<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Information technology and general education</title><description>This blog is about Information technology and general education, tutorial step by step, download articles, networking, etc...</description><managingEditor>noreply@blogger.com (Muadz Susilo)</managingEditor><pubDate>Fri, 1 Nov 2024 17:41:35 +0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">61</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://moe-adz.blogspot.com/</link><language>en-us</language><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>JADI PEBISNIS GAK HARUS KAYA, TAMPIL MEWAH, ATAU TERLIHAT WAHH</title><link>http://moe-adz.blogspot.com/2010/07/jadi-pebisnis-gak-harus-kaya-tampil.html</link><category>BISNIS SEDERHANA</category><category>PEBISNIS GAK HARUS KAYA</category><category>TRIK BISNIS</category><pubDate>Tue, 6 Jul 2010 00:52:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-8554494782155674776</guid><description>&lt;span style="font-family:arial;"&gt;Menurut saya jadi pebisnis itu gak harus kaya, gak harus mewah ataupun terlihat Wahhh... Karena itu menurut saya hal yang salah. Bisnis itu mudah kok... bisa dilakukan kapanpun dimanapun dan dengan modal berapapun bahkan tanpa modal sekalipun, Intinya hanya niat dan kemauan. Kemauan untuk berusaha dan kemauan untuk mencoba.&lt;br /&gt;&lt;br /&gt;Namun selain itu, dalam berbisnis anda juga tentunya harus memikirkan prospek bisnis anda pada tahun yang akan datang, kira-kira bisnis apa yang gak ada habisnya, itu yang perlu anda pikirkan. sehingga anda tidak kehilangan pelanggan.&lt;br /&gt;&lt;br /&gt;Contoh saja misalkan Seperti bisnis pulsa, menurut saya itu prospek yang sangat bagus buat anda yang ingin berbisnis dengan modal yang pas-pasan. Pulsa itu gak ada habisnya loh... semua orang sekarang ini pasti banyak yang menggunakan HP, dan pastinya membutuhkan pulsa juga agar bisa berkomunikasi.&lt;br /&gt;&lt;/span&gt;&lt;span class="fullpost"  style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;Sebagai refrensi, misalkan seperti &lt;a href="http://otsypulsa.com/"&gt;OtsyPulsa.com&lt;/a&gt;, OtsyPulsa adalah penyedia layanan pengisian pulsa 1 Chip All Operator. Jadi anda tidak disibukkan lagi dengan pengisian pulsa yang harus memiliki chip dari banyak operator. Cukup dengan bermodalkan 1 Kartu Perdana dan 1 handphone dan sejumlah uang untuk deposit Saja anda sudah bisa melakukan pengisian pulsa.&lt;br /&gt;Hehehe.. mudah bukan???&lt;br /&gt;&lt;br /&gt;Itu dulu aja deh selingan dari saya... yang mau bertanya silahkan bertanya, atau yang mau nambahin silahkan ditambahin. Saya sangat terbuka untuk anda semua...&lt;br /&gt;Ok...Selamat mencoba... Semoga SUKSES Buat anda....&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Cara Membuat Iklan PopUp Melayang di Blogspot</title><link>http://moe-adz.blogspot.com/2010/05/cara-membuat-iklan-popup-melayang-di.html</link><category>Iklan PopUp Melayang</category><category>Java Script</category><category>PopUp Window</category><pubDate>Sun, 23 May 2010 05:16:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-5499617714160093349</guid><description>&lt;span style="font-family:arial;"&gt;Saya rasa kalian semua sering menjumpai iklan PopUp yang tampil melayang-layang di web atau blog. contohnya pada saat anda mengunjungi blog ini. Nah disini saya akan mengajarkan anda gemana caranya membuat iklan PopUp tersebut secara detail.&lt;br /&gt;&lt;br /&gt;1. Pertama tama kita mesti login dulu kedalam akun blogger kita.&lt;br /&gt;2. Setelah masuk kehalaman Dasbor kita Pilih Tata Letak pada blog yang akan dikasih iklan tersebut.&lt;br /&gt;3. Pilih Tambah Gadget dan pilih yang HTML/JavaScript lalu copy danpaste kode yang ada dibawah kedalam Gadget HTML/Javascript anda tadi.&lt;br /&gt;&lt;/span&gt;&lt;span class="fullpost"  style="font-family:arial;"&gt;&lt;br /&gt;&amp;lt;style type="text/css"&amp;gt;&lt;br /&gt;#topbar{&lt;br /&gt;position:absolute;&lt;br /&gt;top:600px;&lt;br /&gt;left:600px;&lt;br /&gt;border: 3px #00FF00;&lt;br /&gt;padding: 2px;&lt;br /&gt;background-color: #DBF1FA;&lt;br /&gt;width: 740px;&lt;br /&gt;visibility: hidden;&lt;br /&gt;z-index: 100;&lt;br /&gt;}&lt;br /&gt;&amp;lt;/style&amp;gt;&lt;br /&gt;&amp;lt;script src="http://otsypulsa.com/JS/popup.js" type="text/javascript"&amp;gt;&amp;lt;/script&amp;gt;&lt;br /&gt;&amp;lt;div align="center"&amp;gt;&lt;br /&gt;&amp;lt;div id="topbar"&amp;gt;&lt;br /&gt;&amp;lt;div align="right"&amp;gt;&amp;lt;a style="color: gray; font-weight: bold; font-style: italic;" href="" onclick="closebar(); return false"&amp;gt;&amp;lt;span&amp;gt;[close]&amp;lt;/span&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;&amp;lt;p&amp;gt;&amp;lt;a style="font-weight: bold; color: red;" title="Pasang iklan gratis disini"&amp;gt;Hati-Hati SCAME.!!&amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;&amp;lt;a style="font-style: italic; font-weight: bold; color: #000000;"&amp;gt;Baca dan cermati terlebih dahulu isi iklannya, Semua iklan sepenuhnya tanggung jawab pemasang iklan&amp;lt;/a&amp;gt;&lt;br /&gt;&amp;lt;center&amp;gt;&lt;br /&gt;&lt;span class="Apple-style-span"  style="color:#FF9966;"&gt;&amp;lt;script src="http://adsensecamp.com/show/?id=yYabNzv01wg%3D&amp;amp;cid=1mKE6FR8OXo%3D&amp;amp;chan=KeR%2BxePRQMg%3D&amp;amp;type=1&amp;amp;title=006699&amp;amp;text=000000&amp;amp;background=DBF1FA&amp;amp;border=DBF1FA&amp;amp;url=2D6E89" type="text/javascript"&amp;gt;&lt;br /&gt;&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;br /&gt;&amp;lt;/center&amp;gt;&lt;br /&gt;&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Catatan: Anda bisa gantikan tulisan yang berwarna merah dengan script iklan anda.&lt;br /&gt;Selamat mencoba dan semoga bermanfaat.&lt;/span&gt;&lt;div&gt;&lt;span class="fullpost"  style="font-family:arial;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Menghasilkan Jutaan Rupiah per bulan hanya dengan online kurang lebih 15 menit/hari.</title><link>http://moe-adz.blogspot.com/2010/04/menghasilkan-jutaan-rupiah-per-bulan.html</link><category>Menghasilkan Jutaan Rupiah per bulan hanya dengan online kurang lebih 15 menit/hari.</category><pubDate>Fri, 23 Apr 2010 16:34:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-3668338556743908166</guid><description>&lt;span style="font-family:arial;"&gt;Saya rasa anda semua sering dengar yang namanya PTC... PTC (Paid To Click) adalah model bisnis online. Intinya model bisnis ini menjadi sarana pengubung antara pemasang iklan dan konsumen. Pemasang iklan akan membayar untuk menampilkan sebuah link di situs PTC, Konsumen akan dibayar untuk melihat iklan yang dipasang oleh pemasang iklan tersebut.&lt;br /&gt;&lt;br /&gt;Nah.. ngomong2 masalah PTC, disini saya mau sedikit bercerita tentang NEOBUX. Anda pernah dengar NoeBux??&lt;br /&gt;NeoBux adalah PTC N0. 1 Di Dunia, yaitu layanan internasional gratis yang tersedia dalam bahasa Inggris dan bahasa Portugal. Layanan NeoBux memungkinkan pemasang iklan menjangkau ribuan konsumen potensial dengan menayangkan iklan mereka di website NeoBux. User NeoBux mengklik pada iklan dan melihat iklan tersebut dengan batas waktu yang diberikan oleh pemasang iklan. Setelah melihat iklan, userNeoBux mendapatkan “cash” ke account NeoBux mereka.&lt;/span&gt;&lt;span class="fullpost"  style="font-family:arial;"&gt;&lt;br /&gt;Untuk menjadi user NeoBux dan mulai mendapatkan penghasilan, TIDAK DIPERLUKAN BIAYA (FREE REGISTRATION). Jumlah pendapatan  yang dihasilkan  user bervariasi tergantung dari membership, iklan yang dilihat,  dan jumlah referral yang dimilikinya.&lt;br /&gt;Contoh:&lt;br /&gt;Standard Member (No Investment) dengan 300 RR (maksimum RR yang diperbolehkan) :&lt;br /&gt;&lt;br /&gt;Anda klik 4 iklan setiap hari : 4 x $0.01 = $0.04&lt;br /&gt;Referral Anda klik 4 iklan setiap hari : 4 x $0.005 x 300 = $6&lt;br /&gt;&lt;br /&gt;Dalam sehari Jumlah pendapatan Anda + Referral = $0.04 + $6 = $6.04 /hari&lt;br /&gt;Dalam 1 bulan = $6.04 x 30 hari = $181.2 /bln&lt;br /&gt;Dalam 1 tahun = $181.2 x 12 bln = $2174.4&lt;br /&gt;&lt;br /&gt;Kalo dirupiahkan :&lt;br /&gt;&lt;br /&gt;Misalkan Kurs dollar di ambil Rp.9500,- ,&lt;br /&gt;&lt;br /&gt;maka penghasilan Anda adalah :&lt;br /&gt;Perhari = 6.04 x 9500=  Rp. 57.380,-&lt;br /&gt;Perbulan = 181.2 x 9500 = Rp. 1.721.400,-&lt;br /&gt;Pertahun = 2174.4 x 9500 = Rp. 20.656.800,-&lt;br /&gt;&lt;br /&gt;WAaaooowww....!!!!, sungguh menggiurkan ya???&lt;br /&gt;Hemm... gak usah kebanyakan mikir, kelamaan tar keburu ketinggalan. Langsung gabung aja yuk... Silahkan langsung &lt;a href="http://www.neobux.com/?r=maxakaz"&gt;&lt;b&gt;Klik Disini&lt;/b&gt;&lt;/a&gt; untuk &lt;a href="http://www.neobux.com/?r=maxakaz"&gt;&lt;b&gt;daftar gratis&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Kenapa musti pake link ini yaa... emang  gak  boleh langsung???&lt;br /&gt;Boleh saja, nggak ada perbedaan untuk anda, hanya saja jika anda menggunakan link tersebut khan anda akan lebih enak bertanya jawab ke saya, dan saya juga akan lebih senang anda berhasil karena akan membatu saya juga untuk berhasil. Anggap ajalah ini balas jasa anda karena telah diberikan informasi tentang pekerjaan ini. &lt;br /&gt;&lt;br /&gt;Oke..?? semoga bermanfaat...&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>UNSHIELDED TWISTED PAIR (UTP)</title><link>http://moe-adz.blogspot.com/2010/02/unshielded-twisted-pair-utp.html</link><category>Computer Networking</category><category>Tutorial Networking</category><category>UNSHIELDED TWISTED PAIR (UTP)</category><pubDate>Fri, 5 Feb 2010 01:39:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-3150532737029648602</guid><description>&lt;span style="font-family:arial;"&gt;UNSHIELDED TWISTED PAIR (UTP)&lt;br /&gt;&lt;br /&gt;A. SEJARAH UTP (Unshielded Twisted Pair)&lt;br /&gt;Sebelum kita membahas sejarah kabel UTP, akan lebih baik jika kita mengetahui pengertian dari kabel UTP terlebih dahulu. Kabel UTP (Unshielded Twisted Pair) adalah kabel yang biasa digunakan untuk membuat jaringan atau network computer berupa kabel yang didalamnya berisi delapan buah kabel yang dipilin, dimana setiap kabel mempunyai warna yang berbeda-beda yang digunakan sebagai standart pemasangan kabel jaringan computer, yang setiap pasangnya adalah kembar dengan ujung konektor. Disebut unshielded karena kurang tahan terhadapinterferensi elektromagnetik. Dan disebut twisted pair karena di dalamnya terdapat pasangan kabel yang disusun spiral alias saling berlilitan.&lt;br /&gt;&lt;br /&gt;Ada dua macam Twisted Pair, yaitu:&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;1. Unshielded Twisted Pair (UTP)&lt;br /&gt;2. Shielded Twisted Pair (STP)&lt;br /&gt;&lt;br /&gt;· Perbedaan kedua jenis Twisted Pair adalah:&lt;br /&gt;a. STP terdapat lapisan pelindung atau selubung kabel internal.&lt;br /&gt;b. UTP tidak mempunyai lapisan pelindung kabel.&lt;br /&gt;&lt;br /&gt;· Kabel UTP lebih terkenal daripada STP, karena kabel UTP lebih sering digunakan&lt;br /&gt;sebagai kabel jaringan.&lt;br /&gt;&lt;br /&gt;· Kabel UTP (Unshielded Twisted Pair) ada 2 macam:&lt;br /&gt;1. Untuk kabel telepon yang berisi 4 buah kabel.&lt;br /&gt;2. Untuk jaringan computer yang berisi 8 buah kabel.&lt;br /&gt;&lt;br /&gt;· UTP dispesifikasikan oleh organisasi Electronic Industries Association (EIA) dan&lt;br /&gt;Tellecommunication Industries Association (TIA).&lt;br /&gt;&lt;br /&gt;· Ada 2 standard untuk strtuktur pengkabelan :&lt;br /&gt;1. EIA/TIA-568 yang dikeluakan oleh Electronic Industries Association dan Telecommunications Industry Association.&lt;br /&gt;2. ISO 11801 yang dikeluarkan oleh ISO.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;B. KATEGORI UTP (Unshielded Twisted Pair)&lt;br /&gt;&lt;br /&gt;UTP dikategorikan menjadi delapan (7) kategori :&lt;br /&gt;1. Kategori 1&lt;br /&gt;Hanya mampu mentransmisi suara/voice saja, tidak termasuk data.&lt;br /&gt;2. Kategori 2&lt;br /&gt;Kecepatan transmisi data maksimal 4 Mbps.&lt;br /&gt;3. Kategori 3&lt;br /&gt;Kecepatan transmisi data maksimal 10 Mbps.&lt;br /&gt;4. Kategori 4&lt;br /&gt;Kecepatan transmisi data maksimal 16 Mbps.&lt;br /&gt;5. a. Kategori 5&lt;br /&gt;Kecepatan transmisi data maksimal 100 Mbps.&lt;br /&gt;b. Kategori 5 enhanced&lt;br /&gt;Kecepatan transmisi data maksimal 1000 Mbps.&lt;br /&gt;6. Kategori 6&lt;br /&gt;Kecepatan transmisi data maksimal 1000 Mbps.&lt;br /&gt;7. Kategori 7&lt;br /&gt;Kecepatan transmisi data maksimal 1000 Mbps.&lt;br /&gt;Perbedan tiap kategori adalah pada kecepatan transmisi data. Di bawah ini terdapat keterangan Tiap-Tiap Kategori UTP :&lt;br /&gt;&lt;br /&gt;Type CAT 1, Type UTP&lt;br /&gt;dengan kategori ini biasanya digunakan untuk perangkat telepon dan digunakan juga&lt;br /&gt;pada jalur ISDN (Integrated Service Digital Networks). UTP dengan jenis ini juga sering digunakan untuk menghubungkan modem dengan line telepon.&lt;br /&gt;&lt;br /&gt;Type CAT 2, Type UTP&lt;br /&gt;Kabel ini dapat mentransmisikan data hingga 4 megabit perdetik. UTP dengan kategori ini biasanya digunakan pada jaringan bertopologi token ring.&lt;br /&gt;&lt;br /&gt;Type CAT 3, Type UTP/STP&lt;br /&gt;Kabel ini didesain untuk mendukung komunikasi data dan suara pada kecepatan hingga 16&lt;br /&gt;megabit perdetik. Kabel ini menggunakan kawat-kawat tembaga 24-gauge dalam konfigurasi&lt;br /&gt;4 pasang kawat yang dipilin (twisted-pair) yang dilindungi oleh insulasi. Sering digunakan&lt;br /&gt;pada topologi token ring atau 10BaseT.&lt;br /&gt;Type CAT 4, Type UTP,STP&lt;br /&gt;Mentransfer data dengan kecepatan 20Mbit. Kabel ini menggunakan kawat tembaga 22-&lt;br /&gt;gauge atau 24- gauge dalam konfigurasi empat pasang kawat yang dipilin (twisted pair) yang&lt;br /&gt;dilindungi oleh insulasi. Kabel ini dapat mendukung jaringan Ethernet 10BaseT, tapi&lt;br /&gt;seringnya digunakan pada jaringan IBM Token Rin&lt;br /&gt;Type CAT 5, Type UTP, STP-up to100Mhz&lt;br /&gt;Mentransfer data dengan kecepatan 100Mbit. Kabel ini menggunakan kawat tembaga dalam&lt;br /&gt;konfigurasi empat pasang kawat yang dipilin (twisted pair) yang dilindungi oleh insulasi.&lt;br /&gt;Kabel ini telah distandardisasi oleh Electronic Industries Alliance (EIA) dan&lt;br /&gt;Telecommunication Industry Association (TIA).&lt;br /&gt;Type CAT 5enhanced, Type UTP,STP-up to100Mhz&lt;br /&gt;1 Gigabit Ethernet up to 100meters- 4copper pairs.(kedua jenis CAT5 sering digunakan pada&lt;br /&gt;topologi token ring 16Mbps, Ethernet 10Mbprs atau pada FastEthernet 100Mbps) Type CAT&lt;br /&gt;6 up to 155 MHz or 250 MHz 2,5 Gigabit Ethernet up to 100meters or 10Gbit/s up to 25&lt;br /&gt;meters .20,2db(Gigabit Ethernet) Type CAT 7 up to 200 MHz or 700 Mhz (Gigabit Ethernet)&lt;br /&gt;Giga-Ethernet / 20.8 db&lt;br /&gt;Pemberian kategori 1/2/3/4/5/6 merupakan kategori spesifikasi untuk masingmasing&lt;br /&gt;kabel tembaga dan juga untuk jack. Masing-masing merupakan seri revisi&lt;br /&gt;atas kualitas kabel, kualitas pembungkusan kabel (isolator) dan juga untuk kualitas&lt;br /&gt;“belitan” (twist) masing-masing pasang kabel. Selain itu juga untuk menentukan&lt;br /&gt;besaran frekuensi yang bisa lewat pada sarana kabel tersebut, dan juga kualitas&lt;br /&gt;isolator sehingga bias mengurangi efek induksi antar kabel (noise bisa ditekan&lt;br /&gt;sedemikian rupa). Perlu diperhatikan juga, spesifikasi antara CAT5 dan CAT5&lt;br /&gt;enchanced mempunyai standar industri yang sama, namun pada CAT5e sudah&lt;br /&gt;dilengkapi dengan insulator untuk mengurangi efek induksi atau electromagnetic&lt;br /&gt;interference. Kabel CAT5e bisa digunakan untuk menghubungkan network hingga&lt;br /&gt;kecepatan 1Gbps.&lt;br /&gt;C. KEGUNAAN UTP (Unshielded Twisted Pair)&lt;br /&gt;· Sebagai contoh penggunaan kabel UTP untuk sehari-hari adalah kabel telepon. Salah satu&lt;br /&gt;alasan utama mengapa jenis kabel UTP ini sangat popular dibandingankan dengan jenis kabel&lt;br /&gt;lainnya adalah karena penggunaannya kabel UTP sebagai kabel telepon. Banyak gedung&lt;br /&gt;menggunakan kabel ini untuk sistem telepon dan biasanya ada kabel ekstra yang dipasang&lt;br /&gt;untuk memenuhi pengembangan dimasa mendatang.&lt;br /&gt;· Karena kabel ini juga bisa digunakan untuk mentransmisikan data dan juga suara, maka \&lt;br /&gt;menjadi pilihan untuk membangun jaringan komputer. Yang membedakan antara telepon&lt;br /&gt;dengan computer dalam hal penggunakan kabel UTP ini terletak pada jack-nya atau&lt;br /&gt;konektornya.&lt;br /&gt;· Pada komputer digunakan RJ-45 yang dapat menampung 8 koneksi kabel sedangkan pada&lt;br /&gt;telepon digunakan RJ-11, dapat menampung 4 koneksi kabel dan ukurannya lebih kecil.&lt;br /&gt;Lebih jelasnya bisa dilihat koneksi dari telepon Anda yang menggunakan RJ-11.&lt;br /&gt;· Penjelasan Kegunaan Tiap Kategori : 1. Kabel UTP Kategori 1 (Cat1) adalah kabel UTP&lt;br /&gt;dengan kualitas transmisi terendah, yang didesain untuk mendukung komunikasi suara&lt;br /&gt;analog saja. Kabel Cat1 digunakan sebelum tahun 1983 untuk menghubungkan telefon&lt;br /&gt;analog Plain Old Telephone Service (POTS). Karakteristik kelistrikan dari kabel Cat1&lt;br /&gt;membuatnya kurang sesuai untuk digunakan sebagai kabel untuk mentransmisikan data&lt;br /&gt;digital di dalam jaringan komputer, dan karena itulah tidak pernah digunakan untuk tujuan&lt;br /&gt;tersebut.&lt;br /&gt;2. Kabel UTP Kategori 2 (Cat2) adalah kabel UTP dengan kualitas transmisi yang lebih baik&lt;br /&gt;dibandingkan dengan kabel UTP kategori 1 (Cat1), yang didesain untuk mendukung&lt;br /&gt;komunikasi data dan suara digital. Kabel ini dapat mentransmisikan data hingga 4 megabit&lt;br /&gt;per detik. Seringnya, kabel ini digunakan untuk menghubungkan node-node dalam jaringan&lt;br /&gt;dengan teknologi Token Ring dari IBM. Karakteristik kelistrikan dari kabel Cat2 kurang&lt;br /&gt;cocok jika digunakan sebagai kabel jaringan masa kini. Gunakanlah kabel yang memiliki&lt;br /&gt;kinerja tinggi seperti kategori 3, kategori 4, atau kategori 5.&lt;br /&gt;3. Kabel UTP Kategori3 (Cat3) adalah kabel UTP dengan kualitas transmisi yang lebih baik&lt;br /&gt;dibandingkan dengan kabel UTP kategori 2 (Cat2), yang didesain untuk mendukung&lt;br /&gt;komunikasi data dan suara pada kecepatan hingga 10 megabit per detik. Kabel UTP Cat3&lt;br /&gt;menggunakan kawat-kawat tembaga 24-gauge dalam konfigurasi 4 pasang kawat yang dipilin&lt;br /&gt;(twistedpair) yang dilindungi oleh insulasi. Cat3 merupakan kabel yang memiliki&lt;br /&gt;kemampuan terendah (jika dilihat dari perkembangan teknologi Ethernet), karena memang&lt;br /&gt;hanya mendukung jaringan 10BaseT saja. Seringnya, kabel jenis ini digunakan oleh jaringan&lt;br /&gt;IBM Token Ring yang berkecepatan 4 megabit per detik, sebagai pengganti Cat2.&lt;br /&gt;4. Kabel UTP Kategori 4 (Cat4) adalah kabel UTP dengan kualitas transmisi yang lebih baik&lt;br /&gt;dibandingkan dengan kabel UTP kategori 3 (Cat3), yang didesain untuk mendukung&lt;br /&gt;komunikasi data dan suara hingga kecepatan 16 megabit per detik. Kabel ini menggunakan \&lt;br /&gt;kawat tembaga 22-gauge atau 24- gauge dalam konfigurasi empat pasang kawat yang dipilin&lt;br /&gt;(twisted pair) yang dilindungi oleh insulasi. Kabel ini dapat mendukung jaringan Ethernet&lt;br /&gt;10BaseT, tapi seringnya digunakan pada jaringan IBM Token Ring 16 megabit per detik.&lt;br /&gt;5. Kabel UTP Kategori 5 (Cat5) adalah kabel dengan kualitas transmisi yang jauh lebih baik&lt;br /&gt;dibandingkan dengan kabel UTP kategori 4 (Cat4), yang didesain untuk mendukung&lt;br /&gt;komunikasi data serta suara pada kecepatan hingga 100 megabit per detik. Kabel ini&lt;br /&gt;menggunakan kawat tembaga dalam konfigurasi empat pasang kawat yang dipilin (twisted&lt;br /&gt;pair) yang dilindungi oleh insulasi. Kabel ini telah distandardisasi oleh Electronic Industries&lt;br /&gt;Alliance (EIA) dan Telecommunication Industry Association (TIA). Kabel Cat5 dapat&lt;br /&gt;mendukung jaringan Ethernet (10BaseT), Fast Ethernet (100BaseT), hingga Gigabit Etheret&lt;br /&gt;(1000BaseT). Kabel ini adalah kabel paling populer, mengingat kabel serat optik yang lebih&lt;br /&gt;baik harganya hamper dua kali lipat lebih mahal dibandingkan dengan kabel Cat5. Karena&lt;br /&gt;memiliki karakteristik kelistrikan yang lebih baik, kabel Cat5 adalah kabel yang disarankan untuk semua instalasi jaringan. Kategori Enhanced 5 Kabel ini merupakan versi perbaikan dari kabel UTP Cat5, yang menawarkan kemampuan yang lebih baik dibandingkan dengan&lt;br /&gt;Cat5 biasa. Kabel ini mampu mendukung frekuensi hingga 250 MHz, yang&lt;br /&gt;direkomendasikan untuk penggunaan dalam jaringan Gigabit Ethernet, meskipun&lt;br /&gt;menggunaan kabel UTP kategori 6 lebih disarankan untuk mencapai kinerja tertinggi.&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>STORE PROCEDURE</title><link>http://moe-adz.blogspot.com/2010/02/store-procedure.html</link><category>Store Procedure</category><pubDate>Fri, 5 Feb 2010 01:11:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-4975454134040292882</guid><description>&lt;span style="font-family:arial;"&gt;A. Teori Singkat&lt;br /&gt;Store Procedure adalah kumpulan dari perintah Transact-SQL yang dikompile dalam satu unit untuk dijalankan bersama. Dalam SQL Server store procedure memiliki kemampuan antara lain :&lt;br /&gt;• Menerima parameter input dan mengembalikan beberapa nilai parameter output dari procedure yang dipanggil.&lt;br /&gt;• Mengandung statement pemrograman yang melakukan operasi terhadap database termasuk memanggil store procedure lain.&lt;br /&gt;• Memberikan status yang mengindikasikan keberhasilan atau kegagalan eksekusi store procedure Keuntungan pemakaian store procedure adalah :&lt;br /&gt;• Merupakan pemrograman modular&lt;br /&gt;Store procedure dibuat sekali dan dapat dipakai berulang untuk komputasi yang sama&lt;br /&gt;• Memungkinkan eksekusi lebih cepat&lt;br /&gt;Ketika pertama kali dijalankan store procedure akan tersimpan dalam memori. Sehingga memungkinkan eksekusi berikutnya lebih cepat.&lt;br /&gt;• Mengurangi trafik jaringan&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;Barisan kode transact SQL yang seharusnya dilewatkan jaringan, akan digantikan dengan statement tunggal pemanggilan store procedure&lt;br /&gt;• Dapat digunakan sebagai mekanisme sekuriti&lt;br /&gt;Pengguna dimungkinkan mengeksekusi Store procedure, walau mungkin tidak dapat mengeksekusi procedure didalamnya secara langsung.&lt;br /&gt;&lt;br /&gt;Sebelum mempelajari cara pembuatan store procedure, perlu juga dipelajari statement Transact SQL untuk pemrograman server. Beberapa statement Transact SQL :&lt;br /&gt;&lt;br /&gt;TIPE DATA PADA PEMROGRAMAN SERVER&lt;br /&gt;Data yang dapat dimasukkan ke dalam database kita tentunya bermacam-macam. Secara khusus MSSQL Server 2000 mendukung berbagai macam tipe data.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Numeric&lt;/b&gt;&lt;br /&gt;1. bigint&lt;br /&gt;Nilai integer dengan nilai dari -2^63 (-9223372036854775808) sampai 2^63-1&lt;br /&gt;(9223372036854775807).&lt;br /&gt;2. int&lt;br /&gt;Nilai integer dengan nilai dari -2^31 (-2,147,483,648) sampai 2^31 - 1 (2,147,483,647).&lt;br /&gt;3. smallint&lt;br /&gt;Nilai integer dengan nilai dari 2^15 (-32,768) sampai 2^15 - 1 (32,767).&lt;br /&gt;4. tinyint&lt;br /&gt;Nilai integer dengan nilai dari 0 sampai 255.&lt;br /&gt;5. bit&lt;br /&gt;Nilai integer dengan nilai 1 atau 0.&lt;br /&gt;6. Decimal dan Numeric&lt;br /&gt;Angka dengan akurasi tetap dari -10^38 +1 sampai 10^38 –1.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Money&lt;/b&gt;&lt;br /&gt;1. money&lt;br /&gt;Data dengan nilai mata uang -2^63 (-922,337,203,685,477.5808) hingga 2^63 - 1&lt;br /&gt;(+922,337,203,685,477.5807)&lt;br /&gt;2. SmallMoney&lt;br /&gt;Data dengan nilai mata uang -214,748.3648 through +214,748.3647&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Numeric Precession&lt;/b&gt;&lt;br /&gt;1. float&lt;br /&gt;Bilangan presesi dari -1.79E + 308 sampai 1.79E + 308.&lt;br /&gt;2. real&lt;br /&gt;Bilangan presesi dari -3.40E + 38 sampai 3.40E + 38.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Date Time&lt;/b&gt;&lt;br /&gt;1. datetime&lt;br /&gt;Tanggal dan waktu dari January 1, 1753, samapi December 31, 9999, dengan akurasi sampai 3.33&lt;br /&gt;millidetik.&lt;br /&gt;2. smalldatetime&lt;br /&gt;Tanggal dan waktu dari January 1, 1900, samapi June 6, 2079, denagn akurasi satu menit.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Strings&lt;/b&gt;&lt;br /&gt;1. char&lt;br /&gt;Field berisi karakter dengan ukuran panjang tetap dengan panjang maksimum 8,000 karakter.&lt;br /&gt;2. varchar&lt;br /&gt;Field berisi karakter dengan panjang ukuran tidak tetap dengan panjang maksimum 8,000 characters.&lt;br /&gt;3. text&lt;br /&gt;variabel berisi karakter denagn ukuran panjang sampai 2^31 - 1 (2,147,483,647) karakter.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Unicode Character Strings&lt;/b&gt;&lt;br /&gt;1. nchar&lt;br /&gt;Karakter unicode dengan ukuran panjang tetap 4,000 karakter.&lt;br /&gt;2. nvarchar&lt;br /&gt;Karakter dengan panjang tidak tetap hingga 4,000 karakter..&lt;br /&gt;3. ntext&lt;br /&gt;Karakter dengan panjang tidak tetap hingga of 2^30 - 1 (1,073,741,823) Karakter.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Binary Strings&lt;/b&gt;&lt;br /&gt;1. binary&lt;br /&gt;Ukuran tetap data binary hingga 8,000 bytes.&lt;br /&gt;2. varbinary&lt;br /&gt;Ukuran panjang tidak tetap data binary hingga 8,000 bytes.&lt;br /&gt;3. image&lt;br /&gt;Ukuran tidak tetap data binary hingga 2^31 - 1 (2,147,483,647) bytes.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Tipe Data Lain&lt;/b&gt;&lt;br /&gt;1. cursor&lt;br /&gt;Referensi ke cursor.&lt;br /&gt;2. timestamp&lt;br /&gt;Angka ekslusif yang dikenali oleh database&lt;br /&gt;3. uniqueidentifier&lt;br /&gt;Pengenal global yang eksklusif.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;OPERATOR&lt;/b&gt;&lt;br /&gt;Urutan operator yang didukung secara khusus oleh SQL Server berdasar urutan evaluasi:&lt;br /&gt;o + (positif), - (negatif), ~ (birwise NOT)&lt;br /&gt;o * (perkalian), / (pembagian), % (modulus)&lt;br /&gt;o + (penjumlahan), + (pengabungan), - (pengurangan)&lt;br /&gt;o =, &gt;, &lt;, &gt;=, &lt;=, &lt;&gt;, !=, !&gt;, !&lt; (perbandingan)&lt;br /&gt;o ^ (bitwise exclusive OR), &amp; (bitwise AND), | (bitwise OR)&lt;br /&gt;o NOT&lt;br /&gt;o AND&lt;br /&gt;o ALL, ANY, BETWEEN, IN, LIKE, OR, SOME&lt;br /&gt;o = (penugasan)&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>PERMUTASI  DAN  KOMBINASI Matematika Diskret,</title><link>http://moe-adz.blogspot.com/2010/02/permutasi-dan-kombinasi-matematika.html</link><category>Matematika Diskret</category><category>PERMUTASI DAN KOMBINASI</category><pubDate>Wed, 3 Feb 2010 22:30:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-6311528626539917601</guid><description>&lt;span style="font-family:arial;"&gt;DASAR PENGHITUNGAN&lt;br /&gt;|A| : jumlah elemen dalam himpunan A&lt;br /&gt;Aturan Penjumlahan:&lt;br /&gt; |A| = |S1|+|S2|+|S3|+ . . . . .+|Sn|, dimana himpunan-himpunan bagian (S1, S2,..., Sn) semuanya saling asing&lt;br /&gt;Aturan Perkalian:&lt;br /&gt; suatu pekerjaan melibatkan k buah langkah&lt;br /&gt; langkah 1  - dengan n1 cara&lt;br /&gt; langkah 2  - dengan n2 cara&lt;br /&gt; ................&lt;br /&gt; langkah k  - dengan nk cara&lt;br /&gt; Maka keseluruhan pekerjaan dapat dilakukan dengan: (n1) (n2) (n3).... (nk) cara&lt;br /&gt;&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;Contoh 1:&lt;br /&gt; Dalam suatu kartu bridge, berapa cara untuk mengambil:&lt;br /&gt; a. Sebuah jantung atau sebuah daun&lt;br /&gt; b. Sebuah jantung atau kartu As&lt;br /&gt; c. Sebuah As atau King&lt;br /&gt; d. Sebuah kartu bernomor 2 hingga 10&lt;br /&gt;JAWAB:&lt;br /&gt; a. Karena antar gambar kartu adalah saling  asing, maka banyak cara mendapatkan &lt;br /&gt;  = 13 + 13 = 26 cara&lt;br /&gt; b. Banyak cara = 13+3 = 16 cara&lt;br /&gt; c. Banyak cara = 4+4 = 8 cara&lt;br /&gt; d. Banyak cara = 9+9+9+9 = 36 cara&lt;br /&gt;&lt;br /&gt;Contoh 2:&lt;br /&gt; Misal 2 dadu yang berbeda warnanya dilontarkan. Ada berapa cara untuk mendapatkan jumlah angka 4 atau 8&lt;br /&gt;JAWAB:&lt;br /&gt; - Cara mendapatkan jumlah angka 4 ada 3 cara&lt;br /&gt; - Cara mendapatkan jumlah angka 8 ada 5 cara&lt;br /&gt; Sehingga untuk mendapatkan jumlah angka 4 atau 8 ada : 3+5 = 8 cara&lt;br /&gt;&lt;br /&gt;Contoh 3:&lt;br /&gt; Jika 2 buah dadu yang berbeda dilontarkan, berapa banyak kemungkinan angka yang muncul?&lt;br /&gt;JAWAB:&lt;br /&gt; Sebuah dadu mempunyai 6 kemungkinan kemunculan angka-angka, sehingga kalau 2 buah dadu ada: 6*6=36 cara&lt;br /&gt; (Jika ada n dadu, ada 6n kemungkinan)&lt;br /&gt;&lt;br /&gt;Contoh 4:&lt;br /&gt; Suatu kode terdiri dari 3 huruf dan diikuti 4 angka, contoh BAC4321.&lt;br /&gt; a. Jika baik huruf atau angka dapat diulangi  penggunaannya, ada  berapa kode berbeda  yang dihasilkan&lt;br /&gt; b. Bagaimana jika hurufnya saja yang boleh diulang&lt;br /&gt; c. Bagaimana jika huruf maupun angka tidak boleh diulang&lt;br /&gt;JAWAB:&lt;br /&gt; a. Banyak cara = 26*26*26*10*10*10*10 = 263*104&lt;br /&gt; b. Banyak cara = 263*10*9*8*7&lt;br /&gt; c. Banyak cara = 26*25*24*10*9*8*7&lt;br /&gt;&lt;br /&gt;Contoh 5:&lt;br /&gt; Berapa banyak bilangan yang terdiri dari 2 atau 3 digit dapat dibentuk dengan menggunakan angka-angka 1,3,4,5,6,8 dan 9, jika perulangan tidak diperbolehkan&lt;br /&gt;JAWAB:&lt;br /&gt; Banyak cara : 7*6 + 7*6*5 cara&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;PERMUTASI&lt;br /&gt;&lt;br /&gt;- Urutan diperhatikan&lt;br /&gt;- Perulangan tidak diperbolehkan&lt;br /&gt;- Dinotasikan:&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMePdnBFtGscr5QuqAIk0T0Stg8e51Eq-G8N6lLO5jXgiN8KTRrdPWgz10ke8fo1d9wz2t6nvvuTQuJf4HSAClBh_eeW0qtOcNvQ3juRljaqzAwuIFkXEQKiJniO1ZwN5Nki0JF3ZS8i-J/s1600-h/permutasi.JPG"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 280px; height: 97px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMePdnBFtGscr5QuqAIk0T0Stg8e51Eq-G8N6lLO5jXgiN8KTRrdPWgz10ke8fo1d9wz2t6nvvuTQuJf4HSAClBh_eeW0qtOcNvQ3juRljaqzAwuIFkXEQKiJniO1ZwN5Nki0JF3ZS8i-J/s400/permutasi.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5434042689626999346" /&gt;&lt;/a&gt;&lt;br /&gt;- Bila r=n, mana P(n,r) = n!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Contoh 6:&lt;br /&gt; Dalam suatu kelas ada 20 orang. Berapa cara untuk memilih ketua dan bendahara&lt;br /&gt;JAWAB:&lt;br /&gt; Banyak cara = 20*19 =380 cara (urutan diperhatikan)&lt;br /&gt; (hal ini akan berbeda jika akan dipilih 2 orang wakil kelas, karena urutan tidak diperhatikan)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Contoh 7:&lt;br /&gt; Tuliskan semua permutasi 3 objek {a,b,c}&lt;br /&gt;JAWAB:&lt;br /&gt; Ada 3! = 6 kemungkinan, yaitu:&lt;br /&gt; abc, acb, bca, bac, cab, cba&lt;br /&gt;&lt;br /&gt;Contoh 8:&lt;br /&gt; Suatu undian menggunakan 7 digit angka, jika digit-digitnya harus berbeda dengan yang lain, ada berapa kemungkinan nomor undian?&lt;br /&gt;JAWAB:&lt;br /&gt; P(10,7) =10!/3! = 10.9.8.7.6.5.4 macam kemungkinan&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;KOMBINASI&lt;br /&gt;&lt;br /&gt;- Urutan kemunculan tidak diperhatikan&lt;br /&gt;- Dinotasikan&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJaJV4k3csW4R2ji9yvJqNIAjhYa2zwMktRW8P1XV9G9WNiuTvEPZOgtD5sbcKHpnoyYTqZ9uCEQaMb1adnwpPpTFcYrrwEyhio7vcAF0yeJQBznbouaaktM6SQbFjkdZsz4WiePpgUeqG/s1600-h/kombinasi.JPG"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 235px; height: 88px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJaJV4k3csW4R2ji9yvJqNIAjhYa2zwMktRW8P1XV9G9WNiuTvEPZOgtD5sbcKHpnoyYTqZ9uCEQaMb1adnwpPpTFcYrrwEyhio7vcAF0yeJQBznbouaaktM6SQbFjkdZsz4WiePpgUeqG/s400/kombinasi.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5434042687615467890" /&gt;&lt;/a&gt;&lt;br /&gt;- Bila r=n, mana C(n,r) = 1&lt;br /&gt;&lt;br /&gt;Contoh 9:&lt;br /&gt; Berapa tim Basket yang dapat dibentuk dari 12 orang?&lt;br /&gt;JAWAB:&lt;br /&gt; Urutan pemain tidak diperhatikan (abc = bac)&lt;br /&gt; Jadi, banyak tim:&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsnMpSf3Zmf_VNCuw5xAyd4B4HwZjNOjwfyjbvvPdToPJtfm1kbFKf67B-41J3TzJupKn936jhPPMYBfYim0XURuINXZyUdeMGyYMlMClv9vOVRPRV6HBxk_-kd7097YUD_mTGC866a9nE/s1600-h/kombinasi2.JPG"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 251px; height: 85px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsnMpSf3Zmf_VNCuw5xAyd4B4HwZjNOjwfyjbvvPdToPJtfm1kbFKf67B-41J3TzJupKn936jhPPMYBfYim0XURuINXZyUdeMGyYMlMClv9vOVRPRV6HBxk_-kd7097YUD_mTGC866a9nE/s400/kombinasi2.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5434042681039674530" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMePdnBFtGscr5QuqAIk0T0Stg8e51Eq-G8N6lLO5jXgiN8KTRrdPWgz10ke8fo1d9wz2t6nvvuTQuJf4HSAClBh_eeW0qtOcNvQ3juRljaqzAwuIFkXEQKiJniO1ZwN5Nki0JF3ZS8i-J/s72-c/permutasi.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>INDUKSI MATEMATIKA  (Matematika Diskret)</title><link>http://moe-adz.blogspot.com/2010/02/induksi-matematika.html</link><category>induksi matematika</category><category>Matematika Diskret</category><pubDate>Wed, 3 Feb 2010 22:06:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-8937448429992972184</guid><description>&lt;span style="font-family:arial;"&gt;&lt;br /&gt;Induksi Matematika digunakan untuk mengecek hasil proses yang terjadi secara berulang sesuai dengan pola tertentu. Suatu teknik yang dikembangkan untuk membuktikan pernyataan. Perhatikan kasus berikut:&lt;br /&gt;“Beberapa orang Amerika mengusulkan agar pemerintah menghentikan pengeluaran koin 1 sen (1¢), karena selain nilainya terlalu kecil, harga-harga barang yang sama atau lebih dari 4 ¢ dapat dibayar dengan koin 2 ¢ atau 5 ¢ (tanpa memerlukan koin 1 ¢)”&lt;br /&gt;&lt;br /&gt;Secara formal dapat dikatakan:&lt;br /&gt;“Untuk setiap bilangan bulat n≥4, n sen dapat diperoleh dengan koin 2¢ dan 5¢”&lt;br /&gt;&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;Perhatikan tabel berikut:&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg44HzFZ-f8LolyCn4Gt3YQ3C4wwolHUfY4Y7NV8plSW8R3ucy3qjT1Tky7XQ3JzZfu4sU5X_9CAxaO5JBcqBZpUAn0sxKKGj1ooAEz5FIG39XtfNsdcEaxh32mHIwmYq4KHLWydUvFRHH3/s1600-h/induksi+matematika.JPG"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 304px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg44HzFZ-f8LolyCn4Gt3YQ3C4wwolHUfY4Y7NV8plSW8R3ucy3qjT1Tky7XQ3JzZfu4sU5X_9CAxaO5JBcqBZpUAn0sxKKGj1ooAEz5FIG39XtfNsdcEaxh32mHIwmYq4KHLWydUvFRHH3/s400/induksi+matematika.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5434036827085085458" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Baris ke-k dalam tabel tersebut adalah untuk mendapatkan (k+3) ¢ dengan menggunakan koin 2 ¢ dan 5 ¢.&lt;br /&gt;&lt;br /&gt;Untuk melanjutkan pembuatan tabel berikutnya haruslah dibuat aturan bagaimana mengisi baris ke-(k+1), dengan menggunakan pola baris ke-k.&lt;br /&gt;&lt;br /&gt;Ada 2 kemungkinan:&lt;br /&gt; 1. Ada koin 5 ¢ yang digunakan untuk menyusun&lt;br /&gt;atau&lt;br /&gt; 2. Semua koinnya adalah 2 ¢ &lt;br /&gt;&lt;br /&gt;Jika ada 5 ¢ yang digunakan untuk menyusun k-koin, maka untuk menyusun (k+1) koin:&lt;br /&gt;&lt;br /&gt; - gantilah koin 5 ¢ dengan 3 buah koin 2 ¢, sehingga jumlah seluruhnya (k+1) koin.&lt;br /&gt;atau&lt;br /&gt; - gantilah 2 buah koin 2 ¢ yang nilainya 4 ¢, dengan 5 ¢, sehingga seluruhnya (k+1) koin&lt;br /&gt;&lt;br /&gt;Dari contoh tersebut:&lt;br /&gt;&lt;br /&gt;Tunjukkan bahwa P(4) benar&lt;br /&gt; dengan kata lain: 4 ¢ dapat disusun dengan koin 2 ¢ dan 5 ¢&lt;br /&gt;&lt;br /&gt;Tunjukkan kebenaran P(k+1) bisa didapatkan dengan diketahuinya kebenaran P(k)&lt;br /&gt;&lt;br /&gt; dengan kata lain: &lt;br /&gt;&lt;br /&gt; misalkan k ¢ dapat disusun dengan koin 2 ¢ dan 5 ¢, maka ditunjukkan bagaimana (k+1) ¢ didapatkan dari koin 2 ¢ dan 5 ¢&lt;br /&gt;&lt;br /&gt;Disimpulkan:&lt;br /&gt; Misalkan P(n) adalah pernyataan yang yang didefinisikan dalam bilangan bulat n dan a adalah bilangan bulat tetap, maka:&lt;br /&gt;P(a) benar&lt;br /&gt;Jika P(k) benar, maka P(k+1) benar, untuk k ≥ a&lt;br /&gt;&lt;br /&gt;Sehingga: P(n) benar untuk semua n ≥ a&lt;br /&gt;Langkah 1 disebut Basis&lt;br /&gt;Langkah 2 disebut Langkah Induksi&lt;br /&gt;&lt;br /&gt;Contoh Kasus:&lt;br /&gt;Buktikan bahwa:&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo5Hoq0W0f8M_9ZmaIUtx_Pw5nV7x6tys8fJGFcvaYi0wqdtq3gd0qO1F07szGrGuWB-gvIYuwq_Ivf4VkfdZJe-AAfrWvnmboUBCyUTyQR9YI-tSM3A4-YaEhRqV9J2s1QHecgquPTvMh/s1600-h/induksi+matematika2.JPG"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 91px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo5Hoq0W0f8M_9ZmaIUtx_Pw5nV7x6tys8fJGFcvaYi0wqdtq3gd0qO1F07szGrGuWB-gvIYuwq_Ivf4VkfdZJe-AAfrWvnmboUBCyUTyQR9YI-tSM3A4-YaEhRqV9J2s1QHecgquPTvMh/s400/induksi+matematika2.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5434036811496389250" /&gt;&lt;/a&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiCUHKw7hVMSbKclM4jLYRe5TgxBFgRbPWzFKnwBI6b4CHRjk0dR5TL6Li1rXzy027oIvy2jyvZJ2asn0BV9T1PVU9tA-Ly5tcI68n7zR2Mxj2lvZA9FyA4Uy7YZSzh93AwjBWwEpe_nig/s1600-h/induksi+matematika3.JPG"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 199px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiCUHKw7hVMSbKclM4jLYRe5TgxBFgRbPWzFKnwBI6b4CHRjk0dR5TL6Li1rXzy027oIvy2jyvZJ2asn0BV9T1PVU9tA-Ly5tcI68n7zR2Mxj2lvZA9FyA4Uy7YZSzh93AwjBWwEpe_nig/s400/induksi+matematika3.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5434036814381491282" /&gt;&lt;/a&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtqgVDN0V2dm4FrGCkQdpDGbtIVXUvbuN4GwYqPF_G0pQZ9RZZJ11ToHs70zf2orH9yznGYP1_xTZejnMGaxAaIUk-I5LR1NGT3gm15dYJaYMuaEJz2DxgFLVUqOE8R3zzEAFlXKxmrT4m/s1600-h/induksi+matematika4.JPG"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 232px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtqgVDN0V2dm4FrGCkQdpDGbtIVXUvbuN4GwYqPF_G0pQZ9RZZJ11ToHs70zf2orH9yznGYP1_xTZejnMGaxAaIUk-I5LR1NGT3gm15dYJaYMuaEJz2DxgFLVUqOE8R3zzEAFlXKxmrT4m/s400/induksi+matematika4.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5434036821343873362" /&gt;&lt;/a&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRKAnD7WHDUbqvATyVvaWWQB43qlvuBjHsvzN6EHp7YF-1ES0P2wdVSzIwKc4mWYf5pDK_vpdWmfC86C4Vd-RgRyhn8OLuPl9ihPqbDDHyWnNVEqEHe7EqYwaZd9MQPuIxus4vK9urJ9Hs/s1600-h/induksi+matematika5.JPG"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 187px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRKAnD7WHDUbqvATyVvaWWQB43qlvuBjHsvzN6EHp7YF-1ES0P2wdVSzIwKc4mWYf5pDK_vpdWmfC86C4Vd-RgRyhn8OLuPl9ihPqbDDHyWnNVEqEHe7EqYwaZd9MQPuIxus4vK9urJ9Hs/s400/induksi+matematika5.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5434036823470143762" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg44HzFZ-f8LolyCn4Gt3YQ3C4wwolHUfY4Y7NV8plSW8R3ucy3qjT1Tky7XQ3JzZfu4sU5X_9CAxaO5JBcqBZpUAn0sxKKGj1ooAEz5FIG39XtfNsdcEaxh32mHIwmYq4KHLWydUvFRHH3/s72-c/induksi+matematika.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Advertising Progam, Affiliate Progam, Survey Progam, and Cobination Progam</title><link>http://moe-adz.blogspot.com/2010/01/advertising-progam-affiliate-progam.html</link><category>Advertising Progam</category><category>Affiliate Progam</category><category>and Cobination Progam</category><category>Survey Progam</category><pubDate>Thu, 14 Jan 2010 22:22:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-3542981353412110366</guid><description>&lt;span style="font-family:arial;"&gt;&lt;b&gt;Advertising Progam &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Pay Per Click (PPC)&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Google Adsense &lt;a href="http://www.google.com/adsense" target="_blank"&gt;(www.google.com/adsense)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Adbrite &lt;a href="http://www.adbrite.com" target="_blank"&gt;(www.adbrite.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Adhearus &lt;a href="http://www.adhearus.com" target="_blank"&gt;(www.adhearus.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Adknowledge &lt;a href="http://www.adknowledge.com" target="_blank"&gt;(www.adknowledge.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Avnads &lt;a href="http://www.avnads.com" target="_blank"&gt;(www.avnads.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Bidvertiser &lt;a href="http://www.bidvertiser.com" target="_blank"&gt;(www.bidvertiser.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Crispads &lt;a href="http://www.crispads.com" target="_blank"&gt;(www.crispads.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Clickbooth &lt;a href="http://www.clickbooth.com" target="_blank"&gt;(www.clickbooth.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Doubleclick &lt;a href="http://www.doubleclick.com" target="_blank"&gt;(www.doubleclick.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Industrybrains &lt;a href="http://www.industrybrain.com" target="_blank"&gt;(www.industrybrain.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Gogonai &lt;a href="http://www.gogonai.info" target="_blank"&gt;(www.gogonai.info)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Kanoodle &lt;a href="http://www.kanoodle.com" target="_blank"&gt;(www.kanoodle.com)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/span&gt;&lt;span class="fullpost"  style="font-family:arial;"&gt;&lt;ul&gt;&lt;li&gt;Kontera &lt;a href="http://www.kontera.com" target="_blank"&gt;(www.kontera.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Money4bannes &lt;a href="http://www.money4bannes.com" target="_blank"&gt;(www.money4bannes.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Onemonkey &lt;a href="http://www.onemonkey.com" target="_blank"&gt;(www.onemonkey.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Peakclick &lt;a href="http://www.peakclick.com" target="_blank"&gt;(www.peakclick.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Phedo &lt;a href="http://www.phedo.com" target="_blank"&gt;(www.phedo.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Publisher &lt;a href="http://publisher.targetpoin.com" target="_blank"&gt;(publisher.targetpoin.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Revenuepilot &lt;a href="http://www.revenuepilot.com" target="_blank"&gt;(www.revenuepilot.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Searchfeed &lt;a href="http://www.searchfeed.com" target="_blank"&gt;(www.searchfeed.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Shareasale &lt;a href="http://www.shareasale.com" target="_blank"&gt;(www.shareasale.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Textlinksads &lt;a href="http://www.text-links-ads.com" target="_blank"&gt;(www.text-links-ads.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Tnx &lt;a href="http://www.tnx.net" target="_blank"&gt;(www.tnx.net)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Tribalfusion &lt;a href="http://www.tribalfusion.com" target="_blank"&gt;(www.tribalfusion.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Vibrantmedia &lt;a href="http://www.vibrantmedia.com" target="_blank"&gt;(www.vibrantmedia.com)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Widgetbucks &lt;a href="http://www.witgetbucks.com" target="_blank"&gt;(www.witgetbucks.com)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;b&gt;Pay To Click&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Buc.to &lt;a href="http://http://bux.to" target="_blank"&gt;(http://bux.to)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Hits4pay &lt;a href="http://www.hits4pay.com" target="_blank"&gt;(www.hits4pay.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Clixsense &lt;a href="http://www.clixsense.com" target="_blank"&gt;(www.clixsense.com)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Affiliate Progam &lt;/b&gt;&lt;br /&gt;Pay Per Sale (PPS)&lt;br /&gt;Perusahaan akan memberi komisi untuk penjualan langsung dari situs web Anda.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Amazon &lt;a href="http://www.amazon.com" target="_blank"&gt;(www.amazon.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Clickbank &lt;a href="http://www.clickbank.com" target="_blank"&gt;(www.clickbank.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Shareasale &lt;a href="http://www.shareasale.com" target="_blank"&gt;(www.shareasale.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;LinkWorth &lt;a href="http://www.linkworth.com" target="_blank"&gt;(www.linkworth.com)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;Pay Per Lead (PPL)&lt;br /&gt;Perusahaan akan membayar hadiah setelah pengunjung digiring dari web Anda ke situs web perusahaan dan mengisi formulir pembelian. Jika membeli langsung,maka perusahaan tidak membayar hadiah (bounty).&lt;br /&gt;&lt;br /&gt;Two-tier Program&lt;br /&gt;Perusahaan akan memberi komisi dari penjualan langsung dan dari penjualan afiliasi yang Anda rekrut.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;SiteSell &lt;a href="http://www.SiteSell.com" target="_blank"&gt;(www.SiteSell.com)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Two-tier Program&lt;br /&gt;Perusahaan akan memberi komisi dari penjualan langsung dan dari penjualan afiliasi yang Anda rekrut.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;SiteSell &lt;a href="http://www.SiteSell.com" target="_blank"&gt;(www.SiteSell.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Greenhorse &lt;a href="http://www.greenhorse.com" target="_blank"&gt;(www.greenhorse.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Clickcash &lt;a href="http://www.clickcash.com" target="_blank"&gt;(www.clickcash.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Spedia &lt;a href="http://www.spedia.net" target="_blank"&gt;(www.spedia.net)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Titikcash &lt;a href="http://www.titikcash.com" target="_blank"&gt;(www.titikcash.com)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Survey Progam:&lt;/b&gt;&lt;br /&gt;Dibayar berdasarkan isian survey yang Anda isikan sesuai petunjuk yang diberikan &lt;ul&gt;&lt;li&gt;Globaltestmarket &lt;a href="http://www.globaltestmarket.com" target="_blank"&gt;(www.globaltestmarket.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Surveyscout &lt;a href="http://www.surveyscout.com" target="_blank"&gt;(www.surveyscout.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Surveysavvy &lt;a href="http://www.surveysavvy.com" target="_blank"&gt;(www.surveysavvy.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Surveypayoff &lt;a href="http://www.surveypayoff.com" target="_blank"&gt;(www.surveypayoff.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Surveyclub &lt;a href="http://www.surveyclub.com" target="_blank"&gt;(www.surveyclub.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Vindale &lt;a href="http://www.vindale.com" target="_blank"&gt;(www.vindale.com)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Combination Program :&lt;/b&gt;&lt;br /&gt;Perusahaan menyediakan jasa kombinasi mulai dari Pay Per Click (PPC), Pay Per Sale (PPS), Pay Per Lead (PPL), Cost Per Visit (CPV), Cost Per Click (CPC), Cost Per Visit (CPV), Cost Per Thousand Impressions (CPM). contohnya :&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Linkshare &lt;a href="http://www.linkshare.com" target="_blank"&gt;(www.linkshare.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Clicksor &lt;a href="http://www.clicksor.com" target="_blank"&gt;(www.clicksor.com)&lt;/a&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Chitika &lt;a href="http://www.chitika.com" target="_blank"&gt;(www.chitika.com)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Seach Engine Optimization (SEO)</title><link>http://moe-adz.blogspot.com/2010/01/seach-engine-optimization-seo.html</link><category>Seach Engine Optimization (SEO)</category><pubDate>Thu, 7 Jan 2010 17:11:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-4837876645043391408</guid><description>&lt;span style="font-family:arial;"&gt;Search Engine Optimization adalah suatu teknik agar website yang kita buat mudah ditemukan melalui search engine seperti Google dan masih banyak lagi yang lainnya. berikut contoh beberapa link Search Engine Optimization :&lt;br /&gt;&lt;a href="http://www.addme.com/submission/free-submission-start.php" target="_blank"&gt;addme.com&lt;/a&gt; &lt;br /&gt;&lt;a href="http://addurl.altavista.com/addurl/new" target="_blank"&gt;altavista.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://addurl.alltheweb.com/add_url" target="_blank"&gt;alltheweb.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.directory-search.org" target="_blank"&gt;directory-search.org&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.freewebsubmission.com" target="_blank"&gt;freewebsubmission.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.gloprom.com" target="_blank"&gt;gloprom.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.google.com/addurl/" target="_blank"&gt;google.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.halloindonesia.com" target="_blank"&gt;halloindonesia.com&lt;/a&gt;&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;a href="http://www.indocenter.co.id" target="_blank"&gt;indocenter.co.id&lt;/a&gt;&lt;br /&gt;&lt;a href="http://overtune.com/d/about/advertisers/" target="_blank"&gt;overtune.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.positiontech.com/inktomi" target="_blank"&gt;positiontech.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://search.msn.com/docs/submit.aspx?FORM=WSDD2" target="_blank"&gt;msn.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.searchindonesia.com" target="_blank"&gt;searchindonesia.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://submit2.jayde.com" target="_blank"&gt;jayde.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://submit.search.yahoo.com/free/request" target="_blank"&gt;search.yahoo.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://submitawebsite.com" target="_blank"&gt;submitawebsite.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://ask.ineedhhits.com/" target="_blank"&gt;ask.ineedhhits.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://browsertune.com/flanga/hotspots.htm" target="_blank"&gt;browsertune.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://docs.yahoo.com/info/suggest" target="_blank"&gt;docs.yahoo.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://dmoz.org" target="_blank"&gt;dmoz.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://submit.looksmart.com" target="_blank"&gt;looksmart.com&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.submitexpress.com/" target="_blank"&gt;submitexpress.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>5 Step Analyze Simple Computer Virus</title><link>http://moe-adz.blogspot.com/2009/12/5-step-analyze-simple-computer-virus.html</link><category>5 Step Analyze Simple Computer Virus</category><pubDate>Sat, 26 Dec 2009 12:26:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-7863417229515941816</guid><description>&lt;span style="font-family:arial;"&gt;Have not bothered by a virus that attacks your computer? While we do not update antivirus programs are able to recognize the evil that mangacau. Why not try fad analyze yourself? Here a simple step.&lt;br /&gt;&lt;br /&gt;Taufik Juhar Adang, senior Vaksinis Vaksincom in Vaksincom seminar held at Ancol, Friday (4/12/2009), to explain how simple steps that infiltrate the virus analysis on the Windows operating bersistem computer, especially if the local virus attack. &lt;br /&gt;"For the local virus itself was easy to analyze, because it would karakterisitknya same," he said. Adang said that first we must have the Internet, to find tools-tools that can be downloaded for free at some sites.&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;Besides local virus can also be viewed through the list of Windows processes through task manager, to see what kind of a strange file running. In addition, we also can analyze it through the registry tools (reg. edit). &lt;br /&gt;&lt;br /&gt;"For more advanced users there are 2 tools that might use the pack and unpack detection and VB Decompiler program. Because the virus is usually locally-based VB," he added. &lt;br /&gt;&lt;br /&gt;Adang also explained that we have the tools-tools, we can begin to analyze the stages that simple: &lt;br /&gt;&lt;br /&gt;1. Understand the type of virus that had been attacked:&lt;br /&gt;What icon disguised and size. &lt;br /&gt;2. Understand the characteristics of the virus.&lt;br /&gt;Would make a duplicate file, hide files, inject files, or displaying certain messages. &lt;br /&gt;3. Understand how the virus:&lt;br /&gt;What is modified viruses, whether the registry, created master files, or function of the blocked windows. &lt;br /&gt;4. Understand the spread of the virus:&lt;br /&gt;Is the USB flash disk or folder on the share, because the local virus usually infiltrate through the media 2. &lt;br /&gt;5. Prepare a few tools that are used.&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Kick-deflect invasion Email Senders</title><link>http://moe-adz.blogspot.com/2009/12/kick-deflect-invasion-email-senders.html</link><category>Kick-deflect invasion Email Senders</category><pubDate>Sat, 26 Dec 2009 12:05:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-2540215432357362538</guid><description>&lt;span style="font-family:arial;"&gt;Junk email, aka spam is hard muted, especially if the email that we use do not use a filter spam filter. Inevitably, the ads brought gelontoran unwanted messages are going mensesaki our inbox.&lt;br /&gt;&lt;br /&gt;Here are some tricks that can be done to ward off invasion recommended Symantec email:&lt;br /&gt;&lt;br /&gt;Who should do:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Unsubscribe from legitimate mailing-list if you do not want to receive messages again. When registering to receive email, check out additional items whatever you want at the same time. Do not select the items you want.&lt;/li&gt;&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;li&gt;Selective in terms of sites where you register your email address.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Avoid displaying your email address on the Internet. Consider alternative options-for example, use a separate address when registering at a particular mailing list, have several email addresses for many different purposes, or look for a disposable email service.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;By using the instructions provided by the administrator, report spam if you have the option to do so.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Delete all spam.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Avoid clicking on suspicious links in emails or IM messages, because it could be connected to a fake site. We recommend to type a website address directly in the browser rather than trust the link in the message.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Ensure that the operating system up to date, and use security software packages are comprehensive.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Consider the anti-spam solution that has a good reputation for handling filtering throughout your organization.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;Who should not do:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Opening an email attachment from an unknown. This appendix can infect your computer.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Replying to spam. Usually forged email address, and reply to email spam will result in another spam spam.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Fill out the form in a message requesting personal or financial information or passwords (passwords). Leading companies can not ask for your personal information via email. If you hesitate to contact the company through a trusted independent mechanism, such as by verifying the phone number or Internet address is known that you type into a new browser window (do not click on or cut and paste the link in the message).&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Buying products or services from spam messages.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Open the spam message.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Forward any virus warnings you receive by email. It could be a lie that is the news (hoaxes).&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Jurus Menangkis Serbuan Email Sampah</title><link>http://moe-adz.blogspot.com/2009/12/jurus-menangkis-serbuan-email-sampah.html</link><category>Jurus Menangkis Serbuan Email Sampah</category><pubDate>Sat, 26 Dec 2009 10:02:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-371341261445824870</guid><description>&lt;span style="font-family:arial;"&gt;Spam alias email sampah memang sulit diredam, apalagi jika email yang kita gunakan tidak menggunakan filter penyaring spam. Niscaya, gelontoran iklan yang dibawa pesan yang tak diinginkan tersebut bakal mensesaki inbox kita.&lt;br /&gt;&lt;br /&gt;Berikut beberapa jurus yang bisa dilakukan untuk menangkis serbuan email yang direkomendasikan Symantec:&lt;br /&gt;Yang Sebaiknya Dilakukan:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Berhenti berlangganan dari milis-milis sah jika Anda tidak ingin menerima pesan lagi. Ketika mendaftar untuk menerima email, periksa item-item tambahan apa saja yang Anda inginkan pada saat yang sama. Jangan memilih item yang tidak Anda inginkan.&lt;/li&gt;&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;li&gt;Selektif dalam hal situs-situs tempat Anda mendaftarkan alamat email Anda.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Hindari menampilkan alamat email Anda di Internet. Pertimbangkan pilihan alternatif- misalnya, gunakan alamat tersendiri ketika  mendaftar pada milis tertentu, miliki beberapa alamat  email untuk berbagai tujuan berbeda, atau carilah layanan email sekali pakai.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Dengan menggunakan petunjuk yang disediakan oleh administrator, laporkan spam jika Anda memiliki pilihan untuk melakukannya.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Hapus semua spam&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Hindari mengklik pada link mencurigakan dalam email atau pesan IM, karena bisa saja akan menghubungkan ke situs palsu. Kami menyarankan untuk mengetik alamat situs langsung pada browser daripada percaya pada link dalam pesan.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Pastikan bahwa sistem operasi selalu up to date, dan gunakan paket software keamanan yang komprehensif.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Pertimbangkan solusi antispam yang memiliki reputasi baik untuk menangani penyaringan di seluruh organisasi anda.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;Yang Sebaiknya Tidak Dilakukan:&lt;br /&gt;&lt;ul&gt;&lt;br /&gt;&lt;li&gt;Membuka lampiran dari email yang tidak dikenal. Lampiran ini dapat menginfeksi komputer Anda.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Membalas spam. Biasanya alamat emailnya dipalsukan, dan membalas email spam akan menghasilkan spam-spam lain.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Mengisi formulir dalam pesan yang meminta informasi pribadi atau keuangan atau kata sandi (password). Perusahaan terkemuka tidak mungkin meminta informasi pribadi Anda melalui email. Jika ragu untuk menghubungi perusahaan yang bersangkutan melalui mekanisme independen yang terpercaya, seperti dengan memverifikasi  nomor telepon atau alamat Internet yang dikenal yang Anda ketikkan ke jendela browser yang baru (jangan mengklik atau cut dan paste dari link dalam pesan).&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Membeli produk atau jasa dari pesan spam.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Membuka pesan spam.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Meneruskan peringatan virus apapun yang anda terima melalui email. Bisa jadi itu adalah berita bohong (hoax).&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;font color="#333333"&gt;sumber :&lt;/font&gt;&lt;a href="http://www.detiknet.com"&gt;&lt;font color="#333333"&gt;www.detiknet.com&lt;/font&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>5 Tahap Sederhana Menganalisis Virus Komputer</title><link>http://moe-adz.blogspot.com/2009/12/5-tahap-sederhana-menganalisis-virus.html</link><category>Anti Virus</category><pubDate>Sat, 26 Dec 2009 09:44:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-8219549617870605558</guid><description>&lt;span style="font-family:arial;"&gt;&lt;br /&gt;Pernahkah direpotkan oleh virus yang menyerang komputer Anda? Sementara update antivirus kita belum mampu mengenali program jahat yang mangacau tersebut. Mengapa tidak mencoba iseng-iseng menganalisis sendiri? Ini dia tahap sederhananya.&lt;br /&gt;&lt;br /&gt;Adang Juhar Taufik, Senior Vaksinis Vaksincom dalam seminar Vaksincom bertempat di Ancol, Jumat (4/12/2009), memberi penjelasan betapa sederhananya tahapan analisis virus yang menyusup pada komputer bersistem operasi Windows, khususnya jika yang menyerang virus lokal.&lt;br /&gt;&lt;br /&gt;"Untuk virus lokal sendiri sebenarnya mudah untuk menganalisisnya, karena pasti karakterisitknya sama," ujarnya. Adang pun mengatakan bahwa pertama kita harus memiliki internet, untuk mencari tools-tools yang secara gratis bisa diunduh di beberapa situs.&lt;br /&gt;&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;Selain itu virus lokal juga bisa dilihat melalui list proses Windows melalui task manager, untuk melihat jenis file aneh yang running. Di samping itu kita juga bisa menganalisanya melalui registry tools (reg. edit).&lt;br /&gt;&lt;br /&gt;"Untuk user yang lebih advanced ada 2 tools yang mungkin bisa digunakan yakni pack detection dan unpack program serta VB decompiler. Karena biasanya virus lokal berbasis VB," tambahnya.&lt;br /&gt;&lt;br /&gt;Adang pun menjelaskan setelah kita memiliki tools-tools tersebut, kita bisa mulai menganalisa dengan tahapan-tahapan yang sederhana:&lt;br /&gt;&lt;br /&gt;   1. Pahami dulu jenis virus yang menyerang:&lt;br /&gt;Icon apa yang disamarkan serta ukurannya.&lt;br /&gt;   2. Pahami karakteristik virus.&lt;br /&gt;Apakah membuat file duplikat, menyembunyikan file, menginjeksi file, atau menampilkan pesan tertentu.&lt;br /&gt;   3. Pahami cara kerja virus:&lt;br /&gt;Apa yang diubah virus, apakah registry, file induk yang dibuat, atau fungsi windows yang diblok.&lt;br /&gt;   4. Pahami penyebaran virus:&lt;br /&gt;Apakah melalui USB flash disk atau folder yang di share, karena biasanya virus lokal menyusup melalui 2 media tersebut.&lt;br /&gt;   5. Siapkan beberapa tools yang digunakan.&lt;br /&gt;&lt;br /&gt;Sumber : &lt;a href="http://www.detiknet.com"&gt;www.detiknet.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Hack komputer orang lewat jaringan LAN</title><link>http://moe-adz.blogspot.com/2009/12/hack-komputer-orang-lewat-jaringan-lan.html</link><category>Hack komputer orang lewat jaringan LAN</category><pubDate>Thu, 24 Dec 2009 09:29:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-3813078176184047297</guid><description>&lt;span style="font-family:arial;"&gt;Cara masuk di komputer lain lewat DOS (Windows XP / 2000)&lt;br /&gt;Ente ingin masuk dikomputer teman melalui sebuah LAN ? bisa melihat seluruh isi harddisk teman ente, membuat directory, membuat file, mendelete file atau apa saja ? itu mudah, semua caranya ada disini.&lt;br /&gt;&lt;br /&gt;Pertama-tama anda harus tahu 2 program penting lalu downloadlah yaitu internet Maniac (&lt;a href="http://www.ziddu.com/download/7866454/InternetManiac.EXE.html"&gt;Internet Maniac.exe&lt;/a&gt;) … Download Internet. Berfungsi untuk mengetahui ip addreas client melalui computer name / hostname&lt;br /&gt;KaHT (&lt;a href="http://www.ziddu.com/download/7866535/KaHT.exe.html"&gt;KaHt.exe&lt;/a&gt;) … Download program hacker. Berfungsi sebagai program untuk menerobos ke computer server atau client.&lt;br /&gt;Ingat hanya dengan 2 program diatas maka anda bersiap-siaplah menguasai warnet / kampus / kantor dan sebagainya, lho bagaimana bisa ? hehe...&lt;br /&gt;Pertama kali anda periksa dahulu jaringan anda dengan melihat para hostname dengan 2 cara.&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;Untuk Windows XP&lt;br /&gt;Cara Pertama Masuk ke Start Lalu Search, lalu pilih computers or people lalu pilih A computer on the Network lalu langsung klik search maka akan segera muncul computer-komputer yang terkoneksi dalam jaringan.&lt;br /&gt;Untuk Windows 95/98/Me/2000 (kalau anda menemukan open port 135 di OS ini)&lt;br /&gt;Cara Pertama Masuk ke Start Lalu Search Lalu For Files or Folders lalu pada menu Search for other item pilihlah computers, lalu akan muncul Search for computer, maka langsung klik Search Now maka nama-nama computer akan muncul (Alternatif cara yang cepat dapat mengklik My Network Place / Network Neighboure saja).&lt;br /&gt;Setelah enteh dapetin sasaran computer yang mau di masukin / diremote maka ente langsung aja jalankan program Internet Maniac Masuklah ke Host Lookup lalu ketikkan nama computer / hostname lalu klik resolve, disini anda akan mendapat alamat ip computer tersebut. Dengan nomor ip ini maka anda sudah mengetahui sasaran computer yang akan di masuki. Setelah itu selesai maka kita tinggalkan program Internet Maniac, kita akan berlanjut dengan program KaHT, program ini akan didetect sebagai Trojan oleh antivirus, tapi abaikan saja, jangan di hapus / di karantina kalau terdetect, kalau perlu del aja antivirusnya, satu lagi, program KaHT bekerja dalam MS-DOS Mode jadi disini kemampuan anda menggunakan DOS sangat penting, tanpa kemampuan DOS maka anda tidak akan bisa banyak berbuat.&lt;br /&gt;&lt;br /&gt;Cara masuk DOS Mode Untuk Windows XP :&lt;br /&gt;Masuklah ke Start, All programs, Accessories lalu Command Prompt&lt;br /&gt;Untuk Windows 95/98/Me/NT/2000,&lt;br /&gt;Masuklah ke Start, Programs, Accessories lalu MS-DOS Prompt&lt;br /&gt;Setelah berhasil masuk DOS maka masuklah di directory program KaHT, (Misal tadi di C:\KaH) maka ketikkan “CD\KaHT” dan seterusnya.&lt;br /&gt;Jika sudah, ini saatnya?&lt;br /&gt;Ketikkan “KaHT sebelum_no_ip_komputer_sasaran no_ip_komputer_sasaran.&lt;br /&gt;kalau bingung bisa begini : “KaHT Ip1 ip2?&lt;br /&gt;ip1 : ip awal yang discan&lt;br /&gt;ip2 : ip terahkir yang discan&lt;br /&gt;&lt;br /&gt;Misalnya tadi ip-nya 192.168.0.1 setelah di detect pakek Internet Maniac tadi itu lho.&lt;br /&gt;Maka ketikkan saja “KaHT 192.168.0.0 192.168.0.1? lalu enter aja Nah disini nanti program akan bekerja otomatis.&lt;br /&gt;Setelah selesai menscan jika nanti port 135 ternyata dalam keadaan open maka anda akan otomatis di computer tujuan / sasaran, untuk lebih persisnya anda akan berada di “c:\windows\system” milik komputer tujuan / sasaran setelah pen-scan-an selesai.&lt;br /&gt;ente bisa bebas di computer sasaran, mau edit atau di delete pun bisa, hehe Nah kalo udah begini kita bisa berkreasi :&lt;br /&gt;&lt;br /&gt;Memata-matai anak yang sedang chatting pakek MiRC di satu warnet / kampus / kantor / lainnya, cari program MiRC yang digunakan dalam computer tersebut, biasanya seh di C:\Program Files\MiRC, buka file MiRC.INI, lalu Log IRC di On kan saja dan kalo mau lihat isi chattingan teman kita itu cukup lewat “/logs” maksudnya kalau tadi di C:\program Files\MiRC program MiRCnya maka cukup masuk aja di C:\Program Files\MiRC\Logs nanti disitu ada file-file log hasil chattingan dia walaupun dia sedang online tetep aja terekam, hehe, kalo mau mastiin dia makek nick apa, gampang banget bisa jalanin aja MiRCnya atau periksa di MiRC.INI, gampangkan.&lt;br /&gt;Apalagi nih, Bikin computer itu rusak, lebih baik jangan, tapi sebenere bisa lho, delete aja file-file systemnya, hehe.&lt;br /&gt;Diatas cuman kreasi dikit aja, loe bisa aja memanfaatkannya jauh lebih bermanfaat dari pada diatas Tujuan dari tutorial ini untuk anda yang sering menggunakan komputer dengan Windows 2000 dan XP dijaringan agar lebih waspada terhadap berbagai tindakan usil dari pihak-pihak yang tidak bertanggung jawab..&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Membuat akses administrator Windows untuk kita lewat komputer lain.&lt;/b&gt;&lt;br /&gt;Kita ingin membuat administrator Windows XP/2000 di komputer lain melalui LAN ? sangat mudah, caranya masuklah ke komputer tujuan dengan program kaht yang sudah diajarkan diatas, lalu kita akan mencoba beberapa trik.&lt;br /&gt;&lt;br /&gt;Melihat akses guest dan administrator di Windows&lt;br /&gt;Ketik : net user Melihat aktif tidaknya guest di Windows&lt;br /&gt;Ketik : net user guest Membuat akses guest menjadi Administrator dengan perintah :&lt;br /&gt;Ketik : net localgroup Administrators Guest /add&lt;br /&gt;&lt;br /&gt;Membuat akses adminstrator sendiri :&lt;br /&gt;1. Ketik : net user /add&lt;br /&gt;2. Ketik : net localgroup Administrators /add&lt;br /&gt;&lt;br /&gt;Menghapus akses administrator&lt;br /&gt;Ketik : net localgroup Users /delete&lt;br /&gt;&lt;br /&gt;Catatan:&lt;br /&gt;*Tidak untuk disalahgunakan dan hanya untuk pembelajaran&lt;br /&gt;*Tindakan ini mungkin berbahaya jadi pikirkan dulu 100 X sblum mencobanya&lt;br /&gt;*Tidak disarankan untuk pemula atau yg tidak bs memperbaiki PCnya sndiri&lt;br /&gt;*Segala kesalahan error / kerusakan pada komputer dan semacamnya adalah tanggung jawab anda !&lt;br /&gt;*Semua yang anda pelajari dan anda lakukan adalah sepenuhnya tanggung jawab anda tanpa kecuali.&lt;br /&gt;&lt;br /&gt;jadi sebaiknya jgn dilakukan bila perlu!!&lt;br /&gt;&lt;br /&gt;sumber: &lt;a href="http://www.pelupa.com/forum_posts.asp?TID=1791"&gt;pelupa.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">7</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Auditing Network Security System</title><link>http://moe-adz.blogspot.com/2009/12/auditing-network-security-system.html</link><category>Auditing Network Security System</category><category>Computer Networking</category><category>Security system</category><pubDate>Fri, 18 Dec 2009 04:08:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-6004801454019871122</guid><description>&lt;span style="font-family:arial;"&gt;Audit system is one of the stages in order to ensure that "security goal" is maintained properly. After all policies related to computer network security made by an organization, then the next stage is to test whether all the policies and rules that have made it had correctly applied or not.&lt;br /&gt;There are 3 types of audits are usually done on network security systems within an organization, namely:&lt;br /&gt;1. "Audit privilege" that would audit how the permissions settings applied at the company's appropriate or not and how the implementation in the field.&lt;br /&gt;2. "Usage audit" bagaiaman audit of resource use within the organization. Is it in accordance with the policy of the organization or not.&lt;br /&gt;3. "Escalation audit" to audit how the security system in an organization facing a critical situation. For example how fast the system recoveri process in the event of an attack by "hackers",&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt; how the standard operating procedures applied by the organization if a problem occurs on a network system infrastructure, how to cope in the event of natural disasters. So from all of the audit process can identify weaknesses anything contained in the computer network systems organization. To further search can be an appropriate solution to deal with these problems.&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Analysis of factors affecting students in choosing the college of management information systems and computer science "amikom" yogyakarta</title><link>http://moe-adz.blogspot.com/2009/12/analysis-of-factors-affecting-students.html</link><category>Analysis of factors affecting students in choosing the college of management information systems and computer science "amikom" yogyakarta</category><pubDate>Tue, 8 Dec 2009 02:54:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-5604884089586387819</guid><description>&lt;span style="font-family:arial;"&gt;The need for education has been more crucial in employment competition lately in view of the fact that human resource selection by employers is based on certain education level and expertise relevant to the occupational preference. The College of Management Information Systems and Computer Science (STMIK) AMIKOM Yogyakarta as a Private Higher Educational Institution is aimed at achieving the goals of national education by accomplishing the Triadic Function of Higher Education (Tridharma Perguruan Tinggi) including education, research and community services.&lt;br /&gt;&lt;br /&gt;Qualitative data were analyzed and described in percentage and presented in form of tables based on the respondents' responses in both numeric and non-numeric data. Quantitative &lt;a href="http://moe-adz.blogspot.com/2009/12/analysis-of-factors-affecting-students.html"&gt;analysis&lt;/a&gt; was conducted by testing a group of variables that was appropriately considered as a factor based on the criteria that the Eigen value should be greater than or equal to unity.&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt; The contribution of each factor to decision-making process was viewed from the total value of variance for each factor. Whereas, the role of each variable within a factor was determined by the loading factor of the respective variable, where the variable with the greatest loading factor would have the main role within the factor.&lt;br /&gt;&lt;br /&gt;The results of &lt;a href="http://moe-adz.blogspot.com/2009/12/analysis-of-factors-affecting-students.html"&gt;analysis&lt;/a&gt; on service, facility and marketing mix factors considered by the students in their preference and admission to the College of AMIKOM Yogyakarta showed that all factors deserved to consider. Twenty-two variables under consideration were grouped into 6 factors, i.e., service, facility, promotion, price, product and campus location.&lt;br /&gt;&lt;br /&gt;Among 6 factors considered by the students in their preference and admission to the College of AMIKOM Yogyakarta, the factor of service delivered by the College management constituted the most crucial factor with a variance value of 22.880%, indicating that 22.880% of student candidates would consider the service delivered by the college management; then followed by the factor of facility 8.348%; the factor of promotion 7.593%, the factor of price 7.377%; the factor of product 6.736%. Whereas the location of AMIKOM campus at Jalan Ring Road Utara constituted the least significant consideration with a variance value of 5.430%, indicating that 5.430% of student candidates would consider the campus location.&lt;br /&gt;&lt;br /&gt;The percentage of cumulative variance contribution of the six factors considered by the students in their preference and admission to the Collage of AMIKOM Yogyakarta was 58.565. It indicated that the six factors were able to account for the variables considered by the students or consumers in their preference and admission to the College of AMIKOM Yogyakarta to the extent of 58.365%. The remaining percentage of 41.635% was explained by variables outside the model.&lt;br /&gt;&lt;br /&gt;Further research is recommended in view of the limitation of this study that merely considered and tested the variables of service, facility and marketing mix. Conceptually, there are many other variables considered by student candidates in their preference and admission to the College of AMIKOM Yogyakarta such as cultural, socio-political, economic, technological factors and others.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;(Source :http://journal.amikom.ac.id)&lt;/em&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Security System in Worldwide Interoperability for Microwafe Access (WiMAX)</title><link>http://moe-adz.blogspot.com/2009/12/security-system-in-worldwide.html</link><category>Security system</category><category>SECURITY SYSTEM IN WORLDWIDE INTEROPERABILITY FOR MICROWAVE ACCESS (WiMAX)</category><category>Wireless Security</category><pubDate>Tue, 8 Dec 2009 01:29:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-4358353571726139944</guid><description>&lt;span style="font-family:arial;"&gt;802.16 standard, called WirelessMAN, providing a new perspective in accessing high speed internet without depending on the network or modem cable. Year 2002 established a forum Worldwide Interoperability for Microwave Access (WiMAX) which refers to the 802.16 standard and served menginterkoneksikan various technical standards that are global to a single unit. WiMAX technology is more expensive than other broadband technologies like Digital Subscriber Line (DSL)&lt;br /&gt;&lt;br /&gt;Security aspect is very important for broadband technology in accessing information from the Internet. Is discussed in the writing hand security systems found on WirelessMAN technology based on 802.16 standard specifications.&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;IEEE 802.16 standards provide internet access to the metropolitan area with only establish some base station (BS) is able to coverage of millions of subscribers (SS). WiMAX technology is the solution for the city or rural areas that have not developed in the provision of internet access. Encryption data used in the form of data encryption standard (DES) and authentication on each client / subscriber station (SS) is very good with X.509 certificates are unique, powerful and reliable toughness.&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Anatomy And Organizational Learning System</title><link>http://moe-adz.blogspot.com/2009/12/anatomy-and-organizational-learning.html</link><category>Anatomy And Organizational Learning System</category><pubDate>Tue, 1 Dec 2009 21:54:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-1172472555931018723</guid><description>&lt;span style="font-family:arial;"&gt;The principle of learning in terms of organizational development is the Change Challenge. Accepting the challenge and managing change is the key word of the learning process. Anatomy of the organization "of the brain, heart and blood". As the motor must always be a role model other organs. Was "the skeleton and muscles" in addition to being a follower must also function as a creator in the field.&lt;br /&gt;&lt;br /&gt;In reality, the learning process is not going well. He through the long stages to create a culture, in addition to also take a relatively long time. The stages also lived presupposes a conducive climate for the whole organ organization sensed value changes.&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;Can take a relatively short path by applying the three stages of the learning process, which began with a paradigm of thinking and new ways (unfreezing old learning), organize the process and setting priorities (movement to new learning) and refreshment back a learned behavior occurs through the application of reinforcement and feedback bali (refreezing the learned behavior).&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>The Influence of Manager on the Success Of Silver Craft Industries In Yogyakarta.</title><link>http://moe-adz.blogspot.com/2009/12/influence-of-manager-on-success-of.html</link><category>THE INFLUENCE OF MANAGER ON THE SUCCESS OF SILVER CRAFT INDUSTRIES IN YOGYAKARTA</category><pubDate>Tue, 1 Dec 2009 21:34:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-6191298654860071973</guid><description>&lt;span style="font-family:arial;"&gt;The primary objective of this research is to study factors determining the success of silver craft industry, especially those located in Yogyakarta. Results of this research show that roles of employee and manager, all have affected the success of silver craft industry.&lt;br /&gt;&lt;br /&gt;When the above ten variables have significant influence to the success of silver craft industry, then the next issue will be, how to identify the qualities of successful manager.&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;It is not exaggerating to say that manager is a prime determinant to the success of silver craft industry. Henceforth, one objective of this research is to study the manager roles to the success of silver craft industry.&lt;br /&gt;&lt;br /&gt;Results of this research show  that there is positive correlation between the success of silver craft industry and manager role, as shown by coefficient correlation of 0.760, which is significant at one percent level. This leads to the conclusion that in order to reach the success of silver craft industry there should be managers who carry out apropriate managing, planning, organizing, leading and controlling. To conduct a proper management, in trun, education and training in management field will be needed.&lt;br /&gt;&lt;br /&gt;Since it has been proved that manager role determine the success of silvercraft industry, thus futher research is needed. It is important to recognize what kind of factors affecting manager role is.&lt;br /&gt;&lt;br /&gt;Taking the complexity and urgency of factors affecting those silver craft industry into account, a deeper study is needed to carry out, either those examining the entire parts or one merely paying attention on certain issues related to factors of structure and technology.&lt;br /&gt;&lt;br /&gt;If possible, it is important to broaden the scope of this study so to include not only Yogyakarta province, but also the entire area of Indonesia.&lt;br /&gt;&lt;br /&gt;This study could also be expanded to cover such other craft industries as leather craft industry, wooden craft industry, and other industries predicted to have bright prospect in future global marketplace. It is also possible to expand the to cover other industries.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>PROGRAM KALKULATOR MENGGUNAKAN VISUAL BASIC</title><link>http://moe-adz.blogspot.com/2009/11/program-kalkulator-menggunakan-visual.html</link><category>Visual Basic</category><pubDate>Mon, 30 Nov 2009 13:41:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-9158010069534478554</guid><description>&lt;span style="font-family:arial;"&gt;Langkah pertama untuk membuat program kalkulator sederhana ini, anda harus mempersiapkan komponen-komponen yg dibutuhkan seperti pada gambar disamping. lalu samakan propertisnya sesuai dengan tabel dibawah.&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYxDpKh67aRbRt8syduvUaP4Kf-qNbvhp9Jr1fQHHC80VREt4GiAsI6BUAlDXM5RXK5dPfv-KIj53Y-RL3_nEtF4eaSuwGgaWHtHkSNiqk01S7m1fBIwImP7jzXuTMRkvfwDSMIIlNMrL8/s1600/Program+Kalkulator.jpg"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 228px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYxDpKh67aRbRt8syduvUaP4Kf-qNbvhp9Jr1fQHHC80VREt4GiAsI6BUAlDXM5RXK5dPfv-KIj53Y-RL3_nEtF4eaSuwGgaWHtHkSNiqk01S7m1fBIwImP7jzXuTMRkvfwDSMIIlNMrL8/s400/Program+Kalkulator.jpg" alt="" id="BLOGGER_PHOTO_ID_5409799976513187026" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class="fullpost"  style="font-family:arial;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgELiOIMnDivbeBkxiMT0UF6LvLEpZYjxHO1hrGOQPn6YaYe3voOio27MaYt01mtIG_DpvCRVwOcwtwbfS32tbFpvd7syB1ucIV8umwuCffqQJk6-GIHLL3cND-QsPYFTN5V4EUlhKll4Y1/s1600/Program+Kalkulator3.jpg"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 211px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgELiOIMnDivbeBkxiMT0UF6LvLEpZYjxHO1hrGOQPn6YaYe3voOio27MaYt01mtIG_DpvCRVwOcwtwbfS32tbFpvd7syB1ucIV8umwuCffqQJk6-GIHLL3cND-QsPYFTN5V4EUlhKll4Y1/s400/Program+Kalkulator3.jpg" alt="" id="BLOGGER_PHOTO_ID_5409799980986056290" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;Lalu copy listing program dibawah ini:&lt;br /&gt;&lt;center&gt;&lt;br /&gt;&lt;table width="450" bgcolor="#666666" border="1" bordercolor="#0000ff" cellpadding="0" cellspacing="0"&gt;&lt;br /&gt;&lt;tbody&gt;&lt;tr&gt;&lt;br /&gt;&lt;td&gt;&lt;br /&gt;Dim a As Integer&lt;br /&gt;Dim b As Integer&lt;br /&gt;Dim c As Variant&lt;br /&gt;&lt;br /&gt;Private Sub Cmd_6239_Click()&lt;br /&gt;If Txt1_6239.Text = "" And Txt2_6239.Text = "" Then&lt;br /&gt;MsgBox "Anda belum masukkan angka", vbOKOnly + vbInformation, "INFORMASI"&lt;br /&gt;If vbYes Then Exit Sub&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;If Txt1_6239.Text = "" Then&lt;br /&gt;MsgBox "Anda belum masukkan angka pertama", vbOKOnly + vbInformation, "INFORMASI"&lt;br /&gt;If vbYes Then Exit Sub&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;If Txt2_6239.Text = "" Then&lt;br /&gt;MsgBox "Anda belum masukkan angka kedua", vbOKOnly + vbInformation, "INFORMASI"&lt;br /&gt;If vbYes Then Exit Sub&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;If Cmb1_6239.Text = "Pilihan" Then&lt;br /&gt;MsgBox "Anda belum menentukan pilihan", vbOKOnly + vbInformation, "INFORMASI"&lt;br /&gt;If vbYes Then Exit Sub&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;a = Txt1_6239&lt;br /&gt;b = Txt2_6239&lt;br /&gt;If Cmb1_6239.ListIndex = 0 Then&lt;br /&gt;c = a * b&lt;br /&gt;ElseIf Cmb1_6239.ListIndex = 1 Then&lt;br /&gt;c = a / b&lt;br /&gt;ElseIf Cmb1_6239.ListIndex = 2 Then&lt;br /&gt;c = a + b&lt;br /&gt;Else&lt;br /&gt;c = a - b&lt;br /&gt;End If&lt;br /&gt;Txt3_6239 = c&lt;br /&gt;End Sub&lt;br /&gt;&lt;br /&gt;Private Sub Txt1_6239_KeyPress(KeyAscii As Integer)&lt;br /&gt;If KeyAscii = vbKeyBack Then Exit Sub&lt;br /&gt;If KeyAscii &lt;&gt; 57 Then&lt;br /&gt;KeyAscii = 0&lt;br /&gt;MsgBox "Anda Tidak Boleh Masukkan Huruf", vbOKOnly + vbInformation, "INFORMASI"&lt;br /&gt;End If&lt;br /&gt;End Sub&lt;br /&gt;&lt;br /&gt;Private Sub Txt2_6239_KeyPress(KeyAscii As Integer)&lt;br /&gt;If KeyAscii = vbKeyBack Then Exit Sub&lt;br /&gt;If KeyAscii &lt;&gt; 57 Then&lt;br /&gt;KeyAscii = 0&lt;br /&gt;MsgBox "Anda Tidak Boleh Masukkan Huruf", vbOKOnly + vbInformation, "INFORMASI"&lt;br /&gt;End If&lt;br /&gt;End Sub&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;&lt;br /&gt;&lt;/tr&gt;&lt;br /&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/center&gt;&lt;br /&gt;Berikut hasil akhir tampilan dari program kalkulator sederhana yg siap untuk digunakan.&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYmW1WY6FjzTd3oAcUdooumGbDN8mWHpJtlLRDTXnBL8yhwP4i5A9HRTCb5Zvfk85vxnQunfX886HkBcyq6WwawGPybLfJVlxQlKoW_O80cMwSIyq-I5mHN_yYYDDSr-lM32Ety7n0HCdL/s1600/Program+Kalkulator2.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 314px; height: 135px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYmW1WY6FjzTd3oAcUdooumGbDN8mWHpJtlLRDTXnBL8yhwP4i5A9HRTCb5Zvfk85vxnQunfX886HkBcyq6WwawGPybLfJVlxQlKoW_O80cMwSIyq-I5mHN_yYYDDSr-lM32Ety7n0HCdL/s200/Program+Kalkulator2.jpg" alt="" id="BLOGGER_PHOTO_ID_5409787450481784626" border="0" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYxDpKh67aRbRt8syduvUaP4Kf-qNbvhp9Jr1fQHHC80VREt4GiAsI6BUAlDXM5RXK5dPfv-KIj53Y-RL3_nEtF4eaSuwGgaWHtHkSNiqk01S7m1fBIwImP7jzXuTMRkvfwDSMIIlNMrL8/s72-c/Program+Kalkulator.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Notebook Acer Aspire 1810T</title><link>http://moe-adz.blogspot.com/2009/11/notebook-acer-aspire-1810tz.html</link><category>Notebook</category><pubDate>Sat, 28 Nov 2009 13:19:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-2479481938168727344</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJCyIMqIDT-vWN5oFpjaYBE5ZRMhUBkBHEsxkkINrJrAuY2qpynOoCV4U-yD7DgWjvEJzYls5UNL-ecM8iG5CVocASJwmajsC5LGpn-ZTakasLX-9EgG46cjGWjDB9Ety79dSvyyZ_rySF/s1600/AS1810T.jpg"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 250px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJCyIMqIDT-vWN5oFpjaYBE5ZRMhUBkBHEsxkkINrJrAuY2qpynOoCV4U-yD7DgWjvEJzYls5UNL-ecM8iG5CVocASJwmajsC5LGpn-ZTakasLX-9EgG46cjGWjDB9Ety79dSvyyZ_rySF/s320/AS1810T.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5409041297272345874" /&gt;&lt;/a&gt;&lt;span style="font-family:arial;"&gt;&lt;b&gt;Compact design, excellent usability&lt;/b&gt;&lt;br /&gt;This notebook weights just 1.35 kg making it extremely easy to take wherever you go. With the full-size Acer FineTip keyboard, you also get normal-size notebook usability with enhanced mouseless control via the multi-gesture touchpad.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;HD experiences on the go&lt;/b&gt;&lt;br /&gt;Enthralling visuals with superb color and motion are yours to experience via 3D graphics and a 16:9 HD display -- and with an HDMI™ port, you can connect to peripheral displays easily. Audio-wise, you get Optimized 2nd Generation Dolby® Sound Room®for multichannel sound over an ordinary pair of stereo headphones. &lt;br /&gt;&lt;/span&gt;&lt;span class="fullpost"  style="font-family:arial;"&gt;&lt;br /&gt;&lt;b&gt;8-hour battery life&lt;/b&gt;&lt;br /&gt;The Aspire 1810T features an ultra-low voltage (ULV) processor, which consumes less energy and frees you from your electrical outlet. Charge up once and go from morning till night! &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Cool to the touch&lt;/b&gt;&lt;br /&gt;Acer ComfyTouch technology uses an innovative design to air-cool the processor and notebook case. Even when running for a full day, the notebook remains cool in your hands or on your lap.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Earth-first mobility&lt;/b&gt;&lt;br /&gt;Realize energy savings whether on the road or plugged in at your desk. While on the go, save up to 40 percent more power compared with typical notebooks.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Spesifikasi notebook Acer Aspire 1810TZ :&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;br /&gt;&lt;li&gt;Processor : Intel Pentium Dual Core SU4100 1.3 GHz&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Mainboard : Intel GS45&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Memory : 2048 MB, 1 module DDR2-667 MHz, max. 4096MB&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Graphics adapter : Intel Graphics Media Accelerator (GMA) 4500MHD - MB&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Display : 11.6 inch 16:9, 1366x768 pixel, Acer CineCrystal LED Backlight TFT LCD, glossy: yes&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Harddisk : Toshiba MK2555GSX, 250GB 5400rpm&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Soundcard : Intel 82801IBICH9 HD Audio Controller&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Connections : 3 USB, 1 VGA, 1 HDMI, 1 Kensington Lock&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Audio Connections: 3.5mm headphone jack with support for SPDIF, microphone socket, Card Reader: 5-in-1 cardreader, supporting SD, MMC, Memory Stick, Memory Stick Pro, xD Picture Card,&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Networking : Atheros AR8131 PCI-E Gigabit Ethernet Controller (10MBit), 802.11a/b/g/n (abgn)&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Dimensi : height x width x depth (in mm): 30 x 285 x 204&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Bobot : 1.4 kg&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Baterai : 63 Wh Lithium-Ion&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Harga : 519 Euro&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Operating System : Microsoft Windows Vista Home Premium 32 Bit&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Webcam: Acer Crystal Eye und integriertes Mikrofon, MS Works 9, Adobe Reader, Orion, My WinLocker&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Garansi : 12 bulan&lt;/li&gt;&lt;br /&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;font color="#666666"&gt;source: www.acer.co.id&lt;/font&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJCyIMqIDT-vWN5oFpjaYBE5ZRMhUBkBHEsxkkINrJrAuY2qpynOoCV4U-yD7DgWjvEJzYls5UNL-ecM8iG5CVocASJwmajsC5LGpn-ZTakasLX-9EgG46cjGWjDB9Ety79dSvyyZ_rySF/s72-c/AS1810T.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Asus Create World's Fastest Notebook</title><link>http://moe-adz.blogspot.com/2009/11/asus-create-worlds-fastest-notebook.html</link><category>Asus Create World's Fastest Notebook</category><pubDate>Tue, 24 Nov 2009 00:23:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-9106755812444172815</guid><description>&lt;span style="font-family:arial;"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJtCZTC3uGLRyyeH5TZx9PYRmOrdhPwRItxsV-P6qZ4pr7IVHzMV_N8CuRtM4WPq9r3rYVUMwgTTXdr2yZWPO0XZllhtttIdQjqDFMLEPrBbiG3ZG01UHlkzADX1M5VkP6d4MXawL6LvCL/s1600/asus-eee-pc-t91-notebook.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJtCZTC3uGLRyyeH5TZx9PYRmOrdhPwRItxsV-P6qZ4pr7IVHzMV_N8CuRtM4WPq9r3rYVUMwgTTXdr2yZWPO0XZllhtttIdQjqDFMLEPrBbiG3ZG01UHlkzADX1M5VkP6d4MXawL6LvCL/s200/asus-eee-pc-t91-notebook.jpg" border="0" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Although&lt;/b&gt; the 4G technology that will be adopted many mobile operators are likely to LTE (Long Term Evolution), but the ASUS has an affair with WiMAX make. Taiwan Podusen home computer is handed notebook equipped with WiMAX technology. This notebook can be the fastest notebook in the world.&lt;br /&gt;&lt;br /&gt;WiMAX technology in theory it can stream data at speeds up to 70 Megabytes per second (Mbps). If WIFI only reach as far as 10-20 meters area WiMAX can reach 30 to 50 kilometers.&lt;br /&gt;&lt;br /&gt;ASUS Eee PC notebook has been exhibited at the Consumer Electronic Show (CES) 2008. This notebook on display at the exhibition yesterday GSM Mobile World Congress in Barcelona. "With this notebook can be connected to the Internet any time," so said a press release that was launched on the site ..&lt;br /&gt;&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;Notebook with 10-inch screen is using WiMAX technology that works on two frequencies, namely frequency of 2.4 GHz to 2.7 GHz and 5.7 GHz. Thus, in kemungkina can use in any country. In Indonesia, for example, the frequency used for WiMAX kemungkinaadalah 2.3 GHz and 3.3 GHz. The government is currently making a tender for the WiMAX area 15 zone.&lt;br /&gt;&lt;br /&gt;Notebook Asus claims this to be the first notebook Windows 7 compatible with dengna equipped WiMAX.Karena superfast connections, ASUS does not just provide a hard disk to store data. Notebook users also provided a data storage cupboards online with a capacity of 10 Gigabyte. In the notebook itself has a 160 Gigabyte hard drive for.&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJtCZTC3uGLRyyeH5TZx9PYRmOrdhPwRItxsV-P6qZ4pr7IVHzMV_N8CuRtM4WPq9r3rYVUMwgTTXdr2yZWPO0XZllhtttIdQjqDFMLEPrBbiG3ZG01UHlkzADX1M5VkP6d4MXawL6LvCL/s72-c/asus-eee-pc-t91-notebook.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Microsoft Launches Game Halo Waypoint</title><link>http://moe-adz.blogspot.com/2009/11/microsoft-launches-game-halo-waypoint.html</link><category>Microsoft Launches Game Halo Waypoint</category><pubDate>Sun, 22 Nov 2009 17:18:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-8194665199964596293</guid><description>&lt;span style="font-family:arial;"&gt;&lt;div class="separator" style="clear: both; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXQjkSbuozwA9MjjqtMXwgpO0dF2qeTjvbYgUAYFCjO3zuutrsE8TYADdY_iCXPlpuQHDeZFbzzVnyFcmIgqaSzjRcjnHDPPkNX6C-dENJkdxhEZ21Lw5ycV4doRN-Suvb3VLiJuvgUG6V/s1600/halo-waypoint-screens.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXQjkSbuozwA9MjjqtMXwgpO0dF2qeTjvbYgUAYFCjO3zuutrsE8TYADdY_iCXPlpuQHDeZFbzzVnyFcmIgqaSzjRcjnHDPPkNX6C-dENJkdxhEZ21Lw5ycV4doRN-Suvb3VLiJuvgUG6V/s200/halo-waypoint-screens.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Microsoft's&lt;/b&gt; announcement of Halo Waypoint, the Halo "destination" coming to Xbox Live this Fall, was light on details, overshadowed by the reveal of the Halo Legends anime series. Fortunately, 343 Industries' Frank O'Connor was at Comic-Con to clear things up.&lt;br /&gt;&lt;br /&gt;Recently Microsoft has launched the Halo Waypoint long-awaited for Xbox Live members. Portals offer a full preview of the episode Hello Legends, which includes developer interviews, trailers, screenshots and exclusive video footage.&lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuTcdM2UD_DqAJZW0leHns9PMOtVOrOYwI2CuCncEPqpn7uPArmLoMQu_NSVeJCjg7A7nOieTvtj4PWROXRIEAO6PGoKP6RKbRCdg72OzZ0u3wSQgbZmIn3ON0qcXsCePhZA8gdN5cY6W0/s1600/Halo-Waypoint-460x303.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuTcdM2UD_DqAJZW0leHns9PMOtVOrOYwI2CuCncEPqpn7uPArmLoMQu_NSVeJCjg7A7nOieTvtj4PWROXRIEAO6PGoKP6RKbRCdg72OzZ0u3wSQgbZmIn3ON0qcXsCePhZA8gdN5cY6W0/s320/Halo-Waypoint-460x303.jpg" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;In addition, Waypoint has a career system that tracks the performance of players in several games Hello. Participants are expected to accept gifts for specific achievements, including the full set Asker ODST armor and t-shirts.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBZ6R_2KPHUxKllqbeMhh0g2U25obvCVwFpp1hfr75QzCgjByGgTfEdH5zv7tgOlpGqPRcNrjMx_OBR_TcPk_53EsA1cttnaE6cTPE5HSB4j7kT137ftvH7tjJGazXTX3aCSrOc9qmIH4X/s1600/halo_waypoint.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBZ6R_2KPHUxKllqbeMhh0g2U25obvCVwFpp1hfr75QzCgjByGgTfEdH5zv7tgOlpGqPRcNrjMx_OBR_TcPk_53EsA1cttnaE6cTPE5HSB4j7kT137ftvH7tjJGazXTX3aCSrOc9qmIH4X/s320/halo_waypoint.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;Microsoft also has announced the official broadcast schedule for the Halo Legends, who reviewed the stories based on various themes and characters in the Halo universe.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhYPqjtgtj67WaFLJbLOgAsZbNQ2IHxm8F9V0n0yraSiDtolGmUMmzcxJborKRWOIG5LXUspOnp4XS_sFXQ0lzbOlBO1aHkNY4Ro-xDQus0rXGAIzpfWaOucgyRV2_pOGPxwWd2NL_y6Gq/s1600/halo_wars.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhYPqjtgtj67WaFLJbLOgAsZbNQ2IHxm8F9V0n0yraSiDtolGmUMmzcxJborKRWOIG5LXUspOnp4XS_sFXQ0lzbOlBO1aHkNY4Ro-xDQus0rXGAIzpfWaOucgyRV2_pOGPxwWd2NL_y6Gq/s320/halo_wars.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;Halo Waypoint will also be the first place fans will have the chance to see episodes of Halo Legends, the series of shorts developed by Japanese animation studios. They'll be available to viewers for a limited time, debuting on Xbox Live as "events," not just dropped on the Xbox Live Video Marketplace.&lt;br /&gt;Source : http://halo.xbox.com&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXQjkSbuozwA9MjjqtMXwgpO0dF2qeTjvbYgUAYFCjO3zuutrsE8TYADdY_iCXPlpuQHDeZFbzzVnyFcmIgqaSzjRcjnHDPPkNX6C-dENJkdxhEZ21Lw5ycV4doRN-Suvb3VLiJuvgUG6V/s72-c/halo-waypoint-screens.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Choosing a Netbook or Notebook</title><link>http://moe-adz.blogspot.com/2009/11/choosing-netbook-or-notebook.html</link><category>Notebook</category><pubDate>Sun, 22 Nov 2009 01:35:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-3103285245615724035</guid><description>&lt;span style="font-family:arial;"&gt;&lt;div class="separator" style="clear: both; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO8hF9_Cby722qE_SlWov4_8qs6g0yWuH0f08CQikM3kB14QNGDsN7C7WTuHvomGzyybMJAV46KCeftTPYBuXigApwcuga-fEzERiabtVGfhrx4dK_TXohNzbNndZiH9xr3Vvahv2DOdOT/s1600/1-asus-eee-t91.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO8hF9_Cby722qE_SlWov4_8qs6g0yWuH0f08CQikM3kB14QNGDsN7C7WTuHvomGzyybMJAV46KCeftTPYBuXigApwcuga-fEzERiabtVGfhrx4dK_TXohNzbNndZiH9xr3Vvahv2DOdOT/s200/1-asus-eee-t91.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&gt;&lt;b&gt;Netbook&lt;/b&gt; is a notebook type computers are more expensive than regular notebook. According to Wikipedia, the netbook is a small notebook to the medium, light, energy-efficient, relatively inexpensive valuable, and highlighted for easy access to the Internet such as browsing and e-mailing.&lt;br /&gt;&lt;br /&gt;Netbook and Notebook physical differences can be seen on the monitor, Netbook size 7 to 10 inches, while the notebook has a screen more than 10 inches. With small size, very comfortable Netbook taken everywhere we go. &lt;/span&gt;&lt;span class="fullpost" style="font-family:arial;"&gt;Another thing that differentiates a Netbook have limitations on output devices, and netbooks in general does not have an optical drive. Another feature is the price, netbooks have a price range $ 250 to $ 500 or more less than 5 millions of dollars. But you can not find a notebook under $ 500.&lt;br /&gt;&lt;br /&gt;The origins can be traced from netbook line of products owned by Psion netbook - hardware manufacturers who came from London who is now no longer continue, project one laptop per child (OLPC), and the Palm Foleo. All three are computer devices that are small, lightweight, and can be used to access the network. The presence of well-known netbook starting at ASUS began introducing its product line of ASUS Eee PC to fill the market void.&lt;br /&gt;&lt;br /&gt;Target Netbook users are people who like to sit for hours at the food court or even a restaurant cafe that provides a free hotspot. Wi-fi facilities certainly were present in all types of Netbook. Netbook users can be assured that for hours in cafes or restaurants or other places that have wifi spot is a chat, write or just browse the internet, for certain demanding applications are consuming resources and tenanga of these netbooks. Lightweight applications that are common in the Netbook Chat Messenger such as Yahoo Messenger, MSN Messenger, Gtalk, Skype, Mozilla, do not forget the webcam is also embedded in certain kinds of live cam for use with applications that support Messenger cam view.&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO8hF9_Cby722qE_SlWov4_8qs6g0yWuH0f08CQikM3kB14QNGDsN7C7WTuHvomGzyybMJAV46KCeftTPYBuXigApwcuga-fEzERiabtVGfhrx4dK_TXohNzbNndZiH9xr3Vvahv2DOdOT/s72-c/1-asus-eee-t91.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item><item><title>Wireless Security</title><link>http://moe-adz.blogspot.com/2009/11/wireless-security.html</link><category>Computer Networking</category><category>Wireless Security</category><pubDate>Wed, 18 Nov 2009 20:38:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3828018331420537955.post-8168907880076176872</guid><description>&lt;span style="font-family:arial;"&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyIQmyGgL6rjF_EqoS1JtDeslo-msO4SU2YuPUDYUbAPm6L8ESY-bKUo4ThroWBUOhoOr2vi3D24sF4vPq5wfD1qFuEl7QC8qL7x1HPz2J2hudz3L3-QETagM_-L5iFTgocgH_IIY8ggdA/s1600/i_wireless_security.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 209px; height: 203px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyIQmyGgL6rjF_EqoS1JtDeslo-msO4SU2YuPUDYUbAPm6L8ESY-bKUo4ThroWBUOhoOr2vi3D24sF4vPq5wfD1qFuEl7QC8qL7x1HPz2J2hudz3L3-QETagM_-L5iFTgocgH_IIY8ggdA/s320/i_wireless_security.gif" alt="" id="BLOGGER_PHOTO_ID_5407595493811567026" border="0" /&gt;&lt;/a&gt;&lt;b&gt;Background&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;Wireless network (wireless LAN) currently used by more and more companies in support of the company's business processes. Increased implementation of wireless LAN networking technology can not be separated from many advantages offered by technology in this. Excess among flexibility offered, because to implement wireless LAN technology is not constrained topology problems / conditions. This technology can be applied in which Just to reach a good signal depends on the quality of the device wireless LAN is used. Along with the many users of technology wireless-based network, then the more the parties trying to do a "crime" of this network. &lt;/span&gt;&lt;span class="fullpost"  style="font-family:arial;"&gt;&lt;br /&gt;&lt;br /&gt;This can be seen from the number of software / tool that was created to take the offensive for both wireless networks was the kind of active attacks and passive types of attacks. Such software is usually distributed through the internet for free and There are also some who paid. Requiring a security method the right to address security issues for wirelessLAN network.&lt;br /&gt;&lt;br /&gt;Wireless networks are vulnerable to attack, it is because network with this technology can not be confined by a building like that in cable-based network protected by a wall in a building cable-based network which is attached. Radio frequency signals used by the wireless network in the data transmission process in these networks can be easily accepted / in caught by user other than the user's computer wireless network is only with using a wireless network card compatible / fit with the network wireless is installed on the computer user's computer. Security holes in wireless networks can be divided into 2 (two) types of attack, namely: passive attacks and active attacks.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Passive Attack&lt;/b&gt;&lt;br /&gt;Passive attack is a real type of attack does not endanger of a network system. This type of attack does not cause loss of resources in a network or causes damage to the a network of systems that were attacked using this type of attack. Source power contained in the system including a data network, bandwidth network, printer, memory in a computer processing unit (processor) and more. The point of this attack is only to observe the all the resources contained in a computer network system. like network traffic monitor a computer network system. Information resulting from these observations is very useful for those who do not reserves the right to conduct further attacks against the system. so that this type of attack is very difficult to detect by the manager of a computer network systems. Wireless network communications are usually used common radio frequency that is not listed that can be accessed by anyone with a compatible network card. so to This type of network is very easy to tap by using the technique of "sniffing" or "wardriving". We have a lot of "sniffer" using software such as NetStumbler in combination with each other antennas work together with the card wireless network (wireless) to detect the network "access points" (AP) which in range and the signal can be accessed wirelessly network card it. Then the data traffic is happening in the wireless network in captured by the "sniffer" for later in the analysis by using tools such as Microsoft Network Monitor to microsoft windows operating system or using TCPDump to Linux Linux operating system.&lt;br /&gt;&lt;br /&gt;Programs such as NetStumbler but can be used to detect network access point located within range can also be used to displays the information on the Service set identifiers (SSID) and manufacturer information access point is. So if the Access Point remain in the configuration is still using the default SSID settings are included by the manufacturer when the access point is purchased, then the wireless network use the access point device is very susceptible to problems security.&lt;br /&gt;&lt;br /&gt;If the SSID contains information about organizations that provide services wireless network or the network may not use security methods such as encryption by Wireless Equivalent Privacy (WEP) is capable of doing encryption of all data traffic that occur within the wireless network, if it happens the right network security it would be easy to pass by the parties who are not interested (unauthorized users). Once a "sniffer" managed to get the SSID information an access point, the "sniffer" that can take pictures of traffic in wireless network and open information about all the things in the network these, such as user name and password. When a sniffer successfully perform have observed and use the information obtained to entered into the network and accessing or using the resources within system without permission, then at this stage passive attacks (passive attack) turned into a kind of active attacks (active attack).&lt;br /&gt;&lt;br /&gt;To protect wireless networks against computer programs that mengeteksi existence capable wireless network signal, then a manager wireless networks (administrator) to do the reconfiguration of all the basic configuration of the wireless network device if the configuration is still using a standard  onfiguration / defaults provided by the vendor maker wireless network devices such as the device was first purchased. Among them is to implement a security system that is closed with how to configure an Access Point that can not respond connection requests (request) to the status of his SSID that is usually requested by programs such as NetStumbler. In this way an access point in a fixed wireless network can not be detected (invisible) by the parties not entitled to access the wireless network.&lt;br /&gt;&lt;br /&gt;Currently most devices access point for wireless network very easy to its configuration in order to facilitate its users and using the network. But with all these facilities was has weaknesses, too. By prioritizing ease of configuration, then some makers access point vendors do not provide a touch of aspects security in the basic configuration provided on the access point they production. This is due to the configuration of security in a network access point device is quite complicated and must consider many aspects. So if the included network security into the basic configuration of access point devices must process is not easy longer and requires special skills of the user.&lt;br /&gt;Here are some basic things that can be done to protect the network wireless passive attacks and active attacks:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;1. Secure the wireless router or interface page Administrator Access Point.&lt;/b&gt;&lt;br /&gt;Almost all routers and access points have the password for the administrator required at the time of login into the wireless device and to make configuration settings in the access point device. Most access point device using the default password is very simple and not safe. For example the password with the keyword "password" as well or use keyword company names, and some even do not has a password at all. In such cases, the first step performed by an administrator during the first setting wireless router to the device or access point is to change The default password on the device with another password more secure. Because this password is rarely used because to do configuration the access point device is usually very rarely done, then use a password that is easy to remember but difficult to guess or can also be a way to write these passwords are not easily forgotten but stored in a safe place if it is to passsword written so as not to forget. If finally the password is forgotten then satusatunya way is to reset the access device point is that all the  onfiguration is returned to the default configuration as previously when the wireless device was first purchased from the vendor.&lt;br /&gt;&lt;br /&gt;So the administrator must do the reconfiguration of the device to aspects of wireless security.&lt;br /&gt;Here are a few tricks to create a relatively secure password:&lt;br /&gt;• passwords do not use personal information such as name, date of born.&lt;br /&gt;• passwords must be easy to remember but difficult to predict.&lt;br /&gt;• use a different password to access the system different.&lt;br /&gt;• change the password regularly to prevent attacks on password using the program "password cracking".&lt;br /&gt;• if the password should be written and stored in a computer file because it is difficult to remember so keep a safe place and files is the encryption.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2. Do not Make Broadcast of SSID access point.&lt;/b&gt;&lt;br /&gt;Most access points and routers automatically broadcast process for the network name, or SSID (Service Set Identifier). This setting is of course facilitate the wireless network settings on the client and create a device access point can be seen by all wireless network systems are included in coverage access point device is. So by activating SSID on the access point that allows all parties to detect presence of a network access point is either by the party entitled or by parties who are not entitled to access the network. This is of course can lead to security holes in wireless networks are. To securing the feature should disable SSID broadcast on the network so that wireless is to become invisible (invisible) by the other users who do not eligible and not enrolled in these wireless networks. For ordinary users this This can not be detected, but for a "sniffer" of course this does not influential because by using computer programs specific like NetStumbler the "sniffer" can still detect the presence of the device access point for the wireless network.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3. Security Features Enable WPA encryption instead of WEP.&lt;/b&gt;&lt;br /&gt;Keamaanan features WEP encryption (Wired Equipment Privacy) which during the many applied to the access point device has been known to have many weakness that is relatively easy for someone to open the code encryption and access the wireless network using only appropriate device. A better way to protect wireless networks current is to use WPA (Wi-Fi Protected Access). WPA provides more security features and ease of its use, unlike the WEP limit the use of characters password only on the numbers 0-9 and letters from AF. Support for WPA have been included in the operating system Windows XP (with latest service packs)&lt;br /&gt;&lt;br /&gt;and virtually on the latest wireless networking devices today and in operating system. The latest version of the current WPA WPA2 which is to be found on the latest wireless network devices today and provides a mechanism better encryption. But to use this feature may be WPA2 must download the latest patch on Windows XP operating system. Because feature This relatively new and not all Windows XP operating system supports use.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4. Use WEP than not using at all.&lt;/b&gt;&lt;br /&gt;If you find that there are several wireless devices on the market today only supports WEP encryption key (usually found on the device non-PC based such as media players, PDAs, and DVR), then use this feature WEP encryption, although relatively safe than not at all and use keys that are difficult to predict.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;5. Use filtering to control access to wireless networks with using MAC filtering.&lt;/b&gt;&lt;br /&gt;Unlike the use of IP address, MAC address of a unique nature to distinguish between one network device to another one. So that the switch uses MAC filtering feature it can be limited access to the wireless network by only those MAC addresses his MAC address of each user in the wireless network must be known first 12 characters are the MAC address of each network devices that will connect to the access point device.&lt;br /&gt;&lt;br /&gt;Of course this means a little uncomfortable and inflexible because of a administrator must register all MAC addresses for each user / client which will be connected into the network. If the number of client users wireless network is of course a lot of trouble a administratori network. We have had many programs including the category of "hacking tools" which can be used to make counterfeiting / "spoofing" the address MAC. Necessitating careful enough attention from an administrator wireless network to determine which MAC addresses are valid and which addresses MAC false. So with falsified / MAC address spoofing in accordance with MAC address listed in the wireless network is the is not entitled to enter and access these wireless networks.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;6. Reducing the beam power wireless devices (access points).&lt;/b&gt;&lt;br /&gt;This feature is not available in all wireless routers and access points, but there are some wireless devices that provide features for lower power wireless devices in the transmit signal so that the narrower the range of the signal. Although not always possible to make the process of setting appropriate to the size of the signal but this still managed to reduce the potential for gaps security on wireless network system and minimize the chance of outside parties systems that are not entitled to access the wireless network device.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;7. Turn off the features / remote administration service.&lt;/b&gt;&lt;br /&gt;Almost all wireless routers provide the device features to be managed remotely through the Internet. Ideally, the use of this feature when deciding on a specific IP address or to limit the reach the use of IP addresses that may access the router device. instead for the two activities mentioned above, this feature should be disabled. because the This feature will enable everyone in range signal wireless router device has the potential to discover and access these wireless router devices. So that always turn off this feature as a policies in the management of the router device in a wireless network. So that an administrator can not perform network management wirelessnya remotely via the Internet. This feature is usually disabled by default by the vendor making the router device when it was first purchased for security reasons. But it never hurts to check on a regular basis against this feature in a wireless network device if it is true been disabled or still active.&lt;br /&gt;&lt;br /&gt;Conclusion&lt;br /&gt;Wireless network is a computer network is very open and vulnerable the security hole. This is due to constituent components This network is physically very difficult to secure. In contrast to the network cable-based physical security for the secured easily and at control, wireless-based networks is very difficult to control. Transmitting frequency signals used by wireless device allows all parties can detect and access this network while using the compatible wireless receiver and the signal can reach. Today many all types of computer programs that can be used to perform attacks on wireless networks, both types of passive attacks that nature does not destroy and steal just to the type of information to active attacks that can damaging the system and use all the resources contained in the these wireless networks. Because the characteristics of wireless devices that are difficult to physically secured so security can only be done by using policies or use a computer program that usually provided by vendors such wireless device makers with only perform simple settings and easy.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Bibliography&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;br /&gt;&lt;li&gt;CompTIA Security+, Part 1 – security concepts., www.comptia.net&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Network Security Essentials., Stalling W., Prentice Hall., 2004&lt;/li&gt;&lt;br /&gt;&lt;li style="text-align: justify;"&gt;http://www.more.net –Network Auditing-, 2007&lt;/li&gt;&lt;br /&gt;&lt;/ul&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Information Technology and General Education&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyIQmyGgL6rjF_EqoS1JtDeslo-msO4SU2YuPUDYUbAPm6L8ESY-bKUo4ThroWBUOhoOr2vi3D24sF4vPq5wfD1qFuEl7QC8qL7x1HPz2J2hudz3L3-QETagM_-L5iFTgocgH_IIY8ggdA/s72-c/i_wireless_security.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (Muadz Qiyu)</author></item></channel></rss>