ini :

REGEDIT4
[HKEY_CLASSES_ROOT\exefile\shell\open\command] @="\"%1\" %*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command] @="\"%1\"%*"

Setelah memperbaiki registri, delete file FILES32.VXD dan Pretty Park.exe. Reboot komputer Anda. Jika terjadi kesalahan memperbaiki registri akan menyebabkan aplikasi tidak akan berjalan. Informasi virus : Ditemukan pada tanggal : 26 Mei 1999 Berasal dari : Perancis Tipe: Win32 Risk Assessment : Medium, On Watch Minimum DAT: 4029 Variants : tidak diketahui Aliases : Pretty Worm, PrettyPark, Pretty Park

From: Alan R Tumbelaka To: fkui-net@egroups.com Sent: Thursday, July 06, 2000 6:49 AM Subject: Re: [fkui-net] C:\CoolProgs\Pretty Park.exe Untuk mereka yang tersangka telah mengidap virus ini (PrettyPark.exe) karena tidak sengaja membuka filenya, silahkan masuk ke site ini : http://www.getvirushelp.com/PrettyPark/prettyparkcleaner.exe. Moga2 berguna Alan Informasi lain dapat diperoleh di : http://www.symantec.com/avcenter/venc/data/prettypark.worm.html

Thursday, June 14, 2007

TIC BAND - Suara Anak Adam

4kua13q.jpg

Tracklist :

01. Mata Hati 02. Tabu 03. Jiwa Sang Pecinta 04. Wanita 05. Wahai Perempuanku 06. Sahaja Cinta 07. Kodrat Lelaki 08. Suara Adam 09. Naluriah 10. Perjalanan Cinta

Download Full Album Rapidshare

Password : sherra@IndoMp3z.org

OST Pirates Of The Caribbean - At Worlds End

Tracklist:

1. Hoist The Colours 2. Singapore 3. At Wit’s End 4. Multiple Jacks 5. Up Is Down 6. I See Dead People In Boats 7. The Brethren Court 8. Parlay 9. Calypso 10. What Shall We Die For 11. I Don’t Think Now Is The Best Time 12. One Day 13. Drink Up Me Hearties Yo Ho

>>DOWNLOAD<<

Password : appleapple

>>>neolisense.wordpress.com

DRIVE - Esok Lebih Baik

band baru beraliran pop rock ini berada di bawah bendera e-motion Entertaintment pimpinan Piyu ‘Padi’. personil band ini adalah Anji (vocal), Budi (gitar), Dygo (bass) & Adi (drum). judul album perdana mereka ini diambil dari penggalan kalimat dari lagu HIKYP yg sekaligus menggambarkan optimisme mereka sebagai band baru yg siap meramaikan dunia musik tanah air. single hit mereka adalah Tak Terbalas, tapi lagu laennya patut untuk dicoba juga….Tracklist :
03. Tak Terbalas <<– single hit pertama
10. Lupakan Aku
11. Larut Menuju Pagigw baru dapet 9 lagu, lagu yg blon dapet lagu ke-10 & 11
>>>neolisense.wordpress.com

Mengisengi warga dalam Local Area Network

iseng adalah sebuah pekerjaan yang mudah menurut saya walaupun terkadang membuat orang kesal dengan perbuatan kita yah apa boleh buat kalau sudah iseng kita suka terlanjur masuk dan bersenang-senang di sini saya masukan artikel bagaimana menjahili orang dengan mematikan komputernya dengan tiba-tiba menggunakan comand prompt GBU Mengerjai sang Penyusup (Shutdown) Menjadi penyusup memang menyenangkan. Tapi segalanya akan jadi menjengkelkan tatkala kita dalam posisi korban/sang admin. Ini hanya salah satu alternatif untuk menjahili sang penyusup. Kita akan mematikan komputernya jarak jauh Tak perlu repot-repot menggunakan program remote kesayangan anda, gunakan saja bawaan windows. Mengenai bagaimana cara mendeteksi sang penyusup, baca artikel terdahulu. Buka Windows Command Processor anda. Klik Start -> Run lalu ketik: cmd Pada command prompt, ketik: shutdown -i lalu tekan Enter. Perintah tersebut akan memanggil kotak dialog Remote Shutdown. Perhatikan screenshoot berikut: Klik tombol Add untuk memasukkan IP Address atau nama komputer target. Anda bisa memilih aksi, Shutdown, Log Off atau Restart. Pada kolom Display warning for anda bisa menentukan berapa lama countdown yang kan ditampilkan sebelum komputer di shutdown/log off/restart. Pada Opsi planned, ada pesan otomatis yang bisa anda pilih. Pada kolom Comment, anda bisa menuliskan pesan anda untuk sang penyusup. Entah ledekan atau.. terserah anda laah.. Saya rasa anda lebih jago soal ledek-meledek hehehe… Klik OK sesudahnya. Kira-kira di komputer target akan muncul seperti ini: Hohoho… menyenangkan bukan?? Eh?? Kenapa?? Oh, anda adalah sang penyusup?? tidak ingin komputer yang anda pakai dimatikan dengan cara seperti diatas?? Tenang, saya ada sedikit tips.. Saat anda melihat kotak dialog peringatan bahwa komputer anda akn segera di shutdown, secepat mungkin bukalah Notepad atau aplikasi Microsoft Word. Ketik kata-kata sakti berikut: AKU INGIN HIDUP 1000 TAHUN LAGI!!Hehehe.. kelamaan yach?? emang harus kata-kata itu?? Ya nggak laah.. ketik apa aja dech, terserah anda, yang penting jangan biarkan kosong. Jangan menekan tombol Save!! Saat “waktu eksekusi” menunjukkan angka 00:00:00, windows akan berusaha menutup aplikasi-aplikasi yang masih terbuka. Nah, aplikasi Notepad/Microsoft word yang anda buka tadi akan meminta konfirmasi dari anda apakah anda ingin menyimpan dokumen anda. Jangan pilih apa-apa, biarkan saja kotak dialog tu bertanya-tanya ;p Beberapa saat kemudian akan muncul kotak dialog End Program, klik tanda silang yang berada pada pojok kanan atas atau pilih cancel. Kotak dialog yang muncul berbeda-beda, kurang lebih demikian: Nah, anda akan mendapati komputer anda tetap hidup, sehat walafiat dan berdiri tegak. hehehe… Cuma itu caranya?? Ada nich yang lebih “formal” ^_^ 1. Klik START -> Run 2. Secepat kilat, ketik shutdown -a Perintah itu adalah perintah untuk melakukan Abort terhadap shutdown. Lalu apa yang akan dilakukan sang Admin?? Tentu kondisi ini tidak bisa didiamkan. Jangan biarkan sang Penyusup senyum-senyum sendiri. Andalah sebagai admin yang harus tersenyum Beri serangan kedua!! Jangan dulu pakai software remot favorit anda, nggak perlu ngeluarin senjata pamungkas untuk penyusup seperti ini. Ulangi langkah awal tadi, shutdown -i, namun jangan beri centang pada opsi Warn Users Of the action dan kosongi juga opsi Planned. Jangan beri pesan apa-apa dan komputer sang penyusup akan langsung shutdown tanpa konfirmasi Sekian… and Happy SHUTTING DOWN!!! ^_^ >>> neolisense.wordpress.com

Download lagu via mIRC

disini kita akan “nyolong” download mulai dari MP3-wav-sampek bokep2 seadahnya! kekekeke…… tapi jangan diketawain yach soalnya ane seorang newbie!langsung saja tanpa banyak bacot! kalo banyak bacot ntar banyak yang nyocot! langkah pertama harus mempelajari atau baca tutorial dari rekan/sodara sedingin mungkin yaitu sodara “W4750N”. “hallow sodara W4750N, apakah masih ada!” setelah kelar bacanya sampek ngerti! mari kita merenung sejenak! (gawe opo! damn put) yak langsung saja kita mulai nyolong kita! pertama buka mIRC-nya!2. dalam kolom option kamu tulis nick kamu dulu kal bisa yang aneh2! lalu klik ok! jangan klik connect to server lho yach!3. dalam kolom status kamu ketik “/server irc.theoneserv.net” tentunya nggak pakek tanda kutip!3. eh salah.. 4. setelah connect kamu harus register dulu! baca tutorial saudara “W4750N” (wong iki maneh! sing nggawe tutorial iki yo sopo!)dah tunggu bentar!…….…..dah! dah register pa blom! liat email kamu dah valit pa nggak registernya!kalo dah kita lannnjjjjjjooootttt…………….5. dalam kolm status ketik “/msg NickServ IDENTIFY (pasword kamu)—–> nggak pakek tanda kurung lho yach! kalo dikolom status ada tulisanNickServ- Password accepted - you are now recognized. maka….. ketik lagi…hehehehe tetep dikolom status ketik “/j theone”—-> nggak pakek tanda kutip lagi! setelah itu keluarlah channel “THEONE” lah dari sinilah kita nyolongnya! untuk nyari lagu yang kita inginkan ketik @find (lagu kita) dikolom channelmisal aku mo nyolong lagunya ungu ketik: @find ungu setelah itu sabar! nunggu balasan dari beberapa OP! setelah keluar balasan dari sang OP! ntar akan tulisan kayak gini contoh lagi…contoh lagi….umpama aku tadi nyari lagu dangdut! balasan dari salah satu OP kaya’ gini! Search Result • 296 Matches For dangdut • Get My List Of 30,137 Files By Typing @Anne In The Channel Or Refine Your Search. Sending first 5 Results • OmeNServE v2.60 • !Anne Project Pop - Dangdut Is The Music Of My Country.mpg ::INFO:: 75.9MB • OmeNServE v2.60 • !Anne Fahmy Shahab - Kopi Dangdut.DAT ::INFO:: 40.2MB • OmeNServE v2.60 • !Anne Ria Amalia - SMS Dangdut.DAT ::INFO:: 60.4MB • OmeNServE v2.60 • !Anne Ria Amalia - SMS Dangdut.wmv ::INFO:: 48.6MB • OmeNServE v2.60 • !Anne Charles Simbolon Joel Simorangkir - Tor Tor Dangdut.mp3 ::INFO:: 3.8MB • OmeNServE v2.60 • dah kan! setelah itu blok tulisannya menjadi kayak gini! !Anne Project Pop - Dangdut Is The Music Of My Country.mpg lalu paste dikolom channelnya ok! setelah itu nunggu dikirimin dah lagunya!sabar lho! yah! oya sedikit info jangan lupa setting mIRC-nyadi optionnyajangan ada tanda cawang!dah selamat berburu lagu kesukaan lho2 semua!salam merdeka! mo 17-an nich! ttd : djiam_put_cok >>>> www.jasakom.com

data