Full width home advertisement

Post Page Advertisement [Top]

simple cara sebagai berikut 


Bagi pc yang menggunakan Windows untuk sistem komputer , agar melakukan pencegahan terinfeksi malware wannacry yaitu:
1. Update security pada windows anda dengan install Patch MS17-010 yang dikeluarkan oleh microsoct. Lihat: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
2. Jangan mengaktifkan fungsi macros
3. Non aktifkan fungsi SMB v1
4. Block 139/445 & 3389 Ports
5. Selalu backup file file penting di komputer Anda disimpan di tempat lain.
 
TAPI 
kalo gue sendiri lebih nyaranin make aplikasi deepfrozen dan melakukan penonaktifan macros dan memblock 139/445 & 3389 Ports 
dan download spy hunter disini  - klik kana open new tab
dan untuk mem bypass beberapa virus sejenis bisa pake tutorial gue yang ini
dan beberapa ip wajib di block untuk ke amanan
Server-server Locky
Dalam interval tertentu, Locky selalu mencoba mengakses servernya. Berikut daftar aktifitas dan IP servernya:
3/14/2016 19:32:51
Target: TCP [Local host : 1062] -> [195.22.28.196 : 80 (http)]
3/14/2016 19:32:59
Target: TCP [Local host : 1063] -> [195.22.28.222 : 80 (http)]
3/14/2016 19:33:06
Target: TCP [Local host : 1064] -> [195.22.28.198 : 80 (http)]
3/14/2016 19:33:09
Target: TCP [Local host : 1065] -> [208.100.26.234 : 80 (http)]
3/14/2016 19:33:39
Target: TCP [Local host : 1066] -> [195.154.241.208 : 80 (http)]
3/14/2016 19:34:01
Target: TCP [Local host : 1067] -> [46.4.239.76 : 80 (http)]
3/14/2016 19:34:26
Target: TCP [Local host : 1068] -> [195.22.28.196 : 80 (http)]
3/14/2016 19:34:44
Target: TCP [Local host : 1069] -> [195.22.28.222 : 80 (http)]
3/14/2016 19:34:50
Target: TCP [Local host : 1070] -> [195.22.28.198 : 80 (http)]
3/14/2016 19:34:53
Target: TCP [Local host : 1071] -> [208.100.26.234 : 80 (http)]
3/14/2016 19:35:05
Target: TCP [Local host : 1072] -> [195.154.241.208 : 80 (http)]
3/14/2016 19:35:32
Target: TCP [Local host : 1073] -> [46.4.239.76 : 80 (http)]
3/14/2016 19:36:09
Target: TCP [Local host : 1074] -> [195.22.28.196 : 80 (http)]
3/14/2016 19:36:19
Target: TCP [Local host : 1075] -> [195.22.28.222 : 80 (http)]
3/14/2016 19:36:27
Target: TCP [Local host : 1076] -> [195.22.28.198 : 80 (http)]
3/14/2016 19:36:34
Target: TCP [Local host : 1077] -> [208.100.26.234 : 80 (http)]
3/14/2016 19:36:49
Target: TCP [Local host : 1078] -> [195.154.241.208 : 80 (http)]
3/14/2016 19:37:11
Target: TCP [Local host : 1079] -> [46.4.239.76 : 80 (http)]
3/14/2016 19:37:35
Target: TCP [Local host : 1080] -> [195.22.28.196 : 80 (http)]
3/14/2016 19:37:40
Target: TCP [Local host : 1081] -> [195.22.28.222 : 80 (http)]
3/14/2016 19:37:44
Target: TCP [Local host : 1082] -> [195.22.28.198 : 80 (http)]
3/14/2016 19:37:48
Target: TCP [Local host : 1083] -> [208.100.26.234 : 80 (http)]
3/14/2016 19:38:11
Target: TCP [Local host : 1084] -> [195.154.241.208 : 80 (http)]
3/14/2016 19:38:33
Target: TCP [Local host : 1085] -> [46.4.239.76 : 80 (http)]
3/14/2016 19:38:55
Target: TCP [Local host : 1086] -> [195.22.28.196 : 80 (http)]
3/14/2016 19:38:57
Target: TCP [Local host : 1087] -> [195.22.28.222 : 80 (http)]
3/14/2016 19:38:59
Target: TCP [Local host : 1088] -> [195.22.28.198 : 80 (http)]
3/14/2016 19:39:01
Target: TCP [Local host : 1089] -> [208.100.26.234 : 80 (http)]

Tidak ada komentar:

Bottom Ad [Post Page]