sktpjs.zoom-a.com
SK. TAMAN PAROI JAYA
Jln. Persiaran Merak, 70400 Seremban, N. Sembilan Tel:066793241, Faks:066772340
e-mel : sktpjsns@yahoo.com, sktpjs@zoom-a.com

| LAMAN UTAMA | KATA ALU-ALUAN | SEJARAH | FALSAFAH PENDIDIKAN | VISI & MISI | LOGO SEKOLAH | BENDERA SEKOLAH | LAGU SEKOLAH | STAF AKADEMIK | STAF SOKONGAN | ENROLMEN GURU | ENROLMEN MURID | UPSR | INFO ICT | KRONOLOGI KOMPUTER | ICTL | ANTIVIRUS | BIMBINGAN&KAUNSELING | BICARA AGAMA | TAZKIRAH | KESIHATAN | PAUTAN | RANCANGAN TAHUNAN | PIBG SKTPJ | BUKU PELAWAT | HUBUNGI KAMI | SEMBANG ICT | PETA SKTPJ | INFO HALAL | INFO SOLAT | INFO PTPTN | INFO SAMAN | PERMATA PINTAR | AKTIVITI 2009 | AKTIVITI 2010 | AKTIVITI 2011 | AKTIVITI 2012 | AKTIVITI 2013 | AKTIVITI 2014 | ASMAULHUSNA | UCAPAN | KATA-KATA HIKMAH | E-PENYATA GAJI | WARGA SKTPJ | GALERI SKTPJ | E-FILING | KSSR | LAMAN UTAMA |

  1. Amaran serangan virus komputer Worm_downad.AD

          -Untuk menghilangkan virus ini di komputer anda, anda perlulah scan komputer anda menggunakan perisian 

            Trend Micro Office Scan. Sekiranya komputer anda tiada perisian ini, anda boleh scan komputer anda 

            menggunakan perisian ini secara online di alamat http://housecall65.trendmicro.com (atau klik terus di sini)

            (Untuk scan secara online, anda perlulah mempunyai talian internet)

   2.   Panduan Penggunaan Pendrive

         -Setelah memasukkan pendrive ke ruang USB komputer, pastikan anda 'SCAN' terlebih dahulu

          pendrive tersebut menggunakan perisian antivirus. Ini dapat mengelakkan virus yang mungkin terdapat di

          dalam pendrive tersebut tersebar kepada komputer yang dimasukkan pendrive tadi.

         -Sekiranya anda ingin mencabut keluar pendrive anda daripada sesuatu komputer, pastikan anda

          menggunakan kaedah yang betul untuk mengeluarkan pendrive. Cara yang betul adalah :-

          a) Arahkan pointer ke lambang anak panah hijau di ruangan taskbar(bahagian sudut bawah kanan skrin

              komputer) dan kemudian tekan butang kanan mouse.

          b) Kemudian, kotak arahan 'Safely Remove Hardware' akan dipaparkan. Klik pada kotak arahan tersebut.

          c) Kemudian akan keluar kotak menu 'Safely Remove Hardware'(paparan besar). Seterusnya pilih nama

              pendrive anda dan klik pada nama pendrive anda.

          d) Seterusnya tekan pada butang 'stop' pada kotak menu tersebut.

          e) Apabila keluar paparan kotak arahan 'Safe To Remove Harware'(di sudut bawah kanan skrin komputer),

              pendrive anda sudah boleh dikeluarkan daripada komputer tersebut dengan selamat.

         (Sekiranya langkah-langkah ini tidak diikuti semasa menggunakan pendrive di komputer,

          kemungkinan besar jangkitan virus komputer akan mudah berlaku. Data atau maklumat di dalam

          pendrive juga akan rosak dan seterusnya akan menyebabkan pendrive menjadi rosak sekiranya

          ianya tidak dikeluarkan daripada komputer menggunakan prosedur yang betul)

3.     Pemasangan Projektor LCD

         a) 'ON' kan suis power projektor.

         b) Sambungkan kabel VGA kepada slot 'VGA out' di laptop dan slot 'VGA in' di projektor.

         c) Setelah kabel VGA telah dipasang dengan kemas di antara laptop dan projektor, tekan kekunci 'Fn'

             serentak dengan kekunci 'F5' pada keyboard laptop. (Fn + F5)  

         d) Apabila layar/skrin putih memaparkan desktop komputer, ini menunjukkan bahawa pemasangan

             projektor LCD anda telah berjaya.

4.     Hubungan dan Perbezaan antara Trojan Horse dan Virus

Samada anda sedari atau tidak, Trojan Horse dan virus adalah entiti yang berbeza. Perbezaannya adalah seperti berikut :

Bil

Trojan Horse

Virus

 1

Akan wujud dalam fail tunggal dan tidak akan menduplikasi secara sendiri

Ia menjangkiti fail dan menduplikasi secara sendiri

 2

Tidak akan menceroboh sesuatu komputer secara dinamik tetapi diletakkan ke dalam komputer mangsa oleh hacker sendiri

Biasanya menceroboh atau menyerang komputer lain secara dinamik menerusi rangkaian atau kaedah lain

 3

Menunggu sambungan talian hacker, kemudian hacker pula akan mengawal, mencuri fail dan memantau komputer tersebut

Tujuan utama adalah menceroboh sistem komputer tertentu dan merosakkan sistem

5.    Koobface, Other Worms Target Facebook Friends (NewsFactor)

       - As Facebook works to make itself more relevant and timely for its growing member base with a profile page makeover, attackers seem to be working overtime to steal the identities of the friends, fans and brands that connect though the social-networking site.

Indeed, Facebook has seen five different security threats in the past week. According to Trend Micro, four new hoax applications are attempting to trick members into divulging their usernames and passwords. And a new variant of the Koobface worm is running wild on the site, installing malware on the computers of victims who click on a link to a fake YouTube video.

The Koobface worm is dangerous. It can be dropped by other malware and downloaded unknowingly by a user when visiting malicious Web sites, Trend Micro reports. When attackers execute the malware, it searches for cookies created by online social networks. The latest variant is targeting Facebook, but earlier variants have also plagued MySpace.

Koobface's Wicked Agenda

Once Koobface finds the social-networking cookies, it makes a DNS query to check IP addresses that correspond to remote domains. Trend Micro explains that those servers can send and receive information about the affected machine. Once connected, the malicious user can remotely perform commands on the victim's machine.

"Once cookies related to the monitored social-networking Web sites are located, it connects to these Web sites using the user log-in session stored in the cookies. It then navigates through pages to search for the user's friends. If a friend has been located, it sends an HTTP POST request to the server," Trend Micro reports.

Ultimately, the worm's agenda is to transform the victim's computer into a zombie and form botnets for malicious purposes. Koobface attempts to do this by composing a message and sending it to the user's friends. The message contains a link to a Web site where a copy of the worm can be downloaded by unsuspecting friends. And the cycle repeats itself.

An Attractive Face(book)

Malware authors are investing more energy in Facebook and other social-networking sites because that effort pays off, according to Michael Argast, a security analyst at Sophos. Facebook alone has more than 175 million users, which makes it an attractive target.

"Many computer users have been conditioned not to open an attachment from an e-mail or click a link found within, but won't think twice about checking out a hot new video linked to by a trusted friend on Facebook," Argast said.

Argast called the Koobface worm a mix of something old and something new. The new is using social networks as a method to spread malware. The old is using fake codec Trojans linked to a saucy video to induce the user to install the malware.

Argast said people can protect themselves by running up-to-date antivirus software, restricting which Facebook applications they install, thinking twice before clicking on links from friends and never, never installing a codec from some random Web site in the hopes of catching some celebrity in a compromised situation.

"I would expect to see more attacks on Facebook," Argast said. "As long as this is a successful propagation method, the bad guys will double down and invest more. They are entirely motivated by financial gain. If it pays, they'll continue to romp in your social playgrounds."

                                                                     


Zoom A - Program Pembelajaran Secara Interaktif Melalui Internet Yang Tercanggih Di Malaysia

Pelawat: