{"id":4233,"date":"2016-05-23T12:48:24","date_gmt":"2016-05-23T04:48:24","guid":{"rendered":"http:\/\/anakaskarpencen.com\/blog\/?p=4233"},"modified":"2016-05-23T13:02:45","modified_gmt":"2016-05-23T05:02:45","slug":"panduan-ransomware-teslacrypt","status":"publish","type":"post","link":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/","title":{"rendered":"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt"},"content":{"rendered":"<p style=\"text-align: justify;\">Ini berita baik bagi anda yang ingin cuba mendapatkan kembali fail-fail yang sudah dijangkiti ransomware TeslaCrypt. Kini anda sudah boleh menyahkan enkripsi yang telah dibuat oleh ransomware berkenaan, berikutan penulis ransomware itu sendiri yang menunjukkan cara-cara untuk memulihkan kembali fail yang sudah dijangkiti.<\/p>\n<p style=\"text-align: justify;\">Sejak kemunculannya pada bulan Mac tahun lalu, virus komputer\u00a0TeslaCrypt telah menggunakan serangan melalui iklan-iklan malware (<em>malvertising attack<\/em>). Ransomware yang pada kebiasaannya mensasarkan pemain-pemain permainan komputer ini akan mengunci fail-fail di dalam komputer pengguna sehinggalah mangsa bersedia membayar &#8216;wang tebusan&#8217; sejumlah USD 500 dalam bentuk Bitcoin. Jangkitan biasanya diterima dari laman-laman yang sudah diceroboh, malvertising dan emel-emel phishing.<\/p>\n<p style=\"text-align: justify;\">Mujurlah penjenayah siber yang bertanggungjawab di dalam serangan-serangan ini telah memberhentikan operasinya dan telah sudi menyediakan kunci induk TeslaCrypt kepada orang ramai secara percuma.<\/p>\n<p style=\"text-align: justify;\">Berikut adalah petikan dari pembangun ransomware TeslaCrypt yang diterbitkan melalui Dark Website;<\/p>\n<blockquote><p>&#8220;Project closed! Master key for decrypt: <strong>440A241DD80FCC5664E861989DB716E08CE627D8D40C7EA360AE855C727A49EE<\/strong>. Wait for other people make universal decrypt software. We are sorry!&#8221;<\/p><\/blockquote>\n<p style=\"text-align: justify;\">Sehubungan dari maklumat tentang kunci induk untuk TeslaCrypt yang boleh didapati secara percuma, pembangun perisian antivirus ESET, telah mengeluarkan perisian ESET TeslaCrypt Decryptor yang boleh dimuat turun secara percuma dari laman webnya.<\/p>\n<h1 style=\"text-align: left;\">Cara Bersihkan ransomware TeslaCrypt guna\u00a0ESET TeslaCrypt Decryptor<\/h1>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4235\" src=\"http:\/\/anakaskarpencen.com\/blog\/wp-content\/uploads\/2016\/05\/Eset-Teslacrypt-Decryptor.png\" alt=\"Eset-Teslacrypt-Decryptor\" width=\"336\" height=\"280\" srcset=\"https:\/\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/Eset-Teslacrypt-Decryptor.png 336w, https:\/\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/Eset-Teslacrypt-Decryptor-300x250.png 300w, https:\/\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/Eset-Teslacrypt-Decryptor-200x167.png 200w\" sizes=\"auto, (max-width: 336px) 100vw, 336px\" \/><\/p>\n<ul>\n<li style=\"text-align: justify;\">Muat turun perisian\u00a0<a href=\"http:\/\/download.eset.com\/special\/ESETTeslaCryptDecryptor.exe\"><strong>ESETTeslaCryptDecryptor.exe<\/strong><\/a> dan simpankan ke dalam komputer anda. Untuk contoh ini kita tempatkannya pada Desktop<\/li>\n<li style=\"text-align: justify;\">Klik Start &gt; All Program &gt; Accessories, klik kanan <strong>Command Prompt<\/strong> dan pilih <strong>Run as administrator<\/strong> dari menu yang muncul.\u00a0Untuk pengguna Windows 8\/8.1\/10, tekan kekunci Windows + Q untuk Search, taipkan <strong>Command Prompt<\/strong> di dalam kotak Search, klik kanan dan\u00a0<strong>Run as administrator<\/strong>.<\/li>\n<li style=\"text-align: justify;\">Taipkan arahan\u00a0<strong>cd %userprofile%\\Desktop<\/strong> (jangan gantikan &#8220;userprofile&#8221; dengan nama pengguna anda\u2013taipkan arahan sama seperti yang ditunjukkan) dan kemudian tekan\u00a0Enter.<\/li>\n<li style=\"text-align: justify;\">Taipkan arahan <strong>ESETTeslaCryptDecryptor.exe<\/strong> dan tekan\u00a0Enter.<\/li>\n<li style=\"text-align: justify;\">Baca &#8216;end-user license agreement&#8217; dan klik &#8216;<strong>Agree<\/strong>&#8216; jika bersetuju untuk meneruskan.<\/li>\n<li style=\"text-align: justify;\">Taipkan\u00a0<strong>ESETTeslaCryptDecryptor.exe C:<\/strong> dan tekan\u00a0Enter untuk mengimbas pemacu\u00a0C dalam mod senyap. Untuk mengimbas pemacu lain, tukarkan C dengan nama pemacu lain.<\/li>\n<li style=\"text-align: justify;\">TeslaCrypt Decryptor\u00a0akan dimulakan dan paparan mesej\u00a0&#8220;<em>Looking for infected files&#8230;<\/em>&#8221; akan muncul. Jika jangkitan ransomware berkenaan ditemui,\u00a0ikuti arahan seterusnya untuk membersihkan anasir-anasir jahat di dalam komputer anda.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Ini berita baik bagi anda yang ingin cuba mendapatkan kembali fail-fail yang sudah dijangkiti ransomware TeslaCrypt. Kini anda sudah boleh menyahkan enkripsi yang telah dibuat oleh ransomware berkenaan, berikutan penulis ransomware itu sendiri yang menunjukkan cara-cara untuk memulihkan kembali fail yang sudah dijangkiti. Sejak kemunculannya pada bulan Mac tahun lalu, virus komputer\u00a0TeslaCrypt telah menggunakan serangan [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4234,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"tdm_status":"","tdm_grid_status":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1011,1111,763],"tags":[2038,2040,2039,968,1476,2037],"class_list":["post-4233","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-komputer","category-perisian-komputer","category-teknologi","tag-decryptor","tag-eset","tag-fail","tag-perisian","tag-ransomware","tag-teslacrypt"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Panduan pulihkan fail yang terkena Ransomware TeslaCrypt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt\" \/>\n<meta name=\"twitter:description\" content=\"Ini berita baik bagi anda yang ingin cuba mendapatkan kembali fail-fail yang sudah dijangkiti ransomware TeslaCrypt. Kini anda sudah boleh menyahkan enkripsi yang telah dibuat oleh ransomware berkenaan, berikutan penulis ransomware itu sendiri yang menunjukkan cara-cara untuk memulihkan kembali fail yang sudah dijangkiti. Sejak kemunculannya pada bulan Mac tahun lalu, virus komputer\u00a0TeslaCrypt telah menggunakan serangan [&hellip;]\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@hteknologimy\" \/>\n<meta name=\"twitter:site\" content=\"@hteknologimy\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shahrul Yusof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/\"},\"author\":{\"name\":\"Shahrul Yusof\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#\\\/schema\\\/person\\\/91a8bad1580f1480c180b9502c0f6d25\"},\"headline\":\"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt\",\"datePublished\":\"2016-05-23T04:48:24+00:00\",\"dateModified\":\"2016-05-23T05:02:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/\"},\"wordCount\":368,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1\",\"keywords\":[\"decryptor\",\"eset\",\"fail\",\"perisian\",\"ransomware\",\"teslacrypt\"],\"articleSection\":[\"Komputer\",\"Perisian\",\"Teknologi\"],\"inLanguage\":\"ms-MY\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/\",\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/\",\"name\":\"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1\",\"datePublished\":\"2016-05-23T04:48:24+00:00\",\"dateModified\":\"2016-05-23T05:02:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/#breadcrumb\"},\"inLanguage\":\"ms-MY\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ms-MY\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1\",\"width\":800,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/panduan-ransomware-teslacrypt\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Utama\",\"item\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/\",\"name\":\"Harian Teknologi\",\"description\":\"Berita Teknologi di Malaysia dan Dunia Terkini\",\"publisher\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ms-MY\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#organization\",\"name\":\"Harian Teknologi\",\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ms-MY\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Harian-Teknologi-Favicon-1.png\",\"contentUrl\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Harian-Teknologi-Favicon-1.png\",\"width\":500,\"height\":500,\"caption\":\"Harian Teknologi\"},\"image\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/HarianTeknologi\\\/\",\"https:\\\/\\\/x.com\\\/hteknologimy\",\"https:\\\/\\\/www.instagram.com\\\/harian_teknologi\\\/\",\"https:\\\/\\\/youtube.com\\\/channel\\\/UCKIL4apJm-3TUxKKGle9S5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#\\\/schema\\\/person\\\/91a8bad1580f1480c180b9502c0f6d25\",\"name\":\"Shahrul Yusof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ms-MY\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g\",\"caption\":\"Shahrul Yusof\"},\"description\":\"Penulis berpengalaman di dalam bidang teknologi maklumat selama 12 tahun dan kerap mengikuti perkembangan teknologi semasa baik di dalam Malaysia mahupun di luar negara. Penulis boleh dihubungi melalui Twitter\",\"sameAs\":[\"http:\\\/\\\/hteknologi.com\\\/blog\",\"https:\\\/\\\/www.facebook.com\\\/shahrulyusof85\",\"https:\\\/\\\/www.instagram.com\\\/shahrul_yusof\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/shahrul-yusof-4a119a113\\\/\",\"https:\\\/\\\/x.com\\\/hteknologimy\",\"https:\\\/\\\/youtube.com\\\/channel\\\/UCKIL4apJm-3TUxKKGle9S5w\"],\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/author\\\/sylarius\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/","twitter_card":"summary_large_image","twitter_title":"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt","twitter_description":"Ini berita baik bagi anda yang ingin cuba mendapatkan kembali fail-fail yang sudah dijangkiti ransomware TeslaCrypt. Kini anda sudah boleh menyahkan enkripsi yang telah dibuat oleh ransomware berkenaan, berikutan penulis ransomware itu sendiri yang menunjukkan cara-cara untuk memulihkan kembali fail yang sudah dijangkiti. Sejak kemunculannya pada bulan Mac tahun lalu, virus komputer\u00a0TeslaCrypt telah menggunakan serangan [&hellip;]","twitter_image":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1","twitter_creator":"@hteknologimy","twitter_site":"@hteknologimy","twitter_misc":{"Written by":"Shahrul Yusof","Est. reading time":"2 minit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/#article","isPartOf":{"@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/"},"author":{"name":"Shahrul Yusof","@id":"https:\/\/hteknologi.com\/blog\/#\/schema\/person\/91a8bad1580f1480c180b9502c0f6d25"},"headline":"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt","datePublished":"2016-05-23T04:48:24+00:00","dateModified":"2016-05-23T05:02:45+00:00","mainEntityOfPage":{"@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/"},"wordCount":368,"commentCount":0,"publisher":{"@id":"https:\/\/hteknologi.com\/blog\/#organization"},"image":{"@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1","keywords":["decryptor","eset","fail","perisian","ransomware","teslacrypt"],"articleSection":["Komputer","Perisian","Teknologi"],"inLanguage":"ms-MY","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/","url":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/","name":"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt","isPartOf":{"@id":"https:\/\/hteknologi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/#primaryimage"},"image":{"@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1","datePublished":"2016-05-23T04:48:24+00:00","dateModified":"2016-05-23T05:02:45+00:00","breadcrumb":{"@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/#breadcrumb"},"inLanguage":"ms-MY","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/"]}]},{"@type":"ImageObject","inLanguage":"ms-MY","@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/#primaryimage","url":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1","contentUrl":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1","width":800,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/hteknologi.com\/blog\/panduan-ransomware-teslacrypt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Utama","item":"https:\/\/hteknologi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Panduan pulihkan fail yang terkena Ransomware TeslaCrypt"}]},{"@type":"WebSite","@id":"https:\/\/hteknologi.com\/blog\/#website","url":"https:\/\/hteknologi.com\/blog\/","name":"Harian Teknologi","description":"Berita Teknologi di Malaysia dan Dunia Terkini","publisher":{"@id":"https:\/\/hteknologi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hteknologi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ms-MY"},{"@type":"Organization","@id":"https:\/\/hteknologi.com\/blog\/#organization","name":"Harian Teknologi","url":"https:\/\/hteknologi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ms-MY","@id":"https:\/\/hteknologi.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/hteknologi.com\/blog\/wp-content\/uploads\/2024\/05\/Harian-Teknologi-Favicon-1.png","contentUrl":"https:\/\/hteknologi.com\/blog\/wp-content\/uploads\/2024\/05\/Harian-Teknologi-Favicon-1.png","width":500,"height":500,"caption":"Harian Teknologi"},"image":{"@id":"https:\/\/hteknologi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HarianTeknologi\/","https:\/\/x.com\/hteknologimy","https:\/\/www.instagram.com\/harian_teknologi\/","https:\/\/youtube.com\/channel\/UCKIL4apJm-3TUxKKGle9S5w"]},{"@type":"Person","@id":"https:\/\/hteknologi.com\/blog\/#\/schema\/person\/91a8bad1580f1480c180b9502c0f6d25","name":"Shahrul Yusof","image":{"@type":"ImageObject","inLanguage":"ms-MY","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g","caption":"Shahrul Yusof"},"description":"Penulis berpengalaman di dalam bidang teknologi maklumat selama 12 tahun dan kerap mengikuti perkembangan teknologi semasa baik di dalam Malaysia mahupun di luar negara. Penulis boleh dihubungi melalui Twitter","sameAs":["http:\/\/hteknologi.com\/blog","https:\/\/www.facebook.com\/shahrulyusof85","https:\/\/www.instagram.com\/shahrul_yusof\/","https:\/\/www.linkedin.com\/in\/shahrul-yusof-4a119a113\/","https:\/\/x.com\/hteknologimy","https:\/\/youtube.com\/channel\/UCKIL4apJm-3TUxKKGle9S5w"],"url":"https:\/\/hteknologi.com\/blog\/author\/sylarius\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2016\/05\/TeslaCrypt-Decryptor.jpg?fit=800%2C500&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p5oWzh-16h","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/posts\/4233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/comments?post=4233"}],"version-history":[{"count":0,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/posts\/4233\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/media\/4234"}],"wp:attachment":[{"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/media?parent=4233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/categories?post=4233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/tags?post=4233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}