Minggu, 24 Oktober 2010

backup data via hotmail

sory agan2 semua sya cuma mw sesuatu yang mungkin menurut anda tidak bermutu...


saya langsung aja..

1. kita harus mempunyai Account Hotmail..(yg belom pnya silahkan bikin dulu yah..)

2. setelah anda login/pendaftaran telah selesai anda bisa menyeting mail anda..

3. silahkan anda memilik “profil” pada tab sebelah kanan atas sebelah log out

4. kemudian silahkan anda memilih link yang bertuliskan “dokument”

5. dan kemudian pilih juga “my dokument”

6. setelah itu selahkan anda pilih “add file”

7. setelah anda klik akan muncul pilhan untuk “browse”

8. setelah itu yah tinggal anda upload z dokument/sofware apa yng ingin anda upload..

9. dan biasakan klo kita mw upload wajib di jadikan file commpres (bisa seperti .tar/.zip atau sebagainya...)

catatan :
mengapa saya memilih Hotmail krena dia memberikan space secara cuma2 yah ga cukup besar sih cuma 25 Gb doank...

Rabu, 25 Agustus 2010

keamanan komputer

----- ----
1. Definition/Scope of "COMPUTER SECURITY" 2
2. Why Should You Be Concerned? 2
3. Types of Security Breaches 3
4. Reasons for Exposure 7
5. General Security Rules (all computer systems) 8
6. Viruses: 9
6.1 History 9
6.2 Effect 10
6.3 Why do people do it? 10
6.4 Symptoms 10
6.5 Concerns 11
6.6 Known Virus Software (1) 11
6.7 Quick Guide to Virus Names (1) 12
6.8 Table of Virus Effects 16
6.9 Virus Detector/Antidote software 19
6.10 Trojan Horses 20
7. PC Rules of Thumb 22
8. Easy Tricks for PC Security 23
9. So You're Infected (Cure) 24
10. Summary: What Can You Do? 25
11. Security Policy: Points for Consideration 26
12. To run SCAN (included on this diskette) 29

(1) David Stang, Ph.D, "Network Security in the Federal Government,",
January, 1990, p.168-169 (updated by E.A.Bedwell, March, 1990)

- 2 -
Tonight's topic is "Computer Security," a subject near and dear to my
heart after catching fraud a few times, and cracking system security a
few times. The only unfortunate part of this evening is that I have
enough material to cover an intensive 2 or 3 day seminar and I only have
something over an hour, so in addition to extensive notes from this
presentation, I've put an article on viruses, and a PC virus detector
program on diskette for you.


Computer security relates to any potential loss of information or your
ability to operate, regardless of the source of the problem. Of course,
all the publicity about computer security is going to the virus
situation. I don't want to dissuade anyone from their concerns about
viruses, because it's definitely a growing problem, and if you get hit,
you'll be sorry you ever laid eyes on a computer. But, current estimates
indicate that viruses represent only 3% of all the computer problems now
occurring. Of course, if you're one of the 3%, like CNIB or Barclay's
Bank Canada were last fall, you'll feel like you're the only one on
earth. The difference between viruses and other computer security issues
is apparently one of control: I hope to convince you that you have as
much control over viruses and as little control over the other 97% of
problems as to make them equal threats to the safety of your computer.

I'm going to get to viruses later, their prevention, detection and cure,
but I'd like first like to cover the other major problems that affect
computer security - the other 97% - and I'd like to start with reasons
why you should be concerned about security.


Your data is a valuable asset, just like premises, equipment, raw
materials and inventory. Because so much of modern business depends on
computers - financial systems, engineering design, medical diagnosis,
production and safety control - the destructive potential is greater
every year. There has been more than one company that's suffered great
losses, and even gone under because of the loss of things like their
accounts receivable records: no one is going to pay you if you don't
send them a bill, and if they get word of your inability to invoice them,
their darned unlikely to volunteer payment - so you're in a financial
mess. The same goes for your design information, production data, the
consequences if safety control systems malfunction, or even the simple
loss of your customer list.

Another reason why you should be concerned is, too often, people don't
think about computer security until it's too late. There's a saying in
my industry that, "He who laughs last probably made a backup." Another
saying is, "Experience is something you don't get until just after you
needed it the most." Well, if it means the life of your company, or the
loss of potentially millions of dollars, or even just the information on
your home computer, it might be wise to get at least some basic knowledge
before the disaster strikes.

- 3 -


Now that the 'why' is out of the way, let's break down the 97% of
problems. These are not in a specific order, but just as they came to
me. Nor have I attempted to attach percentages to each type of risk,
because very few computer crimes are actually reported, so any figures
that anyone could estimate would not be realistic:

By far the biggest problem is fraud or theft. Some examples of this are:

CHAOS - 1987 - Hamburg -> NASA data bank info sold to USSR

Foreign exchange } famous because of big $
Electronic Funds Transfer } amounts, and because of the
Insider Trading } publicity they've received

Most common: Cookie jar technique - e.g., interest, income tax
(aka 'Salami' technique - take a little and no one
will notice)

Specific examples I've caught were in Payroll (no crash on < or =),
Accounts Payable (dummy companies), Purchasing (failed reasonableness
test), and Accounts Receivable (failed balance routine). These were all
thefts of money.

Another example of theft which is very interesting is the 28-year-old
Canadian who was arrested at UNISYS in Pittsburgh on Dec. 13/89 - what he
is alleged to have stolen was NCR's trade secrets - to the tune of
US$68M, which comes under a different Canadian law from monetary theft.

The next major type of computer security breach is the disgruntled
employee syndrome. Their favourite is the logic bomb or time bomb: on a
certain date or condition after they leave the company, something's going
to happen, such as at the health centre in LA where all prescriptions
suddenly multiplied by 2. That's really serious, even compared to the
logic bomb that superzaps all your files off the face of the earth,
because someone could die. At least with a superzap, you can recover if
you've been backing up and have a disaster recovery plan in effect. Pure
physical vandalism occurs more often at educational institutions, but is
still a serious threat. I wouldn't let me near your machine if I was
angry with you - my vandalism would be difficult to detect (and expensive
to repair). A simple application of a magnetized screwdriver ......

One of the biggest logic bombs that's going to occur is on January 1/2000.

Do you know how many computer systems use a 2 digit number for the year?
Do you know how much work it's going to be to adapt systems to recognize
00 as being greater than 99? My grandmother was born in 1886, and most
systems show her birth year as 99. If she lives to the year 1999, I
wonder if they'll start sending her the baby bonus. This time bomb is not
malicious damage, it's pure lack of planning at the system design stage.

- 4 -

(Lack of Security Planning - continued)

Things like balance checks and reasonableness tests are not built into the
system from the beginning, and it's not easy to put them in later. Users
must participate at the system design stage, because only they know what's
reasonable and what can be balanced. Don't expect a computer technician
to know everything there is to know about your job.

Then there's the practical joker - the one who thinks it's funny to break
into the system to see what he can change, or create some dumb message to
appear on your screen. That's what happened at IBM when the infamous
Christmas tree appeared 2 years ago (1987). The joke was three-fold -
first it analyzed your electronic mail distribution lists and reproduced
itself to send to everyone you normally send messages to - this clogged
the system up with people reading more messages than normal. The second
part was a little more technical - everyone who read the message caused a
separate load of the offending program to take up space in memory, unlike
most systems where two or more people who are doing the same thing are
sharing one load of the software. This clogged memory up so that nothing
else could run. There was one more part to this: there were delay timers
built into the program so it deliberately ran very slowly. The result was
that the largest computer network in the world was shut down for 4 hours.
Someone must have had a great need for a power trip.

Next, there's fumble fingers: you know, the one who keys the formula in
as 600 grams instead of 60 grams, or the estimated production time of 2
hours instead of 2 days. Or the one who almost took me into court when
he blamed "the computer" for a mistake. Without going into details about
that incident, I can say that going through the grilling by several
lawyers in a preliminary investigation was not the high point of my
career. What saved the situation (for me and the organization) was audit
trailing: every time a transaction was entered, the system recorded the
terminal i.d., the user i.d., the date and the time. It also saved a copy
of the record as it existed prior to the transaction taking place. A more
common mistake, though, is to unlatch a diskette door before the light
goes out. Few people realize that the FAT (file attributes table) is the
last thing written on a disk, and you can corrupt the FAT by removing the
disk too early.

Then there's everyone's favourite: copying software. Believe it or not,
in Canada, that falls under the Copyright law, not under theft, but it
has been successfully prosecuted. Even if you reverse engineer it and
make some minor changes, it will come under the "look and feel" test of
the Copyright law - if it looks and feels the same as the original, you
can be prosecuted. Copying software is illegal, and your company as the
registered owner could be held liable if it is detected.

- 5 -

Many major computer crimes are perpetrated by illegal access: the 14-
year old who broke into NASA from his basement computer room is just one
example. There is password software on all larger machines, and it's not
difficult to put it on PCs. On the larger machines, one of the major
problems is not changing the standard passwords that are set when the
machine is delivered: the standard user-level password may be USER, the
standard operator password may be OPERATOR, and the standard field repair
person's password may be REPAIR, and so on. Guess how I've cracked
security a couple of times. In a 1988 article by Dr. Cliff Stoll in
"Computers and Security,", he reported that in 10 months of systematic
testing on computers attached to the US Defense Data Network (Milnet),
access was gained in 13% of the attempts simply by guessing at passwords!

There should be some rules applied to passwords: not less than 7 or 8
characters, must be changed at least every 60 days, don't use common
things like names (another way I've broken security), don't share it
under any circumstances and, for heaven's sake, don't post it on the
front of your machine or leave it where someone can find it. It's your
personal PIN - just like the money machine - and the information you're
dealing with is worth money. Some of the most difficult passwords to
break (take it from me) are "two words reversed" (e.g., boardwall,
hornshoe, cuptea), or foreign language words (e.g., coupdegrace,
millegrazie, caliente). Nonsense is good, too: geebleurql is nice.

If you're installing password security on a PC, consider whether you
should have it so tight that there is no recourse to the DOS level or no
ability to boot from the A: drive. You'd need really good password
software (or a good technician on staff) if you have both of these
facilities - otherwise you can lock yourself out - but it's my preference
(especially for the guy who's wiped his root directory twice).

Finally, another area that affects computer security or your ability to
carry on computer operations, and one that is often overlooked, is simple
physical security: keys, thermal shock, vibration, dirt, water, fire,
visibility of information, steady power supply, discharge of static
electricity, magnetic fields, are all relevant to security. We have one
man in our network who should have (a) cabling bolted to his computer and
the floor, (b) a key to his unit, and (c) dust protectors (as well as
password access only without recourse to the DOS level).

When it comes to thermal shock, if you work in an area where the heat is
reduced on winter weekends, I strongly recommend you leave your unit
running over the weekend - just lock the keyboard. If the air
conditioning is shut down, turn your unit off, and don't turn it on until
the temperature is 23C or less. And please don't leave your machine
sitting in the sun, or in front of an open window to attract dust. The
internal temperature raises within 20 mins. or so to >30C, and the effects
of thermal shock are such that it can, first, rock memory chips out of
their sockets, and, worse, misalign the read heads on your disk drive so
that nothing can be read.

- 6 -

(Physical Security - continued)

Vibration, too, is a source of problems, especially for drives. The read
heads actually float over the surface of drives, not on them the way a
record player needle does, and the space tolerance between is measured in
Angstroms (metric version of microinches). Vibration can cause the head
to hit the drive, and you can say goodbye to whatever was written there.

If you're in a particularly sensitive field, and your information is what
might be called top secret to your company, you might also want to look
at two protection devices: one is encryption, and the other is Tempest
hardware or shielding. Encryption involves translating your data using
algorithms to something unreadable, and de-coding it when you need it. It
uses a "key" to choose the algorithm - dont' lose the key! It comes in a
few forms: software controlled encryption, hardware based encryption, or
a combination of the two. Most encryptors work with standard algorithms,
but defense departments and other high-security installations prefer
random algorithms. Tempest hardware, or shielding, protects against
sniffing of signals. ( Signal emanation surveillance is called
"sniffing.") I don't have a computer here to demonstrate this, but if
you take an old battery-operated transistor radio and set the dial to the
bottom of the AM band around 520, try passing it within a foot of your
computer. Your ear might not pick up the individual signals, but I assure
you there's equipment that does. That's why the US Army was blasting rock
music around the Vatican Embassy when Noriega was there - to mask signals.

More important to the average user, though, is avoidance of electro-
magnetic fields (such as ringing phones near a disk or disk drive), and
having an automatic disk head 'parker' that moves the heads to a safe zone
every few seconds. That way, something like a brief power failure is less
likely to cause a "head crash" on the disk.

Simple visibility of information is a risk. Recently I went to a bank
with a court order in hand to give me access to an account. The clerk
simply turned the terminal toward me and, if I'd wanted to bother, I could
have had the account numbers of two other people with identical names.
There is screen saving software that will blank your screen after an
inactivity duration you choose, and personnel should be made conscious
that unauthorized viewing of information is a security risk. And watch
what your staff throw out on paper, too.

When it comes to fire and water, there are two basic rules that everyone
can follow: first, don't smoke around the PC, and second, don't feed the
PC coffee and donuts. You might be able to save a keyboard or some parts
with a bath in distilled water, possibly followed by drying with a warm
hair dryer, but there's no guarantee. I prefer pure isopropyl alcohol -
without the hairdryer so I don't get fried in the process. Don't blast a
computer with a fire extinguisher if you can avoid it. If you do have a
fire or a flood, though, you'd better have a tested disaster recovery
plan, and your backups stored off-site.

All of these issues are reasonably within your control: fraud, theft,
disgruntled employees, practical jokers, fumble fingers, software copying
and physical security, at least as much as the infamous viruses that are
around, but let's take a look at why you're at risk.

- 7 -


Concentration of data in one place

Instantaneous adjustment

Alteration without a trace

Lack of visible records

Complexity of the system


Technical persons can befuddle

General ignorance by non-techie and management

Detection problems

Lack of training

Security checks in programs not specified

Systems not documented

Limited staff resource for programming/management

No separation of duties

Possibility of enormous losses remaining undetected

Reluctance to report - Embarrassment
Lack of sufficient evidence to prosecute
Cost to prosecute outweighs recovery
Company policy ("Press would have a field day")

- 8 -

5. GENERAL SECURITY RULES (All Systems, big and small)

Disaster Recovery } Backup Backup Backup
Plan } Restore (test it to make sure it works)

Store your backup off-site (not in your car!)

Physical security

Password for access control (don't stick your password on
the front of your machine!)

Access to menu only - not to system control level

Reasonableness tests

Balance checks (rounding: up, down, (out?); cross-calculations

Audit trails - all records (terminal i.d., user i.d., date and
time stamping, history record retention)

Fall-through coding (if it doesn't meet a condition, does it go to limbo)

Payroll/Accounts payable: don't pay the same # twice

Fault tolerance level supported (user friendly/hostile -
balance between fault tolerance & productivity)

Call back or no answer on dial-up systems

UPS (Uninterrupted Power Supply, or allowance for graceful
degradation) - or at least an automatic head parker

Logical view rights (your user 'privileges' allows access only to the
data you need to see, e.g., accounting clerks don't need to see
production formulae)

Multi-user environment: protection against deadly embrace

Automatic logoff on inactivity timer / Screen saver

Policy statement re purchasing/use/theft/illegal
software, etc.

Encryption (?) - don't lose the key!

Shielding ("Tempest" hardware for secure systems)

Educate users

- 9 -


As in medicine, a virus needs an 'organism' to which it may attach itself,
and a virus is 'contagious'.

In the case of computers, a virus is usually a destructive piece of code
which attaches to a working program, such as your word processor,
spreadsheet or CAD/CAM software. Viruses are usually written to detect
any load of a computer file that has an extension of .EXE, .COM, .OVL,
.BIN - such extensions representing executable programs. Often, the
virus loads itself into memory, then loads the program you just called, so
the virus is sitting at the front. Then when you exit the program, the
virus code calls for the re-writing of the program back onto the disk -
with the virus still sitting at the front. Other viruses simply go
straight into your boot sector, so they get loaded every time you turn on
your machine. Some do both.

However they 'hide', and whatever they attach to, they got to your machine
on an infected diskette. If you are infected and then copy your software
to use on another machine, guess what happens? Right! That's where the
'contagious' element comes in.

In 1989, more viruses were discovered than in all previous years. There
were over 110 at the end of the year, and 7 were discovered in December
alone. Sources have been from as far away as Pakistan and Bulgaria.

Only .004% have reported infections, but most are not reported. Consider
this: if only 1% were infected, that would be 1/2 million units in the
U.S. alone. At a cost ranging from $300 to $3,000 per unit to recover,
the problem starts to impact the economy as well as the productivity of
staff at your organization. It cost one Texas company US$10M to shut
down their 3,000-unit network for 4 days to find 35 infected units.

One of the major problems with viruses is that 90% of the users who
recover are re-infected within 30 days. One person at my organization
was re-infected 7 times in 2 months! Most reinfections occur for one of
two reasons (not necessarily in this order): your back-up was infected,
or it was a virus that hid in the boot sector on track 0, and track 0 is
not re-written by the standard "FORMAT" command (only a low-level format
will get rid of a track 0 virus). Be careful of some new software as
well: there has been more than one instance of shrink-wrapped software
being infected (software companies have disgruntled employees, too, it


1959 - Scientific American article about 'worms'
1963 - caught my first two frauds (Payroll & Accounts Payable)
1970 - Palo Alto lab - worm which directed activities
1982 - Anonymous Apple II worm
1984 - Scientific American CoreWare Series: held contest to
find the most clever/difficult to detect 'bug'
1987 - Apparent change from intellectual exercise to
dangerous activity.

- 10 -


Massive destruction: Reformatting
Programs erased
Data file(s) modified/erased

Partial/Selective destruction: Modification of data/disk space
File allocation tables altered
Bad sectors created
If match with event, alter or delete

Random havoc: Altering keystroke values
Directories wiped out
Disk assignments modified
Data written to wrong disk

Annoyance: Message
Execution of RAM resident programs
System suspension


Financial gain
Intellectual exercise
Just plain wierd


Change in file size (Usually on .COM, .EXE
.OVL, .BIN, .SYS or .BAT files)
Change in update time or date
Common update time or date
Decrease in available disk or memory space
Unexpected disk access
Printing and access problems
Unexpected system crashes

- 11 -


Variety: Virus vs Bug vs Worm vs Trojan Horse vs Superzapper
vs Trap Doors vs Piggybacking vs Impersonation
vs Wiretapping vs Emulation
Strains / Complexity / Growing Sophistication
Bulletin board use and free software
Largest threats from taking computer work home
Kids using same machine at home
Networked mainframe systems
Travel/airline computers (AA wiped out early 1989)
Work message systems (E-Mail)
POS terminals
Banking / Credit Cards / Money Machines
Income Tax records
Health records

* Global disaster may be on the way *
* No specific laws to deal with malicious programming *
* No single national centre to gather data on infections *


12 viruses (and their strains) account for 90% of all PC infections:
|_| Pakistani Brain
|_| Jerusalem
|_| Alameda
|_| Cascade (1701/1704)
|_| Ping Pong
|_| Stoned
|_| Lehigh
|_| Den Zuk
|_| Datacrime (1280/1168)
|_| Fu Manchu
|_| Vienna (DOS 62)
|_| April First

- 12 -

6.7 QUICK GUIDE TO VIRUS NAMES (Cross referenced)

Name Synonym-1 Synonym-2 Synonym-3 Synonym-4

1168 Datacrime-B
1184 Datacrime II
1280 Datacrime Columbus Day October 12th Friday 13th
1536 Zero Bug
1701/1704 Cascade Falling Letters Falling Tears Autumn Leaves
1704 Cascade
1704 Cascade-B
1704 Cascade-C
1704 Cascade-D
1704 Format 1704 Blackjack Falling Letters
1704 Blackjack 1704 Format Falling Letters
1808 Jerusalem Black Box/Hole Israeli PLO 1808/1813
1813 Jerusalem Black Box/Hole Israeli PLO 1808/1813
2086 Fu Manchu
3066 Traceback
3551 Syslock
500 Virus Golden Gate
512 Virus Friday 13th COM virus
648 Vienna DOS 62 DOS 68 Austrian
AIDS Info Disk
Alameda Virus Yale Merritt Peking Seoul
Alameda-B Sacramento Yale C
Apple II GS LodeRunner
April 1st SURIV01 SURIV02
April 1st-B
Austrian 648 Vienna DOS 62 DOS 68
Australian Stoned New Zealand Marijuana
Autumn Leaves Cascade 1701/1704 Falling Letters Falling Tears
Basit virus Brain Pakistani Brain Lehore
Black Box Jerusalem Israeli Black Hole 1808/1803 PLO
Black Hole Jerusalem Black Box Israeli 1808/1813 PLO
Black Hole Russian
Blackjack 1704 1704 Format Falling Letters
Bouncing Ball Vera Cruz Ping Pong Bouncing Dot Italian virus
Bouncing Dot Italian virus Bouncing Ball Vera Cruz Ping Pong
Brain-B Brain-HD Harddisk Brain Houston virus
Brain-HD Harddisk Brain Houston virus Brain-B

- 13 -

Brain Pakistani Brain Basit virus Lehore
Cascade 1701/1704 Falling Letters Falling Tears Autumn Leaves
Cascade(-B-C-D) 1704
Century Oregon Jan.1, 2000
Columbus Day 1280/Datacrime October 12th Friday 13th
COM virus 512 virus Friday 13th
COM-B Friday 13th-B
COM-C Friday 13th-C
Cookie virus Sesame Street
Dark Avenger
Datacrime 1280
Datacrime-B 1168
Datacrime-II 1184
dBASE virus
Den Zuk Search Venezuelan
Disk Killer Ogre
Do-Nothing (don't believe it!)
DOS-62 Vienna DOS-68 648 Austrian
DOS-68 Vienna DOS-62 648 Austrian
Falling Tears Cascade 1701/1704 Falling Letters Autumn Leaves
Falling Letters 1704 Blackjack 1704 Format
Falling Letters Cascade 1701/1704 Falling Tears Autumn Leaves
Falling Letters-Boot Ping Pong B
Fat 12 Swap Israeli Boot
FluShot4 (a corrupted version of a virus detector - use FluShot4+)
Friday 13th 1280/Datacrime Columbus Day October 12th COM
Friday 13th-B COM-B 512
Friday 13th-C COM-C
Fumble Type
Fu Manchu 2086
Golden Gate 500 Virus
Golden Gate -B
Golden Gate-C Mazatlan
Golden Gate-D
Harddisk Brain Brain-B Brain-HD Houston virus
Holland Girl Sylvia
Houston virus Brain-B Brain-HD Harddisk Brain
Icelandic Disk-Crunching-virus Saratoga 2
Icelandic 1 Saratoga 1
Icelandic 2 System virus
IRQ v. 41
Israeli Friday13 Jerusalem Black Box/Hole 1808/1813 PLO
Israeli Boot Swap Fat 12

- 14 -

Italian virus Bouncing Ball Vera Cruz Ping Pong Bouncing Dot
Jan.1, 2000 Century Oregon
Jerusalem Israeli Black Box/Hole 1808/1813 PLO Friday 13th
Jerusalem-B New Jerusalem
Lehore Brain Pakistani Brain Basit
LodeRunner Apple II GS
MacMag Peace virus
Madonna (while the nice music plays, your hard disk is being destroyed)
Marijuana New Zealand Stoned
Mazatlan Golden Gate-C
Merritt Alameda virus Yale Peking Seoul
Music virus Oropax virus
New Jerusalem Jerusalem-C
New Zealand Stoned Marijuana Australian
New Zealand-B Stoned-B
New Zealand-C Stoned-C
October 12th 1280/Datacrime Columbus Day Friday 13th
Ogre Disk Killer
Oregon Century
Oropax virus Music virus
Pakistani Brain Lehore Basit Brain
Palette Zero Bug
Peace Virus MacMag
Peking Alameda virus Yale Merritt Seoul
Ping Pong Bouncing Dot Italian virus Bouncing Ball Vera Cruz
Ping Pong-B Falling Letters-Boot
PLO Jerusalem Friday 13th 1808/1813 Israeli
Russian Black Hole
Sacramento Alameda-B Yale C
Saratoga 1 Icelandic 1
Saratoga 2 Icelandic Disk-Crunching-virus
Search Den Zuk Venezuelan
Seoul Alameda virus Yale Merritt Peking
Sesame Street Cookie virus
SF virus
Shoe virus UIUC virus (see also Terse Shoe)

- 15 -

Shoe virus-B
Stoned New Zealand Marijuana Australian
Stoned-B New Zealand-B
Stoned-C New Zealand-C
SRI (destroys anti-viral programs before it damages your system)
SURIV01 April 1st
SURIV02 April 1st
Swap Israeli Boot Fat 12
Sylvia Holland Girl
Syslock 3551
System virus Icelandic 2
Terse Shoe (see also Shoe virus)
TP04VIR Vacsina
TP25VIR Yankee Doodle
TP33VIR Yankee Doodle
TP34VIR Yankee Doodle
TP38VIR Yankee Doodle
TP42VIR Yankee Doodle
TP44VIR Yankee Doodle
TP46VIR Yankee Doodle
Traceback 3066
Typo (boot)
Typo (COM) Fumble
UIUC virus Shoe virus
Venezuelan Den Zuk Search
Vera Cruz Ping Pong Bouncing Dot Italian Virus Bouncing Ball
Vacsina TP04VIR
Vienna DOS-62 DOS-68 648 Austrian
Yale Alameda virus Merritt Peking Seoul
Yale C Alameda-B Sacramento
Yankee Doodle TP25VIR
Yankee Doodle TP33VIR
Yankee Doodle TP34VIR
Yankee Doodle TP38VIR
Yankee Doodle TP42VIR
Yankee Doodle TP44VIR
Yankee Doodle TP46VIR
Zero Bug 1536

- 16 -

6.8 TABLE OF VIRUS EFFECTS (by virus name)

This information is a reformatted version of that which was made
available to the writer by the National Computer Security Association,
Suite 309, 4401-A Connecticut Ave. NW, Washington, D.C., 20008.

This list is not as complete as the list of names preceding. Since
viruses must be created and caught before they can be analyzed for the
type of information that follows, this list will never be as complete as
the list of names. In some instances, you may have been infected with a
variation of the name. You might wish to check this list for all
possible variations of a name you've found on the list of synonyms.

Explanation of codes used under "What it does", and analysis of frequency
of occurrence of each effect:

------ - ----------- -
1. Virus uses self-encryption 13 12
2. Virus remains resident 83 74
3. Infects COMMAND.COM 8 7
4. Infects .COM files 62 55
5. Infects .EXE files 41 37
6. Infects .OVL files 15 13
7. Infects floppy disk boot sector 36 32
8. Infects hard disk boot sector 14 13
9. Infects partition table 1 1
10. Corrupts or overwrites boot sector 31 28
11. Affects system run-time operation 53 47
12. Corrupts program or overlay files 57 51
13. Corrupts data files 4 4
14. Formats or erases all/part of the disk 17 15
15. Corrupts file linkage (FAT) 9 8
16. Overwrites program 4 4
17. Mac virus (as opposed to PC virus) 2 2

Increase in Disinfector
VIRUS NAME Prog'm size that works What it does
---------- ----------- ----------- ------------

1168/Datacrime B 1168 SCAN/D 1, 4, 12, 14
1184/Datacrime 2 1184 1, 4, 5, 12, 14
123nhalf 3907 2, 5, 11, 13
1280/Datacrime 1280 SCAN/D 1, 4, 12, 14
1514/Datacrime II 1514 SCAN/D 1, 4, 5, 12, 14
1536/Zero Bug 1536 SCAN/D 2, 4, 11, 12
1701/Cascade 1701 M-1704 1, 2, 4, 11, 12
1704/Format 1704 M-1704 1, 2, 4, 11, 12, 14
1704/Cascade 1704 M-1704 1, 2, 4, 11, 12
1704/Cascade-B 1704 M-1704 1, 2, 4, 11, 12
1704/Cascade-C 1704 1, 2, 4, 11, 12
1704/Cascade-D 1704 1, 2, 4, 11, 12
2930 2930 SCAN/D 2, 4, 5, 12

- 17 -

3066/Traceback 3066 M-3066 2, 4, 5, 12
3551/Syslock 3551 SCAN/D 1, 4, 5, 12, 13
3555 3555 1, 3, 4
405 SCAN/D 4, 16
AIDS Info Disk 0 AIDSOUT 11
Alabama 1560 SCAN/D 2, 5, 11, 12, 15
Alameda-B 2, 7, 10
Alameda-C 2, 7, 10
Alameda/Yale MDISK 2, 7, 10
Amstrad 847 SCAN/D 4, 12
April 1st 2, 4, 11
April 1st-B 2, 5, 11
Ashar MDISK 2, 7, 10
Black Hole 1808 2, 4, 5, 6, 11, 12, 15
Brain-B 2, 7, 8, 10
Brain-C 2, 7, 8, 10
Century 2, 4, 5, 6, 11, 12, 14, 15
Century-B 2, 4, 5, 6, 11, 12, 14, 15
Clone-B 2, 7, 10, 15
Clone virus 2, 7, 8, 10
dBASE 1864 SCAN/D 2, 4, 11, 12, 13
DOS-62-B 3, 4, 11
DOS-62-UNESCO 650 3, 4, 11
Dark Avenger 1800 M-DAV 2, 3, 4, 5, 6, 11, 12, 15
Datacrime II-B 1917 SCAN/D 1, 3, 4, 5, 12, 14
Disk Killer MDISK 2, 7, 8, 10, 11, 12, 13, 14
Do-Nothing 608 SCAN/D 4, 12
Fri 13th COM 512 SCAN/D 4, 12
Fri 13th COM-B 512 4, 12
Fri 13th COM-C 512 4, 12
Fu Manchu 2086 SCAN/D 2, 4, 5, 6, 11, 12
Ghost-Boot ver. MDISK 2, 7, 8, 10, 11
Ghost-COM ver. 2351 SCAN/D 4, 10, 12
Golden Gate 2, 7, 10, 14
Golden Gate-B 2, 7, 10, 14
Golden Gate-C 2, 7, 10, 14
Golden Gate-D 2, 7, 10, 14
IRQ v. 41 4, 5, 11
Icelandic I 642 SCAN/D 2, 5, 11, 12
Icelandic II 661 SCAN/D 2, 5, 11, 12
Italian/Ping Pong MDISK 2, 7, 10, 11
Italian-B MDISK 2, 7, 8, 10, 11
Jerusalem 1808 SCAN/D/A 2, 4, 5, 6, 11, 12
Jerusalem-B 1808 M-JERUSLM 2, 4, 5, 6, 11, 12
Jerusalem-C 1808 2, 4, 5, 6, 11, 12
Jerusalem-D 1808 2, 4, 5, 6, 11, 12
Jerusalem-E 1808 2, 4, 5, 6, 11, 12, 15
Jork 2, 7, 10
Lehigh SCAN/D 2, 3, 12, 14, 16
Lehigh-2 2, 3, 12, 14, 15, 16
Lisbon 648 SCAN/D 4, 12

- 18 -

MIX1 1618 SCAN/D 2, 5, 11, 12
New Jerusalem 1808 M-JERUSLM 2, 4, 5, 6, 11, 12
New Zealand MD 7
New Zealand-B 7, 8
New Zealand-C 7, 8
nVIR 11, 17
Ohio MDISK 2, 7, 10
Oropax 2, 4
Pakistani Brain MDISK 2, 7, 10
Palette/Zero Bug 1536 2, 3, 4,
Payday 1808 M-JERUSLM 2, 4, 5, 6, 12
Pentagon MDISK 7, 10
SF Virus 2, 7, 11, 14
SRI 1808 2, 4, 5, 6, 11, 12
SURIV01 897 SCAN/D 2, 4, 11, 12
SURIV02 1488 SCAN/D 2, 5, 11, 12
SURIV03 SCAN/D 2, 4, 5, 6, 11, 12
SYS 2, 7, 8, 11, 12
SYS-B 2, 7, 8, 11, 12
SYS-C 2, 7, 8, 11, 12
Saratoga 632 SCAN/D 2, 5, 11, 12
Saratoga-2 2, 5, 11, 12
Scores 11, 17
Search HD 2, 7, 8, 10, 11
Search-B 2, 7, 10, 11
Search/Den Zuk MDISK 2, 7, 10, 11
Shoe virus 2, 7, 8, 10
Shoe virus-B 2, 7, 10
Stoned/Marijuana MDISK/P 2, 7, 9, 10, 11, 15
SumDOS 1500 4, 5, 14
Sunday 1636 SCAN/D 2, 4, 5, 6, 11, 12
Swap/Israeli Boot MDISK 2, 7, 10
Sylvia/Holland 1332 SCAN/D 2, 4, 12
Terse Shoe virus 2, 7, 10
Typo (Boot) MDISK 2, 7, 8, 10, 11
Typo/Fumble (COM) 867 SCAN/D 2, 4, 11, 12
Vacsina/TP04VIR 2, 4, 5
Vienna-B 648 SCAN/D 2, 4, 5, 12
Vienna/648 648 M-VIENNA 4, 12
Yankee Doodle 2855 SCAN/D 2, 4, 5, 11, 12
Yankee Doodle/TP25VIR 2, 4, 5
Yankee Doodle/TP33VIR 2, 4, 5
Yankee Doodle/TP34VIR 2, 4, 5
Yankee Doodle/TP38VIR 2, 4, 5
Yankee Doodle/TP42VIR 2, 4, 5
Yankee Doodle/TP44VIR 2, 4, 5
Yankee Doodle/TP46VIR 2, 4, 5

- 19 -


*** None offer complete protection ***

Some do NOT test for boot sector viruses, modification of the command
interpreter, branching into the BIOS, etc., unconventional things that
nasty viruses are known to do. This is not a comprehensive list, but
you'll have an idea of what's available, either commercially or through
public domain. Look for a product that will detect as many of the
effects identified in the previous section as possible. Warning: some
highly publicized virus detectors only search for ONE (1) virus! Others
are more sophisticated, and may even act as a disinfector as well as a

Old virus symptoms vs file changes

Disk Defender * recommended (add-on board - write-protects hard disk)
Disk watcher
Dr. Panda Utilities
IBM - COMPare in DOS
Mace vaccine
Magic Bullets
Sentry * recommended for systems booted regularly
Virus-Pro * recommended for large corporate environments
Shareware: Novirus

Plus what's shown on preceding pages as a "Disinfector that works". I
also have a list of over 100 shareware products that do everything from
detect and/or disinfect to write-protecting the hard drive and requiring
password access .... but my fingers are getting tired from typing at this
point, and there are more important things to cover - after all, if
you're careful, you won't need a list of detectors/disinfectors.

- 20 -


While a "virus" is something hidden within another program that is
waiting to make your system really sick, and a "worm" may be something
that lives on its own and usually transmits through networked computers,
a "Trojan Horse" is a little of both, so I've included it with this virus
section if only to warn you of its existence. It lives on its own as a
program, and will bring you down like Helen of Troy's soldiers. "I
wouldn't copy something like that," you say. Well, like Helen's horse,
it comes disguised. It will purport to do something really neat, like
compress files (so you have more disk space available), sort your
directories (so you can find things more easily), or play chess or
another game with you. In actuality, it's really just waiting to do the
things that viruses do - trash your files, scramble your boot sector, fry
your FAT, or erase your hard disk. It doesn't usually do anything it
promises to do.

The following are just a few examples of the known Trojan Horses, most
of which come from bulletin boards. Please don't misunderstand me, most
BB operators are honest people who are trying to help the computer
industry as a whole, but they can't be held responsible for the people
who might dial into their BB and leave a disaster waiting until the next

SCRNSAVE.COM: This is supposed to blank your screen after x seconds of
inactivity, thus preventing image burn-in or apparently
offering a sense of security; say goodbye to your files
while it erases your harddisk.

TSRMAP: For the 'sophisticated' user who uses Terminate and Stay
Resident programs, it's sometimes handy to have a map of
where these programs are loaded in memory, and be able to
delete some if you're short of memory; hopefully this
same 'sophisticated' user has a copy of track 0, because
his was just sent to heaven ..... or elsewhere.

DOS-HELP: Sounds great, doesn't it? This TSR program is supposed to
give on-line help on DOS commands. Your hard disk was
just formatted.

ULTIMATE.EXE: This is supposed to be a DOS shell (if you've used
Directory Scanner or some other software that allows you
to move around directories and load programs easily, or
even a menu system, then you know what a DOS shell is).
While the "Loading..." message shows on your screen, the
FAT (file allocation table) of your hard disk went to the
trash bin.

BARDTALE.ZIP This purports to be a commercial game from Electronic Arts
(BARDTALE I) Someone reverse engineered this program, and
wrote in a routine to format your hard disk upon

- 21 -

COMPRESS.ARC This is dated April 1 1987, is executed from a file named
RUN-ME.BAT, and is advertised as "shareware from Borland"
(Borland is a highly reputable company). It will not
compress your files, but it will very competently destroy
your FAT table.

DANCERS.BAS You'll actually see some animated dancers in colour -
while your FAT is being tromped on.

DEFENDER.ARC Think you're going to get a copy of Atari's DEFENDER for
nothing, huh? There's still no such thing as a free
lunch, and this one will be particularly expensive: it
not only formats your hard disk, but it writes itself to
your ROM BIOS - the chip that holds the Basic Input Output
System for your machine. Get your wallet out.

SIDEWAYS.COM The good "SIDEWAYS.EXE" is about 30Kb, while this version
is about 3Kb. The really big difference, though, is what
happens to your hard drive - it's spun off into oblivion.

These are only a few of the 70 or so Trojans I have listed at work, but
I'm sure you've got the idea. These programs (a) stand alone, (b) often
claim to do something useful, (c) may be hacked versions of good
software, (d) may be named the same as good software, (e) may send you
back to using a quill pen.

- 22 -

7. PC RULES OF THUMB (Additional to Basic Rules of Thumb)

Run virus check BEFORE backup

Boot floppy systems from known, protected disks only

Never work with masters - first make copies on a trusted machine

Store data on floppy:
set path in autoexec.bat, but load from A: to
ensure data goes to floppy

Save your data periodically while working

Use write protect tabs

Use write protect software on hard disk / backup track 0

Never boot HD systems from floppies (unless known and

New/repaired hard disk? - run a virus detector

Use protection package (practice safe hex)

Avoid shareware / BB demos
if you use a BB, set path to A: beforehand,
download only to A:, poweroff immediately after,
then powerup and do a virus scan on the floppy;
always scan shareware

Know the source of your software

Don't use illegal copies

If your data is truly confidential, don't depend on
DELETE - you must use, e.g., Wipefile

Autopark software


- 23 -


1. Set Read only attributes on all files ending with .COM, .EXE, .SYS,

e.g.: ATTRIB +R *.SYS

2. Use an undocumented trick in DOS of naming your data files ending
with an ASCII blank or NUL character (ASCII 32 or 255): ***


*** Newer versions of DOS will give the ASCII blank or null by
holding the [Alt] key and striking the numeric keypad numbers;

3. Prevent inadvertent formatting of the hard disk:

Rename FORMAT.EXE to (e.g.) DANGER.EXE
Write a 1-line batch file called FORMAT.BAT:
DANGER A: %1 %2 %3 %4 %5 %6

4. Have a batch program as a shutdown routine, to run:

1. Virus Check
2. Copy Track 0
3. Back up your data files
4. Park the heads

- 24 -


Terminate all connections with other computers

Record your last activities

Determine the nature and extent of the damage

Notify other users

Contact the source of the carrier software

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

Back up data files to new diskettes

Erase infected disk (using high or low level format -
low level is preferred to re-write track 0)

Check master disks with detection program(s)

Restore system files

Restore data files

Run detection program(s) again

Be careful in future - think like a thief!

- 25 -


There are many aspects to computer security, none of which are totally
within your control, but all of which are reasonably within your control.
One of the major methods of getting control is to establish an
enforceable security policy AND a disaster recovery plan. However, it's
almost impossible to establish a plan unless you first know what the
risks are.


Try putting some staff into two teams: "hackers" and "police" (or call
them Blue Jays and Cardinals if you find that offensive). The role of
the hackers is to try to dream up all the things they could get from or
do to the company (or to a department) by breaking computer security.
The role of the police is to respond with defenses. Then switch roles.
List all the ideas, no matter how "far out" they seem, then use this for
the basis of risk analysis and disaster recovery planning. The only rule
to this game is that no idea is initially rejected.

Now that you have some idea of the value of your data and the risks it is
under, you can begin to work on a "Computer Security Policy" and a
"Disaster Recovery Plan." While many suggestions have been made on the
previous pages, recognize that not all risks/solutions apply to all
organizations: you have to make some judgement calls based on your
assessment of the risk. The judgement is based on how much loss you can
comfortably sustain, yet remain in business. The level of security
protection you require may not always be the same. It may vary with the
value of the hardware, software or data under consideration; the
security level, therefore, might be stated as "minimal," "discretionary,"
"mandatory," or "verified." The point is, as long as it's been
considered, you're closer to having a good security system than if you
have no policy or a policy that's based on guesswork.

You may find, after working on this for a while, that you may wish to
develop a separate policy for the selection or development, change,
testing and implementation of software. This might be stated as simply
as, "No system shall be acquired, developed, changed or implemented
without the prior approval of the Systems Steering Group." This might
also go on to cover documentation; e.g., "Documentation must be complete
for all systems prior to implementation, and must include sections on
files used, access controls, security considerations and controls

Some further points for consideration are included in the next section.

- 26 -


Any policy on computer security must be based on the premise that
information is a valuable asset of the company, just like its premises,
equipment, raw materials, inventory and so on. More than one company has
gone under because they lost their accounts receivable data in a fire,
flood, or from a simple hard disk failure. The value of your data should
be subjected to a risk analysis, and all identifiable risks assessed. It
is not until you identify the risks that you can plan for a disaster

Your policy might include some of the many things addressed previously in
this paper: e.g., storing data only on removable media (diskettes or
tapes), limiting access to bulletin boards, establishing password
controls, rules on physical security, use of immunization software, etc.
There are, however, some other specific points not previously discussed:

Recognize that security is a management issue, not a technological
issue, and that setting policy is the responsibility of senior
management. They must be 'on board' and understand why a security policy
is needed to make it sensible and effective, and they must give overt

Someone should be in charge of computer and network security. Without
someone in charge, important security tasks may not get done. The duties
of the security manager would include responsibility for limiting access
to the network, securing the information that passes over it, overseeing
password systems, and installing security packages that protect computers
from illegal tampering once a user is on the network. Other duties might
include analyzing the network for security weaknesses and helping users
understand the security strengths and weaknesses of the network.

The amount of time required of the system security specialist may depend
on the size of the organization, and on the number and complexity of the
systems in use or planned.

Having one person in charge is probably the ideal security arrangement.
The security specialist can become aware of all of the issues affecting
computer/network security, can schedule and establish priority for
actions, and can ensure that the actions are taken.

This position in the organization requires some authority and autonomy.
For instance, security is compromised if the boss shares his/her
password. The security specialist needs to be able to change the boss's
password if this happens, and gently but firmly discuss the problems
which could result.

In many organizations, putting two or more people in charge of something
diffuses responsibility. Each can think that some security concern was
the responsibility of the other. If two individuals are charged with
network security, be certain that they work well together, communicate

- 27 -

well, and will each put in their fair share of the analysis and work that
is required for security.

In some organizations, a "communications manager" is responsible for
limiting access to the network (with dialback modems and encryption
devices), while the network manager maintains password systems and
installs security software.

If someone is in charge of network security and you don't know about it,
then they haven't been very obvious about it. They need not be. But if
it is evident to you that security is lacking, then perhaps the issue of
responsibility should be examined (or re-examined).

Those who are most zealous about backups are those who've been affected
in the past by a loss of data. If backups are performed every day, your
computer or network is probably in good shape when the hard disk or file
server goes to heaven. You will want to verify that this is the case,
since most organizations (and individuals) put this off... and off...
until it's too late.

Backing a system up once a week is not enough, unless the system is
rarely used. If your last backup was a week ago, and your hard disk or
the hard disk in the file server crashes, all users of the network have
lost one week's work.

This cost is enormous. If you have 10 users who have lost 30 hours of
work each, if each user is paid $20/hour, and overhead is 100%, then you
have just lost 10 x 30 x 20 x 2 = $12,000. If you assume that backup
takes one $20 hour with a tape drive, you could back the system up 600
times for $12,000. That's nearly three years, if backups are done five
times a week. Many hard disks will not run continuously for three years.
Even if you're a 'stand alone' computer user, your time is valuable. You
might consider a policy that, if recovery covers a period of more than
'x' days, it must be done on the employee's own time, and all deadlines
must be met - tough, but it get's the point across!

Irregular backups are a sign that backup is not taken as seriously as it
should be. It is probably wisest to do the arithmetic, comparing the
costs of backup with the costs of losing work for multiple users. The
cost comparison in the commentary on the second answer doesn't even
consider the possibility of losing irreplaceable files, such as those
containing new accounts receivable entries or new prospects.

Since file backup is a "private" activity, not knowing how often it
occurs does not mean that it does not occur. But if you have a security
concern, you should find out what the correct answer is. After all, if
you use the network, and it is not backed up frequently, it is your work
that is lost when the hard disk in the server crashes.

- 28 -

BEWARE: backing up is NOT enough! You MUST periodically run your
recovery procedure .... how else will you know it will work when you need
it most?

The policy should state the controls in place for purchase of both
hardware and software, and it should be consistent and centralized.
Unless you've seen what some software can do to destroy security, or how
difficult it is to interconnect different equipment, this might seem to
destroy some autonomous activities in your organization. Autonomy be
darned, it's the company that's paying the bill.

All warranty registrations must be mailed to the manufacturer, and
records kept of purchase dates, expiry dates and repairs made under the
warranty. Keeping accurate records has substantiated the complete
replacement of more than one machine.

The checking, copying and loading of software should be the
responsibility of one person or department. The 'penalty' for loading
illegal/unauthorized software can range from a note in the personnel file
to dismissal, depending on the organization. The opposite, copying the
organization's software for loading in another location, should also be
covered in the policy, because the company (as the registered owner)
could be party to a lawsuit without the ability to plead ignorance.

In several organizations, when a person submits their resignation, their
access to the computer system is immediately withdrawn. This, of course,
requires a close liaison with the personnel department in large
organizations. Many of these companies feel it's worth the salary cost
to have the person leave the premises immediately (escorted), and simply
pay out their notice period. If your company adopts such a policy, it
should be made very clear that it is not an indication of trust in the
person, but simply a means to reduce risk to the valuable resources of
hardware, software and data. It must be administered consistently and
equitably to avoid problems. There are problems with such a policy,
not the least of which could be someone who gives a very lengthy notice
period simply because they're aware of the policy - but you could
transfer them to a clerical job for the interim (like the mail room) or
to maintenance staff (washroom detail).

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

- 29 -

12. TO RUN SCAN (Virus detection software included on this diskette)

SCAN looks for 42 viruses in software files, but not in data files. I
know it works on Jerusalem-B because I used SCAN to detect that virus on
a machine at work. This is NOT the latest version of SCAN, but then
again, you're not likely to have the latest viruses (I hope).

If you want to print the documentation, type: COPY A:SCAN.DOC PRN
If you want to run SCAN, just type: A:SCAN [drive identifier]
e.g., A:SCAN C:

An article from the Washington Post, January 14, 1990, on Computer
Viruses was added to the diskette after this paper was written.

ref : google.com & yang bersangkutan...


"bagaimana cara menggunakan Telenet" .. "
bagaimana cara menggunakan" outdial.
saya memutuskan untuk menulis sebuah file yang sangat dasar tentang telenet dan bagaimana untuk berkeliling di jaringan.

Yah Telenet and others atau PSN (Packet Switching Networks) jaring ini terhubung ke jaringan lain di seluruh dunia. Anda dapat melakukan banyak hal dengan pengetahuan hanya dasar bahwa saya telah (sebagian besar dari Anda akan tahu ini dan jauh di luar apa yang saya tahu tetapi beberapa akan mendapatkan keuntungan dari itu) saya akan mulai dengan beberapa istilah yang sering digunakan dengan layanan ini.

Akses Nomor-Nomor langsung yang Anda dial untuk mengakses jaringan.

Nua (Network Users Address) - Sebuah Nua pada dasarnya adalah sebuah nomor yang Anda ketik untuk mengakses layanan tertentu memikirkan suatu Nua sebagai sorta nomor telepon benar-benar tidak nya sebuah nomor telepon dengan kode negara ACN atau apa pun karena layanan ini terhubung ke jaringan dunia luas. Saya harap cukup jelas saya menunjukkan ini memikirkan planet bumi sebagai suatu jaringan dan untuk mencapai pelayanan di planet Anda memanggil nomor telepon seperti layanan ini merupakan tempat tinggal orang atau bisnis telepon atau telepon umum apa pun persis seperti pada sebuah jaringan Nua adalah Alamat ke sistem atau outdial apapun pada jaringan tertentu. Aku berharap ini jelas atau atleast sedikit dipahami.

Nui (Network User Identification) - Sebuah Nui seperti Account dan Sandi ke jaringan seperti account dan password ke bbs yang memungkinkan Anda mengakses sistem. Beberapa orang menggunakan Nui untuk hal seperti seperti sistem VAX sistem Unix mereka merujuk ke Nui pada dasarnya rekening pada sistem tertentu yang memungkinkan Anda menggunakan sistem.

DNIC (Data Network Identification Code) - The DNIC seperti kode 4 digit yang mewakili apa PSN itu memikirkan sebuah DNIC seperti AreaCode dan Nua nomor telepon perorangan.

Outdial - Apakah pada dasarnya apa yang dikatakan port modem yang terhubung di suatu tempat di jaringan yang akan memungkinkan Anda untuk membuat panggilan keluar dari dan menghubungkan data hanya ke nomor telepon sebenarnya bukan Nua.

Pad (Packet Assemble Disassembler) - sebuah pad X.25 adalah sangat berguna sebuah pad menggunakan X.25. protokol mentransmisikan pada 9600 bps ke Nua. Hal ini mungkin terdengar lucu tetapi panggilan i mereka "Launch Pads" heh seperti dengan x.25 Anda biasanya dapat mengakses Nua pada planet oleh biasanya mengetik Dnic + Nua.

Sekarang saya akan menjelaskan berbagai hal dan memberikan ide-ide membantu.

Mari saya mulai dengan beberapa hal membantu bagi Anda untuk mencoba dan melakukan.


Hal pertama yang akan Anda harus miliki adalah nomor Access sangat mudah untuk mendapatkan nomor akses lokal Anda. Cukup hubungi telenet di 1-800-TELENET yang jumlah pelanggan layanan mereka dan meminta dialup operator akan meminta kode area Anda dan awalan nomor telepon Anda dia juga akan meminta Anda baud rate. Ada port telenet banyak di seluruh negeri dan internationly dengan berbagai tingkat baud dari 110 bps (Yekh) ke 9600 (i wish i had) sehingga Anda akan ingin port maksimum baud Anda lokasi yang paling memiliki atleast 1200 banyak 2400 dan tidak banyak memiliki 9.600 port seperti untuk kota besar seperti Detroit dan Los Angeles pada akhir dari file saya akan mencantumkan beberapa angka berguna.
Beberapa hal untuk dilakukan sementara online dengan Telenet dan Tymnet. Sementara pada @ pada jenis sistem Telenet "mail" atau "C pos" atau "telemail" atau bahkan "telemail c" telenets ini akses's sistem mail sederhana berjudul "Telemail" dari sana ini akan bertanya "nama pengguna" atau sesuatu seperti itu ketik "telepon" berikutnya akan meminta Anda "password" masukkan "telepon". Layanan telepon memiliki banyak informasi berharga ini akan memberikan menu untuk memilih dari sisanya harus Cukup jelas. Seiring dengan informasi lain pada layanan telepon ada update daftar lengkap dari seluruh nomor akses Telenet yang nyaman. Sekali Anda telah mencoba layanan telepon juga pada telemail masukkan "Intl / Associates" sebagai nama pengguna dan "Intl" untuk nomor akses internasional. Jika Anda menelepon dari luar negeri suatu tempat terhubung dengan nomor akses telenet kemudian ketik Nua ini pada telenet itu @ prompt "311020200142" dan masukkan username dan password.
Anda mungkin ingin mengambil semacam buklet referensi pada Telenet hanya lagi menghubungi nomor layanan pelanggan dan meminta mereka untuk "Bagaimana menggunakan Telenet's Asychronus Layanan Dial" dan memberikan alamat Anda yang Cukup jelas.
Berita gembira dari info lain Anda ingin tahu apakah Anda sudah didnt mengetahui bahwa Telenet dimiliki oleh Sprint Kami layanan jarak jauh.


Hal yang sama berlaku untuk layanan Tymnet pertama-tama Anda memerlukan Nomor Akses. Cukup hubungi layanan pelanggan Tymnet di 1-800-872-7654 dan meminta mereka. Sekali lagi Anda mungkin ingin mendapatkan buku referensi Tymnets tentang cara menggunakan sistem hanya ada lagi meminta mereka untuk mengirimkannya kepada Anda. Setelah online dengan jenis nomor akses Tymnet "Informasi" pada nama pengguna prompt dan Anda akan terhubung dengan hal lain yang bagus di tymnet yang Anda memiliki akses ke semua Nomor Akses mereka juga sama seperti "telepon" layanan pada Telenet. Tymnet dimiliki oleh "McDowell Douglas" korporasi. Tidak seperti Telenet dimana perusahaan jarak jauh memiliki jaringan. Pada Tymnet pada layanan "" Informasi ada pilihan yang sangat dingin yang akan menyediakan Anda dengan semua Dnic's (Jaringan) yang tersedia dari Tymnet. Anda juga mungkin ingin mendapatkan bahwa pada penyangga tapi untuk conveinience Anda saya akan menyertakan salinan itu. File "Basic.NetworksII" adalah daftar lengkap dan saya ingin file Basic.NetworksII harus disertai oleh file ini untuk sebagian besar.


Sekarang saya akan membahas Outdials dan kirim cara untuk menggunakannya. Sebuah Outdial pada Telenet adalah Port PCP biasanya. Ini akan memungkinkan Anda untuk menghubungkan data dengan carrier. Sebuah Outdial adalah modem terhubung ke jaringan untuk mengakses jenis spimply outdial yang outdials Nua. Biasanya Anda akan membutuhkan Nui atau Pad untuk menggunakan Outdial pada Telenet hanya untuk memberitahu Anda. Setelah terhubung ke Outdial pada Telenet ketik "Ctrl-e" untuk masuk ke modus perintah dari Outdial atau jika tajam pada perintah AT modem Hayes Anda hanya mengatur masalah perintah melalui besure Outdial mengetik "Atz" ketika login ke ulang parameter modem ke nilai default. Outdials berkisar dari tarif baud yang berbeda seperti jenis modem yang terhubung ke port Outdial. Ini adalah dasar Telenet Outdial tetapi ada banyak jenis satu Tymnet Asychronus adalah sangat baik Outdial menggunakan seperti saya mengatakan ada berbagai jenis di atas adalah untuk Telenet Outdials PCP yang paling banyak digunakan.

Pemindaian Telenet

Nah sekarang saya akan menjelaskan cara memindai telenet dan bagaimana menemukan PCP dll outdials Ketika pemindaian telenet panggilan Anda Nomor Akses dan pada prompt ini masukkan Nua. Rencana untuk memindai sejumlah Nua's di sesi cuaca nomor terserah Anda, biasanya ketika saya scan i scan di blok dari 100 kamu dapat menemukan banyak hal saat memindai. Aku akan mengatakan bagaimana caranya menemukan outdials PCP, pertama jika Anda mencari kode area tertentu untuk mengambil outdial kode area misalnya 313 outdial biasanya adalah dalam 150 angka pertama discan jadi saya akan menyarankan jika memindai outdials scan seperti ini. kode area yang Anda inginkan dua 0 outdial's kemudian nomor tiga digit sehingga scan akan terlihat seperti ini ... 31300001,31300002,31300003 dll.. im yakin Anda mendapatkannya ... sepanjang jalan Anda mungkin akan menemukan hal-hal rapi lainnya. Beberapa hal yang perlu tahu kapan pemindaian telenet adalah ketika Anda memasukkan Nua dan membeku seperti wont melakukan apa pun mengirim sinyal istirahat, untuk Proterm menggunakan saya saya untuk istirahat Apple sinyal terbuka-apel b setelah sinyal pecah dikirimkan ini harus pergi kembali ke @ prompt lagi. Jika Anda mencoba memindai lain nua secara langsung setelah pecah dari bagian beku Telenet akan memberikan pesan kesalahan "Connection Pending" yang berarti masih mencari sistem Nua dari yang Anda minta sebelumnya. Untuk memperbaiki situasi ini setelah sinyal pecah dikirimkan ketik "d" untuk memutuskan sambungan kemudian akan memberitahu Anda koneksi telah dihentikan. Lanjutkan memindai Nua terus di mana Anda tinggalkan. (Note. Anda akan mendapatkan membekukan dan harus mengulangi urutan berulang-ulang pada ada ALOT Nuas bahwa bekukan) Well i taruhan Anda bertanya "bagaimana saya tahu ketika ive menemukan outdial?" biasanya Telenet akan menjawab dengan pesan terhubung dan maka tidak ada yang mencoba untuk mengetik "Atz" jika menjawab "ok" maka Anda memiliki port Outdial dimana Atz modem Hayes adalah perintah untuk reseting modem yang paramaters ke pengaturan default. Ok sekarang saya akan menjelaskan beberapa hal untuk mencari dan beberapa hal yang bijak untuk dilakukan sementara pemindaian dan juga menyediakan sebuah respon penjelasan kunci.
Setiap kali Anda "Connected" ke Nua menuliskannya tidak peduli apa itu membuat catatan dari apa yang kamu menemukan dan label mereka sebagai contoh jika Anda menemukan pesan-pesan.

Nama Pengguna = a Sistem VAX
Login = sebuah sistem Unix
Primenet = sistem utama
Password = sesuatu yang perlu diperhatikan

Pada dasarnya apa yang menghubungkan mencatat ini sangat berguna untuk menemukan sistem untuk hack meskipun sebagian besar atau semua Telenet telah discan pada suatu waktu atau lain selalu ada somethings to do! yang adalah sebuah FAKTA! Pastikan untuk menuliskan semua "Ditolak Koneksi Kumpulkan" juga karena kita tidak boleh lupa bahwa ketika kita meminta Nua bahwa kita sedang meminta untuk panggilan mengumpulkan semua Nuas didata dalam Telenet tanpa Nui dibayar untuk oleh sistem particlar diminta yang mengapa ketika Outdials Nua diminta tanpa apapun Pad, dll Nui tidak akan excecpt panggilan dalam semua kasus saya temui

Berikut adalah daftar Jaringan Pesan yang Telenet akan menjawab dengan mengingat ini adalah untuk semua jenis Telenet mengakses berikut mungkin muncul dan penjelasan selesai.

@ Adalah perintah jaringan prompt

? entri terakhir tidak valid

Akses Bared - permintaan sambungan Anda tidak mengizinkan Anda untuk terhubung ke sistem ini

Akses ke Alamat Ini tidak diijinkan - Nui Anda tidak diizinkan untuk mengakses alamat yang Anda ketik

Mencoba Dibatalkan - Anda enterd yang memutuskan perintah (seperti yang kita katakan sebelumnya ketika membeku saat scanning)

Sibuk - Semua pelabuhan, tujuan sedang digunakan coba lagi nanti

Kumpulkan peperangan Panggilan Tidak Diizinkan - Kumpulkan peperangan panggilan tidak diizinkan oleh tuan rumah atau disetujui oleh Anda Nui

Connected - terminal Anda telah terhubung ke sistem Nua Anda minta

Sambungan Dari - terminal Anda telah dipanggil oleh komputer lain atau terminal

Connection Pending - Jaringan adalah mencoba untuk membuat sambungan dengan Nua kamu meminta (masukkan perintah d atau "bye" untuk memutus upaya)

Terputus - terminal Anda telah terputus dari terminal Anda disebut

Enhanced Kesalahan Sistem Layanan Jaringan - Telepon Anda couldnt divalidasi menghubungi layanan pelanggan

Enhanced Layanan jaringan tidak tersedia pada saat ini - Serivce untuk sementara tidak tersedia coba lagi nanti

Alamat ilegal - masukkan urutan Connect lagi apakah menjadi Nua atau sistem nama

Biaya tidak valid Permintaan - pilihan pembayaran Anda tidak valid

User Id tidak valid atau Sandi - The Nui yang Anda masukkan tidak valid

Lokal Kemacetan - nomor akses lokal Anda adalah mencoba sibuk lagi dalam beberapa menit

Lokal Putus - Anda telah diputus Terminal

Jaringan lokal Outage - Sebuah masalah sementara adalah mencegah Anda untuk menggunakan jaringan

Lokal Prosedur Kesalahan - Komunikasi masalah oleh jaringan yang disebabkan jaringan agar jelas panggilan Anda

Tidak Tersedia, Tidak Operasi, Tidak Menanggapi - Komputer Anda tidak dapat menerima permintaan Anda untuk koneksi mencoba lagi nanti

Tidak Tersambung - Anda telah memasukkan perintah thai s hanya sah ketika terhubung ke suatu jenis sistem "cont" untuk dibawa kembali ke sambungan

Tidak terjangkau - Sebuah prasyarat sementara mencegah Anda untuk menggunakan jaringan

Password - Ini adalah prompt yang apprears setelah youve memasuki Nui

Kemungkinan *** Data Rugi - connecton sudah di-reset

Koneksi menolak Kumpulkan - pilihan pembayaran Anda harus dibayar dimuka

Menolak - Host copmputer menolak untuk menerima panggilan

Remote Prosedur Kesalahan - Komunikasi masalah memaksa jaringan untuk menghapus panggilan kami

Masih Tersambung - Anda meminta layanan lain saat Anda online lain

Telenet XXX XXX - Jaringan Port Anda menggunakan

Terminal - Ini adalah jenis terminal prompt

Tidak dapat memvalidasi panggilan - Anda Nui untuk sementara disbaled

Tidak dapat memvalidasi admin menghubungi kontak - The Nui telah dinonaktifkan permently

Alamat Unknown - Anda mungkin tidak valid Nua

Panggilan peperangan tidak diizinkan - Telenet Dalam peperangan panggilan tidak diizinkan oleh tuan rumah Anda atau Anda Nui

Yah itu adalah akhir dari pesan Telenet dan ini adalah akhir dari file kita hanya kiri adalah nomor saya miliki dan beberapa hal lain yang biasa

Layanan Pelanggan Telenet 1-800-TELENET
Layanan Pelanggan Tymnet 1-800-872-7654
Telenet akses 1200 bps # 313/964-2988 313/963-2274 313/964-3133 2400 9600 bps
Tymnet Access # 313/962-2870
Global Outdial di 20200123

Nah yang tentang itu id ingin menyapa beberapa orang di sini SoldierOfFortune, Frodo, TheBit, Hellraiser, Icecube, Slaytanic, Korupsi, Lorax, Deadman # The Master Disk, The Hunter, DPAK, MOD, Tikus, The Traxster, The Bandit Apple, El Cid, Shadow, Blue Adept, Blacknight, LOD, Hale, DungeonMaster, Blackbeard, Kilroy, Adegan Interchat Whole, Semua buddys saya dari aliansi, Penjudi, pedang Edge, Misfit, The Flash, QSD teman-teman, Semua orang yang disebut saya Vmb'z untuk "Rad Infoz" dan membantu untuk menjaga itu terjadi dan semua orang seluruh Anda membuat perbedaan "Semua kamu Kids keluar tetap ada Iman!"

ref : google.com & yang bersangkutan

Jumat, 20 Agustus 2010

membuat 3 button serial mouse bekerja secara benar pada Linux.

1. Disclaimer (seperti biasa)
The following document is offered in good faith as comprising only safe programming and
procedures. No responsibility is accepted by the author for any loss or damage caused in any way to
any person or equipment, as a direct or indirect consequence of following these instructions.
1.1 Tambahan disclaimer:
Penterjemah hanya mengalihkan dokumen ini ke dalam bahasa Indonesia. Akan tetapi, penterjemah
akan senang hati menerima koreksi dari terjemahan ini, selama koreksi tersebut tidak mempengaruhi
pengertian aslinya yang ditulis oleh Mr. Short.
2. Pendahuluan
Dokumen paling baru mengenai hal ini dapat dilihat di http://kipper.york.ac.uk/mouse.html
Terjemahan ke dalam bahasa Jepang (kalau-kalau tertarik) http://jf.gee.kyoto-u.ac.jp/JF/JF-ftp/euc/3-
Button-Mouse.euc dan dalam bahasa Perancis http://www.freenix.fr/linux/HOWTO/mini/3-Button-
Kebanyakan aplikasi-aplikasi X dibuat dengan asumsi bahwa sang user akan menggunakan 3-button
mouse. Mouse serial seringkali dan banyak digunakan pada komputer serta harganya cukup murah.
Kebanyakan dari mouse ini adalah 3-button mouse dan biasanya menggunakan Microsoft protocol,
yang dalam teori berarti mouse ini cocok digunakan untuk X windows. (Konon, harga termurah dari
sebuah 3 button mouse sekarang ini mencapai $1.14. [Silahkan terjemahkan sendiri ke dalam
Kebanyakan dual-protocol mouse bekerja dalam dua mode:
2-button Micosoft mode
3-button MouseSystems mode
Dokumen ini menjelaskan langkah-langkah yang harus diambil (secara berlainan) untuk
mengkonfigurasikan mouse anda ke dalam kedua mode yang berlainan ini, terutama langkah-langkah
yang diperlukan dalam menggunakan 3-button mode (yang notabene lebih bermanfaat dari 2-button
Sebenarnya, Linux yang didistribusikan telah semakin mudah untuk di set-up sehingga beberapa
problem yang ada seharusnya sudah dihilangkan. Misalnya, RedHat mempunyai program
"mouseconfig" untuk men-set mouse anda. Akan tetapi, pada beberapa versi dari RedHat5.0 ada
bugs di program "mouseconfig" mereka, sehingga pastikan bahwa anda men-check pacthes untuk ini.
3. Serial Ports
Hal pertama yang harus dilakukan adalah memastikan bahwa software anda dapat "menemukan"
mouse anda. Tentukan serial port dimana mouse anda tersambung -- biasanya ada pada /dev/ttyS0
(COM1 pada DOS) atau /dev/ttyS1 (COM2). (ttyS0 biasanya adalah soket 9 pin sedangkan ttyS1
adalah soket 25-pin, tapi tentu saja hal ini tidak mutlak.) Ada juga /dev/cua devices, yang hampir
sama dengan ttyS, tapi penggunaannya tidak dianjurkan. Untuk kemudahan anda, buat link
baru /dev/mouse yang merujuk pada port ttyS ini. Misalnya, untuk ttyS0:
ln -s /dev/ttyS0 /dev/mouse
4. Switched Mice (mouse dengan switch)
Beberapa mouse, biasanya bukan dari jenis yang termurah, mempunyai sebuah switch pada bagian
bawahnya yang ditandai dengan '2/3', atau kadang-kadang dengan 'PC/MS'. Dalam hal ini, '2'
menunjukkan 2 button Microsoft mode, dan '3' untuk 3 button MouseSystem mode. Switch 'PC/MS'
sedikit lebih kompleks. Anda barangkali mendapatkan 'MS' untuk Microsoft, dan 'PC' untuk
MouseSystem. Kadang-kadang 'PC' dideskripsikan sebagai ps/2 mode, akan tetapi dapat juga berupa
MouseSystem. Jika anda mempunyai mouse seperti itu, anda dapat mengganti switch ke '3' atau 'PC'
lalu gunakan setting MouseSystem pada Xconfigs anda (lihat di bawah), dan mouse anda seharusnya
akan berfungsi dengan sempurna dalam 3-button mode.
5. Normal Mice (mouse biasa)
Kalau pada mouse Anda tidak ada switch, dan tidak adanya instruksi untuk hal tersebut, maka Anda
perlu melakukan sedikit eksperimen.
Pertama kali yang harus dicoba adalah menganggap bahwa pabrik pembuat mouse tersebut
menyatakan yang sebenarnya, dan mouse Anda adalah benar-benar Microsoft mouse. Setuplah
Xconfig untuk mengantisipasi sebuah Microsoft mouse (lihat Xconfig pada bagian no.10) dan
Kalau mouse tersebut tidak berfungsi sama sekali, maka mouse Anda bukanlah Microsoft mouse,
atau mungkin ada masalah lain. Coba terapkan protocol lainnya pada config ("man page" untuk
config file merupakan tempat terbaik untuk memulai.) Lihat juga pada "Berbagai Macam Problem"
pada bagian no.12 di bawah.
Apa yang barangkali Anda temukan adalah ketika menjalankan X, mouse Anda dapat bekerja dengan
baik, tetapi hanya dua button/tombol yang diluar yang bekerja. Anda dapat saja menerima hal ini dan
mengemulasikan tombol ke tiga (dengan menekan kedua tombol kiri dan kanan sebagai pengganti
tombol yang di tengah) seperti halnya yang anda lakukan dengan 2-button mouse. Untuk melakukan
hal ini, ganti file Xconfig Anda seperti yang dicontohkan pada bagian "Contoh Xconfig" di bawah.
Hal ini dapat saja berarti bahwa Anda telah membeli sebuah 3-button mouse untuk suatu hal yang
tidak perlu. Jadi, Anda perlu perhatikan hardware milik Anda.
6. Mengganti/switch sebuah Mouse ke 3-Button Mode
Sebuah mouse murahan bahkan bisa bekerja dibawah Mouse System protocol, dengan ketiga
button/tombol yang bekerja semuanya. Caranya adalah dengan membuat mouse tersebut "berpikir"
bahwa ia adalah sebuah mouse dengan Mouse System, suatu hal yang jarang Anda lihat pada
instruksi mengenai mouse.
Caranya adalah: Sebelum Anda menjalankan komputer, tekan tombol mouse yang sebelah kiri (dan,
untuk amannya, tetap tekan sampai komputer Anda berjalan dengan sempurna.)
Pada saat sebuah mouse mendapatkan power dari komputer, kalau tombol sebelah kirinya ditekan ia
berganti ke Mouse System mode. Ini suatu fakta yang sederhana, tetapi tidak selalu dipublikasikan.
Perhatikan bahwa melakukan "soft reboot" pada komputer Anda tidak akan menghentikan power
pada mouse tersebut dan karenanya cara ini tidak akan berhasil mengganti mode pada mouse Anda.
Ada beberapa cara untuk mengganti/swicth mode pada mouse, yang bisa atau tidak bisa bekerja pada
mouse Anda. Sebagian cara ini tidak sedrastis jika Anda me-reboot komputer, sedangkan dua dari
cara ini lebih drastis lagi.
Kalau komputer anda memungkinkan, Anda dapat mencabut mouse dari soket dan menancapkannya
kembali sambil menekan tombol kiri (walaupun Anda seharusnya tidak mencopot apapun pada saat
komputer anda sedang berjalan, spesifikasi RS232 menyatakan hal ini boleh saja dilakukan.)
Anda dapat me-reset mouse tersebut dengan mengetikkan :
echo "*n" > /dev/mouse
yang hasilnya sama saja dengan jika Anda mencabut mouse tersebut. Tekan tombol kiri untuk Mouse
System mode, dan biarkan (jangan tekan) jika Anda ingin Microsoft mode. Anda dapat letakkan ini
pada script apapun yang anda gunakan untuk memulai X.
Bob Nichols (rnichols@interaccess.com) telah menuliskan sebuah C program yang kecil untuk
melakukan hal yang sama, yang akan bekerja jika perintah echo "*n" tidak jalan (dan sebaliknya.)
Anda bisa dapatkan copy dari source code pada http://kipper.york.ac.uk/src/fix-mouse.c
Seseorang melaporkan bahwa baris 'ClearDTR' pada Xconfig sudah cukup untuk mengganti mode
mouse mereka ke Mouse System mode.
Kalau Anda cukup berani, buka mouse Anda (dan ingat bahwa ini akan menyebabkan garansi Anda
tidak berlaku lagi) dan lihat ke dalam. Pada beberapa mouse, maka ada yang mempunyai switch di
dalam (dengan alasan yang hanya diketahui oleh pabrik pembuatnya.) Besar kemungkinan pada
mouse murahan akan Anda temukan sebuah jumper yang dapat dipindahkan. Switch atau jumper
tersebut dapat mempunyai efek yang sama dengan switch 'PC/MS' seperti yang telah dijelaskan pada
bagian "Switched Mouse" di atas. Anda dapat melihat bahwa papan circuitnya dirancang untuk
pergantian antara 2 dan 3 button/tombol, tetapi hal tersebut belum diterapkan. Bentuk tampilannya
kira-kira seperti ini:
| o | o | o |
Coba sambungkan pin 1-2 atau 2-3 dan lihat apakah hal ini merubah cara kerja mouse Anda. Bila ya,
Anda bisa memasangkan sebuah switch kecil atau men-solder sambungan tersebut sebagai solusi
yang cepat dan permanen.
Alternatif solusi pen-solder-an yang barangkali merupakan cara terakhir untuk mouse yang
sama sekali tidak "mengerti" MouseSystems dari Peter Benie
(pjb1008@chiark.chu.cam.ac.uk): jika switch dari tombol tengah adalah double-pole,
sambungkan satu sisi switch tersebut ke switch tombol kiri, dan sisi lainnya ke switch tombol
kanan. Kalau bukan merupakan switch double pole, gunakan dioda untuk
menyambungkannya. Sekarang, tombol yang ditengah mendorong tombol kiri dan kanan
bersama ke bawah. Pilih "ChordMiddle" pada XF86Config dan Anda jadi punya tombol
tengah yang berfungsi.
Sumber utama dengan menggunakan besi solder pertama kali dijelaskan oleh Brian Craft
(bcboy@pyramid.bio.brandeis.edu). Dua chip mouse generik yang umum adalah Z8350 yang
16 pin dan HM8350A yang 18 pin. Pada setiap chip ini, sebuah pin mengatur mode dari chip
tersebut, seperti ini:
Pin 3
Default Microsoft. Mouse Systems if a button is held on power-up.
Always Mouse Systems.
Always Microsoft.
(Pin dinomerkan sbb:)
pin1 -| \/ |-
pin2 -|
pin3 -|
pin8 -|____|-
(Info ini didapat atas kebaikan Hans-Christoph Wirth dan Juergen Exner, yang mempostkan
hal ini di de.comp.os.linux.hardware) Anda dapat mensolder sambungan antara pin 3 dan gnd,
yang akan membuat mode mouse menjadi Mouse Systems mode.
Peter Fredriksson (peterf@lysator.liu.se) telah mencoba chip SYSGRATION SYS2005, dan
menemukan bahwa menyambungkan Pin 3 ke Gnd akan memaksakan Mouse System mode.
Uli Drescher (ud@digi.ruhr.de) mengkonfirmasikan bahwa hal ini juga bekerja pada chip
HN8348A; Ben Ketcham (bketcham@anvilite.murkworks.net)mengkonfirmasikan hal yang
sama terhadap chip HM8348A (pin 9 adalah Gnd)
Urban Widmark (ubbe@ts.umu.se) menyatakan bahwa hal yang sama juga pada chip
EC3567A1, dimana Pin 8 adalah ground. Penulis sudah mencobanya juga dengan hasil yang
Timo T Metsala (metsala@cc.helsinki.fi) menemukan bahwa pada chip HT6510A pin 3 adalah
mode select dan pin 9 adalah Gnd. Hal yang sama juga pada chip HT6513A. Perusahaan
Holtek juga membuat HT6513B dan HT6513F dimana Gnd pada chip ini adalah pin 8.
Robert Romanowski (robin@cs.tu-berlin.de) menyatakan pin 3 -pin 8 (Gnd) juga bekerja pada
Robert Kaiser (rkaiser@sysgo.de) mengkonfirmasikan bahwa pin 3 - Gnd juga bekerja pada
chip EC3576A1.
Sean Cross (secross@whidbey.com) menemukan hal tersebut dengan pin 2 - pin 7 pada chip
Peter Fox (fox@roestock.demon.co.uk) menggunakan pin 3 - pin 8 pada chip HM8348A.
Jon Klein (jbklein@mindspring.com) menemukan pin 3 - pin 9 pada chip UA5212S.
Sebagai alternatif dari metoda-metoda di atas, Anda dapat membuat mouse Anda menekan
button/tombolnya sendiri pada waktu booting -- circuit ini dari Mathias Katzer
R ---------O------ + Supply
| E
__ /
/ \
B | #V | T
|-----|-# |
Left button switch
| #\ |
\ C
--- C
------O----------> (to somewhere
### Ground
= 100nF capacitor
= 100kOhm
= BC557 transistor
of the mouse
deep inside the mouse)
Mouse yang digunakan untuk test ini adalah mouse tanpa nama dengan model MUS2S -- apakah
metoda ini bekerja pada mouse lainnya atau tidak, tergantung pada circuit dari mouse tersebut. Jika
switchnya tersambung ke ground dan tidak ke +Supply, sebuah npn-transistor seperti BC547 dapat
bekerja; dan kemudian R dan C juga harus ditukar satu sama lainnya.
Nah, begitulah, pilihan ada pada Anda sendiri. Anda bisa tetap gunakan default Microsoft 2-button
mouse, atau lakukan cara penggantian mode tersebut dan jalankan X untuk memanfaatkan kelebihan
7. Wheeled mice (mouse dengan roda)
Mouse beroda muncul semenjak beberapa tahun yang lalu, dimulai dengan Microsoft Intellimouse
dan menyebar ke pembuat lainnya. Roda tersebut dapat di-click seperti halnya button/tombol, atau
digulirkan (scroll) ke atas dan ke bawah. Referensi terbaik yang berada nun jauh di sana adalah
http://www.inria.fr/koala/colas/mouse-wheel-scroll yang menjelaskan bagaimana mendapatkan
banyak aplikasi-aplikasi X untuk mengenal aksi gulir (scrolling action) tersebut.
Secara umum, Anda akan membutuhkan Xserver yang cukup baru untuk menggunakan aksi gulir ini.
Akan tetapi, beberapa server lama juga mengenal aksi click dari mouse tersebut.
8. Menggunakan gpm untuk mengganti Mouse Modes
adalah program yang memungkinkan untuk menggunakan mouse pada console mode. Program
ini biasanya sudah termasuk pada distribusi Linux, dan dapat dimulai dari command line atau pada
star-up script /etc/rc.d/rc.local. Perhatikan bahwa distribusi linux ini tidak selalu mempunyai versi
terbaru (versi 1.13 pada saat penulisan how-to ini) yang bisa didapat pada mirror dari
Mode utama utuk serial mouse pada gpm adalah
gpm -t ms
gpm -t msc
gpm -t help
untuk mode Microsoft atau mode MouseSystems, atau untuk memeriksakan mouse untuk anda dan
memberitahu Anda apa yang ditemukannya. Untuk menjalankan gpm pada MouseSystems mode,
Anda mungkin membutuhkan -3 flag, dan kemungkinan juga DTR, dengan menggunakan -o dtr flag:
gpm -3 -o dtr -t msc
gpm seringkali bisa mengenal semua tiga button/tombol dari mouse bahkan walaupun dalam
Microsoft mode. Dan versi-versi yang lebih baru (versi 1.0 dan selanjutnya (?)) dapat menjadikan
informasi ini tersedia untuk program lainnya. Untuk menjalankan hal ini, anda perlu menjalankan
gpm dengan -R flag, seperti ini:
gpm -R -t ms
Hal ini akan menyebabkan gpm mengekspor kembali data dari mouse ke device baru yang disebut
dengan /dev/gpmdata, yang bagi program lainnya kelihatan seperti sebuah mouse. Perhatikan
bahwa device ini *selalu* menggunakan MouseSystems protocol. Anda kemudian dapat men-set
Xconfig untuk menggunakannya dan bukannya /dev/mouse seperti yang diperlihatkan di bawah.
Tapi tentu saja Anda harus memastikan bahwa gpm selalu berjalan ketika menggunakan X. Beberapa
orang melaporkan bahwa dengan menggunakan teknik ini, beberapa aktivitas/action tombol tengah
tidak diinterpretasikan secara benar oleh X. Hal ini dapat ditelusuri ke setup dari masing-masing
Merubah pemetaan (mapping) button/tombol untuk gpm dan X (gustafso@math.utah.edu): Anda
bisa melihat bahwa gpm menggunakan pemetaan tombol standar (default buton mappings) yang
berbeda-beda pada X, sehingga menggunakan kedua system pada mesin yang sama bisa
membingungkan. Untuk membuat X menggunakan tombol yang sama dalam operasi memilih
(select) dan menaruh (paste)seperti gpm, gunakan perintah X
xmodmap -e "pointer = 1 3 2"
yang menyebabkan tombol kiri mouse untuk memilih dan tombol kanan untuk meletakkan (paste),
baik untuk 2-button ataupun 3-button mouse. Untuk memaksa gpm menggunakan pemetaan standar
tombol dari X, mulailah dengan perintah -B, yaitu
gpm -t msc -B 132
9. Menggunakan dua mouse
Pada beberapa kasus, misalnya sebuah laptop dengan built-in pointing device, Anda mungkin ingin
menggunakan serial mouse sebagai device kedua. Dalam kebanyakan kasus, built-in device ini
menggunakan PS/2 protocol, dan dapat diabaikan jika Anda tidak ingin menggunakannya.
Konfigurasikan saja gpm atau X untuk menggunakan /dev/ttyS0 (atau apapun) seperti biasanya.
Untuk menggunakan keduanya sekaligus, Anda dapat menggunakan gpm -M untuk mengeksport
kembali device tersebut. Detail lebih lanjut bisa dilihat pada gpm man page. Juga, XFree 3.3.1 dan
versi berikutnya mensupport berbagai input devices, dengan menggunakan mekanisme XInput. File-
file XF86 yang di-generate secara otomatis seharusnya punya catatan yang cukup mengenai hal ini.
10. Contoh-contoh file XF86Config dan Xconfig
Lokasi dari file konfigurasi untuk X tergantung pada keluaran (release) tertentu dan distributi yang
anda punyai. Lokasinya mungkin adalah /etc/Xconfig, /etc/XF86Config
atau /usr/X11/lib/XF86Config. Anda seharusnya bisa melihatnya pada saat memulai X -- hal
tersebut akan ditampilkan pada screen sebelum seluruh pilihan ditayangkan. Syntax antara file-file
XF86Config dan Xconfig sedikit berbeda, sehingga keduanya dimasukkan pada distribusi.
Microsoft Serial Mouse
Section "Pointer"
Protocol "microsoft"
Device "/dev/mouse"
# Mouse definition and related parameters
Microsoft Serial Mouse with Three Button Emulation
Section "Pointer"
Protocol "microsoft"
Device "/dev/mouse"
# Mouse definition and related parameters
MouseSystems Three Button Serial Mouse
Section "Pointer"
Protocol "mousesystems"
Device "/dev/mouse"
These two lines probably won't be needed,
try without first and then just the DTR
# Mouse definition and related parameters
# These two lines probably won't be needed,
# try without first and then just the DTR
Microsoft Serial Mouse with gpm -R
Section "Pointer"
Protocol "MouseSystems"
Device "/dev/gpmdata"
# Mouse definition and related parameters
11. Kabel-kabel, extension dan adaptor
Kabel yang hanya diperlukan untuk kabel mouse adalah: TxD dan RxD untuk transfer data, RTS
dan/atau DTR untuk sumber power, dan ground. Diterjemahkan ke dalam nomer pin, mereka adalah:
9-pin port
25-pin port
Tabel di atas bisa berguna jika Anda ingin membuat adaptor antara steker (plug) 9 pin dan 25 pin,
atau untuk membuat kabel extension.
12. Macam-macam Problem dan Setup
Kalau Anda mendapatkan masalah dengan mouse pada X atau console mode, periksa bahwa
Anda tidak sedang menjalankan getty pada serial line, atau lainnya seperti modem. Juga
periksa kemungkinan konflik pada IRQ
Anda mungkin perlu menekan dan menahan tombol kiri mouse pada saat memulai (booting) X
windows. Beberapa sistem mungkin mengirimkan semacam sinyal atau "spike" ke mouse
ketika X dimulai.
Serial device yang bermasalah bisa jadi disebabkan oleh serial port tersebut yang tidak
terinisialisasi secara benar pada saat dimulai (boot). Inisialisasi ini dilakukan oleh perintah
setserial, yang dijalankan dari start-up script /etc/rc.d/rc.serial. Periksa man page
mengenai "setserial" and Serial-HOWTO untuk lebih jelasnya lagi. Barangkali akan berguna
jika dilakukan sedikit percobaan mengenai tipenya, misalnya coba perintah
setserial /dev/mouse uart 16550 atau 16550a, apapun port yang anda punyai. (Misalnya,
mouse tidak cocok dengan 16c550AF)
Flag ClearDTR mungkin tidak bisa bekerja dengan benar pada beberapa sistem, kecuali jika
Anda matikan RTS/CTS handshaking dengan perintah :
stty -crtscts < /dev/mouse
(diuji pada UART 16450/Pentium oleh Vladimir Geogjaev (geogjaev@wave.sio.rssi.ru)
Mouse Logitech mungkin memerlukan baris ChordMiddle untuk memungkinkan bekerjanya
button tengah dari ke 3 button. Baris ini menggantikan Emulate3Buttons atau diletakkan
setelah baris /dev/mouse pada file config. Anda juga mungkin membutuhkan baris ClearDTR
dan ClearRTS pada Xconfig anda. Beberapa mouse Logitech secara pasti tidak memerlukan
baris ChordMiddle - salah satu cirinya adalah menu seakan-akan bergerak bersama dengan
mouse dan bukannya bergulir (scroll) ke bawah. (Dari: chang@platform.com)
Swapping/menukar button: gunakan perintah xmodmap untuk mengganti fungsi button/tombol
pada mouse click. Contohnya: xmodmap -e "pointer = 3 2 1" akan mengganti fungsi tombol
pada mouse untuk dapat digunakan pada *tangan kiri*. Jika anda hanya punya 2-button
mouse, maka gunakan angka 1 dan 2.
Percepatan (acceleration): gunakan perintah xset untuk mengganti setting dari mouse.
Contohnya, xset m 2 akan men-set percepatan menjadi 2. Lihat man page untuk perincian yang
Pointer offset: jika clik action sepertinya terjadi dari sebelah kiri atau kanan dimana cursor
berada, kemungkinannya adalah screen anda tidak "disejajarkan" (aligned). Ini adalah problem
dengan driver S3, yang bisa anda betulkan dengan menggunakan xvidtune. Cobalah
Invert_VCLK/InvertVCLK, atau EarlySC. (Dari: Bill Lavender - lavender@MCS.COM dan
Simon Hargrave.) Pada XF86Config, mungkin jadinya seperti ini:
Subsection "Display"
"1024x768" "800x600" "640x480" "1280x1024"
Invert_VCLK "*" 1
Jika anda mendapatkan 'bouncing' dari mouse button, yakni dua click ketika anda hanya
memerlukan satu saja, maka mungkin ada sesuatu yang salah dengan mouse tersebut. Untuk
Logitech mouse, problem ini sudah dipecahkan oleh Bob Nichols (rnichols@interaccess.com)
dan meliputi mensolder beberapa resistor dan sebuah chip pada mouse untuk menghilangkan
bounce pada microswitches.
Jika beberapa pemakai/users tidak dapat menggunakan mouse tapi sebagian (misalnya root)
bisa, mungkin user tersebut tidak menjalankan hal yang persis sama -- misalnya versi X yang
berbeda atau Xconfig yang berbeda. Periksa pesan-pesan start-up X secara cermat untuk
Jika anda menemukan mouse pointer menghapus hal-hal pada screen anda, maka anda
mempunyai masalah pada server config. Cobalah dengan menambahkan pilihan linear atau
barangkali nonlinear pada bagian graphic card di file config, atau jika PCI board, gunakan
pilihan tgui_pci_write_off dan tgui_pci_read_off. (Sepertinya ini adalah problem dari Trident
Jika cursor dari mouse tidak terlihat pada screen, akan tetapi mouse sepertinya berjalan dengan
lancar, coba gunakan pilihan "sw_cursor" pada bagian Device di file config.
Jika mouse anda berhenti bekerja ketika hari cerah atau ketika lampu dinyalakan, barangkali
sensor pada mouse terganggu oleh cahaya yang masuk lewat cangkang mouse. Anda dapat
mencoba mencat hitam bagian dalam mouse, atau taruh semacam kartu pada bagian atas di
dalam mouse.
Mouse dengan merek Microsoft sering merupakan penyebab masalah. Jenis terbaru dari
"Microsoft Serial Mouse 2.1A" dilaporkan tidak dapat bekerja pada banyak sistem, walaupun
mencabut dan memasangkannya kembali bisa membantu. gpm versi 1.13 dan keatas
seharusnya mendukung mouse 2.1A, dengan menggunakan mouse tipe pnp. (Lihat gpm pada
bagian no.8 mengenai bagaimana mengekspor kembali hal ini.) Microsoft Intellimouse juga
menyebabkan masalah, walaupun hal ini seharusnya sudah disupport oleh XFree versi 3.3.
13. Model-model yang telah diuji
Ada banyak mouse yang berbeda-beda, dan penulis secara jujur tidak dapat mengatakan bahwa Anda
harus pergi dan membeli suatu model tertentu dan bukan lainnya. Apa yang penulis dapat kerjakan
adalah memberikan daftar tentang apa yang penulis kira mouse ini lakukan, berdasarkan pengalaman
dan pemberitahuan. Bahkan dengan informasi ini Anda harus sedikit berhati-hati - penulis
mempunyai dua mouse yang persis sama pada dua komputer di kantor mereka, mouse yang satu
dapat digunakan dan yang satu lagi tidak dapat! Tambahan untuk list ini akan diterima dengan
senang hati.
[daftar di bawah ini tidak diterjemahkan.]
Mouse Systems optical mouse, serial version Works well (as you might expect from the name!)
without ClearDTR or ClearRTS in the config.
WiN mouse, as sold by Office World for eight quid [ini mata uang Inggris]. Standard dual-mode
Agiler Mouse 2900 Standard dual-mode Microsoft/MouseSystems. SYSGRATION SYS2005 chip is
Sicos mouse Works ok, needs ClearDTR & Clear RTS in config.
Index sell a mouse for 10 quid Doesn't work in 3 button mode, but does have nice instructions :-)
Artec mouse Usual dual-protocol mouse, needs `ClearDTR' set in config, NOT `ClearRTS'
DynaPoint 3 button serial mouse. Usual dual-protocol mouse, needs `ClearDTR' AND `ClearRTS' in
Genius Easymouse 3 button mouse Works fine with Mouseman protocol without the ChordMiddle
parameter set. From Roderick Johnstone (rmj@ast.cam.ac.uk)
Truemouse, made in Taiwan Works OK, needs `ClearDTR' in config. From Tim MacEachern
(http://ccn.cs.dal.ca/ ae721/Profile.html)
Champ brand mouse Needs to have switch in PC mode, which enables MouseSystems protocol also.
(From tnugent@gucis.cit.gu.edu.au)
MicroSpeed mouse Usual dual-protocol mouse.
Venus brand ($7) Has a jumper inside to switch between 2 and 3 button mode. (From
Saturn Switched mouse, works OK as MouseSystems in 3-button position. (From
Manhattan mouse Switch for `MS AM' / `PC AT' modes, MS mode works fine with the gpm -R
method. (From komanec@umel.fee.vutbr.cz)
Inland mouse Switch for `PC/MS' modes, works fine. (From http://ptsg.eecs.berkeley.edu/ venkates)
qMouse (3-button), FCC ID E6qmouse X31 Sells in the USA for about $10. Works with `gpm -t msc
-r 20'. No jumpers or switches for MouseSystems 3-button mode. Unreliable in X. Does not respond
to echo "*n" > /dev/mouse.
Mitsumi Mouse (2-button), FCC ID EW4ECM-S3101 Sells in the USA for about $12. Reliable in X
and under gpm, smooth double-button. (These two from gustafso@math.utah.edu)
PC Accessories mouse that i got from CompUSA for under $10 Has PC/MS switch on bottom.
Works OK. (From steveb@communique.net)
First Mouse - seriously cheap at 7.79 pounds at Tempo Dual Microsoft/MouseSystems, mode set by
button depress at power-up. No switches, no links. Four wire connection, echo '*n' doesn't work.
`gpm -R' works a treat. (From peterk@henhouse.demon.co.uk)
Trust 3-button mouse Dual-mode with switch, works OK as MouseSystems in `PC' mode. gpm
doesn't like the Microsoft mode.
Chic 410 Works perfectly when kept in ms mode and used with the gpm -R command. From Stephen
M. Weiss (steve@esc.ie.lehigh.edu)
KeyMouse 3-button mouse Works OK with ClearDTR and ClearRTS in Xconfig; `-o dtr' needed
with gpm. (From EZ4PHIL@aol.com)
Qtronix keyboard `Scorpio 60' All three buttons work in MouseSystems protocol. (From
Tecra 720 laptop The glidepoint is on /dev/cua0; the stick is on /dev/psaux. (From apollo@anl.gov)
Anubis mouse Works fine, need to hold down left button whenever switching to the X virtual
console. From Joel Crisp (Joel.Crisp@bristol.ac.uk)
Yakumo No.1900 mouse Works with gpm -R -t ms exporting to X. (From Oliver Schwank
Genius `Easy Trak' Trackball Is *not* Microsoft compatible, use Mouseman in the Xconfig and it
will work fine. (From VTanger@aol.com)
Highscreen Mouse Pro `Works fine' says alfonso@univaq.it
Logitech CA series Works in X using MMseries protocol, at 2400 Baud, 150 SampleRate. (Should
also apply to Logitech CC, CE, C7 & C9 mice). (From vkochend@nyx.net)
A4-Tech mouse Works OK, needs DTR line under both X and gpm. (From deane@gooroos.com)
Vertech mouse Normal Microsoft/Mousesystems behaviour, can be soldered for a permenant fix.
(From duncan@fs3.ph.man.ac.uk)
Boeder M-7 ``Bit Star'' (and other M series apart from M13) Switches to Mousesystems protocol by
holding any button down at power-on. (From sjt@tappin.force9.co.uk)
Mouse Systems ``Scroll'' Mouse (four buttons and a roller/button) Has a 2/3 switch - in mode 3
functions as a three button MouseSystems mouse, ignoring extra button & wheel. Doesn't need
ClearRTS/DTR. (From parker1@airmail.net)
Radio Shack 3-button Serial Mouse Model 26-8432, available in Tandy for about 20 quid. Works as
Mousesystems with ClearDTR. (From Sherilyn@sidaway.demon.co.uk)
Dexxa serial mouse Works fine using Microsoft protocol in Xconfig, no ChordMiddle or anything
needed. (From slevy@ncsa.uiuc.edu)
Belkin 3 button mouse As purchased from Sears (\$10), needs -o rts under gpm (and probably
ClearRTS under X) when in PC mode. (From mmicek@csz.com)
14. Keterangan Lebih Lanjut
Mouse System mempunyai web site http://www.mousesystems.com/ . Mereka mempunyai
Windows driver jika anda membutuhkannya.
Linux Serial HOWTO terdapat pada berbagai mirror sunsite di berbagai penjuru duania. Jika
Anda tidak tahu letak mirror terdekat, silahkan langsung ke
Ada sebuah penjelasan yang sangat bagus mengenai bagaimana mouse bekerja pada
Detail lebih lengkap tentang file-file Xconfig dan XF86Config didapat pada man page yang
relevan, dan juga pada dokumentasi mengenai pemasangan X windows seperti XFree86
HOWTO. Juga, lihat XFree86 FAQ pada mirror dari http://www.XFree86.org.
Informasi mengenai gpm bisa didapat pada man page, juga bisa coba pada situs Darin Ernst di
Banyak informasi tentang hardware dan software mouse yang bisa didapat pada
15. Mouse Tail (Buntut Tikus ;-) (Penutup)
Banyak informasi untuk dokumen ini yang didapat dari berbagai macam linux newsgroups. Penulis
memohon maaf bahwa dia tidak mencatat setiap orang yang telah berkontribusi secara tidak
langsung lewat jalur ini, dan penulis mengucapkan terima kasih kepada mereka semua.
3 button Microsoft mouse yang murahpun bahkan dapat berfungsi.
Konfigurasikan X untuk mengantisipasi Mouse System mouse.
Tekan dan tahan button/tombol kiri mouse Anda pada saat menghidupkan (boot) komputer
untuk mengganti mouse ke Mouse System mode.
Anda mungkin perlu menekan dan menahan button kiri mouse sewaktu memulai X.
Tikus ternyata lebih cerdas dari yang anda sangka.

ref : belajar-geratis.com