- Bila di dunia ini ada sekelompok elit yang tahu seluk-beluk dunia siber, salah satu orangnya tentu Jim Geovedi. Ia termasuk yang paling jeli. Jika mau, dia bisa mengakses semua informasi, mulai dari percakapan surat elektronik hingga menelusuri jejak percintaan Anda di dunia maya. "Kalau mau saya bisa mengontrol internet di seluruh Indonesia," kata Jim dalam percakapannya dengan Detusche Welle, 16/8/2013.Ia mengaku bisa mengalihkan trafik internet, mengamati trafik yang keluar maupun masuk Indonesia. Ia juga mengaku bisa memanipulasi transaksi mungkin tidak terlihat seperti penjahat di film James Bond, tapi, seperti disebut BBC, "ia memiliki rahasia yang mungkin bisa membunuh Anda." Jadi, sebenarnya, siapakah si Jim Geovedi ini?Diselamatkan PendetaJim Geovedi adalah peretas asal Indonesia dengan reputasi global. Pria kelahiran 28 Juni 1979 ini namanya begitu dikenal di komunitas peretashacker karena bolak-balik menjadi pembicara pertemuan hacker di Berlin, Amsterdam, Paris, Torino, hingga keahliannya? Sebagai contoh, Jim bisa meretas satelit. Peragaannya terkait cara meretas satelit, hingga menggeser posisinya, dilakukan di sebuah seminar yang videonya telah diunggah ke pria asal Bandar Lampung itu menjalankan perusahaan konsultan jasa sistem keamanan siber, yang markasnya ada di London, Inggris, setelah ia pindah ke sana pada tahun 2012. Jasa yang ia tawarkan termasuk pengamanan sistem satelit, perbankan, hingga telekomunikasi.'Kecanggihan' Jim dalam memahami suatu sistem siber mungkin membuatnya dikira sebagai anak sekolahan. Tapi itu sendiri tidak pernah sekolah di bidang teknologi informasi IT. Media Deutsche Welle menyebut bahwa setelah lulus SMA, ia turun dalam kehidupan jalanan yang keras di Bandar Lampung sebagai seniman grafis. Nasibnya berubah saat seorang pendeta memperkenalkan dirinya pada komputer dan internet. Sejak itu, ia mempelajari internet secara otodidak dengan menyimak chatting dari para hacker kini Jim ogah dijuluki sebagai 'ahli', dan lebih mau dipanggil sebagai 'pengamat' atau 'partisipan aktif'."Saya tidak memulai dengan menghack sistem kemudian setelah terkenal membuka identitas dan membangun bisnis sistem keamanan," kata dia, dikutip dari DW. Jim Geovedi kiri saat berbicara dengan Pavel Durov, pendiri aplikasi Telegram. Foto Wikimedia Commons "Sejak awal saya lebih banyak bergaul dengan para hacker dunia ketimbang Indonesia, dan dari sana saya sering diundang menjadi pembicara seminar atau diwawancara media internasional.""Beberapa tahun setelah itu saya mulai diperhatikan di Indonesia."Tahun 2004, Jim diminta membantu Komisi Pemilihan Umum KPU saat data pusat penghitungan suara pemilu diretas. Kasus ini berhasil diusut hingga berujung pada penangkapan hacker bernama Dani tahun kemudian, per 2006, ia diminta jadi pembicara isu sistem keamanan satelit. Sejak itulah ia namanya mulai dikenal secara Seluk Beluk SatelitTerkait meretas satelit, Jim Geovedi mengaku bahwa sistem satelit cukup unik."Orang yang bisa mengontrol satelit harus tahu A sampai Z tentang isi satelit. Satu-satunya cara adalah masuk ke ruang operator atau berada dalam situasi kerja sang operator lewat peretasan," sebutnya dalam wawancara dengan cara itu hacker bisa mengetahui kapan satelit diluncurkan, bagaimana cara kontrolnya, sistem yang dipakai. Dari sini bisa diketahui kelemahan sistemnya. "Itu semua total insting. Semakin sering Anda mempelajari kasus, jika berhadapan dengan kasus lain, Anda akan bisa melihat adanya kesamaan pola," DW, Jim mengaku pernah meretas satelit Indonesia dan satelit China, di mana keduanya merupakan satelit milik kliennya. Di kedua kasus satelit itu, Geovedi ditugasi untuk menguji sistem keamanan kontrol satelit. Dan ia melihat ada celah untuk melakukan penggeseran."Satelit yang dari China bisa saya geser, tapi kalau yang dari Indonesia saya ubah rotasinya," kata Jim Geovedi kini kerap dijadikan bukti bahwa tanpa diploma di bidang IT, seseorang sebenarnya bisa mencapai kesuksesan. Jim, yang telah menetap di London, kerap diwawancarai terkait sistem keamanan satelit dan pencegahan luar isu IT, ia juga merupakan DJ profesional dan produser musik. Ia menjadi musisi yang dinaungi label Elektrax Recordings, sebuah label musik yang bermarkas di Sydney, Australia.
Carahack facebook tanpa email 1. Kalau kamu sedang mencari cara hack website dengan cmd, mungkin beberapa perintah dasar berikut ini bisa kamu gunakan, geng. Biasanya hacker menggunakan gratis software hacker atm android malware khusus yang bisa mengalihkan setiap transaksi yang dilakukan nasabah. Pura2 klo mesin atm tuh gi ada masalah/upgrade. Lakukan deposit minimum 500ribu + 1000 atau 501.000.
Your/ SAN FRANCISCO—Just because a satellite is high up in orbit doesn't mean it's beyond the reach of a determined hacker, as outlined by security experts here at the RSA conference. Satellites are basically Internet of Things IoT devices, said Bill Malik, VP of Infrastructure Strategies at Trend Micro. "They're snazzy, they're wild, it's spaaaaace, but they're IoT devices," he said. Malik went through the history of satellites, from Sputnik to the TDRS satellites used in NASA's orbital communication network. Over the 50 years that humanity has been launching things into orbit, satellites have suffered from many of the same security flaws as Earth-bound devices. "The range of vulnerabilities [is] astonishing," Malik said. Sputnik 1, Malik said, "demonstrated we could put stuff up there, talk to it, and anyone could hear it." The Soviet satellite's famous pings could be heard by anyone with a short-wave radio. Even with Skylab, an early orbital outpost built by NASA, anyone could potentially tune in. "Transmissions were not encrypted; you could listen to what was going on," said Malik. This is because satellite hardware is limited in how it can process encrypted data without running out of power, in addition to the delay inherent in trying to communicate with something in space. Malik presented the Voyager probe as an extreme example. Not only does the far-flung spacecraft only have of onboard storage, but it takes 20 hours for it to receive a signal. "So if you want to set up an SSL link, that will take six days," he said. Malik then turned to Hubble, which had some other unique vulnerabilities. The optics of the space telescope, Malik explained, are covered by a hatch to protect them from the sun, while its solar panels can be adjusted to "tune" the amount of power the craft receives. Both could potentially be exploited. An attacker could point the Hubble toward the sun and burn out its optics, or position the solar panels in such a way that the power would destroy the batteries. Attacks are already underway. Malik showed the RSA audience a list of known intrusions into NASA systems, and several included attacks on satellites. Protection in the Sky To address these threats, Malik presented some immediate solutions. To prevent jamming, satellite operators can have their communications "hop" repeatedly between frequencies, making it much harder for an attacker to jam communications. Satellites can also be hardened against electromagnetic interference, protecting from attacks or natural phenomenon. For systems on the ground that rely on satellite communication, such as GPS guidance, Malik also suggested increased use of GPS authentication. That way, Malik explained, "the signal can actually give you some measure of confidence that you're listening to a real satellite." Better than these piecemeal efforts, Malik pushed for what he called a more systemic approach to satellite security. "[It] would be much more comprehensive and effective security orchestration," said Malik. "Meaning you gotta be able to wield the appropriate kinds of protections in space in response to changing conditions in the satellite." While newer satellites are using encryption, Malik stressed that more monitoring and logging of transmission traffic, as well as more sophisticated means of monitoring and detecting activity on the satellite, were needed. He also recommended that industry think carefully about whether a satellite is the best solution for a particular need, and to secure the information being sent and received from existing satellites. Recommended by Our Editors "Whatever you send up, [it will] send back down, so it's up to you to make sure that transmission is protected at both ends," said Malik. He also called for greater regulation, and more standards, on satellite design. "For the most part every company that puts together a satellite uses its own security architecture," he said. An Increasing Threat This isn't the first time we've seen satellites and satellite communications be the focus of security research. At Black Hat, a researcher demonstrated that satellite communications aren't nearly as secure as they should be, and that pieces of satellite infrastructure—on the ground and potentially in orbit—could be used to inflict physical harm. The Pentagon has said that both Russia and China are developing anti-satellite weapons, including missiles and lasers. The US has already carried out such operations, like the destruction of the Solwind satelliteOpens in a new window in 1985, which used a missile fired from an F-15 fighter jet. But while Malik sees improvements with satellite security, he also believes the threat is increasing as well. With the advent of cheap, small CubeSat satellites, more craft are going into orbit. This, Malik says, just increases the attack surface, giving more opportunities for the bad guys. And while the tools necessary for attacking a satellite have traditionally been too large and expensive for anyone other than governments, that too is changing. "The cost of an antenna is dropping via Moore's Law," said Malik. "Bad guys can set up a fairly sophisticated antenna for a couple hundred bucks." That, obviously, is a distressingly low barrier for entry. Like What You're Reading? Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox. This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.
LacakGSMmerupakan sebuah website yang juga dapat digunakan untuk melacak no hp lewat satelit GPS. Selain gratis, web sangat easy to use sehingga siapapun dapat menggunakan web ini. Cara Penggunaan: Buka browser di perangkatmu. Disarankan pakai Google Chrome agar lebih cepat. Kunjungi alamat websitenya: www.lacakgsm.com
DOWNLOAD ANDROID. HACKING. BLOGGING. Beranda » NewsUpdate » Aplikasi Google Maps bisa di "Hack" Begini Caranya. Aplikasi Google Maps bisa di "Hack" Begini Caranya. Teknologi sekarang ini telah berkembang jauh sejak tahun 90-an dan hari ini, kita mengandalkan semua GPS untuk Internet untuk memperoleh informasi real-time
Berikutini cara hack FB lewat Android tanpa root melalui situ website Feebhax yang bisa anda ikuti: Langkah pertama, anda bisa mengunjungi alamat situs website Feebhax melalui link berikut ini. Klik Disini; Setelah berada pada laman awal situs Feebhax, lalu anda bisa klik "Open Feebhax".