Virus Removal

A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

The term “computer virus” is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system’s hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious.

Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today’s viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging, and file sharing systems to spread.

Services

Thanks for reading this article. Have a computer virus that you having hard time to kill? Please contact us, the virus exterminator.

Source

SIM Card Recovery

Sim card data recovery software is developed to recover deleted text messages (known as SMS) and phone book saved contact numbers (including dialed numbers, fixed numbers) from mobile phone sim card memory. Software provides details of sim card like service provider name, IMSI or card identification number and other similar information.

Recovery of data lost due to

  • Accidentally deleted SMS and Phone book saved contact numbers
  • Inaccessible mobile phone
  • Human error

Recoverable Information

  • SMS
  • Phonebook Number
  • Last Dialed Number
  • Fixed Dialed Number
  • Service Provider Name
  • Card Identification
  • Location
  • IMSI

Services

Contact us for more information on this recovery service. No Recovery No Charge as per other data recovery services.
Due to limitation of SIM Card, overwritten contact / sms is unrecoverable even partial of it’s content.

Secure Erase

Data erasure is a method of software-based overwriting that completely destroys all electronic data residing on a hard drive or other digital media. Permanent data erasure goes beyond basic file deletion commands, which only remove direct pointers to data disk sectors and make data recovery possible with common software tools. Unlike degaussing and physical destruction, which render the disk unusable, data erasure removes all information while leaving the disk operable, preserving assets and the environment.

Software-based overwriting uses a software application to write patterns of meaningless data onto each of a hard drive’s sectors. There are key differentiators between data erasure and other overwriting methods, which can leave data intact and raise the risk of data breach or spill, identity theft and failure to achieve regulatory compliance. Data erasure also provides multiple overwrites so that it supports recognized government and industry standards. It provides verification of data removal, which is necessary for meeting certain standards.

To protect data on lost or stolen media, some data erasure applications remotely destroy data if the password is incorrectly entered. Data erasure tools can also target specific data on a disk for routine erasure, providing a hacking protection method that is a less time-consuming than encryption.

Services

Thanks for reading this article. In short if you have anything that you wish to Securely Delete from (HardDisk, USB Stick, Memory Cards etc), do contact us.

Source

Encryption

Introduction
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

Encryption has long been used by militaries and governments to facilitate secret communication. Encryption is now commonly used in protecting information within many kinds of civilian systems. For example, in 2007 the U.S. government reported that 71% of companies surveyed utilized encryption for some of their data in transit. Encryption can be used to protect data “at rest”, such as files on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers’ personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) are another somewhat different example of using encryption on data at rest.

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks.

Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication code (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g., traffic analysis, TEMPEST, or Trojan horse.

AES Encryption
In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES).

AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before Rijndael was selected as the most suitable (see Advanced Encryption Standard process for more details). It became effective as a standard May 26, 2002. As of 2009, AES is one of the most popular algorithms used in symmetric key cryptography.[citation needed] It is available in many different encryption packages. AES is the first publicly accessible and open cipher approved by the NSA for top secret information

Until May 2009, the only successful published attacks against the full AES were side-channel attacks on specific implementations. The National Security Agency (NSA) reviewed all the AES finalists, including Rijndael, and stated that all of them were secure enough for US Government non-classified data. In June 2003, the US Government announced that AES may be used to protect classified information:

The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. The implementation of AES in products intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and use.”

You may also want to refer to your local Law. Below are the acts from Malaysia Cyber Law:

Three Acts contain a power to require people to decrypt during a search; such a search is allowed when there is reasonable cause to believe that an offence under the Act at issue is being or has been committed. There is therefore no general power to order decryption.

  1. Art. 10 (1) (b) of the Computer Crimes Act 1997 requires (likely) users and people otherwise concerned with the operation of computers or material, during a search, to provide reasonable assistance for the purpose of accessing programs or data or material that is reasonably suspected to be used in connection with an offence under the Act, as well as to produce any information contained in a computer and accessible from the premises to be produced in a form in which it can be taken away and in which it is visible and legible. Refusal to cooperate is punishable with at most 25k ringgit and/or three years’ imprisonment (art. 11).
  2. Art. 79 of the Digital Signature Act 1997 requires people, during a search, to give access to computerised data whether stored in a computer or otherwise, which includes providing the necessary password, encryption code, decryption code, software or hardware required to enable comprehension of computerised data. Refusal to cooperate is punishable with at most 200k ringgit and/or four years’ imprisonment (art. 83).
  3. Art. 249 of the Communications and Multimedia Act requires people, during a search, to give access to computerised data whether stored in a computer or otherwise, which includes providing the necessary password, encryption code, decryption code, software or hardware required to enable comprehension of computerised data. Refusal to cooperate is punishable with at most 100k ringgit and/or two years’ imprisonment (art. 242). This Act contains a provision (art. 256(2)) allowing people to refuse answering questions if they thereby would incriminate themselves; by contrast, the privilege against self-incrimination can be deemed not to hold for complying with a decryption order.

Services
If you are looking for ways to protect your sensitive electronic data from unauthorized person, then you have come to the right place. From here we would like to offer you our service in protecting your electronic data using AES-256 Algorithm (the best & most secure available encryption algorithm available today). We can even provide you with hidden encryption “In situation whereby you are forced to reveal the encrypted data but by using hidden encryption technique you may decrypt what ever fake data you wish to show while the actualy encrypted data remain safe”. Please contact us for more information to secure your data (Internal or External HardDisk, USB Stick, Windows Operating Systems).

Disclaimer & Notices
Although AES-256 is the best encryption technique available today and impossible to crack at the moment, but this doesn’t mean some can’t access your file if they know your password.
Example of how someone / authority might steal your password.

  1. Implement a tracking device / spyware / key logger on your keyboard to steal the password you had key in.
  2. Using phishing method, whereby a spyware disguised as the genuine software to steal your password.
  3. Or simply force you to reveal your password.

Source

  1. Wikipedia
  2. National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information
  3. Crypto Law
  4. Malaysia Communication and Multimedia Act588

Data Recovery

Introduction

Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as hard disk drives, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system.

The most common “data recovery” issue involves an operating system (OS) failure (typically on a single-disk, single-partition, single-OS system), where the goal is to simply copy all wanted files to another disk. This can be easily accomplished with a Live CD, most of which provide a means to 1) mount the system drive, 2) mount and backup disk or media drives, and 3) move the files from the system to the backup with a file manager or optical disc authoring software. Further, such cases can be mitigated by disk partitioning and consistently moving valuable data files to a different partition from the replaceable OS system files.

The second type involves a disk-level failure such as a compromised file system, disk partition, or a hard disk failure —in each of which the data cannot be easily read. Depending on the case, solutions involve repairing the file system, partition table or MBR, or hard disk recovery techniques ranging from software-based recovery of corrupted data to hardware replacement on a physically damaged disk. These last two typically indicate the permanent failure of the disk, thus “recovery” means sufficient repair for a one-time recovery of files.

A third type involves the process of retrieving files that have been deleted from a storage media. Although there is some confusion as to the term, the term “data recovery” may be used to refer to such cases in the context of forensic purposes or spying.

Services

Thanks for reading this article. In short if you have anything that you wish to recover from (HardDisk, USB Stick, Memory Cards etc), do contact us. No recovery No charge.

Source

Bird Nest Products

With dedication & care, we produce the finest Bird Nest products for our customer needs. All of our Bird Nest product is 100% natural & chemical free. Without any bleaching or chemical treatment, our Bird Nest maintain it’s natural nutrient and this is why we are one of the top Bird Nest supplier in Malaysia.

Feel free to look at our product gallery or Click Here to place your order. You are also welcome visit to our Bird Nest processing center to take a closer look at our products.

Photos

Cleaning Process

Services

Besides selling our bird nest product to consumers, we also provide one stop center for processing raw bird nest.

All our bird nest are hand cleaned and NO chemicals / bleach are used in the cleaning process. This is to maintain the natural goodness of the bird nest and also to prevent harmful chemicals from entering our body when consumed.

Below is a summary of our cleaning process:

  1. Raw bird nest from supplier – this raw bird nest may contain alot of dirt, feathers, bird excretion etc.
  2. 1st Cleaning process – our skillfull & experienced staff will then clean & filter unwanted dirt. This process may take an hour or so for each bird nest depending on how dirty is the raw bird nest
  3. 2nd Cleaning process – the bird nest will go thru another round of cleaning / filtering process to ensure that the nest are properly cleaned.
  4. Drying process – after the bird nest has been cleaned, it will be send for drying before packing and return to supplier.

For more information kindly contact us and feel free to visit our processing factory.

Below is a sample video clip on our cleaning process.

Photos