Blog or website has now become a staple of all people in the world. There's Blog, here is the Blog, everywhere there are blogs. Person to use the Blog for a variety of purposes ranging from just to resolve the national tasks, make the diari, or for business.
Along with the development of the better blogs, the bloggers (term for the user Blog) are also beginning to think critically. They are thinking how can this blog into something entertaining and interesting to do. Akhirmya they found a new innovation that is by inserting a "trap" in one part of blogs to mean to people who open it.
This kind of Web/Blog Gets a response from many parties. Most refused because it is considered disruptive, and the rest just agree because it is regarded as a mere joke. Let the Bloggers of expression with all the resources and efforts for not breaking the rules. But in fact, the pros and cons of this thus causing a proliferation of this kind of Blog and more variants.
Get To Know Web Ghost
Web Ghost is a Web/Blog that has disisipi script or content for the purpose of naughty fun.You should know that the script and the content is different from the script and the naughty content is evil or commonly called Malscript.
Both are almost the same and almost unable to distinguish, but no one else is really the same world. Both of these things have a difference in terms of goals, if the script and the content is intended for fun, naughty and nasty content script and have the purpose to steal, damage, and all types of Web Ghost
As explained earlier that the web opens the favor only a fraction of the web's ghost. There are still a wide variety of types of websites and ghosts, both already known of its existence or still gentayangan.
Web ghosts can be grouped or categorized based on the complexity of the web, these types of traps are made, and the impact of the ditimbul-kan. Based on the third, then generally the ghost web can be categorized as follows:
1. Viral Web (web phantom high level)
The web's most dangerous and feared of all people around the world. The reason the web is able to enter into the computer system to embed the parent virus. As a result the effects posed not on the browser, but on the computer entirely.

Web creation itself is very difficult. Need programming language and logic skills to make it.To eliminate the effect of this web You need an antivirus that is installed on your computer.
2. Flash Based Website
Flash Based Website is the web a high level as well, but still under Web viruses. Almost all of the existing Flash files from the planted through a script. The advantages of a ghost website using Flash as a medium is very dynamic. The creator can set a timer, sound, and other effects with ease.

But on the other hand, Flash files have one fatal deficiency, which required an add-on Flash player in a browser to run. Even though now there are already technologies of HTML 5 is capable of playing videos or Flash without the add-on, but most people still use older browsers, so if there is no Flash player, then this website will not run at all.
The example Flash files using the web as their main ingredient ishttp://www.rumdesign.com/wrong. At the time of posting this page load, turn on your speakers and adjust the volume of the loudest, and then wait for 30 seconds. Lo and behold, what happens.
3. Distrubing GIF Image
This technique is actually the old techniques, very traditional, and error-keting period. But in fact many ghost Blog using this way to trap prey. The General form of the use of GIF image in the Blog's Ghost is to simply scare people who are browsing in cyberspace.

In addition to scare, usually used to post a GIF animated image-based hot, either with what purpose, for sure it is not good for the health of the body, especially your eyes.
Maybe if you open the web above would look very seder-hana, in the next chapter I'll will show you how the GIF image can compete with Flash that has a timer.
4. Mall-Script
Mal-Script can be said to be almost identical to the virus. The difference was not created to infect Malscript or damage the PC, but only as interfering with comfort.

Suppose when browsing you open a website and suddenly your browser to move there-to let. It is not caused by a virus or other Malcodes, but rather by javascript that is already arranged so that such an effect occurs.
Whether it is dangerous for the health of YOUR PC? No, this script does not permanently in the computer because she could not menginfeksikan himself to the PC. This Script will only work when you open the website that carries it. So, be careful before opening a website.
5. Video Freak
A website containing videos often also became a media Blog. The actual effect is caused not so bad, but enough to make you bounce off of the seat.
Usually the web like this scheme is showing the video is funny as the intro, after you've eaten by the story line, in the middle of video await a creepy scene that came out unexpectedly followed by a sound effect hihihi ...

The example above is just part of the use of a Video Freak, there are many tricks that can be developed.
In addition to requiring a fast enough connection, another drawback of ghost website using this technique is required an add-on Flash Player to play the video. So essentially, if the victim's browser does not have Flash Player, then the video will not be played.
6. from Defacing
Have you ever seen the real deface? Deface or Cyber Grafity is an action to change the home page or the homepage of a website with the other page was made before permanently. The purpose of deface itself can vary, for example, wanted to introduce himself to the audience, dropping the image of other people, or other.

Once again I reiterate here, we will not discuss deface for evil, but only as pleasure. Deface is is changing the look of the website (any page) for a while and can only be seen by your computer. So when there are other people who open the pages we've deface, it still remains and does not change at all. The following examples of websites that have been temporarily deface.
Visible from the image above, all existing posts have been changed, that originally used the language of Indonesia is now changed into the Java language. Pretty good isn't it. ..
7. phishing scams
Phishing is one of the crimes committed by people who are not responsible with how to create fake pages from a website that contains a Login Form. When COR-ban entered a valid username and password on the page, then that information will be stored in a special file which has been prepared by the creator's website.

On the original site, the username and password you enter will be sent to the server directly to get a cookie so that you can access your account. Examples of phishing scams are most often used, facebook, yahoo, and other social media.
Web Ghost Goal
As you already know beforehand that the main goal of making the web is for sheer pleasure.But who knew that the ghost web has other goals which could not be seen by the naked eye. Many of these goals are not important, but it was enough to cause the satisfaction of yourself. Here is another goal of the ghost web usage:
1. Media promotions
2. the spread of the virus
3. steal passwords
4. the destruction of reputation
5. Famous
6. Testing
7. Learning Media, etc.
Source:
0 komentar:
Posting Komentar