While too long for the computer, it is no wonder if the hand, fingers and eyes will feel painful. Instead, give it time a short break every 15 minutes you are typing on the computer. Jakub Krechowicz/SXC.Hu
young man named Yani major Dix origin of Jember, East Java, Criminal Police bodies Reserse secured because allegedly paved the official website of President Susilo Bambang Yudhoyono is located on www.presidensby.info. A number of Parties suggested, hackers computer security need to be embraced and guidance given.
According to Ahmad Alkazimy of the Indonesian Institute of computer security Computer Emergency Response Team (CERT-ID) hackers do not considered the enemy. "My personal
opinion, a talented hacker should be given guidelines," he said.
There must be a convincing approach to not to abuse his ability of talented hackers, especially for activities that violate the law.
Things that were revealed to Muhammad Salman, the Vice-President of the cooperation Indonesia Security Incident Response Team on Internet infrastructure (ID-SIRTII). "There must be social without having to approach a State of memperkeruh. In addition, this virtual world, and there is usually an action of solidarity of the hacker community, "he said.
Sure harvesting enough, catching Sam sympathy from the community of hackers in Indonesia. According to Salman, hackers Community traffic this is the usual case, both in Indonesia and in other countries.
Since Tuesday night until the early hours of Wednesday (30/1/2013), no fewer than seven government site subdomains are attacked and partially-damaging aka replaced view contains the warning message. A number of sites that are crippled, among other things, some subdomains on the KPPU, BPS, the Embassy in Tashkent, Kemensos, Kemenparekraf, Kemenhuk and HAM, and even Indonesia.go.id.
Hacking a government site or violation of public law number 11 year 2008 of the information and electronic transactions. Any person knowingly and without the right do manipulation, change, delete, move or damaging electronic information be considered as breaking the law.
Cyberspace attacks patterns are done nowadays are no longer conventional. The reason, the number of internet protocol address (IP address) can be faked to cover up the trail of the perpetrators. About the scenario was so. Hacking happens in Indonesia is set as if out of the country.
Salman hoped, government site administrator can Windows of this case. "They should improve these security systems, databases, and more care about the customers that they promote," said Salman.
Indirectly, meant this type of hacker actions to get the message that there are dangerous cracks in the site, so that the other party may infiltrate and access to the data.
ID-CERT free government agency contains a contact number or email address that is not valid is call the site manager. The ID-CERT can be according to Ahmad, often a complaint that you let know that there is a dangerous gap in some sites. At that time, the ID-CERT often have trouble communicating with the provider of the site due to existing contacts and email is not valid.