Tips agar terhindar dari jerat UU ITE Pasal 27 ayat 3

Kasus pencemaran nama baik yang dikenakan pada Prita Mulyasari, yang ditahan gara-gara menulis curhat di internet, merupakan wujud ancaman terbesar kebebasan berekspresi di Indonesia. Pencemaran nama baik dalam UU ITE terlalu eksesif. Pasal 27 ayat (3) UU ITE tentang Informasi dan Transaksi Elektronik (UU ITE):

“setiap orang dengan sengaja dan tanpa hak mendistribusikan dan/atau mentransmisikan dan/atau membuat dapat diaksesnya Informasi Elektronik dan/atau Dokumen Elektronik yang memiliki muatan penghinaan dan/atau pencemaran nama baik dapat diajukan ke pengadilan.”

Tips sederhana untuk menghindari “penghinaan dan/atau pencemaran nama baik”, maka sebaiknya “nama objek”  yang mau ditulis harus dipikirkan dulu.  Bisa saja dituliskan dengan sebuah plesetan atau sebuah inisial (apakah dia orang per orang, instansi, perusahaan badan hukum, organisasi, dll).

Gangguan server IIX

Beberapa hari terakhir akses ke server IIX terasa lambat karena ada gangguan network upstream kami. Saat ini gangguan tersebut sudah berhasil diatasi oleh pihak datacenter dan akses ke server IIX sudah normal kembali.
Kami mohon maaf atas ketidaknyamanan ini.

Posted in News. No Comments »

HTML:Iframe-inf wordpress Infection

If your blog has been infected by the HTML:Iframe-inf  infection according to avast here are two scripts that can help you.

First What is the HTML:Iframe infection? – Its just a line of text that is inserted at the end of every index.php and/or index.htm in your website. Nothing to freak out about but you want to fix it. And Its probably due to wordpress not being secure.

Anyways, here is what you do : This is something you run on the commmand line.

You will need to find infected files first.

find / -type f | xargs grep -l '<iframe'  2>/dev/null

or you could print out a list of files possibly comprimised. 

by typing 

find / -type f | xargs grep -l '<iframe'  2>/dev/null >infectedFileslist.txt

The first step is figuring out what is going on with your virus infection.

If you know the time frame of when the virus ran then you could narrow the list of infected files even more by tweaking the find command.

Lets say you know it infected your website about 5 days ago.

Then you would modify the find command to search all files modified less than 10 days ago.

find / -type f -mtime -10 | xargs grep -l '<iframe'  2>/dev/null >infectedFileslist.txt

Remove infected text

find / -type f -mtime -10 | xargs grep -l ‘<iframe’| xargs perl -pi -e ‘s/^.*\<iframe.*$/ /g’

Here is an explanation of what the script does line by line so you can adjust per your situation.

find / -type f -mtime -10 – looks all files that were modified in the last 10 days ( you adjust as needed)

xargs grep -l ‘<iframe’ – of that list of files modified recently look for a line that says <iframe

xargs perl -pi -e ‘s/^.*\<iframe.*$/ /g’ – search and replace that line with a blank space You can modify the script line by line to