Aang Yogya, Mengubah level access dari Guest menjadi Administrator pada Windows XP atau Windows 2000. Jika anda dapat mengakses sebuah komputer, namun sayangnya posisi anda hanyalah seorang Guest yang hak aksesnya sangatlah terbatas. Jika dalam Windows XP atau Windows 2000 posisi anda sebagai user biasa ataupun hanya seorang guest, anda tetap dapat melakukan "KUDETA" untuk mendapatkan posisi sebagai Administrator.
Sebenarnya anda dapat melakukan pengecekan posisi user anda menggunakan perintah: net user nama_user atau jika anda guest ketiklah "net user guest". Supaya anda juga dapat berperan sebagai Administrator, walaupun nama anda tetaplah Guest. Ketiklah script dibawah ini menggunakan Notepad:
@echo off
net localgroup Administrator Guest/add
exit
Simpanlah file tersebut dengan nama yang tidak mencurigakan administrator asli. Misalnya, office.bat, ingat ekstensi yang digunakan adalah .BAT. letakkan file tersebut pada folder berikut:
c:\Document and Setting\"Nama Administrator"\Start Menu\Programs\Startup
Selanjutnya anda harus menunggu sang Administrator menjalankan atau merestart komputer untuk menjalankan file office.bat yang telah anda buat. Kemudian anda periksa status user ana menggunakan perintah net user Guest. Coba anda lihat pada bagian Local Group Memberships, kini anda menyandang dua jabatan yaitu sebagai Guest dan Administrator. Jika anda masih kurang percaya bahwa anda sebagai Administrator, coba buka User Account pada Control Panel. Sekarang anda perhatikan, terdapat dua buah accout Guest dan yang satunya adalah Administrator.
Anda tidak perlu takut jika Administrator Asli membuka User Account sebab yang terlihat hanyalah Guest account is on, sedangkan Guest yang berperan sebagai Administrator tidak akan kelihatan.
Aang Yogya Komputer Teknologi Informasi Internet Blog Komputer Hardware Software Network Tips n Triks Overclock Virus
Tampilkan postingan dengan label Scurity. Tampilkan semua postingan
Tampilkan postingan dengan label Scurity. Tampilkan semua postingan
Senin, 12 Juli 2010
Jumat, 30 April 2010
Scurity: Hackers World Know
Aang Yogya security post, To some people, hearing the word "hacker" or "hacking" alone makes chilling shiver of fear. Hacking activities in general it has been identified with evil deeds, whereas the real purpose of hacking is to find security holes penetrated prone. Any technology as a double-edged knife, could be used for good, but also a crime. This paper attempts to decipher what was actually hacking activities, and how we can use them for our common good. In carrying out its action, the work of a hacker is identical to an attempt to tamper with the cmd on windows operating system and shell on linux operating system. Why use the cmd and the shell? Because in the cmd shell and have access to take over the authority without limit for the system with the provisions of hacker candidates must know and understand the function of what is in cmd and shell. A hacker can be categorized as a hacker is smart and creative in its operations if the hacker is not much use tools that help smooth the action. As an initial capital to move into the world of hacking, it is obligatory to learn the contents or purpose of the information displayed in the Cmd and shell. To find out what a command that can be used in Cmd and the shell you can do with typing "Help" or "Info" in the Cmd and the shell will display data that serves as a command in the Cmd and shell like the example in Figure 1.0 results from cmd when typing "Help": In the cmd on windows will dinampilkan all functions available in the cmd and also explained what the functions of his orders. If still confused of the purpose of the let command cmd in together immediately wrote practiced as for ways to practice are as follows: To find the IP Address from the command window can be done by typing "ipconfig / all" will display data in the form of information such as IP Address
White blocked text above is what is called an IP Address and IP Address to see in linux is done by typing the command "ifconfig" will display the same data as instructed to display the IP Address on Linux machines. Like the picture 1.2. On the other side hackers also claimed to be active and creative in finding other commands that have not been there in Cmd and in the Shell. After the candidates with advanced hackers can master it then it could be said the hackers were eligible to move into a higher level such as using a function of the ping, nmap, telnet and other sebaginya, where each of these functions or cruise mempuyai rooting ability of its own. As far as a hacker still has the willpower to try and try again until successful, not impossible if one day he will be able to explore this virtual world without borders, without finding the wall that is too high or too 'hot' for his passing.
White blocked text above is what is called an IP Address and IP Address to see in linux is done by typing the command "ifconfig" will display the same data as instructed to display the IP Address on Linux machines. Like the picture 1.2. On the other side hackers also claimed to be active and creative in finding other commands that have not been there in Cmd and in the Shell. After the candidates with advanced hackers can master it then it could be said the hackers were eligible to move into a higher level such as using a function of the ping, nmap, telnet and other sebaginya, where each of these functions or cruise mempuyai rooting ability of its own. As far as a hacker still has the willpower to try and try again until successful, not impossible if one day he will be able to explore this virtual world without borders, without finding the wall that is too high or too 'hot' for his passing.
Langganan:
Komentar (Atom)