<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3272875449860424148</id><updated>2024-11-01T03:37:13.993-07:00</updated><category term="Network"/><category term="Computer"/><category term="Cisco"/><category term="Tips and Tricks"/><category term="Network Security"/><category term="Operating System"/><category term="Security Computer"/><category term="Hardware"/><category term="Programming"/><category term="Software"/><category term="Games"/><category term="Troubleshooting"/><category term="Web Development"/><title type='text'>FuadKP</title><subtitle type='html'>Science is Never Die!</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>36</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-7086716156719776307</id><published>2011-10-29T22:15:00.000-07:00</published><updated>2011-10-29T22:21:24.379-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hardware"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Seputar Bateray Notebook</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Setelah sekian lama g pernah posting lg,,,,,&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Perangkat notebook jaman sekarang kebanyakan menggunkan Baterai jenis  Lithium (Li-On). Berikut ini adalah karakteristik dari baterai  tersebut:&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  Jika package battere Li-Ion dibuka, sebetulnya didalamnya  mengandung beberapa buah battere kecil yang disebut sebagai CELL.  Semakin banyak CELL-nya (artinya semakin banyak battere-nya), akan  membuat daya tahan-nya lebih lama. Saat ini jumlah CELL pada Baterai  Notebook berkisar antara 4, 6 dan 8 Cell.&lt;br /&gt;Jumlah CELL juga akan mempengaruhi berat battere-nya, dan berimbas pada  berat notebook secara keseluruhan. Inilah yang menjelaskan kenapa  notebook ringan juga menggunakan Baterai dengan jumlah cell sedikit.  Misalnya : Notebook ORIS menggunakan Baterai  4-cell.&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; Baterai Li-Ion TIDAK mengenal “Memory Effect”, yaitu suatu  kondisi dimana jika battere tidak di-charge sampai full (100%) maka  kemampuannya akan berkurang. Jadi tidak ada istilah bahwa jumlah  pemakaian charge akan mempengaruhi kondisi Baterai tsb.&lt;/li&gt;&lt;li&gt; Jika di-charge 100% dan disimpan pada suhu rata-rata 25? maka  kemampuan / umur Baterai Li-Ion akan berkurang 20% setiap tahunnya. Ini  dalam pemakaian normal.&lt;/li&gt;&lt;li&gt; Pada saat notebook tidak digunakan, maka charge Baterai sebaiknya  rata-rata 40% saja (jangan sampai di-charge penuh). Karena jika keadaan  full charge, kondisi itu akan membuat battere lebih banyak kehilangan  daya tahannya. Ini juga menjelaskan kenapa jika kita membeli notebook /  HP baru, battere selalu TIDAK DALAM KEADAAN PENUH.&lt;/li&gt;&lt;li&gt; Battere Li-Ion juga akan berkurang kemampuannya apabila suhu  menjadi semakin panas. Ini yang menjelaskan kenapa pada notebook Celeron  M, daya tahan Baterai semakin berkurang. Celeron M itu tidak memiliki  fitur SpeedStep Technology seperti pada Pentium M / Core Duo, sehingga  clock speed tidak bisa diturunkan dan membuat notebook semakin panas.&lt;/li&gt;&lt;li&gt; Teknologi kimia Li-Ion sebetulnya aman apabila digunakan secara  wajar dan sesuai petunjuk. Tapi baterai ini juga dapat MELEDAK /  TERBAKAR pada kondisi tertentu, seperti pada kondisi panas yang ekstrim  dan berlebihan. Sebaiknya jangan meletakkan notebook pada mobil yang  terparkir terbuka pada siang hari yg terik !&lt;/li&gt;&lt;li&gt; Berbeda dengan tipe Baterai lainnya seperti Ni-Cd, Li-Ion dapat  di-charged berulang kali tanpa kehilangan kualitasnya. Pada saat  Notebook tidak digunakan dalam waktu lama, sebaiknya charge Baterai  jangan melebihi 40% agar pengurangan umur Baterai tidak terlalu cepat.&lt;/li&gt;&lt;li&gt; Life cycle baterai Lithium (Li-On) adalah sekitar 400-600 cycle  charge dan recharge dimana setelah cycle tersebut maka akan terjadi  penurunan kualitas Baterai. Karena lithium saat di charge dari kondisi  1% ke 100% itu dianggapnya sama saja dengan charge dari 99% ke 100%,  yakni 1x life cycle. Saat life cyclenya semakin banyak, kapasitas  baterai akan semakin berkurang jadi perhatikan metoda cycle recharge  anda.&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Pertanyaan umum dan problem yang sering terjadi pada baterai Notebook:&lt;/p&gt;&lt;br /&gt;Saya baru pakai 3 bulan/1tahun kok baterai sudah tidak bisa dipakai :&lt;ol style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;Baterai dipakai BUKAN BERDASARKAN WAKTU (hari, bulan, tahun), tetapi  di-DIHITUNG berdasarkan CYCLE CHARGE-DISCHARGE, setiap satu cycle  kemampuan berdasarkan kalkulasi BOARD BATTERY akan berkurang, bukan  kemampuan cell baterai. Dimana BOARD BATTERY ada batasan minimum  kemampuan baterai yang diperbolehkan. Pada umumnya baterai bisa sampai  400-600 cycle. Jadi kalau dalam satu hari melakukan 30 cycle, kurang  lebih baterai dalam 10 hari akan drop&lt;/p&gt;&lt;li&gt;Baterai saya charge kok tidak penuh2x hanya sampai xx% :&lt;/li&gt;&lt;p&gt;Kenapa tidak penuh2x, karena Current Capacity di BOARD BATTERY tidak  sinkron/SAMA dengan perhitungan Arus dan Voltage CELL BATTERY (CELL  IMPEDANCE).  Ada beberapa type yang bisa di kalibrasi ada yang di LOCK  oleh MANUFACTURE BATTERY (Bukan Manufacture laptop).&lt;/p&gt;&lt;li&gt;Lampu charge baterai menyala tetapi kalau adaptor di cabut laptop ikut mati / baterai tidak berfungsi normal :&lt;/li&gt;&lt;p&gt;Kondisi ini biasanya karena SAFETY CIRCUIT di BOARD BATTERY sudah  rusak, bisa di akibatkan over current (I), over voltage (V) maupun heat  atau panas. Dan didalam BOARD BATTERY terdapat safety circuit 3 lapis  dan CUKUP CERDAS&lt;/p&gt;&lt;li&gt; Baterai saya simpan (tidak dipasang di laptop) setelah beberapa  waktu kok tidak bisa dipakai lagi. Karena KATA ORANG kalau baterai mau  awet lebih baik dicabut :&lt;/li&gt;&lt;p&gt;Didalam BOARD BATTERY terdapat “self discharge/day” parameter dimana  apabila battery tidak dipakai akan mengurangi “Current Capacity” di  BOARD BATTERY , dimana ada minimum CURRENT CAPACITY yang di ijinkan oleh  BOARD BATTERY. Apabila terlalu rendah maka BOARD BATTERY akan  mengaktifkan SAFETY CIRCUIT, alias bunuh diri.&lt;/p&gt;&lt;/ol&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Tips dalam penggunaan Baterai notebook&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt; Saat mengunakan baterai atau notebook baru discharge sampai kosong  daya bawaan dari pabrik kemudia charge penuh dalam kondisi mati dalam  waktu 4-8 jam agar cell baterai optimal.&lt;/li&gt;&lt;li&gt; Battere Li-Ion tidak boleh dikosongkan sampai 0% terlalu sering.&lt;/li&gt;&lt;li&gt; Gunakan baterai dengan optimal artinya manfaatkan life cycle dengan  baik jangan ketika baterai masih 90% atau 80% langsung di charge.&lt;/li&gt;&lt;li&gt; Jangan di charge sampai 100% kemudia melepas baterai dari notebook,  bila ingin meyimpan baterai dengan melepas dari notebook pastikan  kondisi baterai dalam kapasitas 40-60%.&lt;/li&gt;&lt;li&gt; Metode melepas baterai ketika menggunakan listrik AC tidak serta  merta membuat baterai menjadi awet dibalik itu ada resiko notebook  mengalami kerusakan lain saat hanya mengunakan listrik AC dan terjadi  pemadaman listrik.&lt;/li&gt;&lt;li&gt; Usahakan gunakan notebook dalam kondisi temperature ruangan yg baik  jangan terlalu panas Karena panas merupakan musuh utama baterai Lithium  (Li-On) ada baiknya menggunakan perangkat pendingin notebook seperti  external cooling notebook.&lt;/li&gt;&lt;li&gt; Lakukan kalibrasi secara berkala terhadap baterai dengan cara  melakukan satu kali discharge penuh (dari kapasitas 100% menjadi sekitar  3%) kemudian diikuti pengisian penuh baterai dengan mematikan notebook.&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/7086716156719776307/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/10/seputar-bateray-notebook.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7086716156719776307'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7086716156719776307'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/10/seputar-bateray-notebook.html' title='Seputar Bateray Notebook'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-4780734443952544211</id><published>2011-08-24T15:31:00.000-07:00</published><updated>2011-08-24T15:34:04.751-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><title type='text'>Cisco: How to configure NAT - Network Address Translation</title><content type='html'>&lt;h4 style=&quot;text-align: justify;&quot;&gt;This brief tutorial will let you configure NAT overload, or how to  enable Internet access to multiple PCs of your LAN using only 1 public  IP address. This type of NAT can easily be used at home when you have a  Cisco 800 series xDSL router.&lt;/h4&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span id=&quot;more-713&quot;&gt;&lt;/span&gt;&lt;br /&gt;The first step is to define the addresses that will need to be NAT’d, this is done using a standard access-list:&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;access-list 1 permit &lt;em&gt;your_lan_address_range&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;example: access-list 1 permit 192.168.1.0&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Now that we defined the addresses that are allowed to use the NAT address we enable the actual NAT:&lt;br /&gt;&lt;strong&gt;ip nat inside source list &lt;em&gt;access-list number interface&lt;/em&gt; overload&lt;/strong&gt;&lt;br /&gt;example: ip nat inside source list 1 dialer0 overload&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This  command states that it will use the addresses from the access-list we  defined in step 1 and NAT it to the Public IP address on the &lt;em&gt;interface&lt;/em&gt;,  e.g. serial 0, dialer 0, ethernet 1,… The overload keyword specifies  that multiple LAN addresses can be NAT’d to that address. The router  uses the TCP and UDP ports of the hosts [LAN addresses] to translate the  public IP address back to the originating local host address.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The last steps we need to configure is to tell the router which our &lt;strong&gt;inside&lt;/strong&gt; and &lt;strong&gt;outside&lt;/strong&gt; addresses. This is achieved using the following commands:&lt;br /&gt;- for the inside&lt;br /&gt;&lt;strong&gt;conf t&lt;br /&gt;interface ethernet | fastethernet &lt;em&gt;number&lt;/em&gt;&lt;br /&gt;ip nat inside&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;- for the outside, assume we are dealing with an xDSL router&lt;br /&gt;&lt;strong&gt;conf t&lt;br /&gt;interface dialer0&lt;br /&gt;ip nat outside&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Now that NAT is configured we can check to see which addresses are being used by using the &lt;strong&gt;show ip nat translations&lt;/strong&gt; commands.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/4780734443952544211/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/08/cisco-how-to-configure-nat-network.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/4780734443952544211'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/4780734443952544211'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/08/cisco-how-to-configure-nat-network.html' title='Cisco: How to configure NAT - Network Address Translation'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-615559898648590444</id><published>2011-08-24T15:28:00.000-07:00</published><updated>2011-08-24T15:31:29.935-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><title type='text'>Configuring DHCP to work with Cisco Manager</title><content type='html'>&lt;h4 style=&quot;text-align: justify;&quot;&gt;In this case from a Windows Server 2000 or 2003 system, with Cisco  Call Manager (CCM). When introducing CCM into environments with an  exsiting DHCP infrastructure, problems may occur because Cisco IP phones  require additional information from the DHCP server when they startup.&lt;/h4&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Following the steps of DHCP server on the CCM hardware :&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;1) Start the DHCP server software that is already installed on your  server (it comes with Server 2000 or Server 2003) buy clicking on  “Start” then “Setting” then “Control Panel”. After the Control Panel  open click on the “Administrative Tools” icon, and then the “DHCP” icon.  &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;2) After the DHCP management console opens click on “Action”  then select “New Scope…” then “OK” to the “New Scope Wizard”, then type  in the name of your scope, this can be almost anything you would like, I  named mine “voip_scope”, you can also give it a description if you  like, I did not. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;3) Then click “Next” and enter a start IP  address and a end IP address, then use the up and down arrow buttons to  increases or decrees the length of your sub-net mask, (just keep  clicking the arrow buttons till you see the sub-net mask you what to  use) and then click “Next”. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;4) Next you will be asked to enter  any address you do not want issue out be the DHCP server, maybe you are  saving some static addresses for you router and/or servers. You can  enter in just one address by entering the same address in the start and  end boxes, or a range of addresses be putting the first or lowest in the  start box, and the last or highest in the end box, then click “Next”. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;5) You will be asked how long you want the lease to be good for; I leave it to the default and click “Next”. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;6)  Next you are asked if you want to set up the DHCP options now, these  are the options the DHCP server will pass along to the requesting client  with it’s new IP address, I select “Yes” and enter the “Router (Default  Gateway) IP address, and click “Add” and then click “Next”. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;7) Next you can enter and any Domain information you have and then click “Add” then “Next”. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;8)  You can now add and WINS information you have, I leave mind blank, and  click “Next”. The lest question you are asked is if you want to active  the scope now, I select “Yes” and click “Next” and then “Finish” to  close the “New Scope Wizard”. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;9) In the right hand plane of the  DHCP management console windows double click on “Scope Options”, the  click “Action” and select “Configure Options…” then in the “Scope  Options” box click “066 Boot Server Host Name” to check that option, and  in the “String value” box enter the IP address of your TFTP server,  mine happens to be the same as my CCM, and click OK. Now when a client  asked for a new IP address it will also get the TFTP server’s address,  which the Cisco IP phones need to boot. &lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/615559898648590444/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/08/configuring-dhcp-to-work-with-cisco.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/615559898648590444'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/615559898648590444'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/08/configuring-dhcp-to-work-with-cisco.html' title='Configuring DHCP to work with Cisco Manager'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-907278515340193734</id><published>2011-08-23T12:06:00.000-07:00</published><updated>2011-08-23T12:15:59.244-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Learning Cisco CCNA with Simulators</title><content type='html'>Passing the CCNA is all about knowing the details of how things work, and knowing CSMA/CD theory and how to define collision domains is of the lots of details you have got to master. In the next part of this CCNA tutorial, we&#39;ll take a glance at broadcast domains, and how defining broadcast domains in the right places can dramatically cut down on unnecessary traffic on your network.&lt;br /&gt;&lt;br /&gt;As you study for your CCNA and CCNP exams, if you are getting hands-on practice in your home lab or rack rental service, you are going to be sending lots of pings. As a CCNA or CCNP candidate, you know that exclamation points (!!) as a ping return indicates that you have IP connectivity to the remote location. periods (\.\...) indicates that you do not have that connectivity.&lt;br /&gt;&lt;br /&gt;Students and Professionals that got their CCNA certification will normally finish up in one of categories. The 1st: guys and gals entering the IT world. The 2nd section: individuals who need to make the transition from Local Area Network to Wide Area Network. WAN engineers and administrators make the 3rd section. In the event that they got their CCNA certification, it is because they yearn to move up the ladder.&lt;br /&gt;Keep learning &amp;amp; improving after your&#39;ve earned your certification. It is simple to quickly forget what you don&#39;t use. Feel free to take off a couple days to reward yourself for all that hard work. Then, of work, it is time to strap back in &amp;amp; study. Keep reviewing your CCNA topics, &amp;amp; start on your first CCNP examination. Lots of folks who get that glorious CCNA certificate will basically forget the knowledge they obtained because they gave up studying one time the examination was over.&lt;br /&gt;I give strong recommendation to video tutorials, Exams Testing Engines, Study Guides, Preparation Labs, Q &amp;amp; A for CCNA certification package. Indeed it is a actual worth to money. Here you can get configuration of cisco devices along with proper explanation but the disadvantage is it does not cover everything in examination so you need to go for CCNA CCNA exams training simulators.&lt;br /&gt;Get practice check program&lt;br /&gt;&lt;br /&gt;Cisco Simulators&lt;br /&gt;There&#39;s free or paid cisco CCNA exams training simulators available on web. It is necessary to get your hands on these simulators so you get on hand experience in configuration cisco devices. In case you have budge you can also build your Cisco home lab.&lt;br /&gt;&lt;br /&gt;Today plenty of companies sell practice exams that help to attempt CCNA CCNA examination training. You require to buy them &amp;amp; go for your first check. In the first attempt you may fail but don&#39;t get discouraged. Plenty of practice check program are the bank of questions, each divided in to four practice tests. You are necessary to attempt the practice tests four times. Finally you take final practice examination including the all the questions. At this point of time you are prepared to go for actual examination.&lt;br /&gt;&lt;br /&gt;If your preparing for career alter &amp;amp; looking for CCNA Training the best online training provider that provide the all the &amp;amp; complete MCTS certification exams training in package, certkingdom self study training kits, save your money on bootcamps, training institutes, It is also save your travelling &amp;amp; time. All training materials are &quot;Guaranteed&quot; to pass your exams &amp;amp; get you certified on the fist attempt, due to best training they become no1 site 2009 &amp;amp; 2010.&lt;br /&gt;In addition I recommend Certkindom.com is best and No1 site of 2008  which provide the complete Windows Server 2003 certified professionals  training, Microsoft MCITP, Microsoft MCTS, Cisco CCNA, Cisco CCIE,  CompTIA A+, IBM, Citrix, PMP, ISC, and lots more online training self  study kits, saving your time and money on all those expensive bootcamps,  conventional training institutes where you have take admission pay fees  first and if you don&#39;t want to continue no refunds no transfer to any  other &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;training course&lt;/span&gt;, If you planed to take CCNA  or specialization in MCSE 2003 all the process starts again; as for  getting online training can be much beneficial and you don&#39;t need to  take for fill any from to switch your training on any desire  certification.&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/907278515340193734/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/08/learning-cisco-ccna-with-simulators.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/907278515340193734'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/907278515340193734'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/08/learning-cisco-ccna-with-simulators.html' title='Learning Cisco CCNA with Simulators'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-7644966625246787134</id><published>2011-08-23T11:38:00.000-07:00</published><updated>2011-08-23T12:06:04.602-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>4 Tips to Use a CCNA Study Guide</title><content type='html'>Try to look for more CCNA study guides &amp;amp; CCNA books. This may help you understand things in over fashion. Reading a range of CCNA study guides about the same idea makes you understand it more &amp;amp; perhaps simple. Go to Amazon &amp;amp; buy CCNA study guides from different study authors as you can.&lt;br /&gt;&lt;br /&gt;A CCNA study guide is tremendous gizmo to pass the CCNA Certification examination if used correctly. Regrettably, some CCNA students use CCNA study guides badly, &amp;amp; this leads to confusions related to the CCNA topics &amp;amp; decrease the CCNA candidate&#39;s chances to pass the CCNA check. In the upcoming paragraphs, you&#39;ll some tips on how to make use of CCNA study guides.&lt;br /&gt;&lt;br /&gt; of the ways to benefit from you CCNA study guide is to make use of it as a checklist. all of CCNA study guide provide knowledge that you are supposed to know to pass the CCNA certification examination. In the coursework of your CCNA study journey, try to mark a check to each element in your CCNA study guide when you have comprehended it &amp;amp; configured its related commands. When you finish studying, review you CCNA study guide to see in case you have left or more items unchecked. If yes, use other CCNA books &amp;amp; other networking books on the item or items you still don&#39;t understand. You may also do a research on Google &amp;amp; find lots of useful knowledge, document, &amp;amp; even some free CCNA study guides.&lt;br /&gt;&lt;br /&gt;Finally, try to build your own CCNA study guide by assembling all the notes you have made as you were studying. In addition, try to share your CCNA study guide with other people studying for the CCNA examination.&lt;br /&gt;&lt;br /&gt;Do not make the error of relying on CCNA study guide alone. As historicallyin the past mentioned, CCNA study guides are in no way complete, &amp;amp; you must not treat it as the single source of knowledge to help you pass your CCNA examination. In case you are enrolled in a CCNA boot camp, pay attention in the coursework of your CCNA study activities in the boot camp to help you benefit the most out of your CCNA study guide.&lt;br /&gt;&lt;br /&gt;Read more: http://www.articlesbase.com/computers-articles/4-tips-to-use-a-ccna-study-guide-perfectly-4305027.html#ixzz1VsdoxfZE&lt;br /&gt;Under Creative Commons License: Attribution No Derivatives</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/7644966625246787134/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/08/4-tips-to-use-ccna-study-guide.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7644966625246787134'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7644966625246787134'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/08/4-tips-to-use-ccna-study-guide.html' title='4 Tips to Use a CCNA Study Guide'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-840196417021540632</id><published>2011-08-23T11:30:00.000-07:00</published><updated>2011-08-23T11:36:55.948-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><title type='text'>Classful IP Subnet Calculations</title><content type='html'>&lt;h3&gt;&lt;a name=&quot;addressing&quot;&gt;1.  IP Addressing&lt;/a&gt;&lt;/h3&gt; 		&lt;p&gt;At this point you should know that IP, the Internet Protocol, is a  network layer (OSI layer 3) protocol, used to route packets between  hosts on different networks.  To suit this purpose, IP must define an  addressing scheme, so that a packet&#39;s intended destination can be  indicated.&lt;/p&gt; 		&lt;p&gt;An IP address is composed of 32 bits.  These 32 bits are divided  into 4 octets of 8 bits each.  You may have seen an IP address  represented like this:  172.68.15.24.  We must remember, however, that  the computer understands this number only in binary, so we must often  deal with them in binary.  Many people are intimidated by this  initially, but soon find that it is not difficult.  If you do not allow  yourself to be flustered, you can master this topic.&lt;/p&gt; 		&lt;p&gt;IP addresses are assigned to orginazations in blocks.  Each block  belongs to one of three classes:  class A, class B, or class C.  You can  tell what class an IP address is by the value in its first octet.&lt;/p&gt; 			&lt;table border=&quot;1&quot;&gt; 				&lt;tbody&gt;&lt;tr&gt; 					&lt;td&gt;Class A&lt;/td&gt; 					&lt;td&gt;1-126&lt;/td&gt; 				&lt;/tr&gt; 				&lt;tr&gt; 					&lt;td&gt;Class B&lt;/td&gt; 					&lt;td&gt;128-191&lt;/td&gt; 				&lt;/tr&gt; 				&lt;tr&gt; 					&lt;td&gt;Class C&lt;/td&gt; 					&lt;td&gt;192 --&amp;gt;&lt;/td&gt; 				&lt;/tr&gt; 			&lt;/tbody&gt;&lt;/table&gt; 		&lt;p&gt;An IP address  consists of two fields.  The first field identifies  the network, and the second field identifies the node on the network.   Which bits of the address are in the network field and which bits are in  the host field is determined by the subnet mask.&lt;/p&gt; 		&lt;p&gt;When a class A IP license is granted, you are assigned something  like this:  99.0.0.0.  Only the value of the bits in the first octet are  assigned.  This means you are free to assign any values you wish in the  second, third and fourth octets.&lt;/p&gt; 		&lt;p&gt;The defualt subnet mask for a class A network is 255.0.0.0.  High  bits, ones, indicate the bits that are part of the network field of the  IP address.  The default subnet mask &lt;b&gt;does not&lt;/b&gt; create subnets.   Therefor, a class A network with the default subnet mask is one network.   The three octets that are unassigned and unmasked are part of the host  field of the address.  There is a total of 24 bits in those three  octets.  Each bit can be in one of two states.  Therefor, 2^24 is the  number of host addresses that  can be assigned on that network, almost.   Two addresses are reserved on every network, x.x.x.0 and x.x.x.255.  So  the total number of hosts possible on this network is 2^24.   2^24-2=16,777,214 hosts for a class A IP network.&lt;/p&gt; 		&lt;p&gt;When a class B license is granted, the first two octets are  assigned.  For example, 172.198.x.x.  The default subnet mask for a  class B is 255.255.0.0.  One network, two octets free, 16 bits for the  host address field.  2^16-2=65,534 possible host addresses on a class B  IP network.&lt;/p&gt; 		&lt;p&gt;When a class C license is granted, the first three octets are  assigned, for example:  193.52.16.0.  The default subnet mask for a  class C is 255.255.255.0.  Once octet makes up the host address field.   2^8-2=254 host addresses possible on a class C network.&lt;/p&gt;&lt;p&gt; 		&lt;/p&gt;&lt;h3&gt;&lt;a name=&quot;reason&quot;&gt;2.  Reason for Subnetting&lt;/a&gt;&lt;/h3&gt; 		&lt;p&gt;We said that the default subnet mask for a class A IP network is  255.0.0.0.  Once octet only of a class A network address identifies the  network, with this subnet mask.  This leaves three octets of 8 bits  each, or 24 bits, to identify  the host on that one network.   2^24=16,777,216 addresses.  Two addresses are reserved, x.x.x.0 and  x.x.x.255.  16,777,214 nodes can be assigned an IP address on this  network.&lt;/p&gt; 		&lt;p&gt;It is highly unlikely that any organization would want one network  of 16,777,214 nodes.  They might want that many devices connected in a  wide area network (WAN), thus capablee of communicating when neccessary,  but they will want to subdivide this huge network into mostly  self-contained subnetworks of nodes that communicate with each other  often.  This is called subnetting.&lt;/p&gt; 		&lt;p&gt;To understand why, consider what would happen in either a broadcast  or a token passing network that consisted of over 16,000,000 nodes.   Nothing would happen.  It simply would not work.  Though the problem is  not as drastic, class B and class C IP networks are often subnetted,  also.&lt;/p&gt; 		&lt;p&gt;The subnet mask is used to subdivide an IP network into subnets.   This is a division that takes place in OSI layer 3, so it is a &lt;b&gt;logical&lt;/b&gt; division that is created by the addressing scheme.  This logical division is usually combined with a&lt;b&gt; physical&lt;/b&gt;  division.  Many subnets are physically isolated from the rest of the  network by a device such as a router or a switch.  This aspect of  subnetting is discussed in Unit 3--Data Link Layer.&lt;/p&gt; 		&lt;h3&gt;&lt;a name=&quot;how&quot;&gt;3.  How Subnetting Works&lt;/a&gt;&lt;/h3&gt; 		&lt;p&gt;The bits of an address that are masked by the subnet mask are the  bits that make up the network field of the address.  To subnet, the  default subnet mask for a network is extended to cover bits of the  address that would otherwise be part of the host field.  Once these bits  are masked, they become part of the network field, and are used  to  identify subnets of the larger network.&lt;/p&gt; 		&lt;p&gt;Here is where we begin dealing with both addresses and subnetmasks  in binary.  Get yourself a cold beverage, stretch, take a deep breath  and don&#39;t worry.  Once you get your brain around the concepts, it is not  difficult.  You just have to keep trying until the light goes on.&lt;/p&gt; 		&lt;h4&gt;3.1  Translating Binary to Decimal&lt;/h4&gt; 		&lt;p&gt;Both IP addresses and subnet masks are composed of 32 bits divided  into 4 octets of 8 bits each.  Here is how a single octet translates  from binary to decimal.  Consider an octet of all ones:  11111111.&lt;/p&gt;  &lt;pre&gt;128 64 32 16 8 4 2 1 ---  --  --  --  -  -  -  - 1  1  1  1  1  1  1  1  128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255 &lt;/pre&gt;     		&lt;p&gt;Here&#39;s another:  10111001&lt;/p&gt; &lt;pre&gt;128 64 32 16 8 4 2 1 ---  --  --  --  -  -  -  - 1  0  1  1  1  0  0  1 128 +  0 + 32  +16 + 8 + 0 + 0 + 1 = 185 &lt;/pre&gt;  		&lt;p&gt;and 00000000&lt;/p&gt; &lt;pre&gt;128 64   32   16   8   4   2   1 ---   --   --   --   -   -   -   -  0     0    0    0   0   0   0   0  0  +  0 +  0 +  0 + 0 + 0 + 0 + 0 = 0 &lt;/pre&gt; 		&lt;h4&gt;3.2  Converting Decimal to Binary&lt;/h4&gt; 		&lt;p&gt;Converting decimal to binary is similar.  Consider 175:&lt;/p&gt;  &lt;pre&gt;128 64  32   16   8   4   2   1 ---   --   --   --   -   -   -   -  1     0    1    0   1   1   1   1 128 +  0 + 32 +  0 + 8 + 4 + 2 + 1 = 175 &lt;/pre&gt;  		&lt;p&gt;175=10101111&lt;/p&gt; 		&lt;h4&gt;3.3  Simple Subnetting&lt;/h4&gt; 		&lt;p&gt;The simpliest way to subnet is to take the octet in the subnet mask  that covers the first unassigned octet in the IP address block, and  make all its bits high.  Remember, a high bit, a 1, in the subnet mask  indicates that that corresponding bit in the IP address is part of the  network field.  So, if you have a class B network 172.160.0.0, with the  subnet mask 255.255.0.0, you have one network with 65, 534 possible  addresses.  If you take that subnet mask and make all the bits in the  third octet high&lt;/p&gt;  &lt;pre&gt;128 64   32   16   8   4   2   1 ---   --   --   --   -   -   -   -  1     1    1    1   1   1   1   1 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255 &lt;/pre&gt;  		&lt;p&gt;you get the subnet mask 255.255.255.0.&lt;/p&gt; &lt;pre&gt;172.60.  0. 0 255.255.255.0 &lt;/pre&gt; 		&lt;p&gt;Now the third octet of all the addresses on this network are part  of the network field instead of the host field.  That is one octet, or  eight bits, that can be manipulated to create subnets.  2^8=256 possible  subnets now on this class B network.&lt;/p&gt; 		&lt;p&gt;One octet is left for the host field.  2^8-2=254 possible host addressed on each subnet.&lt;/p&gt; 		&lt;h4&gt;3.4  Advanced Subnetting&lt;/h4&gt; 		&lt;p&gt;That is the simplist way to subnet, but it may not be the most  desirable.  You might not want 256 subnets on your class B network.   Instead, you might use a subnet mask like 255.255.224.0.  How many  subnets would this give you?  The first step is to see how many bits are  allocated to the network by this mask.  &lt;/p&gt;&lt;pre&gt;128 64   32   16   8   4   2   1 ---   --   --   --   -   -   -   -  1     1    1    0   0   0   0   0 128 + 64 + 32 +  0 + 0 + 0 + 0 + 0 = 224 &lt;/pre&gt; 		&lt;p&gt;3 bits are allocated.  2^3=8 subnets.&lt;/p&gt; 		&lt;p&gt;How many hosts on each subnet?  Well, 5 bits from this octet are  left for the host field, and 8 bits in the fourth octet, for a total of  13 bits in the host field.  2^13-2=8190 possible hosts on each subnet.&lt;/p&gt; 		&lt;p&gt;The subnet mask is always extended by masking off the next  bit in  the address, from left to right.  Thus, the last octet in the subnet  mask will always be one of these:  128, 192, 224, 240, 248, 252, 254 or  255.&lt;/p&gt; 		&lt;p&gt;Given the IP address of a host and the subnet address for the  network, you need to be able to calculate which subnet that host is on.   To do this we compare the binary representation of the pertinent octet  of the subnet mask witht he binary representation of the corresponding  octet in the IP address.  Example:&lt;/p&gt;  &lt;pre&gt;IP address=172.60.50.2 subnet mask=255.255.224.0  50= 00110010 224=11100000 &lt;/pre&gt; 		&lt;p&gt;We perform a logical &lt;b&gt;AND&lt;/b&gt; on these two numbers.  We will be left with only the bits where there is a one in &lt;b&gt;both&lt;/b&gt; octets.&lt;/p&gt;  &lt;pre&gt;00110010 11100000 -------- 00100000=32 &lt;/pre&gt; 		&lt;p&gt;This host is on subnet 172.60.32.0.&lt;/p&gt; 		&lt;p&gt;We also need to be able to find the range of assignable IP  addresses on this subnet.  To do this, we take the binary that tells us  the subnet address, in this case 00100000, and compare it with the  subnet mask.&lt;/p&gt;  &lt;pre&gt;00100000 11100000 &lt;/pre&gt; 		 		&lt;p&gt;The bits convered by the mask we will leave as they are.  The rest of the bits we make high.  So  &lt;/p&gt;&lt;pre&gt;00100000 11100000 -------- 0011111=63 &lt;/pre&gt; 		&lt;p&gt;The range of assignable IP addresses on the subnet 172.60.32.0 is 172.60.32.1-172.60.63.254.&lt;/p&gt; 		&lt;p&gt;On every network and subnet, two addresses are reserved.  At the  low end of the range of addresses for the network or subnet, in this  case 172.60.32.0, is the address for the network or subnet itself.  The  address at the high end of the range of addresses, in this case  172.60.63.255, is the broadcast address.  Any message sent to the  broadcast address will be received by every host on the network.&lt;/p&gt; 		&lt;h3&gt;&lt;a name=&quot;problem&quot;&gt;4.  Sample Problem&lt;/a&gt;&lt;/h3&gt; 		&lt;p&gt;Here is a sample problem for you to calculate.  When you are done,  you can check your answers using an online subnet calcualtor at &lt;a href=&quot;http://www.subnetonline.com/pages/subnet-calculators/ip-subnet-calculator.php&quot; title=&quot;subnet calculator&quot;&gt;SubnetOnline.com&lt;/a&gt;.&lt;/p&gt;  &lt;pre&gt;IP address:  154.16.52.16 subnet mask:  255.255.240.0  Find: Number of subnets possible on this network: Number of hosts possible on each subnet: Which subnet this address is on: Range of addresses on that subnet: &lt;/pre&gt; </content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/840196417021540632/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/08/classful-ip-subnet-calculations.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/840196417021540632'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/840196417021540632'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/08/classful-ip-subnet-calculations.html' title='Classful IP Subnet Calculations'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-2217298365607994290</id><published>2011-08-22T10:39:00.000-07:00</published><updated>2011-08-24T15:53:37.802-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Computer"/><title type='text'>Configure your Cisco Router</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl2mbib0NfHk8vHW2kOGopgiiJP8IAbQkr4O8L7tEKsKTxDDEOUUOKhwfyiA0-Y73oBt39ho-ItfcDW81Od_F7GnV7459K6InzI0f0kVOPWTSWK0RXqAp6BCT7sU5hyE7YcY6QK5qHW5o/s1600/images.jpg&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 176px; height: 147px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl2mbib0NfHk8vHW2kOGopgiiJP8IAbQkr4O8L7tEKsKTxDDEOUUOKhwfyiA0-Y73oBt39ho-ItfcDW81Od_F7GnV7459K6InzI0f0kVOPWTSWK0RXqAp6BCT7sU5hyE7YcY6QK5qHW5o/s200/images.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5644559433916471474&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;If you have just turned on the router, it will be completely  unconfigured.  If it is already configured, you may want to view its  current configuration.  Even if it has not been previously configured,  you should familiarize yourself with the &lt;code&gt;show&lt;/code&gt; commands before beginning to configure the router.  Enter privileged mode by issuing the command &lt;code&gt;enable&lt;/code&gt;, then issue several &lt;code&gt;show&lt;/code&gt; commands to see what they display.  Remember, the command &lt;code&gt;show ?&lt;/code&gt; will display all the &lt;code&gt;show&lt;/code&gt;commands aavailable in the current mode.  Definately try out the following commands:&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3&quot;&gt; 		&lt;code&gt; 		Router#show interfaces&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3&quot;&gt;&lt;code&gt;		Router#show ip protocols&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3&quot;&gt;&lt;code&gt;		Router#show ipv6 protocols&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3&quot;&gt;&lt;code&gt;		Router#show ip route&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3&quot;&gt;&lt;code&gt;		Router#show ipv6 route&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3&quot;&gt;&lt;code&gt;		Router#show ip arp&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3&quot;&gt;&lt;code&gt;		Router#show ipv6 neighbors  		&lt;/code&gt; 		&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3&quot;&gt;When you enter privileged mode by using the command &lt;code&gt;enable&lt;/code&gt;,  you are in the top-level mode of privileged mode, also known in this   document as &quot;parent mode.&quot;  It is in this top-level or parent mode that  you can display most of the information about the router.  As you now  know, you do this with the &lt;code&gt;show&lt;/code&gt; commands.  Here you can  learn the configuration of interfaces and whether they are up or down.   You can display what IP protocols are in use, such as dynamic routing  protocols.  You can view the route and ARP tables, and these are just a  few of the more important options.&lt;/a&gt;&lt;a name=&quot;sect3&quot;&gt;&lt;/a&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; 		&lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;As you configure the router, you will enter various sub-modes to  set options, then return to the parent mode to display the results of  your commands.  You also return to the parent mode to enter other  sub-modes.  To return to the parent mode, you hit &lt;code&gt;ctrl-z&lt;/code&gt;.  This puts any commands you have just issued into affect, and returns  you to parent mode.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; 		- &lt;span class=&quot;fullpost&quot;&gt;a.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.1&quot;&gt;Global configuration (config)&lt;/a&gt;&lt;/h3&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgltEQhwOVNGJbnHHOr7X3QTI0QzPLaLuQlwEAbZAYwS0-hbmuSsdNzfMwsPwwEFWZJ_9bMI2F06fVbNPZYtG8wSTvGu95RKXQq9l66VtfmgEore62q54P5Xtggb_L1nM1mj4Viv4x9a6A/s1600/images1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 292px; height: 173px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgltEQhwOVNGJbnHHOr7X3QTI0QzPLaLuQlwEAbZAYwS0-hbmuSsdNzfMwsPwwEFWZJ_9bMI2F06fVbNPZYtG8wSTvGu95RKXQq9l66VtfmgEore62q54P5Xtggb_L1nM1mj4Viv4x9a6A/s320/images1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5644558862299522562&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.1&quot;&gt;To configure any feature of the router, you must enter  configuration mode.  This is the f&lt;/a&gt;&lt;a name=&quot;sect3.1&quot;&gt;&lt;/a&gt;irst sub-mode of the parent mode.  In  the parent mode, you issue the command &lt;code&gt;config&lt;/code&gt;.&lt;a name=&quot;sect3&quot;&gt;&lt;/a&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; 		&lt;code&gt; 		Router#config&lt;/code&gt;&lt;br /&gt;&lt;a name=&quot;sect3.1&quot;&gt;&lt;code&gt;		Router(config)# 		&lt;/code&gt; 		&lt;p&gt;As demonstrated above, the prompt changes to indicate the mode that you are now in.&lt;/p&gt; 		&lt;p&gt;In connfiguration mode you can set options that apply system-wide,  also refered to as &quot;global configurations.&quot;  For instance, it is a good  idea to name your router so that you can easily identify it.  You do  this in configuration mode with the &lt;code&gt;hostname&lt;/code&gt; command.&lt;/p&gt; 		&lt;code&gt; 		Router(config)#hostname ExampleName&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.1&quot;&gt;&lt;code&gt;		ExampleName(config)# 		&lt;/code&gt; 		&lt;p&gt;As demonstrated above, when you set the name of the host with the &lt;code&gt;hostname&lt;/code&gt; command, the prompt immediately changes by replacing &lt;code&gt;Router&lt;/code&gt; with &lt;code&gt;ExampleName&lt;/code&gt;.  (&lt;b&gt;Note:&lt;/b&gt;  It is a good idea to name your routers with an organized naming scheme.)&lt;/p&gt; 		&lt;p&gt;Another useful command issued from config mode is the command to designate the DNS server to be used by the router:&lt;/p&gt; 		&lt;code&gt; 		ExampleName(config)#ip name-server aa.bb.cc.dd&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.1&quot;&gt;&lt;code&gt;		ExampleName(config)#ctrl-Z&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.1&quot;&gt;&lt;code&gt;		ExampleName# 		&lt;/code&gt;	 		&lt;p&gt;This is also where you set the password for privileged mode.&lt;/p&gt; 		&lt;code&gt; 		ExampleName(config)#enable secret examplepassword&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.1&quot;&gt;&lt;code&gt;		ExampleName(config)#ctrl-Z&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.1&quot;&gt;&lt;code&gt;		ExampleName# 		&lt;/code&gt; 		&lt;p&gt;Until you hit &lt;code&gt;ctrl-Z&lt;/code&gt; (or type &lt;code&gt;exit&lt;/code&gt; until  you reach parent mode) your command has not been put into affect.  You  can enter config mode, issue several different commands, then hit &lt;code&gt;ctrl-Z&lt;/code&gt; to activate them all.  Each time you hit &lt;code&gt;ctrl-Z&lt;/code&gt; you return  to parent mode and the prompt:&lt;/p&gt; 		&lt;code&gt; 		ExampleName# 		&lt;/code&gt; 		&lt;p&gt;Here you use &lt;code&gt;show&lt;/code&gt; commands to verify the results of the commands you issued in config mode.  To verify the results of the &lt;code&gt;ip name-server&lt;/code&gt; command, issue the command &lt;code&gt;show host&lt;/code&gt;.&lt;/p&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;/a&gt;&lt;/h3&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.2&quot;&gt;Configuring Cisco router interfaces&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.2&quot;&gt; 		&lt;p&gt;Cisco   interface naming is straightforward.  Individual interfaces are referred to by this convention:&lt;/p&gt; 		&lt;code&gt; 		media type slot#/port# 		&lt;/code&gt; 		&lt;p&gt;&quot;Media type&quot; refers to the type of media that the port is an  interface for, such as Ethernet, Token Ring, FDDI, serial, etc.  Slot  numbers are only applicable for routers that provide slots into which  you can install modules.  These modules contain several ports for a  given media.  The 7200 series is an example.  These modules are even  hot-swapable.  You can remove a module from a slot and replace it with a  different module, without interrupting service provided by the other  modules installed in the router.  These slots are numbered on the  router.&lt;/p&gt;  		&lt;p&gt;Port number refers  to the port in reference to the other ports in  that module.  Numbering is left-to-right, and all numbering starts at 0,  not at one.&lt;/p&gt; 		&lt;p&gt;For example, a Cisco 7206 is a 7200 series router  with six slots.   To refer to an interface that is the third port of an Ethernet module  installed in the sixth slot, it would be interface ethernet 6/2.   Therefor, to display the configuration of that interface you use the  command:&lt;/p&gt; 		&lt;code&gt; 		ExampleName#show interface ethernet 6/2 		&lt;/code&gt; 		&lt;p&gt;If your router does not have slots, like a 1600, then the interface name consists only of:&lt;/p&gt; 		&lt;code&gt; 		media type port# 		&lt;/code&gt; 		&lt;p&gt;For example:&lt;/p&gt; 		&lt;code&gt; 		ExampleName#show interface serial 0 		&lt;/code&gt; 		&lt;p&gt;Here is an example of configuring a serial port with an IP address:&lt;/p&gt; 		&lt;code&gt; 		ExampleName#config&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config)#interface serial 1/1&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config-if)#ip address 192.168.155.2 255.255.255.0&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config-if)#ipv6 address fe80::230:1bff:fe80:b8ea/64&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config-if)#ipv6 enable&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config-if)#no shutdown&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config-if)#ctrl-Z&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName# 		&lt;/code&gt; 		&lt;p&gt;Then to verify configuration:&lt;/p&gt; 		&lt;code&gt; 		ExampleName#show interface serial 1/1 		&lt;/code&gt; 		&lt;p&gt;&lt;b&gt;Note&lt;/b&gt; the &lt;code&gt;no shutdown&lt;/code&gt; command.  An interface may  be correctly configured and physically connected, yet be  &quot;administratively down.&quot;  In this state it will not function.  The  command for causing an interface to be administratively down is &lt;code&gt;shutdown&lt;/code&gt;.&lt;/p&gt; 		&lt;code&gt; 		ExampleName(config)#interface serial 1/1&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config-if)#shutdown&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config-if)#ctrl-Z&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName#show interface serial 1/1 		&lt;/code&gt; 		&lt;p&gt;In the Cisco IOS, the way to reverse or delete the results of any command is to simply put &lt;code&gt;no&lt;/code&gt; infront of it.  For instance, if we wanted to unassign the IP address we had assigned to interface serial 1/1:&lt;/p&gt; 		&lt;code&gt; 		ExampleName(config)#interface serail 1/1&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config-if)#no ip address 192.168.155.2 255.255.255.0&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName(config-if)ctrl-Z&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;code&gt;		ExampleName#show interface serial 1/1 		&lt;/code&gt; 		&lt;p&gt;Configuring most interfaces for LAN connections might consist only  of assigning a network layer address and making sure the interface is  not administratively shutdown.  It is usually not necessary to stipulate  data-link layer encapsulation. &lt;b&gt; Note&lt;/b&gt; that it is often necessary  to stipulate the appropriate data-link layer encapsulation for WAN  connections, such as frame-relay and ATM.  Serial interfaces default to  using HDLC.  A discussion of data-link protocols is outside the scope of  this document.  You will need to look up the IOS command &lt;code&gt;encapsulation&lt;/code&gt; for more details.&lt;/p&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.3&quot;&gt;Configuring Cisco Routing&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.3&quot;&gt; 		&lt;p&gt;IP routing is automatically enabled on Cisco routers.  If it has  been previously disabled on your router, you turn it back on in config  mode with the command &lt;code&gt;ip routing.&lt;/code&gt;&lt;/p&gt; 		&lt;code&gt; 		ExampleName(config)#ip routing&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;code&gt;		ExampleName(config)#ctrl-Z 		&lt;/code&gt;  		&lt;p&gt;To enable IPv6 routing, use the command &lt;code&gt;ipv6 unicast-routing.&lt;/code&gt;&lt;/p&gt; 		&lt;code&gt;                 ExampleName(config)#ipv6 unicast-routing&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;code&gt;            ExampleName(config)#ctrl-Z                 &lt;/code&gt;  		&lt;p&gt;There are two main ways a router knows where to send packets.  The administrator can assign &lt;b&gt;static routes&lt;/b&gt;, or the router can learn routes by employing a &lt;b&gt;dynamic routing protocol.&lt;/b&gt;&lt;/p&gt; 		&lt;p&gt;Static routes are generally used  in very simple networks or in  particular cases that necessitate their use.  To create a static route,  the administrator tells the router operating system that any network  traffic destined for a specified network layer address should be  forwarded to a similiarly specified network layer address.  In the Cisco  IOS this is done with the &lt;code&gt;ip route&lt;/code&gt; and ipv6 route commands.&lt;/p&gt; 		&lt;code&gt; 		ExampleName#config&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;code&gt;		ExampleName(config)#ip route 172.16.0.0 255.255.255.0 192.168.150.1&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;code&gt;		ExampleName(config)#ctrl-Z&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;code&gt;		ExampleName#show ip route&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;code&gt;             ExampleName#config&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;code&gt;            ExampleName(config)#ipv6 route fe80::230:1bff:fe80::/64 fe80::230:1bff:fe80::1&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;code&gt;            ExampleName(config)#ctrl-Z&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;code&gt;            ExampleName#show ipv6 route  		&lt;/code&gt; 		&lt;p&gt;Two things to be said about this example.  First, the packet  destination address must include the subnet mask for that destination  network.  Second, the address it is to be  forwarded to is the specified  addres of the next router along the path to the destination.  This is  the most common way of setting up a static route, and the only one this  document covers.  Be aware, however, that there are other methods.&lt;/p&gt; 		&lt;p&gt;Dynamic routing protocols, running on connected routers, enable  those routers to share routing information.  This enables routers to &lt;em&gt;learn&lt;/em&gt;  the routes available to them.  The advantage of this method is that  routers are able to adjust to changes in network topologies.  If a route  is physically removed, or a neighbor router goes down, the routing  protocol searches for a new  route.  Routing protocols can even  dynamically choose between possible routes based on variables such as  network congestion or network reliability.&lt;/p&gt; 		&lt;p&gt;There are many different routing protocols, and they all use  different variables, known as &quot;metrics,&quot; to decide upon appropriate   routes.  Unfortunately, a router needs to be running the same routing  protocols as its neighbors.  Many routers can, however, run mutliple  protocols.  Also, many protocols are designed to be able to pass routing  information to other routing protocols.  This is called  &quot;redistribution.&quot;   		&lt;/p&gt;&lt;p&gt;Routing protocols are a complex topic and this document  contains only this superficial description of them.  There is much to  learn about them, and there are many sources of information about them  available.  An excelent source of information on this topic is Cisco&#39;s  website, &lt;code&gt;http://www.cisco.com&lt;/code&gt;.&lt;/p&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.4&quot;&gt;IPv6 configuration with IOS&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.4&quot;&gt;  		&lt;p&gt;This is a seperate section because IPv6 is new to most people, and  they will be looking specifically for information about configuring  IPv6.  Examples of configuring IPv6 are included throughout the  document, however, alongside IPv4.  That is a more accurate reflection  of how you will work with IPv6 on a day-to-day basis.  Once the newness  of IPv6 passes, it will be one more piece in the familiar puzzle.&lt;/p&gt; 		&lt;p&gt;The important concept to understand when configuring IPv6 is that  IPv4 and IPv6 exist in parrallel.  One is not a replacement for the  other, at least not in the way it is treated by the operating system.  A  term for this is &lt;b&gt;dual stack&lt;/b&gt;.  An interface can have an IPv4  address and no IPv6 address.  Or  an IPv6 address and no IPv4 address.   Or both an IPv4 address and an IPv6 address.  Examples:&lt;/p&gt; 		&lt;p&gt;IPv4 only&lt;/p&gt; 		&lt;code&gt; 	        !&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;	 		interface FastEthernet0/0&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;	         ip address 192.168.1.138 255.255.255.0&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;		!&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;		&lt;/code&gt;	   		&lt;p&gt;   		&lt;/p&gt;&lt;p&gt;IPv6 only&lt;/p&gt; 		&lt;code&gt;                 !&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;            interface FastEthernet0/0&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;		ipv6 address fe80::230:1bff:fe80::/64&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;		ipv6 enable&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;		!&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;            &lt;/code&gt;                 &lt;p&gt;                 &lt;/p&gt;&lt;p&gt;IPv4 and IPv6&lt;/p&gt; 		&lt;code&gt;                 !&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;            interface FastEthernet0/0&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;             ip address 192.168.1.138 255.255.255.0&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;		ipv6 address fe80::230:1bff:fe80::/64&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;            ipv6 enable&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;            !&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;            &lt;/code&gt; 		&lt;p&gt;Notice that there are seperate but  similiar commands for IPv4 and IPv6.  To assign an IPv4 address,&lt;/p&gt; 		 &lt;code&gt; 		ExampleName(config-if)#ip address 192.168.1.138 255.255.255.0&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;		&lt;/code&gt; 		&lt;p&gt;To assign an IPv6 address,&lt;/p&gt; 		 &lt;code&gt; 		ExampleName(config-if)#ipv6 address fe80::230:1bff:fe80::/64&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;code&gt;		&lt;/code&gt;     		&lt;p&gt;There are some bigger differences between IPv4 and IPv6 IOS commands.  For example, the IPv6 equivilant of &lt;code&gt;show ip arp&lt;/code&gt;, is &lt;code&gt;show ipv6 neighbors&lt;/code&gt;.    	 		  		&lt;/p&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.4&quot;&gt;&lt;/a&gt;&lt;a name=&quot;sect3.5&quot;&gt;3.5 Saving your Cisco Router configuration&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.5&quot;&gt; 		&lt;p&gt;Once you have  configured routing on the router, and you have  configured individual interfaces, your router should be capable of  routing traffic.  Give it a few moments to talk to its neighbors, then  issue the commands &lt;code&gt;show ip route&lt;/code&gt; and &lt;code&gt;show ip arp&lt;/code&gt;.  There should now be entries in these tables learned from the routing protocol.&lt;/p&gt; 		&lt;p&gt;If you turned the router off right now, and turned it on again, you would have to start configuration over again.  Your &lt;b&gt;running configuration&lt;/b&gt; is not saved to any perminent storage media.  You can see this configuration with the command &lt;code&gt;show running-config&lt;/code&gt;.&lt;/p&gt; 		&lt;code&gt; 		ExampleName#show running-config 		&lt;/code&gt; 		&lt;p&gt;You &lt;b&gt;do&lt;/b&gt; want to save your successful running configuration.  Issue the command &lt;code&gt;copy running-config startup-config&lt;/code&gt;.&lt;/p&gt; 		&lt;code&gt; 		ExampleName#copy running-config startup-config 		&lt;/code&gt; 		&lt;p&gt;Your configuration is now saved  to &lt;b&gt;non-volatile RAM&lt;/b&gt; (NVRAM).  Issue the command &lt;code&gt;show startup-config&lt;/code&gt;.&lt;/p&gt; 		&lt;code&gt; 		ExampleName#show startup-config 		&lt;/code&gt; 		&lt;p&gt;Now any time you need to return your router to that configuration, issue the command &lt;code&gt;copy startup-config running-config&lt;/code&gt;.&lt;/p&gt; 		&lt;code&gt; 		ExampleName#copy startup-config running-config 		&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.5&quot;&gt;&lt;code&gt;&lt;/code&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect3.5&quot;&gt;&lt;code&gt;&lt;/code&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.6&quot;&gt;Example Cisco Router configuration&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;sect3.6&quot;&gt; 		&lt;ol&gt;&lt;li&gt;Router&amp;gt;enable 		&lt;/li&gt;&lt;li&gt;Router#config 		&lt;/li&gt;&lt;li&gt;Router(config)#hostname N115-7206 		&lt;/li&gt;&lt;li&gt;N115-7206(config)#interface serial 1/1 		&lt;/li&gt;&lt;li&gt;N115-7206(config-if)ip address 192.168.155.2 255.255.255.0 		&lt;/li&gt;&lt;li&gt;N115-7206(config-if)ipv6 address fe80::230:1bff:fe80:b8ea/64 		&lt;/li&gt;&lt;li&gt;N115-7206(config-if)ipv6 enable 		&lt;/li&gt;&lt;li&gt;N115-7206(config-if)no shutdown 		&lt;/li&gt;&lt;li&gt;N115-7206(config-if)ctrl-z 		&lt;/li&gt;&lt;li&gt;N115-7206#show interface serial 1/1 		&lt;/li&gt;&lt;li&gt;N115-7206#config 		&lt;/li&gt;&lt;li&gt;N115-7206(config)#interface ethernet 2/3 		&lt;/li&gt;&lt;li&gt;N115-7206(config-if)#ip address 192.168.150.90 255.255.255.0 		&lt;/li&gt;&lt;li&gt;N115-7206(config-if)#no shutdown 		&lt;/li&gt;&lt;li&gt;N115-7206(config-if)#ctrl-z 		&lt;/li&gt;&lt;li&gt;N115-7206#show interface ethernet 2/3 		&lt;/li&gt;&lt;li&gt;N115-7206#config 		&lt;/li&gt;&lt;li&gt;N115-7206(config)#ip name-server 172.16.0.10 		&lt;/li&gt;&lt;li&gt;N115-7206(config)#ctrl-z 		&lt;/li&gt;&lt;li&gt;N115-7206#ping archie.au 		&lt;/li&gt;&lt;li&gt;N115-7206#config 		&lt;/li&gt;&lt;li&gt;N115-7206(config)#enable secret password 		&lt;/li&gt;&lt;li&gt;N115-7206(config)#ctrl-z 		&lt;/li&gt;&lt;li&gt;N115-7206#copy running-config startup-config 		&lt;/li&gt;&lt;li&gt;N115-7206#exit	 		&lt;/li&gt;&lt;/ol&gt;	 		&lt;/a&gt;&lt;a name=&quot;sect3.3&quot;&gt;&lt;/a&gt;&lt;a name=&quot;sect3.2&quot;&gt;&lt;/a&gt;&lt;a name=&quot;sect3.1&quot;&gt;&lt;/a&gt;-&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/2217298365607994290/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/08/configure-your-cisco-router.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/2217298365607994290'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/2217298365607994290'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/08/configure-your-cisco-router.html' title='Configure your Cisco Router'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl2mbib0NfHk8vHW2kOGopgiiJP8IAbQkr4O8L7tEKsKTxDDEOUUOKhwfyiA0-Y73oBt39ho-ItfcDW81Od_F7GnV7459K6InzI0f0kVOPWTSWK0RXqAp6BCT7sU5hyE7YcY6QK5qHW5o/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-641781293883935642</id><published>2011-08-22T09:45:00.000-07:00</published><updated>2011-08-24T15:42:30.411-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><title type='text'>Started with Cisco</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3c4ymKSM9ndovtZHqdUdiJh_x-ya9RBxxlYvfMuE-bIwkiH3b16Qb-PfjSzN4fkNyqsRnjhCfM21UNJm7zC7x72PccL37jTtadzVx0tunPYmOQDr9VLXhA_o_YA5zREaEuTT4Ujzd_FY/s1600/thumb.php.png&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 200px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3c4ymKSM9ndovtZHqdUdiJh_x-ya9RBxxlYvfMuE-bIwkiH3b16Qb-PfjSzN4fkNyqsRnjhCfM21UNJm7zC7x72PccL37jTtadzVx0tunPYmOQDr9VLXhA_o_YA5zREaEuTT4Ujzd_FY/s320/thumb.php.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5644556532388397266&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Initially you will probably configure your router from a terminal.   If the router is already configured and at least one port is configured  with an IP address, and it has a physical connection to the network,  you might be able to &lt;code&gt;telnet&lt;/code&gt; to the router and configure it  across the network.  If it is not already configured, then you will have  to directly connect to it with a terminal and a serial cable.  With any  Windows box you can use Hyperterminal to easily connect to the router.   Plug a serial cable into a serial (COM) port on the PC and the other  end into the console port on the Cisco router.  Start Hyperterminal,  tell it which COM port to use and click &lt;code&gt;OK&lt;/code&gt;.  Set the speed of the connection to &lt;code&gt;9600 baud&lt;/code&gt; and click &lt;code&gt;OK&lt;/code&gt;.  If the router is not on, turn it on.&lt;a name=&quot;sect2&quot;&gt; 		&lt;p&gt;If you wish to configure the router from a &lt;b&gt;Linux&lt;/b&gt; box, either Seyon or Minicom should work.  At least one of them, and maybe both, will come with your Linux distribution.&lt;/p&gt; 		&lt;p&gt;Often you will need to hit the &lt;code&gt;Enter&lt;/code&gt; key to see the prompt from the router.  If it is unconfigured it will look like this:&lt;/p&gt; 		&lt;code&gt; 		Router&amp;gt; 		&lt;/code&gt; 		&lt;p&gt;If it has  been previously configured with a hostname, it will look like this:&lt;/p&gt; 		&lt;code&gt; 		hostname of router&amp;gt; 		&lt;/code&gt; 		&lt;p&gt;If you have just turned on the router, after it boots it will ask you if you wish to begin initial configuration.  &lt;b&gt;Say no.&lt;/b&gt;  If you say &lt;code&gt;yes&lt;/code&gt;, it will put you in the menu interface.  Say &lt;code&gt;no&lt;/code&gt;.&lt;/p&gt; 		&lt;/a&gt;- &lt;a name=&quot;sect2.1&quot;&gt;The Cisco IOS command-line interface is organized around the idea of &lt;b&gt;modes&lt;/b&gt;.   You move in and out of several different modes while configuring a  router, and which mode you are in determines what commands you can use.   Each mode has a set of commands available in that mode, and some of  these commands are &lt;em&gt;only&lt;/em&gt; available in that mode।  In any mode, typing a question mark will display a list of the commands available in that mode.&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect2.1&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;a name=&quot;sect2.1&quot;&gt;&lt;/a&gt;&lt;a name=&quot;sect2.1&quot;&gt;&lt;p&gt;When you first connect to the router and provide  the password (if necessary), you enter EXEC mode, the first mode in  which you can issue commands from the command-line.  From here you can  use such &lt;b&gt;unprivileged&lt;/b&gt; commands as &lt;code&gt;ping, telnet, and rlogin.&lt;/code&gt;  You can also use some of the &lt;code&gt;show&lt;/code&gt; commands to obtain information about the system.  In unprivileged mode you use commands like, &lt;code&gt;show version&lt;/code&gt; to display the version of the IOS the router is running.  Typing &lt;code&gt;show ?&lt;/code&gt; will diplay all the &lt;code&gt;show&lt;/code&gt; commands available in the mode you are presently in.&lt;/p&gt; 		&lt;code&gt; 		Router&amp;gt;show ? 		&lt;/code&gt; 		&lt;p&gt;You must enter privileged mode to configure the router.  You do this by using the command &lt;code&gt;enable&lt;/code&gt;.   Privileged mode will usually be password protected unless the router  is unconfigured.  You have the option of not password protecting  privileged mode, but it is HIGHLY recommended that you do.  When you  issue the command &lt;code&gt;enable&lt;/code&gt; and provide the password, you will enter privileged mode.&lt;/p&gt; 		&lt;p&gt;To help the user keep track of what mode they are in, the  command-line prompt changes each time you enter a different mode.  When  you switch from unprivileged mode to privileged mode, the prompt   changes from:&lt;/p&gt; 		&lt;code&gt; 		Router&amp;gt; 		&lt;/code&gt; 		&lt;p&gt;to&lt;/p&gt; 		&lt;code&gt; 		Router# 		&lt;/code&gt;  &lt;p&gt;This would probably not be a big deal if there were just two modes.   There are, in fact, numerous modes, and this feature is probably  indispensable.  Pay close attention to the prompt at all times.&lt;/p&gt; 		&lt;p&gt;Within privileged mode there are many &lt;b&gt;sub-modes&lt;/b&gt;.  In this  document I do not closely follow Cisco terminology for this hierarchy of  modes.  I think that my explanation is clearer, frankly.  Cisco  describes two modes, unprivileged and privileged, and then a hierarchy  of commands used in privileged mode.  I reason that it is much clearer  to understand if you just consider there to be many sub-modes of  privileged mode, which I will also call &lt;b&gt;parent&lt;/b&gt; mode.  Once you  enter privileged mode (parent mode) the prompt ends with a pound sign  (#).  There are numerous modes you can enter only after entering  privileged mode.  Each of these modes has a prompt of the form:&lt;/p&gt; 		Router(arguments)# 		 		&lt;p&gt;They still all end with the pound sign.  They are subsumed within  privileged mode.  Many of these modes have sub-modes of their own.  Once  you enter priliged mode, you have access to all the configuration  information and options the IOS provides, either directly from the  parent mode, or from one of its submodes. 		&lt;/p&gt;&lt;/a&gt; -&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/641781293883935642/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/08/started-with-cisco.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/641781293883935642'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/641781293883935642'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/08/started-with-cisco.html' title='Started with Cisco'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3c4ymKSM9ndovtZHqdUdiJh_x-ya9RBxxlYvfMuE-bIwkiH3b16Qb-PfjSzN4fkNyqsRnjhCfM21UNJm7zC7x72PccL37jTtadzVx0tunPYmOQDr9VLXhA_o_YA5zREaEuTT4Ujzd_FY/s72-c/thumb.php.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-6268489750498020612</id><published>2011-07-25T13:12:00.000-07:00</published><updated>2011-08-22T22:58:30.870-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Games"/><title type='text'>computer game</title><content type='html'>&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;A &lt;b&gt;personal computer game&lt;/b&gt; (also known as a &lt;b&gt;computer game&lt;/b&gt; or &lt;b&gt;PC game&lt;/b&gt;) is a &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_game&quot; title=&quot;Video game&quot;&gt;video game&lt;/a&gt; played on a &lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer&quot; title=&quot;Personal computer&quot;&gt;personal computer&lt;/a&gt;, rather than on a &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_game_console&quot; title=&quot;Video game console&quot;&gt;video game console&lt;/a&gt; or &lt;a href=&quot;http://en.wikipedia.org/wiki/Arcade_machine&quot; title=&quot;Arcade machine&quot; class=&quot;mw-redirect&quot;&gt;arcade machine&lt;/a&gt;. Computer games have evolved from the simple graphics and gameplay of early titles like &lt;a href=&quot;http://en.wikipedia.org/wiki/Spacewar%21&quot; title=&quot;Spacewar!&quot;&gt;Spacewar!&lt;/a&gt;, to a wide range of more visually advanced titles.&lt;sup id=&quot;cite_ref-ESApressrelease_0-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-ESApressrelease-0&quot;&gt;&lt;span&gt;[&lt;/span&gt;1&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;PC games are created by one or more &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_game_developer&quot; title=&quot;Video game developer&quot;&gt;game developers&lt;/a&gt;, often in conjunction with other specialists (such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_artist&quot; title=&quot;Game artist&quot;&gt;game artists&lt;/a&gt;) and either published independently or through a third party &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_game_publisher&quot; title=&quot;Video game publisher&quot;&gt;publisher&lt;/a&gt;. They may then be distributed on physical media such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Digital_versatile_disc&quot; title=&quot;Digital versatile disc&quot; class=&quot;mw-redirect&quot;&gt;DVDs&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Compact_Disc&quot; title=&quot;Compact Disc&quot;&gt;CDs&lt;/a&gt;, as Internet-downloadable, possibly &lt;a href=&quot;http://en.wikipedia.org/wiki/Freely_redistributable_software&quot; title=&quot;Freely redistributable software&quot;&gt;freely redistributable&lt;/a&gt;, software, or through online delivery services such as Direct2Drive and &lt;a href=&quot;http://en.wikipedia.org/wiki/Steam_%28software%29&quot; title=&quot;Steam (software)&quot;&gt;Steam&lt;/a&gt;. PC games often require specialized hardware in the user&#39;s computer in order to play, such as a specific generation of &lt;a href=&quot;http://en.wikipedia.org/wiki/Graphics_processing_unit&quot; title=&quot;Graphics processing unit&quot;&gt;graphics processing unit&lt;/a&gt; or an &lt;a href=&quot;http://en.wikipedia.org/wiki/Internet&quot; title=&quot;Internet&quot;&gt;Internet&lt;/a&gt; connection for online play, although these &lt;a href=&quot;http://en.wikipedia.org/wiki/System_requirements&quot; title=&quot;System requirements&quot;&gt;system requirements&lt;/a&gt; vary from game to game.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;- &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;mw-headline&quot; id=&quot;History&quot;&gt;History&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink relarticle mainarticle&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Main article: &lt;a href=&quot;http://en.wikipedia.org/wiki/History_of_video_games&quot; title=&quot;History of video games&quot;&gt;History of video&lt;br /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Although personal computers only became popular with the development of the &lt;a href=&quot;http://en.wikipedia.org/wiki/Microprocessor&quot; title=&quot;Microprocessor&quot;&gt;microprocessor&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Microcomputer&quot; title=&quot;Microcomputer&quot;&gt;microcomputer&lt;/a&gt;, computer gaming on &lt;a href=&quot;http://en.wikipedia.org/wiki/Mainframe_computer&quot; title=&quot;Mainframe computer&quot;&gt;mainframes&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Minicomputer&quot; title=&quot;Minicomputer&quot;&gt;minicomputers&lt;/a&gt; had previously already existed. &lt;a href=&quot;http://en.wikipedia.org/wiki/OXO&quot; title=&quot;OXO&quot;&gt;OXO&lt;/a&gt;, an adaptation of &lt;a href=&quot;http://en.wikipedia.org/wiki/Tic-tac-toe&quot; title=&quot;Tic-tac-toe&quot;&gt;tic-tac-toe&lt;/a&gt; for the &lt;a href=&quot;http://en.wikipedia.org/wiki/EDSAC&quot; title=&quot;EDSAC&quot; class=&quot;mw-redirect&quot;&gt;EDSAC&lt;/a&gt;, debuted in 1952. Another pioneer computer game was developed in 1961, when &lt;a href=&quot;http://en.wikipedia.org/wiki/Massachusetts_Institute_of_Technology&quot; title=&quot;Massachusetts Institute of Technology&quot;&gt;MIT&lt;/a&gt; students Martin Graetz and &lt;a href=&quot;http://en.wikipedia.org/wiki/Alan_Kotok&quot; title=&quot;Alan Kotok&quot;&gt;Alan Kotok&lt;/a&gt;, with MIT student &lt;a href=&quot;http://en.wikipedia.org/wiki/Steve_Russell&quot; title=&quot;Steve Russell&quot;&gt;Steve Russell&lt;/a&gt;, developed &lt;a href=&quot;http://en.wikipedia.org/wiki/Spacewar%21&quot; title=&quot;Spacewar!&quot;&gt;Spacewar!&lt;/a&gt; on a &lt;a href=&quot;http://en.wikipedia.org/wiki/PDP-1&quot; title=&quot;PDP-1&quot;&gt;PDP-1&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Mainframe&quot; title=&quot;Mainframe&quot;&gt;mainframe&lt;/a&gt; computer used for statistical calculations.&lt;sup id=&quot;cite_ref-spacewar_1-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-spacewar-1&quot;&gt;&lt;span&gt;[&lt;/span&gt;2&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The first generation of computer games were often &lt;a href=&quot;http://en.wikipedia.org/wiki/Text_game&quot; title=&quot;Text game&quot; class=&quot;mw-redirect&quot;&gt;text&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Adventure_game&quot; title=&quot;Adventure game&quot;&gt;adventures&lt;/a&gt; or &lt;a href=&quot;http://en.wikipedia.org/wiki/Interactive_fiction&quot; title=&quot;Interactive fiction&quot;&gt;interactive fiction&lt;/a&gt;, in which the player communicated with the computer by entering commands through a keyboard. An early text-adventure, &lt;a href=&quot;http://en.wikipedia.org/wiki/Colossal_Cave_Adventure&quot; title=&quot;Colossal Cave Adventure&quot;&gt;Adventure&lt;/a&gt;, was developed for the &lt;a href=&quot;http://en.wikipedia.org/wiki/PDP-11&quot; title=&quot;PDP-11&quot;&gt;PDP-11&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Minicomputer&quot; title=&quot;Minicomputer&quot;&gt;minicomputer&lt;/a&gt; by Will Crowther in 1976, and expanded by Don Woods in 1977.&lt;sup id=&quot;cite_ref-adventure_2-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-adventure-2&quot;&gt;&lt;span&gt;[&lt;/span&gt;3&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; By the 1980s, personal computers had become powerful enough to run games like Adventure,  but by this time, graphics were beginning to become an important factor  in games. Later games combined textual commands with basic graphics, as  seen in the SSI &lt;a href=&quot;http://en.wikipedia.org/wiki/Gold_Box&quot; title=&quot;Gold Box&quot;&gt;Gold Box&lt;/a&gt; games such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Pool_of_Radiance&quot; title=&quot;Pool of Radiance&quot;&gt;Pool of Radiance&lt;/a&gt;, or &lt;a href=&quot;http://en.wikipedia.org/wiki/Bard%27s_Tale_%281985%29&quot; title=&quot;Bard&#39;s Tale (1985)&quot; class=&quot;mw-redirect&quot;&gt;Bard&#39;s Tale&lt;/a&gt; for example.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;By the late 1970s to early 1980s, games were developed and distributed through &lt;a href=&quot;http://en.wikipedia.org/wiki/Hobbyist&quot; title=&quot;Hobbyist&quot; class=&quot;mw-redirect&quot;&gt;hobbyist&lt;/a&gt; groups and gaming magazines, such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Creative_Computing&quot; title=&quot;Creative Computing&quot;&gt;Creative Computing&lt;/a&gt; and later &lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_Gaming_World&quot; title=&quot;Computer Gaming World&quot;&gt;Computer Gaming World&lt;/a&gt;.  These publications provided game code that could be typed into a  computer and played, encouraging readers to submit their own software to  competitions.&lt;sup id=&quot;cite_ref-codesubmission_3-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-codesubmission-3&quot;&gt;&lt;span&gt;[&lt;/span&gt;4&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Microchess&quot; title=&quot;Microchess&quot;&gt;Microchess&lt;/a&gt;  was one of the first games for microcomputers which was sold to the  public. First sold in 1977, Microchess eventually sold over 50,000  copies on cassette tape.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Like with &lt;a href=&quot;http://en.wikipedia.org/wiki/History_of_video_game_consoles_%28second_generation%29&quot; title=&quot;History of video game consoles (second generation)&quot;&gt;second-generation&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_game_console&quot; title=&quot;Video game console&quot;&gt;video game consoles&lt;/a&gt; at the time, early home computer games began gaining commercial success by capitalizing on the &lt;a href=&quot;http://en.wikipedia.org/wiki/Golden_age_of_video_arcade_games&quot; title=&quot;Golden age of video arcade games&quot;&gt;success of arcade games&lt;/a&gt; at the time with ports or clones of popular &lt;a href=&quot;http://en.wikipedia.org/wiki/Arcade_game&quot; title=&quot;Arcade game&quot;&gt;arcade games&lt;/a&gt;.&lt;sup id=&quot;cite_ref-Enterprise-1982_4-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-Enterprise-1982-4&quot;&gt;&lt;span&gt;[&lt;/span&gt;5&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;sup id=&quot;cite_ref-Markoff-1981_5-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-Markoff-1981-5&quot;&gt;&lt;span&gt;[&lt;/span&gt;6&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; By 1982, the &lt;a href=&quot;http://en.wikipedia.org/wiki/List_of_best-selling_video_games&quot; title=&quot;List of best-selling video games&quot;&gt;top-selling games&lt;/a&gt; for the &lt;a href=&quot;http://en.wikipedia.org/wiki/Atari_400&quot; title=&quot;Atari 400&quot; class=&quot;mw-redirect&quot;&gt;Atari 400&lt;/a&gt; were ports of &lt;a href=&quot;http://en.wikipedia.org/wiki/Frogger&quot; title=&quot;Frogger&quot;&gt;Frogger&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Centipede&quot; title=&quot;Centipede&quot;&gt;Centipede&lt;/a&gt;, while the top-selling game for the &lt;a href=&quot;http://en.wikipedia.org/wiki/Texas_Instruments_TI-99/4A&quot; title=&quot;Texas Instruments TI-99/4A&quot;&gt;Texas Instruments TI-99/4A&lt;/a&gt; was the &lt;a href=&quot;http://en.wikipedia.org/wiki/Space_Invaders&quot; title=&quot;Space Invaders&quot;&gt;Space Invaders&lt;/a&gt; clone &lt;a href=&quot;http://en.wikipedia.org/wiki/TI_Invaders&quot; title=&quot;TI Invaders&quot;&gt;TI Invaders&lt;/a&gt;.&lt;sup id=&quot;cite_ref-Enterprise-1982_4-1&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-Enterprise-1982-4&quot;&gt;&lt;span&gt;[&lt;/span&gt;5&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; That same year, &lt;a href=&quot;http://en.wikipedia.org/wiki/Pac-Man&quot; title=&quot;Pac-Man&quot;&gt;Pac-Man&lt;/a&gt; was ported to the &lt;a href=&quot;http://en.wikipedia.org/wiki/Atari_800&quot; title=&quot;Atari 800&quot; class=&quot;mw-redirect&quot;&gt;Atari 800&lt;/a&gt;,&lt;sup id=&quot;cite_ref-Markoff-1981_5-1&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-Markoff-1981-5&quot;&gt;&lt;span&gt;[&lt;/span&gt;6&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; while &lt;a href=&quot;http://en.wikipedia.org/wiki/Donkey_Kong&quot; title=&quot;Donkey Kong&quot;&gt;Donkey Kong&lt;/a&gt; was licensed for the &lt;a href=&quot;http://en.wikipedia.org/wiki/Coleco_Adam&quot; title=&quot;Coleco Adam&quot;&gt;Coleco Adam&lt;/a&gt;.&lt;sup id=&quot;cite_ref-6&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-6&quot;&gt;&lt;span&gt;[&lt;/span&gt;7&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; In late 1981, &lt;a href=&quot;http://en.wikipedia.org/wiki/Atari&quot; title=&quot;Atari&quot;&gt;Atari&lt;/a&gt; attempted to take legal action against unauthorized clones, particularly &lt;a href=&quot;http://en.wikipedia.org/wiki/Pac-Man_clones&quot; title=&quot;Pac-Man clones&quot;&gt;Pac-Man clones&lt;/a&gt;, despite some of these predating Atari&#39;s exclusive rights to the home versions of &lt;a href=&quot;http://en.wikipedia.org/wiki/Namco&quot; title=&quot;Namco&quot;&gt;Namco&lt;/a&gt;&#39;s game.&lt;sup id=&quot;cite_ref-Markoff-1981_5-2&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-Markoff-1981-5&quot;&gt;&lt;span&gt;[&lt;/span&gt;6&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=3&quot; title=&quot;Edit section: Industry crash&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Industry_crash&quot;&gt;Industry crash&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink relarticle mainarticle&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Main article: &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_game_crash_of_1983&quot; title=&quot;Video game crash of 1983&quot; class=&quot;mw-redirect&quot;&gt;Video game crash of 1983&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;As the video game market became flooded with poor-quality cartridge  games created by numerous companies attempting to enter the market, and  over-production of high profile releases such as the &lt;a href=&quot;http://en.wikipedia.org/wiki/Atari_2600&quot; title=&quot;Atari 2600&quot;&gt;Atari 2600&lt;/a&gt; adaptations of &lt;a href=&quot;http://en.wikipedia.org/wiki/Pac-Man_%28Atari_2600%29&quot; title=&quot;Pac-Man (Atari 2600)&quot;&gt;Pac-Man&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/E.T._the_Extra-Terrestrial_%28Atari_2600%29&quot; title=&quot;E.T. the Extra-Terrestrial (Atari 2600)&quot; class=&quot;mw-redirect&quot;&gt;E.T.&lt;/a&gt;  grossly underperformed, the popularity of personal computers for  education rose dramatically. In 1983, consumer interest in console video  games dwindled to historical lows, as interest in computer games rose.&lt;sup id=&quot;cite_ref-crash_7-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-crash-7&quot;&gt;&lt;span&gt;[&lt;/span&gt;8&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; The effects of the crash were largely limited to the console market, as established companies such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Atari&quot; title=&quot;Atari&quot;&gt;Atari&lt;/a&gt;  posted record losses over subsequent years. Conversely, the home  computer market boomed, as sales of low-cost color computers such as the  &lt;a href=&quot;http://en.wikipedia.org/wiki/Commodore_64&quot; title=&quot;Commodore 64&quot;&gt;Commodore 64&lt;/a&gt; rose to record highs and developers such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Electronic_Arts&quot; title=&quot;Electronic Arts&quot;&gt;Electronic Arts&lt;/a&gt; benefited from increasing interest in the platform.&lt;sup id=&quot;cite_ref-crash_7-1&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-crash-7&quot;&gt;&lt;span&gt;[&lt;/span&gt;8&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The console market experienced a resurgence in the United States with the release of the &lt;a href=&quot;http://en.wikipedia.org/wiki/Nintendo_Entertainment_System&quot; title=&quot;Nintendo Entertainment System&quot;&gt;Nintendo Entertainment System&lt;/a&gt; (NES). In Europe, computer gaming continued to boom for many years after.&lt;sup id=&quot;cite_ref-crash_7-2&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-crash-7&quot;&gt;&lt;span&gt;[&lt;/span&gt;8&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; Computers such as the &lt;a href=&quot;http://en.wikipedia.org/wiki/ZX_Spectrum&quot; title=&quot;ZX Spectrum&quot;&gt;ZX Spectrum&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/BBC_Micro&quot; title=&quot;BBC Micro&quot;&gt;BBC Micro&lt;/a&gt;  were successful in the European market, where the NES was not as  successful despite its monopoly in Japan and North America. The only &lt;a href=&quot;http://en.wikipedia.org/wiki/History_of_video_game_consoles_%28third_generation%29&quot; title=&quot;History of video game consoles (third generation)&quot;&gt;8-bit console&lt;/a&gt; to have any success in Europe would be the &lt;a href=&quot;http://en.wikipedia.org/wiki/Sega_Master_System&quot; title=&quot;Sega Master System&quot;&gt;Sega Master System&lt;/a&gt;.&lt;sup id=&quot;cite_ref-8&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-8&quot;&gt;&lt;span&gt;[&lt;/span&gt;9&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; Meanwhile in Japan, both consoles and computers became major industries, with the console market dominated by &lt;a href=&quot;http://en.wikipedia.org/wiki/Nintendo&quot; title=&quot;Nintendo&quot;&gt;Nintendo&lt;/a&gt; and the computer market dominated by &lt;a href=&quot;http://en.wikipedia.org/wiki/NEC&quot; title=&quot;NEC&quot;&gt;NEC&lt;/a&gt;&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/NEC_PC-8801&quot; title=&quot;NEC PC-8801&quot;&gt;PC-88&lt;/a&gt; (1981) and &lt;a href=&quot;http://en.wikipedia.org/wiki/NEC_PC-9801&quot; title=&quot;NEC PC-9801&quot;&gt;PC-98&lt;/a&gt; (1982). A key difference between Western and Japanese computers at the time was the &lt;a href=&quot;http://en.wikipedia.org/wiki/Display_resolution&quot; title=&quot;Display resolution&quot;&gt;display resolution&lt;/a&gt;, with Japanese systems using a higher resolution of 640x400 to accommodate &lt;a href=&quot;http://en.wikipedia.org/wiki/Japanese_writing_system&quot; title=&quot;Japanese writing system&quot;&gt;Japanese text&lt;/a&gt; which in turn had an impact on &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_design&quot; title=&quot;Game design&quot;&gt;game design&lt;/a&gt; and allowed more detailed graphics.&lt;sup id=&quot;cite_ref-hg101_retro_9-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-hg101_retro-9&quot;&gt;&lt;span&gt;[&lt;/span&gt;10&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=4&quot; title=&quot;Edit section: New genres&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;New_genres&quot;&gt;New genres&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Increasing adoption of the &lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_mouse&quot; title=&quot;Computer mouse&quot; class=&quot;mw-redirect&quot;&gt;computer mouse&lt;/a&gt;, driven partially by the success of games such as the highly successful &lt;a href=&quot;http://en.wikipedia.org/wiki/King%27s_Quest&quot; title=&quot;King&#39;s Quest&quot;&gt;King&#39;s Quest&lt;/a&gt; series, and high resolution &lt;a href=&quot;http://en.wikipedia.org/wiki/Bitmap&quot; title=&quot;Bitmap&quot;&gt;bitmap&lt;/a&gt; displays allowed the industry to include increasingly high-quality &lt;a href=&quot;http://en.wikipedia.org/wiki/GUI&quot; title=&quot;GUI&quot; class=&quot;mw-redirect&quot;&gt;graphical interfaces&lt;/a&gt; in new releases. Meanwhile, the &lt;a href=&quot;http://en.wikipedia.org/wiki/Amiga&quot; title=&quot;Amiga&quot;&gt;Commodore Amiga&lt;/a&gt;  computer achieved great success in the market from its release in 1985,  contributing to the rapid adoption of these new interface technologies.&lt;sup id=&quot;cite_ref-amiga_10-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-amiga-10&quot;&gt;&lt;span&gt;[&lt;/span&gt;11&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Further improvements to game artwork were made possible with the introduction of &lt;a href=&quot;http://en.wikipedia.org/wiki/FM_synthesis&quot; title=&quot;FM synthesis&quot; class=&quot;mw-redirect&quot;&gt;FM synthesis&lt;/a&gt; sound. &lt;a href=&quot;http://en.wikipedia.org/wiki/Yamaha&quot; title=&quot;Yamaha&quot; class=&quot;mw-redirect&quot;&gt;Yamaha&lt;/a&gt; began manufacturing FM synth boards for computers in the early-mid 1980s, and by 1985, the &lt;a href=&quot;http://en.wikipedia.org/wiki/FM-7&quot; title=&quot;FM-7&quot;&gt;FM-7 AV&lt;/a&gt; computer had built-in FM sound.&lt;sup id=&quot;cite_ref-hg101_retro_9-1&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-hg101_retro-9&quot;&gt;&lt;span&gt;[&lt;/span&gt;10&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; The first &lt;a href=&quot;http://en.wikipedia.org/wiki/Sound_card&quot; title=&quot;Sound card&quot;&gt;sound cards&lt;/a&gt;, such as &lt;a href=&quot;http://en.wikipedia.org/wiki/AdLib&quot; title=&quot;AdLib&quot; class=&quot;mw-redirect&quot;&gt;AdLib&lt;/a&gt;&#39;s Music Synthesizer Card, soon appeared in 1987. These cards allowed &lt;a href=&quot;http://en.wikipedia.org/wiki/IBM_PC_compatible&quot; title=&quot;IBM PC compatible&quot;&gt;IBM PC compatible&lt;/a&gt;  computers to produce complex sounds using FM synthesis, where they had  previously been limited to simple tones and beeps. However, the rise of  the &lt;a href=&quot;http://en.wikipedia.org/wiki/Creative_Labs&quot; title=&quot;Creative Labs&quot; class=&quot;mw-redirect&quot;&gt;Creative Labs&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Sound_Blaster&quot; title=&quot;Sound Blaster&quot;&gt;Sound Blaster&lt;/a&gt; card, released in 1989, which featured much higher sound quality due to the inclusion of a &lt;a href=&quot;http://en.wikipedia.org/wiki/PCM&quot; title=&quot;PCM&quot; class=&quot;mw-redirect&quot;&gt;PCM&lt;/a&gt; channel and &lt;a href=&quot;http://en.wikipedia.org/wiki/Digital_signal_processor&quot; title=&quot;Digital signal processor&quot;&gt;digital signal processor&lt;/a&gt;, led AdLib to file for bankruptcy by 1992. Also in 1989, the &lt;a href=&quot;http://en.wikipedia.org/wiki/FM_Towns&quot; title=&quot;FM Towns&quot;&gt;FM Towns&lt;/a&gt; computer included built-in PCM sound, in addition to a &lt;a href=&quot;http://en.wikipedia.org/wiki/CD-ROM&quot; title=&quot;CD-ROM&quot;&gt;CD-ROM&lt;/a&gt; drive and &lt;a href=&quot;http://en.wikipedia.org/wiki/24-bit_color&quot; title=&quot;24-bit color&quot; class=&quot;mw-redirect&quot;&gt;24-bit color&lt;/a&gt; graphics.&lt;sup id=&quot;cite_ref-hg101_retro_9-2&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-hg101_retro-9&quot;&gt;&lt;span&gt;[&lt;/span&gt;10&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;In 1991, &lt;a href=&quot;http://en.wikipedia.org/wiki/Id_Software&quot; title=&quot;Id Software&quot;&gt;id Software&lt;/a&gt; produced an early &lt;a href=&quot;http://en.wikipedia.org/wiki/First-person_shooter&quot; title=&quot;First-person shooter&quot;&gt;first-person shooter&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Hovertank_3D&quot; title=&quot;Hovertank 3D&quot;&gt;Hovertank 3D&lt;/a&gt;,  which was the company&#39;s first in their line of highly influential games  in the genre. There were also several other companies that produced  early first-person shooters, such as Arsys Software&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Role-playing_shooters&quot; title=&quot;Role-playing shooters&quot; class=&quot;mw-redirect&quot;&gt;Star Cruiser&lt;/a&gt;,&lt;sup id=&quot;cite_ref-11&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-11&quot;&gt;&lt;span&gt;[&lt;/span&gt;12&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; which featured fully &lt;a href=&quot;http://en.wikipedia.org/wiki/3D_computer_graphics&quot; title=&quot;3D computer graphics&quot;&gt;3D polygonal graphics&lt;/a&gt; in 1988,&lt;sup id=&quot;cite_ref-12&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-12&quot;&gt;&lt;span&gt;[&lt;/span&gt;13&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Accolade&quot; title=&quot;Accolade&quot;&gt;Accolade&lt;/a&gt;&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Day_of_the_Viper&quot; title=&quot;Day of the Viper&quot;&gt;Day of the Viper&lt;/a&gt; in 1989. Id Software went on to develop &lt;a href=&quot;http://en.wikipedia.org/wiki/Wolfenstein_3D&quot; title=&quot;Wolfenstein 3D&quot;&gt;Wolfenstein 3D&lt;/a&gt;  in 1992, which helped to popularize the genre, kick-starting a genre  that would become one of the highest-selling in modern times.&lt;sup id=&quot;cite_ref-fpssales_13-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-fpssales-13&quot;&gt;&lt;span&gt;[&lt;/span&gt;14&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; The game was originally distributed through the &lt;a href=&quot;http://en.wikipedia.org/wiki/Shareware&quot; title=&quot;Shareware&quot;&gt;shareware distribution model&lt;/a&gt;,  allowing players to try a limited part of the game for free but  requiring payment to play the rest, and represented one of the first  uses of &lt;a href=&quot;http://en.wikipedia.org/wiki/Texture_mapping&quot; title=&quot;Texture mapping&quot;&gt;texture mapping&lt;/a&gt; graphics in a popular game, along with &lt;a href=&quot;http://en.wikipedia.org/wiki/Ultima_Underworld&quot; title=&quot;Ultima Underworld&quot; class=&quot;mw-redirect&quot;&gt;Ultima Underworld&lt;/a&gt;.&lt;sup id=&quot;cite_ref-texturemapping_14-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-texturemapping-14&quot;&gt;&lt;span&gt;[&lt;/span&gt;15&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;While leading &lt;a href=&quot;http://en.wikipedia.org/wiki/Sega&quot; title=&quot;Sega&quot;&gt;Sega&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Nintendo&quot; title=&quot;Nintendo&quot;&gt;Nintendo&lt;/a&gt; console systems kept their CPU speed at 3-7 &lt;a href=&quot;http://en.wikipedia.org/wiki/Clock_rate&quot; title=&quot;Clock rate&quot;&gt;MHz&lt;/a&gt;, the &lt;a href=&quot;http://en.wikipedia.org/wiki/Intel_80486&quot; title=&quot;Intel 80486&quot;&gt;486&lt;/a&gt; PC processor ran much faster, allowing it to perform many more calculations per second. The 1993 release of &lt;a href=&quot;http://en.wikipedia.org/wiki/Doom_%28video_game%29&quot; title=&quot;Doom (video game)&quot;&gt;Doom&lt;/a&gt;  on the PC was a breakthrough in 3D graphics, and was soon ported to  various game consoles in a general shift toward greater realism.&lt;sup id=&quot;cite_ref-realismshift_15-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-realismshift-15&quot;&gt;&lt;span&gt;[&lt;/span&gt;16&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; In the same time frame, games such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Myst&quot; title=&quot;Myst&quot;&gt;Myst&lt;/a&gt;  took advantage of the new CD-ROM delivery format to include many more  assets (sound, images, video) for a richer game experience.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Many early PC games included extras such as the peril-sensitive sunglasses that shipped with &lt;a href=&quot;http://en.wikipedia.org/wiki/The_Hitchhiker%27s_Guide_to_the_Galaxy_%28computer_game%29&quot; title=&quot;The Hitchhiker&#39;s Guide to the Galaxy (computer game)&quot; class=&quot;mw-redirect&quot;&gt;The Hitchhiker&#39;s Guide to the Galaxy&lt;/a&gt;.  These extras gradually became less common, but many games were still  sold in the traditional over-sized boxes that used to hold the extra &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Feelies&quot; title=&quot;Feelies&quot; class=&quot;mw-redirect&quot;&gt;feelies&lt;/a&gt;&quot;. Today, such extras are usually found only in Special Edition versions of games, such as Battlechests from &lt;a href=&quot;http://en.wikipedia.org/wiki/Blizzard_Entertainment&quot; title=&quot;Blizzard Entertainment&quot;&gt;Blizzard&lt;/a&gt;.&lt;sup id=&quot;cite_ref-feelies_16-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-feelies-16&quot;&gt;&lt;span&gt;[&lt;/span&gt;17&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=5&quot; title=&quot;Edit section: Contemporary gaming&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Contemporary_gaming&quot;&gt;Contemporary gaming&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;By 1996, the rise of &lt;a href=&quot;http://en.wikipedia.org/wiki/Microsoft_Windows&quot; title=&quot;Microsoft Windows&quot;&gt;Microsoft Windows&lt;/a&gt; and success of 3D console titles such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Super_Mario_64&quot; title=&quot;Super Mario 64&quot;&gt;Super Mario 64&lt;/a&gt; sparked great interest in &lt;a href=&quot;http://en.wikipedia.org/wiki/3D_acceleration&quot; title=&quot;3D acceleration&quot; class=&quot;mw-redirect&quot;&gt;hardware accelerated 3D graphics&lt;/a&gt; on the &lt;a href=&quot;http://en.wikipedia.org/wiki/IBM_PC_compatible&quot; title=&quot;IBM PC compatible&quot;&gt;IBM PC compatible&lt;/a&gt;, and soon resulted in attempts to produce affordable solutions with the &lt;a href=&quot;http://en.wikipedia.org/wiki/ATI_Technologies&quot; title=&quot;ATI Technologies&quot;&gt;ATI&lt;/a&gt; Rage, &lt;a href=&quot;http://en.wikipedia.org/wiki/Matrox&quot; title=&quot;Matrox&quot;&gt;Matrox&lt;/a&gt; Mystique and &lt;a href=&quot;http://en.wikipedia.org/wiki/S3_ViRGE&quot; title=&quot;S3 ViRGE&quot;&gt;S3 ViRGE&lt;/a&gt;. &lt;a href=&quot;http://en.wikipedia.org/wiki/Tomb_Raider&quot; title=&quot;Tomb Raider&quot;&gt;Tomb Raider&lt;/a&gt;,  which was released in 1996, was one of the first third person shooter  games and was praised for its revolutionary graphics. As 3D graphics  libraries such as &lt;a href=&quot;http://en.wikipedia.org/wiki/DirectX&quot; title=&quot;DirectX&quot;&gt;DirectX&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/OpenGL&quot; title=&quot;OpenGL&quot;&gt;OpenGL&lt;/a&gt;  matured and knocked proprietary interfaces out of the market, these  platforms gained greater acceptance in the market, particularly with  their demonstrated benefits in games such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Unreal&quot; title=&quot;Unreal&quot;&gt;Unreal&lt;/a&gt;.&lt;sup id=&quot;cite_ref-unreal_17-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-unreal-17&quot;&gt;&lt;span&gt;[&lt;/span&gt;18&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; However, major changes to the &lt;a href=&quot;http://en.wikipedia.org/wiki/Microsoft_Windows&quot; title=&quot;Microsoft Windows&quot;&gt;Microsoft Windows&lt;/a&gt; operating system, by then the market leader, made many older &lt;a href=&quot;http://en.wikipedia.org/wiki/MS-DOS&quot; title=&quot;MS-DOS&quot;&gt;MS-DOS&lt;/a&gt;-based games unplayable on &lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_NT&quot; title=&quot;Windows NT&quot;&gt;Windows NT&lt;/a&gt;, and later, &lt;a href=&quot;http://en.wikipedia.org/wiki/Windows_XP&quot; title=&quot;Windows XP&quot;&gt;Windows XP&lt;/a&gt; (without using an &lt;a href=&quot;http://en.wikipedia.org/wiki/Emulator&quot; title=&quot;Emulator&quot;&gt;emulator&lt;/a&gt;, such as &lt;a href=&quot;http://en.wikipedia.org/wiki/DOSbox&quot; title=&quot;DOSbox&quot; class=&quot;mw-redirect&quot;&gt;DOSbox&lt;/a&gt;).&lt;sup id=&quot;cite_ref-dosincompatibility_18-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-dosincompatibility-18&quot;&gt;&lt;span&gt;[&lt;/span&gt;19&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;sup id=&quot;cite_ref-19&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-19&quot;&gt;&lt;span&gt;[&lt;/span&gt;20&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The faster graphics accelerators and improving &lt;a href=&quot;http://en.wikipedia.org/wiki/Central_processing_unit&quot; title=&quot;Central processing unit&quot;&gt;CPU&lt;/a&gt;  technology resulted in increasing levels of realism in computer games.  During this time, the improvements introduced with products such as  ATI&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Radeon_R300&quot; title=&quot;Radeon R300&quot;&gt;Radeon R300&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/NVidia&quot; title=&quot;NVidia&quot; class=&quot;mw-redirect&quot;&gt;NVidia&lt;/a&gt;&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/GeForce_6_Series&quot; title=&quot;GeForce 6 Series&quot;&gt;GeForce 6 Series&lt;/a&gt; have allowed developers to increase the complexity of modern &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_engine&quot; title=&quot;Game engine&quot;&gt;game engines&lt;/a&gt;. PC gaming currently tends strongly toward improvements in 3D graphics.&lt;sup id=&quot;cite_ref-graphicstrend_20-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-graphicstrend-20&quot;&gt;&lt;span&gt;[&lt;/span&gt;21&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Unlike the generally accepted push for improved graphical performance, the use of &lt;a href=&quot;http://en.wikipedia.org/wiki/Physics_engine&quot; title=&quot;Physics engine&quot;&gt;physics engines&lt;/a&gt; in computer games has become a matter of debate since announcement and 2005 release of the &lt;a href=&quot;http://en.wikipedia.org/wiki/NVidia&quot; title=&quot;NVidia&quot; class=&quot;mw-redirect&quot;&gt;nVidia&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/PhysX&quot; title=&quot;PhysX&quot;&gt;PhysX&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Physics_processing_unit&quot; title=&quot;Physics processing unit&quot;&gt;PPU&lt;/a&gt;, ostensibly competing with &lt;a href=&quot;http://en.wikipedia.org/wiki/Middleware&quot; title=&quot;Middleware&quot;&gt;middleware&lt;/a&gt; such as the &lt;a href=&quot;http://en.wikipedia.org/wiki/Havok_%28software%29&quot; title=&quot;Havok (software)&quot;&gt;Havok physics engine&lt;/a&gt;. Issues such as difficulty in ensuring consistent experiences for all players,&lt;sup id=&quot;cite_ref-ppumultiplayer_21-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-ppumultiplayer-21&quot;&gt;&lt;span&gt;[&lt;/span&gt;22&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; and the uncertain benefit of first generation PhysX cards in games such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Tom_Clancy%27s_Ghost_Recon_Advanced_Warfighter&quot; title=&quot;Tom Clancy&#39;s Ghost Recon Advanced Warfighter&quot;&gt;Tom Clancy&#39;s Ghost Recon Advanced Warfighter&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/City_of_Villains&quot; title=&quot;City of Villains&quot;&gt;City of Villains&lt;/a&gt;, prompted arguments over the value of such technology.&lt;sup id=&quot;cite_ref-grawppubenchmark_22-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-grawppubenchmark-22&quot;&gt;&lt;span&gt;[&lt;/span&gt;23&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;sup id=&quot;cite_ref-covppubenchmark_23-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-covppubenchmark-23&quot;&gt;&lt;span&gt;[&lt;/span&gt;24&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Similarly, many game publishers began to experiment with new forms of marketing. Chief among these alternative strategies is &lt;a href=&quot;http://en.wikipedia.org/wiki/Episodic_gaming&quot; title=&quot;Episodic gaming&quot; class=&quot;mw-redirect&quot;&gt;episodic gaming&lt;/a&gt;, an adaptation of the older concept of &lt;a href=&quot;http://en.wikipedia.org/wiki/Expansion_pack&quot; title=&quot;Expansion pack&quot;&gt;expansion packs&lt;/a&gt;, in which game content is provided in smaller quantities but for a proportionally lower price. Titles such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Half-Life_2:_Episode_One&quot; title=&quot;Half-Life 2: Episode One&quot;&gt;Half-Life 2: Episode One&lt;/a&gt; took advantage of the idea, with mixed results rising from concerns for the amount of content provided for the price.&lt;sup id=&quot;cite_ref-episodereactions_24-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-episodereactions-24&quot;&gt;&lt;span&gt;[&lt;/span&gt;25&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=6&quot; title=&quot;Edit section: PC game development&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;PC_game_development&quot;&gt;PC game development&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink relarticle mainarticle&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Main article: &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_development&quot; title=&quot;Game development&quot; class=&quot;mw-redirect&quot;&gt;Game development&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Game development, as with &lt;a href=&quot;http://en.wikipedia.org/wiki/Console_game&quot; title=&quot;Console game&quot;&gt;console games&lt;/a&gt;, is generally undertaken by one or more &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_game_developer&quot; title=&quot;Video game developer&quot;&gt;game developers&lt;/a&gt;  using either standardized or proprietary tools. While games could  previously be developed by very small groups of people, as in the early  example of &lt;a href=&quot;http://en.wikipedia.org/wiki/Wolfenstein_3D&quot; title=&quot;Wolfenstein 3D&quot;&gt;Wolfenstein 3D&lt;/a&gt;, many popular computer games today require large development teams and budgets running into the millions of dollars.&lt;sup id=&quot;cite_ref-devcosts_25-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-devcosts-25&quot;&gt;&lt;span&gt;[&lt;/span&gt;26&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;PC games are usually built around a central piece of software, known as a &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_engine&quot; title=&quot;Game engine&quot;&gt;game engine&lt;/a&gt;,&lt;sup id=&quot;cite_ref-gameengine_26-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-gameengine-26&quot;&gt;&lt;span&gt;[&lt;/span&gt;27&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;  that simplifies the development process and enables developers to  easily port their projects between platforms. Unlike most consoles,  which generally only run major engines such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Unreal_Engine_technology#Unreal_Engine_3.0&quot; title=&quot;Unreal Engine technology&quot; class=&quot;mw-redirect&quot;&gt;Unreal Engine 3&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/RenderWare&quot; title=&quot;RenderWare&quot;&gt;RenderWare&lt;/a&gt; due to restrictions on &lt;a href=&quot;http://en.wikipedia.org/wiki/Homebrew_%28video_games%29&quot; title=&quot;Homebrew (video games)&quot;&gt;homebrew&lt;/a&gt;  software, personal computers may run games developed using a larger  range of software. As such, a number of alternatives to expensive  engines have become available, including &lt;a href=&quot;http://en.wikipedia.org/wiki/Open_source&quot; title=&quot;Open source&quot;&gt;open source&lt;/a&gt; solutions such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Crystal_Space&quot; title=&quot;Crystal Space&quot;&gt;Crystal Space&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/OGRE_Engine&quot; title=&quot;OGRE Engine&quot; class=&quot;mw-redirect&quot;&gt;OGRE&lt;/a&gt; and DarkPlaces.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=7&quot; title=&quot;Edit section: User-created modifications&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;User-created_modifications&quot;&gt;User-created modifications&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink relarticle mainarticle&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Main article: &lt;a href=&quot;http://en.wikipedia.org/wiki/Mod_%28computer_gaming%29&quot; title=&quot;Mod (computer gaming)&quot; class=&quot;mw-redirect&quot;&gt;Mod (computer gaming)&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The multi-purpose nature of personal computers often allows users to  modify the content of installed games with relative ease. Since console  games are generally difficult to modify without a proprietary &lt;a href=&quot;http://en.wikipedia.org/wiki/Software_development_kit&quot; title=&quot;Software development kit&quot;&gt;software development kit&lt;/a&gt;, and are often protected by legal and physical barriers against tampering and &lt;a href=&quot;http://en.wikipedia.org/wiki/Homebrew_%28video_games%29&quot; title=&quot;Homebrew (video games)&quot;&gt;homebrew software&lt;/a&gt;,&lt;sup id=&quot;cite_ref-modlegality_27-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-modlegality-27&quot;&gt;&lt;span&gt;[&lt;/span&gt;28&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;sup id=&quot;cite_ref-modbarriers_28-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-modbarriers-28&quot;&gt;&lt;span&gt;[&lt;/span&gt;29&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;  it is generally easier to modify the personal computer version of games  using common, easy-to-obtain software. Users can then distribute their  customised version of the game (commonly known as a mod) by any means they choose.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The inclusion of map editors such as &lt;a href=&quot;http://en.wikipedia.org/wiki/UnrealEd&quot; title=&quot;UnrealEd&quot;&gt;UnrealEd&lt;/a&gt; with the retail versions of many games, and others that have been made available online such as &lt;a href=&quot;http://en.wikipedia.org/wiki/GtkRadiant&quot; title=&quot;GtkRadiant&quot;&gt;GtkRadiant&lt;/a&gt;,  allow users to create modifications for games easily, using tools that  are maintained by the games&#39; original developers. In addition, companies  such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Id_Software&quot; title=&quot;Id Software&quot;&gt;id Software&lt;/a&gt; have released the &lt;a href=&quot;http://en.wikipedia.org/wiki/Source_code&quot; title=&quot;Source code&quot;&gt;source code&lt;/a&gt; to older game engines, enabling the creation of entirely new games and major changes to existing ones.&lt;sup id=&quot;cite_ref-q3source_29-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-q3source-29&quot;&gt;&lt;span&gt;[&lt;/span&gt;30&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Modding had allowed much of the community to produce game elements  that would not normally be provided by the developer of the game,  expanding or modifying normal gameplay to varying degrees. Arguably, the  most notable example is &lt;a href=&quot;http://en.wikipedia.org/wiki/Counter-Strike&quot; title=&quot;Counter-Strike&quot;&gt;Counter-Strike&lt;/a&gt;, a mod for &lt;a href=&quot;http://en.wikipedia.org/wiki/Half-Life_%28video_game%29&quot; title=&quot;Half-Life (video game)&quot;&gt;Half Life&lt;/a&gt;. &lt;a href=&quot;http://en.wikipedia.org/wiki/Counter-Strike&quot; title=&quot;Counter-Strike&quot;&gt;Counter-Strike&lt;/a&gt; turned the initial adventure &lt;a href=&quot;http://en.wikipedia.org/wiki/First-person_shooter&quot; title=&quot;First-person shooter&quot;&gt;FPS&lt;/a&gt; into a round based, tactical &lt;a href=&quot;http://en.wikipedia.org/wiki/First-person_shooter&quot; title=&quot;First-person shooter&quot;&gt;FPS&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=8&quot; title=&quot;Edit section: Distribution&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Distribution&quot;&gt;Distribution&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=9&quot; title=&quot;Edit section: Physical distribution&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Physical_distribution&quot;&gt;Physical distribution&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Computer games are typically sold on standard storage media, such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Compact_Disc&quot; title=&quot;Compact Disc&quot;&gt;compact discs&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/DVD&quot; title=&quot;DVD&quot;&gt;DVD&lt;/a&gt;, and &lt;a href=&quot;http://en.wikipedia.org/wiki/Floppy_disk&quot; title=&quot;Floppy disk&quot;&gt;floppy disks&lt;/a&gt;.&lt;sup id=&quot;cite_ref-30&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-30&quot;&gt;&lt;span&gt;[&lt;/span&gt;31&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; These were originally passed on to customers through &lt;a href=&quot;http://en.wikipedia.org/wiki/Mail_order&quot; title=&quot;Mail order&quot;&gt;mail order&lt;/a&gt; services,&lt;sup id=&quot;cite_ref-mailorder_31-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-mailorder-31&quot;&gt;&lt;span&gt;[&lt;/span&gt;32&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; although retail distribution has replaced it as the main distribution channel for video games due to higher sales.&lt;sup id=&quot;cite_ref-retailsales_32-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-retailsales-32&quot;&gt;&lt;span&gt;[&lt;/span&gt;33&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Cassette_tapes&quot; title=&quot;Cassette tapes&quot; class=&quot;mw-redirect&quot;&gt;Cassette tapes&lt;/a&gt;&lt;sup id=&quot;cite_ref-tapes_33-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-tapes-33&quot;&gt;&lt;span&gt;[&lt;/span&gt;34&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; and different formats of &lt;a href=&quot;http://en.wikipedia.org/wiki/Floppy_disk&quot; title=&quot;Floppy disk&quot;&gt;floppy disks&lt;/a&gt;  were initially the staple storage media of the 1980s and early 1990s,  but have fallen out of practical use as the increasing sophistication of  computer games raised the overall size of the game&#39;s data and program  files.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The introduction of complex &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_engine&quot; title=&quot;Game engine&quot;&gt;graphics engines&lt;/a&gt; in recent times has resulted in additional storage requirements for modern games, and thus an increasing interest in &lt;a href=&quot;http://en.wikipedia.org/wiki/CD&quot; title=&quot;CD&quot; class=&quot;mw-redirect&quot;&gt;CDs&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/DVD&quot; title=&quot;DVD&quot;&gt;DVDs&lt;/a&gt;  as the next compact storage media for personal computer games. The  rising popularity of DVD drives in modern PCs, and the larger capacity  of the new media (a single-layer DVD can hold up to 4.7 &lt;a href=&quot;http://en.wikipedia.org/wiki/Gigabyte&quot; title=&quot;Gigabyte&quot;&gt;gigabytes&lt;/a&gt;  of data, more than five times as much as a single CD), have resulted in  their adoption as a format for computer game distribution. To date, CD  versions are still offered for most games, while some games offer both  the CD and the DVD versions.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=10&quot; title=&quot;Edit section: Shareware&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Shareware&quot;&gt;Shareware&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink relarticle mainarticle&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Main articles: &lt;a href=&quot;http://en.wikipedia.org/wiki/Shareware&quot; title=&quot;Shareware&quot;&gt;Shareware&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_demo&quot; title=&quot;Game demo&quot;&gt;Game demo&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Shareware marketing, whereby a limited or demonstration version of  the full game is released to prospective buyers without charge, has been  used as a method of distributing computer games since the early years  of the gaming industry and was seen in the early days of &lt;a href=&quot;http://en.wikipedia.org/wiki/Tanarus_%28video_game%29&quot; title=&quot;Tanarus (video game)&quot;&gt;Tanarus&lt;/a&gt;  as well as many others. Shareware games generally offer only a small  part of the gameplay offered in the retail product, and may be  distributed with gaming magazines, in retail stores or on developers&#39;  websites free of charge.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;In the early 1990s, shareware distribution was common among fledging game companies such as &lt;a href=&quot;http://en.wikipedia.org/wiki/3D_Realms&quot; title=&quot;3D Realms&quot;&gt;Apogee Software&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Epic_Games&quot; title=&quot;Epic Games&quot;&gt;Epic Megagames&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Id_Software&quot; title=&quot;Id Software&quot;&gt;id Software&lt;/a&gt;,  and remains a popular distribution method among smaller game  developers. However, shareware has largely fallen out of favor among  established game companies in favour of traditional retail marketing,  with notable exceptions such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Big_Fish_Games&quot; title=&quot;Big Fish Games&quot;&gt;Big Fish Games&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/PopCap_Games&quot; title=&quot;PopCap Games&quot;&gt;PopCap Games&lt;/a&gt; continuing to use the model today.&lt;sup id=&quot;cite_ref-34&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-34&quot;&gt;&lt;span&gt;[&lt;/span&gt;35&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=11&quot; title=&quot;Edit section: Online delivery&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Online_delivery&quot;&gt;Online delivery&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;With the increased popularity of the &lt;a href=&quot;http://en.wikipedia.org/wiki/Internet&quot; title=&quot;Internet&quot;&gt;Internet&lt;/a&gt;, online distribution of game content has become more common.&lt;sup id=&quot;cite_ref-35&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-35&quot;&gt;&lt;span&gt;[&lt;/span&gt;36&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; Retail services such as Direct2Drive and &lt;a href=&quot;http://en.wikipedia.org/wiki/Download.com&quot; title=&quot;Download.com&quot;&gt;Download.com&lt;/a&gt; allow users to purchase and download large games that would otherwise only be distributed on physical media, such as &lt;a href=&quot;http://en.wikipedia.org/wiki/DVD&quot; title=&quot;DVD&quot;&gt;DVDs&lt;/a&gt;,  as well as providing cheap distribution of shareware and demonstration  games. Companies such as Real Networks provide a service that allows  other websites to use their game catalog and ecommerce backend to  publish their own game download distribution sites. Other services,  allow a subscription-based distribution model in which users pay a  monthly fee to download and play as many games as they wish.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The &lt;a href=&quot;http://en.wikipedia.org/wiki/Steam_%28software%29&quot; title=&quot;Steam (software)&quot;&gt;Steam&lt;/a&gt; system, developed by &lt;a href=&quot;http://en.wikipedia.org/wiki/Valve_Corporation&quot; title=&quot;Valve Corporation&quot;&gt;Valve Corporation&lt;/a&gt;,  provides an alternative to traditional online services. Instead of  allowing the player to download a game and play it immediately, games  are made available for &quot;pre-load&quot; in an encrypted form days or weeks  before their actual release date. On the official release date, a  relatively small component is made available to unlock the game. Steam  also ensures that once bought, a game remains accessible to a customer  indefinitely, while traditional mediums such as floppy disks and CD-ROMs  are susceptible to unrecoverable damage and misplacement. The user  would however depend on the Steam servers to be online to download its  games. According to the terms of service for Steam, Valve has no  obligation to keep the servers running. Therefore, if the Valve  Corporation shut down, so would the servers. However, they have stated  that if the service was to be discontinued, games would no longer  require authorization from the servers to run. Nevertheless, they are  not obligated to do so.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=12&quot; title=&quot;Edit section: PC game genres&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;PC_game_genres&quot;&gt;PC game genres&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink boilerplate seealso&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;See also: &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_game_genres&quot; title=&quot;Video game genres&quot;&gt;Video game genres&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The &lt;a href=&quot;http://en.wikipedia.org/wiki/Real-time_strategy&quot; title=&quot;Real-time strategy&quot;&gt;real-time strategy&lt;/a&gt; genre, which accounts for more than a quarter of all PC games sold,&lt;sup id=&quot;cite_ref-ESApressrelease_0-1&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-ESApressrelease-0&quot;&gt;&lt;span&gt;[&lt;/span&gt;1&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; has found very little success on video game consoles, with releases such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Starcraft_64&quot; title=&quot;Starcraft 64&quot; class=&quot;mw-redirect&quot;&gt;Starcraft 64&lt;/a&gt;  failing in the marketplace. Real-time strategy games tend to suffer  from the design of console controllers, which do not allow fast,  accurate movement.&lt;sup id=&quot;cite_ref-nintendo_36-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-nintendo-36&quot;&gt;&lt;span&gt;[&lt;/span&gt;37&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=13&quot; title=&quot;Edit section: PC gaming technology&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;PC_gaming_technology&quot;&gt;PC gaming technology&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;thumb tright&quot;&gt; &lt;div class=&quot;thumbinner&quot; style=&quot;width: 252px;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/File:Personal_computer,_exploded_5.svg&quot; class=&quot;image&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/4/41/Personal_computer%2C_exploded_5.svg/250px-Personal_computer%2C_exploded_5.svg.png&quot; class=&quot;thumbimage&quot; width=&quot;250&quot; height=&quot;269&quot; /&gt;&lt;/a&gt;&lt;/span&gt; &lt;div class=&quot;thumbcaption&quot;&gt; &lt;div class=&quot;magnify&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/File:Personal_computer,_exploded_5.svg&quot; class=&quot;internal&quot; title=&quot;Enlarge&quot;&gt;&lt;img src=&quot;http://bits.wikimedia.org/skins-1.17/common/images/magnify-clip.png&quot; alt=&quot;&quot; width=&quot;15&quot; height=&quot;11&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; An exploded view of a modern personal computer: &lt;/span&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_display&quot; title=&quot;Computer display&quot; class=&quot;mw-redirect&quot;&gt;Display&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Motherboard&quot; title=&quot;Motherboard&quot;&gt;Motherboard&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Central_processing_unit&quot; title=&quot;Central processing unit&quot;&gt;CPU&lt;/a&gt; (&lt;a href=&quot;http://en.wikipedia.org/wiki/Microprocessor&quot; title=&quot;Microprocessor&quot;&gt;Microprocessor&lt;/a&gt;)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Primary_storage&quot; title=&quot;Primary storage&quot; class=&quot;mw-redirect&quot;&gt;Primary storage&lt;/a&gt; (&lt;a href=&quot;http://en.wikipedia.org/wiki/Random_access_memory&quot; title=&quot;Random access memory&quot; class=&quot;mw-redirect&quot;&gt;RAM&lt;/a&gt;)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Expansion_card&quot; title=&quot;Expansion card&quot;&gt;Expansion cards&lt;/a&gt; (&lt;a href=&quot;http://en.wikipedia.org/wiki/Graphics_card&quot; title=&quot;Graphics card&quot; class=&quot;mw-redirect&quot;&gt;graphics cards&lt;/a&gt;, etc.)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Power_supply&quot; title=&quot;Power supply&quot;&gt;Power supply&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Optical_disc&quot; title=&quot;Optical disc&quot;&gt;Optical disc drive&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Secondary_storage&quot; title=&quot;Secondary storage&quot; class=&quot;mw-redirect&quot;&gt;Secondary storage&lt;/a&gt; (&lt;a href=&quot;http://en.wikipedia.org/wiki/Hard_disk&quot; title=&quot;Hard disk&quot; class=&quot;mw-redirect&quot;&gt;Hard disk&lt;/a&gt;)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_keyboard&quot; title=&quot;Computer keyboard&quot;&gt;Keyboard&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Mouse_%28computing%29&quot; title=&quot;Mouse (computing)&quot;&gt;Mouse&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt; &lt;/div&gt; &lt;/div&gt; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink relarticle mainarticle&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Main article: &lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer&quot; title=&quot;Personal computer&quot;&gt;Personal computer&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=14&quot; title=&quot;Edit section: Hardware&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Hardware&quot;&gt;Hardware&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Modern computer games place great demand on the computer&#39;s hardware, often requiring a fast &lt;a href=&quot;http://en.wikipedia.org/wiki/Central_processing_unit&quot; title=&quot;Central processing unit&quot;&gt;central processing unit&lt;/a&gt; (CPU) to function properly. CPU manufacturers historically relied mainly on increasing &lt;a href=&quot;http://en.wikipedia.org/wiki/Clock_rate&quot; title=&quot;Clock rate&quot;&gt;clock rates&lt;/a&gt; to improve the performance of their processors, but had begun to move steadily towards &lt;a href=&quot;http://en.wikipedia.org/wiki/Multi-core_%28computing%29&quot; title=&quot;Multi-core (computing)&quot; class=&quot;mw-redirect&quot;&gt;multi-core&lt;/a&gt; CPUs by &lt;a href=&quot;http://en.wikipedia.org/wiki/2005_in_video_gaming&quot; title=&quot;2005 in video gaming&quot;&gt;2005&lt;/a&gt;. These processors allow the computer to simultaneously process multiple tasks, called &lt;a href=&quot;http://en.wikipedia.org/wiki/Thread_%28computing%29&quot; title=&quot;Thread (computing)&quot; class=&quot;mw-redirect&quot;&gt;threads&lt;/a&gt;, allowing the use of more complex graphics, artificial intelligence and in-game physics.&lt;sup id=&quot;cite_ref-graphicstrend_20-1&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-graphicstrend-20&quot;&gt;&lt;span&gt;[&lt;/span&gt;21&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;sup id=&quot;cite_ref-multicore_trend_37-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-multicore_trend-37&quot;&gt;&lt;span&gt;[&lt;/span&gt;38&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Similarly, 3D games often rely on a powerful &lt;a href=&quot;http://en.wikipedia.org/wiki/Graphics_processing_unit&quot; title=&quot;Graphics processing unit&quot;&gt;graphics processing unit&lt;/a&gt; (GPU), which accelerates the process of drawing complex scenes in realtime. GPUs may be an integrated part of the computer&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Motherboard&quot; title=&quot;Motherboard&quot;&gt;motherboard&lt;/a&gt;, the most common solution in laptops,&lt;sup id=&quot;cite_ref-integrated_gpus_38-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-integrated_gpus-38&quot;&gt;&lt;span&gt;[&lt;/span&gt;39&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; or come packaged with a discrete graphics card with a supply of dedicated &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_RAM&quot; title=&quot;Video RAM&quot; class=&quot;mw-redirect&quot;&gt;Video RAM&lt;/a&gt;, connected to the motherboard through either an &lt;a href=&quot;http://en.wikipedia.org/wiki/Accelerated_graphics_port&quot; title=&quot;Accelerated graphics port&quot; class=&quot;mw-redirect&quot;&gt;AGP&lt;/a&gt; or &lt;a href=&quot;http://en.wikipedia.org/wiki/PCI-Express&quot; title=&quot;PCI-Express&quot; class=&quot;mw-redirect&quot;&gt;PCI-Express&lt;/a&gt; port. It is also possible to use multiple GPUs in a single computer, using technologies such as &lt;a href=&quot;http://en.wikipedia.org/wiki/NVidia&quot; title=&quot;NVidia&quot; class=&quot;mw-redirect&quot;&gt;NVidia&lt;/a&gt;&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Scalable_Link_Interface&quot; title=&quot;Scalable Link Interface&quot;&gt;Scalable Link Interface&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/ATI_Technologies&quot; title=&quot;ATI Technologies&quot;&gt;ATI&lt;/a&gt;&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/ATI_CrossFire&quot; title=&quot;ATI CrossFire&quot; class=&quot;mw-redirect&quot;&gt;CrossFire&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Sound_card&quot; title=&quot;Sound card&quot;&gt;Sound cards&lt;/a&gt; are also available to provide improved audio in computer games. These cards provide improved &lt;a href=&quot;http://en.wikipedia.org/wiki/3D_audio_effect&quot; title=&quot;3D audio effect&quot;&gt;3D audio&lt;/a&gt;  and provide audio enhancement that is generally not available with  integrated alternatives, at the cost of marginally lower overall  performance.&lt;sup id=&quot;cite_ref-soundcard_performance_39-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-soundcard_performance-39&quot;&gt;&lt;span&gt;[&lt;/span&gt;40&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; The &lt;a href=&quot;http://en.wikipedia.org/wiki/Creative_Labs&quot; title=&quot;Creative Labs&quot; class=&quot;mw-redirect&quot;&gt;Creative Labs&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/SoundBlaster&quot; title=&quot;SoundBlaster&quot; class=&quot;mw-redirect&quot;&gt;SoundBlaster&lt;/a&gt; line was for many years the de facto standard for sound cards, although its popularity dwindled as PC audio became a commodity on modern motherboards.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Physics_processing_unit&quot; title=&quot;Physics processing unit&quot;&gt;Physics processing units&lt;/a&gt; (PPUs), such as the &lt;a href=&quot;http://en.wikipedia.org/wiki/Nvidia&quot; title=&quot;Nvidia&quot;&gt;Nvidia&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/PhysX&quot; title=&quot;PhysX&quot;&gt;PhysX&lt;/a&gt; (formerly &lt;a href=&quot;http://en.wikipedia.org/wiki/AGEIA&quot; title=&quot;AGEIA&quot; class=&quot;mw-redirect&quot;&gt;AGEIA&lt;/a&gt;  PhysX) card, are also available to accelerate physics simulations in  modern computer games. PPUs allow the computer to process more complex  interactions among objects than is achievable using only the CPU,  potentially allowing players a much greater degree of control over the  world in games designed to use the card.&lt;sup id=&quot;cite_ref-integrated_gpus_38-1&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-integrated_gpus-38&quot;&gt;&lt;span&gt;[&lt;/span&gt;39&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Virtually all personal computers use a &lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_keyboard&quot; title=&quot;Computer keyboard&quot;&gt;keyboard&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_mouse&quot; title=&quot;Computer mouse&quot; class=&quot;mw-redirect&quot;&gt;mouse&lt;/a&gt; for user input. Other common gaming peripherals are a headset for faster communication in online games, &lt;a href=&quot;http://en.wikipedia.org/wiki/Joystick&quot; title=&quot;Joystick&quot;&gt;joysticks&lt;/a&gt; for &lt;a href=&quot;http://en.wikipedia.org/wiki/Flight_simulator&quot; title=&quot;Flight simulator&quot;&gt;flight simulators&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Steering_wheel&quot; title=&quot;Steering wheel&quot;&gt;steering wheels&lt;/a&gt; for driving games and &lt;a href=&quot;http://en.wikipedia.org/wiki/Gamepad&quot; title=&quot;Gamepad&quot;&gt;gamepads&lt;/a&gt; for console-style games.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=15&quot; title=&quot;Edit section: Software&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Software&quot;&gt;Software&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Computer games also rely on &lt;a href=&quot;http://en.wikipedia.org/wiki/Third-party_software_component&quot; title=&quot;Third-party software component&quot;&gt;third-party&lt;/a&gt; software such as an &lt;a href=&quot;http://en.wikipedia.org/wiki/Operating_System&quot; title=&quot;Operating System&quot; class=&quot;mw-redirect&quot;&gt;operating system (OS)&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Device_driver&quot; title=&quot;Device driver&quot;&gt;device drivers&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Library_%28computing%29&quot; title=&quot;Library (computing)&quot;&gt;libraries&lt;/a&gt; and more to run. Today, the vast majority of computer games are designed to run on the &lt;a href=&quot;http://en.wikipedia.org/wiki/Microsoft_Windows&quot; title=&quot;Microsoft Windows&quot;&gt;Microsoft Windows&lt;/a&gt; family of operating systems. Whereas earlier games written for &lt;a href=&quot;http://en.wikipedia.org/wiki/MS-DOS&quot; title=&quot;MS-DOS&quot;&gt;MS-DOS&lt;/a&gt; would include code to communicate directly with hardware, today &lt;a href=&quot;http://en.wikipedia.org/wiki/API&quot; title=&quot;API&quot; class=&quot;mw-redirect&quot;&gt;Application programming interfaces (APIs)&lt;/a&gt; provide an interface between the game and the OS, simplifying game design. Microsoft&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/DirectX&quot; title=&quot;DirectX&quot;&gt;DirectX&lt;/a&gt; is an API that is widely used by today&#39;s computer games to communicate with sound and graphics hardware. &lt;a href=&quot;http://en.wikipedia.org/wiki/OpenGL&quot; title=&quot;OpenGL&quot;&gt;OpenGL&lt;/a&gt; is a &lt;a href=&quot;http://en.wikipedia.org/wiki/Cross-platform&quot; title=&quot;Cross-platform&quot;&gt;cross-platform&lt;/a&gt; API for graphics rendering that is also used. The version of the graphics card&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Device_driver&quot; title=&quot;Device driver&quot;&gt;driver&lt;/a&gt; installed can often affect game performance and &lt;a href=&quot;http://en.wikipedia.org/wiki/Gameplay&quot; title=&quot;Gameplay&quot;&gt;gameplay&lt;/a&gt;. It is not unusual for a game company to use a third-party &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_engine&quot; title=&quot;Game engine&quot;&gt;game engine&lt;/a&gt;, or third-party libraries for a game&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Artificial_intelligence_%28video_games%29&quot; title=&quot;Artificial intelligence (video games)&quot;&gt;AI&lt;/a&gt; or &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_physics&quot; title=&quot;Game physics&quot;&gt;physics&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=16&quot; title=&quot;Edit section: Multiplayer&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Multiplayer&quot;&gt;Multiplayer&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h4 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=17&quot; title=&quot;Edit section: Local area network gaming&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Local_area_network_gaming&quot;&gt;Local area network gaming&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Multiplayer gaming was largely limited to &lt;a href=&quot;http://en.wikipedia.org/wiki/Local_area_network&quot; title=&quot;Local area network&quot;&gt;local area networks&lt;/a&gt; (LANs) before cost-effective &lt;a href=&quot;http://en.wikipedia.org/wiki/Broadband_Internet_access&quot; title=&quot;Broadband Internet access&quot;&gt;broadband Internet access&lt;/a&gt; became available, due to their typically higher &lt;a href=&quot;http://en.wikipedia.org/wiki/Bandwidth_%28computing%29&quot; title=&quot;Bandwidth (computing)&quot;&gt;bandwidth&lt;/a&gt; and lower &lt;a href=&quot;http://en.wikipedia.org/wiki/Latency_%28engineering%29&quot; title=&quot;Latency (engineering)&quot;&gt;latency&lt;/a&gt;  than the dial-up services of the time. These advantages allowed more  players to join any given computer game, but have persisted today  because of the higher latency of most Internet connections and the costs  associated with broadband Internet.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;LAN gaming typically requires two or more personal computers, a &lt;a href=&quot;http://en.wikipedia.org/wiki/Router&quot; title=&quot;Router&quot;&gt;router&lt;/a&gt; and sufficient networking cables to connect every computer on the network. Additionally, each computer must have a &lt;a href=&quot;http://en.wikipedia.org/wiki/Network_card&quot; title=&quot;Network card&quot; class=&quot;mw-redirect&quot;&gt;network card&lt;/a&gt; in order to communicate with other computers on the network, and its own copy (or &lt;a href=&quot;http://en.wikipedia.org/wiki/Spawn_installation&quot; title=&quot;Spawn installation&quot;&gt;spawn copy&lt;/a&gt;) of the game in order to play. Optionally, any LAN may include an external connection to the &lt;a href=&quot;http://en.wikipedia.org/wiki/Internet&quot; title=&quot;Internet&quot;&gt;Internet&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h4 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=18&quot; title=&quot;Edit section: Online games&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Online_games&quot;&gt;Online games&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink relarticle mainarticle&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Main article: &lt;a href=&quot;http://en.wikipedia.org/wiki/Online_game&quot; title=&quot;Online game&quot;&gt;Online game&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Online multiplayer games have achieved popularity largely as a result of increasing &lt;a href=&quot;http://en.wikipedia.org/wiki/Broadband_internet&quot; title=&quot;Broadband internet&quot; class=&quot;mw-redirect&quot;&gt;broadband&lt;/a&gt;  adoption among consumers. Affordable high-bandwidth Internet  connections allow large numbers of players to play together, and thus  have found particular use in &lt;a href=&quot;http://en.wikipedia.org/wiki/Massively_multiplayer_online_role-playing_game&quot; title=&quot;Massively multiplayer online role-playing game&quot;&gt;massively multiplayer online role-playing games&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Tanarus_%28video_game%29&quot; title=&quot;Tanarus (video game)&quot;&gt;Tanarus&lt;/a&gt; and persistent online games such as &lt;a href=&quot;http://en.wikipedia.org/wiki/World_War_II_Online&quot; title=&quot;World War II Online&quot;&gt;World War II Online&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Although it is possible to participate in online computer games using dial-up &lt;a href=&quot;http://en.wikipedia.org/wiki/Modem&quot; title=&quot;Modem&quot;&gt;modems&lt;/a&gt;,  broadband internet connections are generally considered necessary in  order to reduce the latency between players (commonly known as &quot;lag&quot;).  Such connections require a broadband-compatible modem connected to the  personal computer through a &lt;a href=&quot;http://en.wikipedia.org/wiki/Network_interface_card&quot; title=&quot;Network interface card&quot; class=&quot;mw-redirect&quot;&gt;network interface card&lt;/a&gt; (generally integrated onto the computer&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Motherboard&quot; title=&quot;Motherboard&quot;&gt;motherboard&lt;/a&gt;), optionally separated by a &lt;a href=&quot;http://en.wikipedia.org/wiki/Router&quot; title=&quot;Router&quot;&gt;router&lt;/a&gt;.  Online games require a virtual environment, generally called a &quot;game  server&quot;. These virtual servers inter-connect gamers, allowing real time,  and often fast paced action. To meet this subsequent need, &lt;a href=&quot;http://en.wikipedia.org/wiki/Game_server&quot; title=&quot;Game server&quot;&gt;Game Server Providers (GSP)&lt;/a&gt;  have become increasingly more popular over the last half decade. While  not required for all gamers, these servers provide a unique &quot;home&quot;,  fully customizable (such as additional modifications, settings, etc.) -  giving the end gamers the experience they desire. Today there are over  510,000 game servers hosted in North America alone.&lt;sup id=&quot;cite_ref-40&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-40&quot;&gt;&lt;span&gt;[&lt;/span&gt;41&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=19&quot; title=&quot;Edit section: Emulation&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Emulation&quot;&gt;Emulation&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink relarticle mainarticle&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Main article: &lt;a href=&quot;http://en.wikipedia.org/wiki/Emulator&quot; title=&quot;Emulator&quot;&gt;Emulator&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Emulation software, used to run software without the original  hardware, are popular for their ability to play legacy video games  without the consoles or operating system for which they were designed.  The operating system emulators include &lt;a href=&quot;http://en.wikipedia.org/wiki/DOSBox&quot; title=&quot;DOSBox&quot;&gt;DOSBox&lt;/a&gt;,  a DOS emulator which allows playing games developed originally for this  operating system and thus not compatible with a modern day OS. Console  emulators such as &lt;a href=&quot;http://en.wikipedia.org/wiki/NESticle&quot; title=&quot;NESticle&quot;&gt;NESticle&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/MAME&quot; title=&quot;MAME&quot;&gt;MAME&lt;/a&gt; are relatively commonplace, although the complexity of modern consoles such as the &lt;a href=&quot;http://en.wikipedia.org/wiki/Xbox&quot; title=&quot;Xbox&quot;&gt;Xbox&lt;/a&gt; or &lt;a href=&quot;http://en.wikipedia.org/wiki/PlayStation&quot; title=&quot;PlayStation&quot;&gt;PlayStation&lt;/a&gt; makes them far more difficult to emulate, even for the original manufacturers.&lt;sup id=&quot;cite_ref-xboxemulation_41-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-xboxemulation-41&quot;&gt;&lt;span&gt;[&lt;/span&gt;42&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Most emulation software mimics a particular hardware architecture,  often to an extremely high degree of accuracy. This is particularly the  case with classic home computers such as the &lt;a href=&quot;http://en.wikipedia.org/wiki/Commodore_64&quot; title=&quot;Commodore 64&quot;&gt;Commodore 64&lt;/a&gt;, whose software often depends on highly sophisticated low-level programming tricks invented by game programmers and the &lt;a href=&quot;http://en.wikipedia.org/wiki/Demoscene&quot; title=&quot;Demoscene&quot;&gt;demoscene&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=20&quot; title=&quot;Edit section: Controversy&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Controversy&quot;&gt;Controversy&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot; class=&quot;rellink relarticle mainarticle&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Main article: &lt;a href=&quot;http://en.wikipedia.org/wiki/Video_game_controversy&quot; title=&quot;Video game controversy&quot;&gt;Video game controversy&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;PC games have long been a source of controversy, particularly related  to the violence that has become commonly associated with video gaming  in general. The debate surrounds the influence of objectionable content  on the social development of &lt;a href=&quot;http://en.wikipedia.org/wiki/Minor_%28law%29&quot; title=&quot;Minor (law)&quot;&gt;minors&lt;/a&gt;, with organisations such as the &lt;a href=&quot;http://en.wikipedia.org/wiki/American_Psychological_Association&quot; title=&quot;American Psychological Association&quot;&gt;American Psychological Association&lt;/a&gt; concluding that video game violence increases children&#39;s aggression,&lt;sup id=&quot;cite_ref-42&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-42&quot;&gt;&lt;span&gt;[&lt;/span&gt;43&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; a concern that prompted a further investigation by the &lt;a href=&quot;http://en.wikipedia.org/wiki/Center_for_Disease_Control&quot; title=&quot;Center for Disease Control&quot; class=&quot;mw-redirect&quot;&gt;Center for Disease Control&lt;/a&gt; in September 2006.&lt;sup id=&quot;cite_ref-cvgaggressionresearch_43-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-cvgaggressionresearch-43&quot;&gt;&lt;span&gt;[&lt;/span&gt;44&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;  Industry groups have responded by noting the responsibility of parents  in governing their children&#39;s activities, while attempts in the United  States to control the sale of objectionable games have generally been  found unconstitutional.&lt;sup id=&quot;cite_ref-freespeech_44-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-freespeech-44&quot;&gt;&lt;span&gt;[&lt;/span&gt;45&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Game_addiction&quot; title=&quot;Game addiction&quot; class=&quot;mw-redirect&quot;&gt;Video game addiction&lt;/a&gt;  is another cultural aspect of gaming to draw criticism as it can have a  negative influence on health and on social relations. The problem of  addiction and its health risks seems to have grown with the rise of &lt;a href=&quot;http://en.wikipedia.org/wiki/MMORPG&quot; title=&quot;MMORPG&quot; class=&quot;mw-redirect&quot;&gt;Massively Multiplayer Online Role Playing Games (MMORPGs)&lt;/a&gt;.&lt;sup id=&quot;cite_ref-cvgaddiction_45-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-cvgaddiction-45&quot;&gt;&lt;span&gt;[&lt;/span&gt;46&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;  Alongside the social and health problems associated with computer game  addiction have grown similar worries about the effect of computer games  on education.&lt;sup id=&quot;cite_ref-titleTom_Maher_discusses_the_effects_of_computer_game_addiction_on_classroom_teaching_46-0&quot; class=&quot;reference&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_computer_game#cite_note-titleTom_Maher_discusses_the_effects_of_computer_game_addiction_on_classroom_teaching-46&quot;&gt;&lt;span&gt;[&lt;/span&gt;47&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;editsection&quot;&gt;[&lt;a href=&quot;http://en.wikipedia.org/w/index.php?title=Personal_computer_game&amp;amp;action=edit&amp;amp;section=21&quot; title=&quot;Edit section: Computer games museums&quot;&gt;edit&lt;/a&gt;]&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Computer_games_museums&quot;&gt;Computer games museums&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;color: rgb(0, 0, 0); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;There are several computer games museums around the world. In &lt;a href=&quot;http://en.wikipedia.org/wiki/2011&quot; title=&quot;2011&quot;&gt;2011&lt;/a&gt; one opened in &lt;a href=&quot;http://en.wikipedia.org/wiki/Berlin&quot; title=&quot;Berlin&quot;&gt;Berlin&lt;/a&gt;, a computer game museum that documents computer games from the &lt;a href=&quot;http://en.wikipedia.org/wiki/1970s&quot; title=&quot;1970s&quot;&gt;1970s&lt;/a&gt; until today.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; -&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/6268489750498020612/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/07/computer-game.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/6268489750498020612'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/6268489750498020612'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/07/computer-game.html' title='computer game'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-7638784036431950358</id><published>2011-07-25T13:11:00.000-07:00</published><updated>2011-08-22T22:43:26.244-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Computer"/><title type='text'>Computer Hacking Law &amp; Legal Definition</title><content type='html'>&lt;p&gt;Computer hacking is broadly defined as intentionally accesses a computer without authorization or exceeds authorized access. Various state and federal laws govern computer hacking.&lt;/p&gt; &lt;p&gt;The federal Computer Fraud and Abuse Act provides in part as follows:&lt;/p&gt;- . &quot;(a) Whoever-- &lt;ol&gt;&lt;li&gt;having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation, willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it;&lt;/li&gt;&lt;li&gt;intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains--&lt;/li&gt;&lt;ol type=&quot;A&quot;&gt;&lt;li&gt;information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.);&lt;/li&gt;&lt;li&gt;information from any department or agency of the United States; or&lt;/li&gt;&lt;li&gt;information from any protected computer if the conduct involved an interstate or foreign communication;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States;&lt;/li&gt;&lt;li&gt;knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period;&lt;/li&gt;&lt;ol type=&quot;A&quot;&gt;&lt;li&gt;knowingly causes the transmission of a program,  information, code, or command, and as a result of such conduct,  intentionally causes damage without authorization, to a protected  computer;&lt;/li&gt;&lt;li&gt;intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or&lt;/li&gt;&lt;li&gt;intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if--&lt;/li&gt;&lt;p&gt;(a)trafficking affects interstate or foreign commerce; or such computer is used by or for the Government of the United States; with intent to extort from any person, firm, association, educational institution, financial institution, government entity, or other legal entity, any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to cause damage to a protected computer; shall be punished as provided in subsection (c) of this section. (b) Whoever attempts to commit an offense under subsection (a) of this section shall be punished as provided in subsection (c) of this section. (c) The punishment for an offense under subsection (a) or (b) of this section is--&lt;/p&gt;&lt;ol type=&quot;A&quot;&gt;&lt;li&gt;a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(1) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and&lt;/li&gt;&lt;li&gt;a fine under this title or imprisonment for not more than twenty years, or both, in the case of an offense under subsection (a)(1) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and&lt;/li&gt;&lt;ol&gt;&lt;p&gt;(A) a fine under this title or imprisonment for not more than one year, or both, in the case of an offense under subsection (a)(2), (a)(3), (a)(5)(C), or (a)(6) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and&lt;/p&gt;&lt;ol type=&quot;i&quot;&gt;&lt;li&gt;the offense was committed for purposes of commercial advantage or private financial gain;&lt;/li&gt;&lt;li&gt;the offense was committed in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or of any State; or&lt;/li&gt;&lt;li&gt;the value of the information obtained exceeds $5,000;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;(B) a fine under this title or imprisonment for not more than 5 years, or both, in the case of an offense under subsection (a)(2), if--&lt;/p&gt;&lt;p&gt;(C) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(2), (a)(3) or (a)(6) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and&lt;/p&gt;&lt;p&gt;      (A) a fine under this title or imprisonment for not more than five years, or both, in the case of an offense under subsection (a)(4), (a)(5)(A), (a)(5)(B), or (a)(7) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(4), (a)(5)(A), (a)(5)(B), (a)(5)(C), or (a)(7)of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and [former paragraph (4) stricken effective Oct. 11, 1996].&lt;/p&gt;&lt;p&gt;The United States Secret Service shall, in addition to any other agency having such authority, have the authority to investigate offenses under subsections (a)(2)(A), (a)(2)(B), (a)(3), (a)(4), (a)(5), and (a)(6) of this section. Such authority of the United States Secret Service shall be exercised in accordance with an agreement which shall be entered into by the Secretary of the Treasury and the Attorney General.&quot;&lt;/p&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;/ol&gt; -</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/7638784036431950358/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/07/computer-hacking-law-legal-definition.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7638784036431950358'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7638784036431950358'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/07/computer-hacking-law-legal-definition.html' title='Computer Hacking Law &amp; Legal Definition'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-8401423374592856143</id><published>2011-07-25T13:08:00.000-07:00</published><updated>2011-08-22T23:04:48.735-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>Computer Software Definition</title><content type='html'>Software is a generic term for organized collections of computer data  and instructions, often broken into two major categories: system  software that provides the basic non-task-specific functions of the  computer, and application software which is used by users to accomplish  specific tasks.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;System software is responsible for controlling, integrating, and  managing the individual hardware components of a computer system so that  other software and the users of the system see it as a functional unit  without having to be concerned with the low-level details such as  transferring data from memory to disk, or rendering text onto a display.  Generally, system software consists of an operating system and some  fundamental utilities such as disk formatters, file managers, display  managers, text editors, user authentication (login) and management  tools, and networking and device control software. &lt;/p&gt; &lt;p&gt;Application software, on the other hand, is used to accomplish  specific tasks other than just running the computer system. Application  software may consist of a single program, such as an image viewer; a  small collection of programs (often called a software package) that work  closely together to accomplish a task, such as a spreadsheet or text  processing system; a larger collection (often called a software suite)  of related but independent programs and packages that have a common user  interface or shared data format, such as Microsoft Office, which  consists of closely integrated word processor, spreadsheet, database,  etc.; or a software system, such as a database management system, which  is a collection of fundamental programs that may provide some service to  a variety of other independent applications. &lt;/p&gt; Software is created with programming languages and related utilities,  which may come in several of the above forms: single programs like  script interpreters, packages containing a compiler, linker, and other  tools; and large suites (often called Integrated Development  Environments) that include editors, debuggers, and other tools for  multiple languages. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt; -</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/8401423374592856143/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/07/computer-software-definition.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/8401423374592856143'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/8401423374592856143'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/07/computer-software-definition.html' title='Computer Software Definition'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-4547646364852948354</id><published>2011-07-25T13:02:00.000-07:00</published><updated>2011-08-22T23:03:15.877-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>Computer</title><content type='html'>A computer is a device that accepts information (in the form of digitalized data&lt;a href=&quot;http://searchdatamanagement.techtarget.com/sDefinition/0,,sid91_gci211894,00.html&quot;&gt;&lt;/a&gt;) and manipulates it for some result based ओं or sequence of instructions on how the data is to be processed।   A computer is a device that accepts &lt;span style=&quot;text-decoration: underline;&quot;&gt;information&lt;/span&gt; (in the form of digitalized data&lt;a href=&quot;http://searchdatamanagement.techtarget.com/sDefinition/0,,sid91_gci211894,00.html&quot;&gt;&lt;/a&gt;) and manipulates it for some result based on a program sequence of instructions on how the data is to be processed.   Complex computers also include the means for storing data (including the  program, which is also a form of data) for some necessary duration.  A  program may be invariable and built into the computer (and called &lt;i&gt;logic circuitry&lt;/i&gt; as it is on  microprocesors)  or different programs may be provided to the computer (loaded into its  storage and then started by an administrator or user).  Today&#39;s  computers have both kinds&lt;span class=&quot;decorationTop&quot;&gt;&lt;/span&gt;    &lt;span class=&quot;decorationBottom&quot;&gt;&lt;/span&gt;      of programming.&lt;br /&gt;&lt;br /&gt;&lt;p&gt; Most histories of the modern computer begin with the &lt;a href=&quot;http://whatis.techtarget.com/definition/0,,sid9_gci213714,00.html&quot;&gt;Analytical Engine&lt;/a&gt; envisioned by &lt;a href=&quot;http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci213713,00.html&quot;&gt;Charles Babbage&lt;/a&gt; following the mathematical ideas of &lt;a href=&quot;http://whatis.techtarget.com/definition/0,,sid9_gci525743,00.html&quot;&gt;George Boole&lt;/a&gt;,  the mathematician who first stated the principles of logic inherent in  today&#39;s digital computer.  Babbage&#39;s assistant and collaborator, &lt;a href=&quot;http://whatis.techtarget.com/definition/0,,sid9_gci960405,00.html&quot;&gt;Ada Lovelace&lt;/a&gt;,  is said to have introduced the ideas of program loops and subroutines  and is sometimes considered the first programmer.  Apart from mechanical  calculators, the first really useable computers began with the &lt;a href=&quot;http://whatis.techtarget.com/definition/0,,sid9_gci213686,00.html&quot;&gt;vacuum tube&lt;/a&gt;, accelerated with the invention of the &lt;a href=&quot;http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci213216,00.html&quot;&gt;transistor&lt;/a&gt;,  which then became embedded in large numbers in integrated circuits,  ultimately making possible the relatively low-cost personal computer. &lt;/p&gt;&lt;p&gt; Modern computers inherently follow the ideas of the stored program laid out by &lt;a href=&quot;http://whatis.techtarget.com/definition/0,,sid9_gci214025,00.html&quot;&gt;John von Neumann&lt;/a&gt;  in 1945.  Essentially, the program is read by the computer one  instruction at a time, an operation is performed, and the computer then  reads in the next instruction, and so on.  Recently, computers and  programs have been devised that allow multiple programs  (and computers)  to work on the same problem at the same time in parallel.  With the  advent of the Internet and higher &lt;a href=&quot;http://searchenterprisewan.techtarget.com/sDefinition/0,,sid200_gci211634,00.html&quot;&gt;bandwidth&lt;/a&gt;  data transmission, programs and data that are part of the same overall  project can be distributed over a network and embody the Sun  Microsystems slogan: &quot;The network is the computer.&quot; &lt;/p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt; -</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/4547646364852948354/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/07/computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/4547646364852948354'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/4547646364852948354'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/07/computer.html' title='Computer'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-4038657314044699567</id><published>2011-02-19T21:04:00.000-08:00</published><updated>2011-08-22T23:12:12.821-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Hardware"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Tips Merawat Notebook/Netbook</title><content type='html'>Baterai&lt;br /&gt;&lt;br /&gt;1. jangan meletakkan baterai di tempat panas (dashboard mobil, dekat sumber panas, terkena panas matahari langsung )&lt;br /&gt;&lt;br /&gt;2. charge baterai sesuai dengan buku manual product.&lt;br /&gt;&lt;br /&gt;3. Jangan membiarkan baterai terpasang dinotebook lebih dari 1 bulan tanpa menghubungkan dengan adaptor AC&lt;span class=&quot;fullpost&quot;&gt;4. apabila anda dalam waktu lama tdk pakai notebook, lepaslah baterai simpan ditempat yang aman dan kering.&lt;br /&gt;&lt;br /&gt;5. jangan sering mencharge batere jika indikator batere dlm keadaan sudah penuh.&lt;br /&gt;&lt;br /&gt;6. Apabila anda igin bekerja untuk waktu cukup lama, lepaskanlah baterai dari notebook dan bekerjalah henya dengan menggunakan adaptor saja. ( dengan syarat listrik cukup aman, tidak sering mati mendadak dan cukup stabil )&lt;br /&gt;&lt;br /&gt;7. Pastikan notebook dalam keadaan mati pada saat mengganti baterai.&lt;br /&gt;&lt;br /&gt;Harddisk&lt;br /&gt;&lt;br /&gt;1. biasakan untuk selalu membackup file data yang ada di harddisk.&lt;br /&gt;2. Instal program anti virus.&lt;br /&gt;3. Jangan memindahkan notebook selama HD sedang bekerja.&lt;br /&gt;4. jangan mengguncang hardisk.&lt;br /&gt;&lt;br /&gt;LCD Notebook&lt;br /&gt;&lt;br /&gt;1. setelah memakai notebook, biarkan notebook terbuka sekitar 5 menit, baru menutupnya.&lt;br /&gt;2. Sebaiknya gunakan screen saver.&lt;br /&gt;&lt;br /&gt;Tips Membersihkan Notebook&lt;br /&gt;&lt;br /&gt;1. Untuk membersihkan notebook, pakai kain lembut / kain kaca mata dengan dibasahi sedikit dengan cairan khusus pembersih LCD.&lt;br /&gt;&lt;br /&gt;2. Jangan menggunakan alkohol, atau bahan kimia lainnya.&lt;br /&gt;&lt;br /&gt;3. Jangan menyemprotkan cairan langsung ke layar LCD,cukup hanya di kain pembersihnya saja.&lt;br /&gt;&lt;br /&gt;4. Bersihkan layar dengan penuh hati hati, jangan terlalu ditekan.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/4038657314044699567/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/02/tips-merawat-notebooknetbook.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/4038657314044699567'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/4038657314044699567'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/02/tips-merawat-notebooknetbook.html' title='Tips Merawat Notebook/Netbook'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-6888474328503063232</id><published>2011-02-11T08:47:00.000-08:00</published><updated>2011-08-22T23:03:49.791-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><title type='text'>Bridging Access Point to Access Point</title><content type='html'>Hotspot saat ini bukan lagi merupakan hal yang istimewa dan menherankan bagi para penggemar dunia maya. Cafe, warung internet bahkan rumahan pun saat ini telah menyediakan fasilitas tersebut sebagai salah satu sarana untuk memperlaris atau memudahkan untuk akses internet.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Bridge berasal dari bahasa Inggris, dan sesuai dengan terjemahannya yang berarti jembatan. Metode bridge dalam aplikasi komputer adalah suatu metode yang menjembatani/ menghubungkan dua jaringan LAN kabel menjadi satu sehingga dapat saling berhubungan seperti dalam satu jaringan lan kabel.&lt;br /&gt;&lt;br /&gt;Contoh aplikasi sederhana dari metode bridge ini yaitu misalnya kita ingin menghubungkan jaringan LAN di kantor di Gedung A dengan jaringan LAN di gedung B dimana kondisi tidak memungkinkan untuk memasang kabel, maka solusinya hanya menggunakan jaringan radio atau wireless. Pemilihan menggunakan teknologi WIFI ini tidak selamanya mahal karena saat ini sudah banyak produk wireless murah namun berkualitas untuk rumahan atau kantor kecil. Apalagi jika metode ini ingin di terapkan pada lembaga-lembaga non profit seperti gedung-gedung sekolah atau kampus yang tidak mungkin harus mengeluarkan biaya yang sangat besar.&lt;br /&gt;&lt;br /&gt;Langkah-langkah sederhana untuk aplikasi yang harus di perhatikan, yaitu :&lt;br /&gt;1. Jarak antar gedung&lt;br /&gt;2. Kondisi sekitar antar gedung apakah terhalang oleh pepohonan atau gedung lain atau tidak.&lt;br /&gt;3. Kondisi alam apakah rawan bahaya petir atau tidak.&lt;br /&gt;&lt;br /&gt;Contoh kasus sederhana penerapan aplikasi sederhana point to point pada sebuah gedung sekolah atau kampus. Kondisinya:&lt;br /&gt;1. Gedung A berjarak sekitar 50 s/d 100 meter dengan Gedung B&lt;br /&gt;2. Antar gedung tersebut tidak terhalang oleh pepohonan atau gedung.&lt;br /&gt;3. Kondisi alam sekitar tidak rawan petir.&lt;br /&gt;&lt;br /&gt;Pihak sekolah ingin jaringan lan di Gedung A dapat terhubung dengan Gedung B sehingga aplikasi-aplikasi jaringan di dua LAN tersebut dapat di manfaatkan secara optimal bersama-sama.&lt;br /&gt;&lt;br /&gt;Maka di pasang dua buah perangkat Akses Point (AP), AP1 di tempatkan di Gedung A dan AP2 di tempatkan di Gedung B. Pemasangan dua AP yang akan di hubungkan tersebutkan di letakan di tempat pada tempat yang saling berhadapan dan di kondisikan tidak ada yang merintangi, misalnya kedua AP tersebut diletakan di langit-langit luar kedua gedung yang saling berhadapan dimana masing-masing AP tersebut terhubung dengan kabel UTP yang menghubungkan dengan masing-masing jaringan LAN.&lt;br /&gt;&lt;br /&gt;Garis besar konfigurasi yang harus dilakukan di masing-masing AP yang akan di perlakukan sebagai sarana jembatan koneksi dua LAN tersebut :&lt;br /&gt;1. Pilih konfigurasi mode WAP yaitu sebagai bridge atau point to point&lt;br /&gt;2. Masukan MAC address AP1 di AP2 pada kolom isian MAC AP pasangan, begitu pula sebaliknya MAC address AP2 di masukan ke AP1 kolom isian MAC AP pasang, masing-masing harus di isi MAC address pasangannya.&lt;br /&gt;3. Konfigurasi AP1 dan AP2 sama-sama menggunakan channel radio wireless yang sama, konfigurasi mode keamanan yang sama, seperti jika menggunakan mode keamanan menggunakan WPA PSK atau WPA2PSK masing-masing harus menggunakan konfigurasi dan keyword yang sama.&lt;br /&gt;4. Sesudah dipastikan semua konfigurasi ini sama , cek dan pastikan apakah LAN1 di Gedung A dapat terhubung dengan LAN2 di Gedung B, jika terhubung seharusnya kedua lan ini dapat saling berkomunikasi untuk saling berbagi resource seperti sharing folder, printer , koneksi internet, komputer di LAN1 dapat berhubungan dengan komputer di LAN2. (LAN1 dan LAN2 memiliki subnet mask yang sama meski beda segment)&lt;br /&gt;&lt;br /&gt;Jika kondisi antar Gedung terdapat beberapa penghalang seperti daun pepohonan atau jarak yang relative lumayan jauh yang mengurangi kemampuan daya jangkau sinyal AP, maka dapat di lakukan dengan menambahkan antenna high gain directional ke masing-masing AP menggantikan antenna omni bawaan yang kita pasang bahkan adakalanya cukup salah satu AP yang dipasang antenna tersebut (kemampuan antenna dapat dilihat dari DB antenna). Hal lain yang dapat memperkuat sinyal adalah dengan memasang sebuah repeater di tempat antara AP1 dan AP2, biasanya perlakuan ini dilakukan jika kondisi antar gedung penuh dengan penghalang atau inteferensi gangguan sinyal radio lain, maka kita tinggal memilih channel yang cocok untuk bridge kita.&lt;br /&gt;&lt;br /&gt;WAP yang umum dijual biasanya transmisi b dan G menggunakan sinyal 2,4 Mhz yang juga di gunakan alat-alat wireless lainnya, namun ada juga WAP yang menyediakan teknologi extended transmisi 2x to 3x eXtended Range dan 108M Super G, serta transmisi N. Juga teknologi transmisi a yang menggunakan sinyal 5 Mhz. Kita tinggal menyesuaikan dengan kondisi yang kita hadapi. Sepasang AP dalam koneksi point to point dapat juga juga dikonfigurasi sebagai Akses Point seperti pada WAP TP-Link TL-WA601G 108M, sehingga pengguna komputer wireless terkoneksi dengan jaringan meski AP tersebut digunakan untuk koneksi point to point, langkah penghematan sederhana. &lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/6888474328503063232/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/02/bridging-access-point-to-access-point.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/6888474328503063232'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/6888474328503063232'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/02/bridging-access-point-to-access-point.html' title='Bridging Access Point to Access Point'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-522322196668554050</id><published>2011-01-17T17:37:00.000-08:00</published><updated>2011-08-22T23:16:08.906-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Hardware"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Troubleshooting"/><title type='text'>Bunyi &quot;Tit&quot; dan kerusakan komputer</title><content type='html'>&lt;span class=&quot;fullpost&quot;&gt;Bunyi &quot;tit&quot; pada komputer dapat dijadikan referensi apakah kompuer anda sehat atau tidak. Sama hal nya dengan makan jika porsinya pas maka hidup anda akan sehat, tp kalo kurang atau lebih pasti akan menmbulkan sesuatu yg tidak tepat atau boleh dikatakan bermasalah.&lt;br /&gt;&lt;br /&gt;Pada komputer, bunyi tit&lt;br /&gt;(nnti lgi y tak sambung)&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/522322196668554050/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2011/01/bunyi-tit-dan-kerusakan-komputer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/522322196668554050'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/522322196668554050'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2011/01/bunyi-tit-dan-kerusakan-komputer.html' title='Bunyi &quot;Tit&quot; dan kerusakan komputer'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-2341022157064324763</id><published>2010-10-16T10:41:00.000-07:00</published><updated>2011-08-22T22:46:14.876-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Computer"/><title type='text'>Filter MAC Address Mikrotik</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Banyaknya user yang terkadang mengganti-ganti IP Address pada suatu jaringan yg telah ditetapkan alamat IP ny masing-masing. Untuk mengatasi hal ini ada salah satu solusi yang mungkin bisa meminimalisir hal ini, dimana dalam pembahasan kali mengunci MAC hanya dan untuk bisa digunakan oleh IP yang menjadi pasangannya.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;MAC filter sendiri metode yang digunakan untuk mengunci MAC address + IP address. Pada contoh kasus sekarang kita akan mengunci :&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;1. MAC :  00:1D:72:20:E8:1E  ke IP : 192.168.5.7&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;2. MAC :  00:1D:72:C6:AA:F7  ke IP : 192.168.5.8&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;3. MAC :  00:1F:D0:1E:AB:93  ke IP : 192.168.5.9&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Pada contoh kasus di atas digunakan 3 PC dimana masing2 IP telah ditetapkan sesuai MAC nya.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Caranya :&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;1. Buka WINBOX&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;2. Masuk ke bagian IP terus klik ARP&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;3. Step no. 2 digunakan untuk membantu mencari target MAC dan alamat IP-nya ,anda tinggal masuk ke new terminal di winbox anda , kemudian ketik script berikut&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;/ip firewall filter&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Setelah itu ...&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Untuk mengunci MAC : 00:1D:72:20:E8:1E  ke IP : 192.168.5.7&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;add chain=forward src-address=192.168.5.7 src-mac-address=!00:1D:72:20:E8:1E action=drop comment=”kunci 192.168.5.7 ke 00:1D:72:20:E8:1E”&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;add chain=forward src-address=!192.168.5.7 src-mac-address=00:1D:72:20:E8:1E action=drop comment=”kunci 192.168.5.7 ke 00:1D:72:20:E8:1E”&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Untuk mengunci MAC : 00:1D:72:C6:AA:F7  ke IP : 192.168.5.8&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;add chain=forward src-address=192.168.5.8 src-mac-address=!00:1D:72:C6:AA:F7 action=drop comment=”kunci 192.168.5.8 ke 00:1D:72:20:E8:1E”&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;add chain=forward src-address=!192.168.5.8 src-mac-address=00:1D:72:C6:AA:F7 action=drop comment=”kunci 192.168.5.8 ke 00:1D:72:C6:AA:F7?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Kemudian yang terakhir&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Untuk mengunci MAC : 00:1F :  D0 : 1E:AB:93 ke IP : 192.168.5.9&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;add chain=forward src-address=192.168.5.9 src-mac-address=!00:1F:D0:1E:AB:93 action=drop comment=”kunci 192.168.5.9 ke 00:1F:D0:1E:AB:93?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;add chain=forward src-address=!192.168.5.9 src-mac-address=00:1F:D0:1E:AB:93 action=drop comment=”kunci 192.168.5.9 ke 00:1F:D0:1E:AB:93?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Setelah langkah-langkah diatas selesai, maka pemilik IP dan MAC yang bersangkutan tidak akan bisa ganti-ganti IP, bahkan menggunakan MAC Clone ato mac address changer sekalipun, karena MAC dan IP-nya terkunci.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/2341022157064324763/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2010/10/filter-mac-address-mikrotik.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/2341022157064324763'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/2341022157064324763'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2010/10/filter-mac-address-mikrotik.html' title='Filter MAC Address Mikrotik'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-2583093009233180162</id><published>2009-06-01T15:44:00.000-07:00</published><updated>2011-08-22T23:17:33.059-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><title type='text'>Apa itu Cisco router?</title><content type='html'>&lt;p align=&quot;justify&quot;&gt;Cisco router adalah peralatan utama yang banyak digunakan pada Jaringan Area Luas atau Wide Area Network (WAN). Dengan cisco router, informasi dapat diteruskan ke alamat-alamat yang berjauhan dan berada di jaringan computer yang berlainan. Untuk dapat meneruskan paket data dari suatu LAN ke LAN lainnya, Cisco router menggunakan tabel dan protocol routing yang berfungsi untuk mengatur lalu lintas data. Paket data yang tiba di router diperiksa dan diteruskan ke alamat yang dituju. Agar paket data yang diterima dapat sampai ke tujuannya dengan cepat, router harus memproses data tersebut dengan sangat tepat.&lt;br /&gt;Untuk itu, Cisco Router menggunakan Central Processing Unit (CPU) seperti yang&lt;span class=&quot;fullpost&quot;&gt;digunakan di dalam komputer untuk memproses lalu lintas data tersebut dengan cepat. Seperti komputer, cisco router juga mempunyai sejumlah jenis memori yaitu ROM, RAM, NVRAM dan FLASH, yang berguna untuk membantu kerjanya CPU. Selain itu dilengkapi pula dengan sejumlah interface untuk berhubungan dengan dunia luar dan keluar masuk data. Sistem operasi yang digunakan oleh cisco router adalah Internetwork Operating System (IOS). Memori yang digunakan oleh cisco router masing-masing mempunyai kegunaan sendiri-sendiri sebagai berikut :&lt;br /&gt;• ROM berguna untuk menyimpan sistem bootstrap yang berfungsi untuk mengatur proses boot dan menjalankan Power On Self Test (POST) dan IOS image.&lt;br /&gt;• RAM berguna untuk menyimpan running configuration dan dan sistem operasi IOS yang aktif.&lt;br /&gt;• NVRAM berguna untuk menyimpan konfigurasi awal (start-up configuration)&lt;br /&gt;• FLASH berguna untuk menyimpan IOS image. Dengan menggunakan FLASH, IOS versi baru dapat diperoleh dari TFTP server tanpa harus mengganti komponen dalam router.&lt;br /&gt;&lt;br&gt;&lt;br /&gt;&lt;b&gt;Macam-macam Cisco router&lt;/b&gt;&lt;br /&gt;Perusahaan cisco membuat router dengan berbagai seri dan model untuk berbagai kelas&lt;br /&gt;atau tingkat penggunaan, seperti :&lt;br /&gt;1. CISCO ROUTER TIPE FIXED TINGKAT AKSES&lt;br /&gt;• Cisco router 700 series&lt;br /&gt;• Cisco router 801-804&lt;br /&gt;• Cisco router 805&lt;br /&gt;• Cisco router 811 dan 813&lt;br /&gt;• Cisco router 827&lt;br /&gt;• Cisco router 1000 series&lt;br /&gt;• Cisco router 2000 series&lt;br /&gt;• Cisco router 2500 series&lt;br /&gt;• Cisco router 3000 series&lt;br /&gt;2. CISCO ROUTER TIPE MODULAR TINGKAT AKSES&lt;br /&gt;• Cisco router 1600 series&lt;br /&gt;• Cisco router 1720 dan 1750&lt;br /&gt;• Cisco router 2500 series&lt;br /&gt;• Cisco router 2600 series&lt;br /&gt;• Cisco router 3600 series&lt;br /&gt;• Cisco router 4000 series&lt;br /&gt;3. CISCO ROUTER TIPE MODULAR TINGKAT INTI&lt;br /&gt;• Cisco router 7000 series, untuk enterprise&lt;br /&gt;• Cisco router 10000 dan 12000 series, untuk enterprise&lt;br /&gt;Umumnya perusahaan cisco memberikan nomor model dengan angka kecil seperti cisco router model 700 untuk jaringan WAN sederhana untuk dipakai oleh perusahaan kecil. Sedangkan nomor dengan angka yang besar seperti cisco router model 12000 digunakan&lt;br /&gt;untuk jaringan WAN kompleks yang dipakai oleh perusahaan besar. Cisco router tipe fixed mempunyai interface tetap yang tidak dapat diganti-ganti sesuai dengan kebutuhan pemakai. Umumnya cisco router jenis modular harganya jauh lebih mahal, tetapi lebih fleksibel dalam penggunaanya. Cisco router 2500 series tersedia dalam&lt;br /&gt;bentuk tipe fixed maupun modular.&lt;br /&gt;Setiap router biasanya mempunyai dua Synchronous Serial port DB-60 (Serial0 dan Serial1) untuk hubungan WAN, satu ethernet port DB-15 (AUI) untuk hubungan LAN, satu Console port RJ-45 untuk akses langsung ke sistem router dan satu Auxiliary Port RJ-45 (AUX) untuk akses ke sistem router dengan modem.&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/2583093009233180162/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2009/06/apa-itu-cisco-router.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/2583093009233180162'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/2583093009233180162'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2009/06/apa-itu-cisco-router.html' title='Apa itu Cisco router?'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-7032786308153838327</id><published>2009-05-09T03:52:00.000-07:00</published><updated>2011-08-22T23:18:21.704-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>ETOS KERJA</title><content type='html'>“ BEBERAPA PENGERTIAN ETOS KERJA ”&lt;br /&gt;1. Keyakinan yang berfungsi sebagai panduan tingkah laku bagi seseorang,&lt;br /&gt;sekelompok orang atau sebuah institusi.&lt;br /&gt;2. Etos Kerja merupakan perilaku khas suatu komunitas atau organisasi,&lt;br /&gt;mencangkup motivasi yang menggerakkan, karakteristik utama, spirit dasar,&lt;br /&gt;pikiran dasar, kode etik, kode moral, kode perilaku,sikap-sikap,&lt;span class=&quot;fullpost&quot;&gt;aspirasiaspirasi,&lt;br /&gt;keyakinan-keyakinan, prinsip-prinsip, standar-standar.&lt;br /&gt;3. Sehimpunan perilaku positif yang lahir sebagai buah keyakinan fundamental&lt;br /&gt;dan komitmen total pada sehimpunan paradigma kerja yang integral.&lt;br /&gt;“ DELAPAN ETOS KERJA MENURUT JANSEN H SINAMO ”&lt;br /&gt;1. Kerja adalah Rahmat&lt;br /&gt;bekerja tulus penuh syukur.&lt;br /&gt;2. Kerja adalah Amanah&lt;br /&gt;bekerja benar penuh tanggung jawab&lt;br /&gt;3. Kerja adalah Panggilan&lt;br /&gt;bekerja tuntas penuh integritas.&lt;br /&gt;4. Kerja adalah Aktualisasi&lt;br /&gt;bekerja keras penuh semangat.&lt;br /&gt;5. Kerja adalah Ibadah&lt;br /&gt;bekerja serius penuh kecintaan.&lt;br /&gt;6. Kerja adalah Seni&lt;br /&gt;bekerja cerdas penuh kreativitas.&lt;br /&gt;7. Kerja adalah Kehormatan&lt;br /&gt;bekerja tekun penuh keunggulan.&lt;br /&gt;8. Kerja adalah Pelayanan&lt;br /&gt;bekerja paripurna penuh kerendahan hati.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/7032786308153838327/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2009/05/nhigboi.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7032786308153838327'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7032786308153838327'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2009/05/nhigboi.html' title='ETOS KERJA'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-5462514025058958835</id><published>2009-03-02T22:19:00.000-08:00</published><updated>2011-08-22T23:18:42.558-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><title type='text'>Data Mining Menggali Informasi yang Terpendam</title><content type='html'>&lt;p align=&quot;justify&quot;&gt;Data Mining memang salah satu cabang ilmu komputer yang relatif baru. Dan sampai sekarang orang masih memperdebatkan untuk menempatkan data mining di bidang ilmu mana, karena data mining menyangkut database, kecerdasan buatan (artificial intelligence), statistik, dsb. Ada pihak yang berpendapat bahwa data mining tidak lebih dari machine learning atau analisa statistik yang berjalan di atas database. Namun pihak lain berpendapat bahwa&lt;span class=&quot;fullpost&quot;&gt;database berperanan penting di data mining karena data mining mengakses data yang ukurannya besar (bisa sampai terabyte) dan disini terlihat peran penting database terutama dalam optimisasi query-nya.&lt;br /&gt;Lalu apakah data mining itu? Apakah memang berhubungan erat dengan dunia pertambangan…. tambang emas, tambang timah, dsb. Definisi sederhana dari data mining adalah ekstraksi informasi atau pola yang penting atau menarik dari data yang ada di database yang besar. Dalam jurnal ilmiah, data mining juga dikenal dengan nama Knowledge Discovery in Databases (KDD).&lt;br /&gt;Kehadiran data mining dilatar belakangi dengan problema data explosion yang dialami akhir-akhir ini dimana banyak organisasi telah mengumpulkan data sekian tahun lamanya (data pembelian, data penjualan, data nasabah, data transaksi dsb.). Hampir semua data tersebut dimasukkan denganmenggunakan aplikasi komputer yang digunakan untuk menangani transaksi sehari-hari yang kebanyakan adalah OLTP (On Line Transaction Processing). Bayangkan berapa transaksi yang dimasukkan oleh hypermarket semacam Carrefour atau transaksi kartu kredit dari sebuah bank dalam seharinya dan bayangkan betapa besarnya ukuran data mereka jika nanti telah berjalan beberapa tahun. Pertanyaannya sekarang, apakah data tersebut akan dibiarkan menggunung, tidak berguna lalu dibuang, ataukah kita dapat me-‘nambang’-nya untuk mencari ‘emas’, ‘berlian’ yaitu informasi yang berguna untuk organisasi kita. Banyak diantara kita yang kebanjiran data tapi miskin informasi.&lt;br /&gt;Jika Anda mempunyai kartu kredit, sudah pasti Anda bakal sering menerima surat berisi brosur penawaran barang atau jasa. Jika Bank pemberi kartu kredit Anda mempunyai 1.000.000 nasabah, dan mengirimkan sebuah (hanya satu) penawaran dengan biaya pengiriman sebesar Rp. 1.000 per buah maka biaya yang dihabiskan adalah Rp. 1 Milyar!! Jika Bank tersebut mengirimkan penawaran sekali sebulan yang berarti 12x dalam setahun maka anggaran yang dikeluarkan per tahunnya adalah Rp. 12 Milyar!! Dari dana Rp. 12 Milyar yang dikeluarkan, berapa persenkah konsumen yang benar-benar membeli? Mungkin hanya 10 %-nya saja. Secara harfiah, berarti 90% dari dana tersebut terbuang sia-sia.&lt;br /&gt;Persoalan di atas merupakan salah satu persoalan yang dapat diatasi oleh data mining dari sekian banyak potensi permasalahan yang ada. Data mining dapat menambang data transaksi belanja kartu kredit untuk melihat manakah pembeli-pembeli yang memang potensial untuk membeli produk tertentu. Mungkin tidak sampai presisi 10%, tapi bayangkan jika kita dapat menyaring 20% saja, tentunya 80% dana dapat digunakan untuk hal lainnya.&lt;br /&gt;Lalu apa beda data mining dengan data warehouse dan OLAP (On-line Analytical Processing)? Secara singkat bisa dijawab bahwa teknologi yang ada di data warehouse dan OLAP dimanfaatkan penuh untuk melakukan data mining.teknologi data warehouse digunakan untuk melakukan OLAP, sedangkan data mining digunakan untuk melakukan information discovery yang informasinya lebih ditujukan untuk seorang Data Analyst dan Business Analyst (dengan ditambah visualisasi tentunya). Dalam prakteknya, data mining juga mengambil data dari data warehouse. Hanya saja aplikasi dari data mining lebih khusus dan lebih spesifik dibandingkan OLAP mengingat database bukan satu-satunya bidang ilmu yang mempengaruhi data mining, banyak lagi bidang ilmu yang turut memperkaya data mining seperti: information science (ilmu informasi), high performance computing, visualisasi, machine learning, statistik, neural networks (jaringan syaraf tiruan), pemodelan matematika, information retrieval dan information extraction serta pengenalan pola. Bahkan pengolahan citra (image processing) juga digunakan dalam rangka melakukan data mining terhadap data image/spatial.&lt;br /&gt;Dengan memadukan teknologi OLAP dengan data mining diharapkan pengguna dapat melakukan hal-hal yang biasa dilakukan di OLAP seperti drilling/rolling untuk melihat data lebih dalam atau lebih umum, pivoting, slicing dan dicing. Semua hal tersebut diharapkan nantinya dapat dilakukan secara interaktif dan dilengkapi dengan visualisasi.&lt;br /&gt;Data mining tidak hanya melakukan mining terhadap data transaksi saja. Penelitian di bidang data mining saat ini sudah merambah ke sistem database lanjut seperti object oriented database, image/spatial database, time-series data/temporal database, teks (dikenal dengan nama text mining), web (dikenal dengan nama web mining) dan multimedia database.&lt;br /&gt;Meskipun gaungnya mungkin tidak seramai seperti ketika Client/Server Database muncul, tetapi industri-industri seperti IBM, Microsoft, SAS, SGI, dan SPSS terus gencar melakukan penelitian-penelitian di bidang data mining dan telah menghasilkan berbagai software untuk melakukan data mining:&lt;br /&gt;Intelligent Miner dari IBM. Berjalan di atas sistem operasi AIX, OS/390, OS/400, Solaris dan Windows NT. Dijual dengan harga sekitar US$60.000. Selain untuk data IBM juga mengeluarkan produk Intelligent Miner untuk teks. Web site:&lt;br /&gt;www.software.ibm.com/data/iminer/fortext&lt;br /&gt;www-4.inm.com/software/data/iminer/fordata/index.html •&lt;br /&gt;Microsoft juga telah menambahkan fasilitas data mining di Microsoft SQL Server 2000. Web site: www.microsoft.com/sql/productinfo/feaover.htm •&lt;br /&gt;Enterprise Miner dari SAS. Berjalan di atas sistem operasi AIX/6000, CMS, Compaq Tru64 UNIX, HP-UX, IRIX, Intel ABI, MVS, OS/2, Open VMS Alpha, Open VMS Vax, Solaris, dan Windows. Web site: www.sas.com •&lt;br /&gt;MineSet dari Silicon Graphics. Berjalan di atas sistem operasi Windows 9x/NT dan IRIX. Dijual per seat seharga US$995, server (Windows NT) seharga US$35.000 dan untuk IRIX dijual US$50.000. Web site: www.sgi.com/software/mineset •&lt;br /&gt;Clementine dari SPSS. Berjalan di atas sistem operasi UNIX dan Windows NT. Web site: www.spss.com/software/clementine&lt;br /&gt;Beberapa penelitian sekarang ini sedang dilakukan untuk memajukan data mining diantaranya adalah peningkatan kinerja jika berurusan dengan data berukuran terabyte, visualisasi yang lebih menarik untuk user, pengembangan bahasa query untuk data mining yang sedapat mungkin mirip dengan SQL. Tujuannya tidak lain adalah agar end-user dapat melakukan data mining dengan mudah dan cepat serta mendapatkan hasil yang akurat.&lt;br /&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;Sumber: Yudho Giri Sucahyo, sucahyoy@cs.curtin.edu.au, &lt;a href=&quot;http://www.ilmukomputer.com/&quot;&gt;http://www.ilmukomputer.com/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/5462514025058958835/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2009/03/d-ata-mining-menggali-informasi-yang.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/5462514025058958835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/5462514025058958835'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2009/03/d-ata-mining-menggali-informasi-yang.html' title='Data Mining Menggali Informasi yang Terpendam'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-8998436955133106800</id><published>2009-01-24T02:26:00.000-08:00</published><updated>2011-08-22T23:19:22.985-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Development"/><title type='text'>CakePHP</title><content type='html'>&lt;p align=&quot;justify&quot;&gt;CakePHP adalah salah satu framework yang digunakan untuk membuat atau membangun wesbsite berbasis PHP. CakePHP dengan berbagai keunggulannya &lt;span class=&quot;fullpost&quot;&gt;sangat membantu bagi para pengembang website dalam menyalurkan inspirasi web mereka.&lt;br /&gt;CakePHP Tehe Rapid Development PHP Framework merupakan Wen Framework MVC di dunia PHP yang diinspirasi oleh popularitas RubyonRails. Mencoba menyajikan Rails like Framework di PHP, CakePHP di design mengikuti arsitektur RoR meskipun  pastinya terdapat perbedaan.&lt;br /&gt;Kenapa CakePHP menjadi pilihan? Jawabannya adalah ergantung anda sebagai user. CakePHP di design untuk menyelesaikan masalah set solusi yang telah dirangkai dalam paket framework secara tepat dan lengkap.&lt;br /&gt;Itulah sekilas tentang CakePHP, untuk lebih lengkapnya lagi telusuri situs http://www.cakephp.org/ .&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/8998436955133106800/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2009/01/cakephp.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/8998436955133106800'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/8998436955133106800'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2009/01/cakephp.html' title='CakePHP'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-7148965165479603392</id><published>2008-12-31T01:51:00.000-08:00</published><updated>2011-08-22T23:03:49.793-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><title type='text'>Wide Area Network (WAN) dan Router</title><content type='html'>&lt;p align=&quot;justify&quot;&gt;&lt;br /&gt;&lt;i&gt;Kontribusi Dari Wasi Tri Prasetya&lt;br /&gt;Wednesday, 10 September 2008&lt;br /&gt;Pemutakhiran Terakhir Wednesday, 10 September 2008&lt;/i&gt;&lt;br /&gt;&lt;br&gt;&lt;br /&gt;Alamat komputer tidak punya network ID yang sama karena berada pada subnet yang berbeda, sehingga untuk mengirimkan paket data tidak bisa menggunakan koneksi hub atau switch. Router dibutuhkan untuk meneruskan paket dari sub-net ke sub-net yang berbeda.&lt;br&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;Karakteristik utama WAN&lt;br&gt;&lt;br /&gt;- Menghubungkan peralatan pada tempat yang berjauhan (area luas)&lt;br /&gt;- Menggunakan layanan dengan menyewa, seperti: RBOCs (Perusahan opeasi regional Bell – Regional Bell Operating Company’s), Sprint, MCI, and VPM Internet Services Inc., untuk membangun koneksi antar situs&lt;br /&gt;- Menggunakan koneksi serial dari berbagai jenis untuk mengakses pita lebar dalam lokasi yang berjauhan (luas).&lt;br /&gt;- Bekerja pada layer fisik dan layer datalink dari OSI model&lt;br /&gt;- Melakukan pertukaran paket data dan frames antara ruter dan switch dan LAN yang telah dibangun.&lt;br&gt;&lt;br /&gt;Komponen yang digunakan WAN&lt;br&gt;&lt;br /&gt;- Router dengan beberapa layanan, termasuk interkoneksi dan port-port perantara WAN. &lt;br /&gt;- Modem termasuk perantara layanan voice-grade, unit layanan canel/unit layanan digital (CSU/DSUs), dengan layanan terminal 1/Ethernet 1 (T1/E1), Adapter terminal/terminasi jaringan 1 (TA/NT1s) dengan perantara layanan jaringan digital&lt;br /&gt;terintegrasi (ISDN). &lt;br /&gt;- Server komunikasi pusat dengan dial in and dial out komunikasi antar user&lt;br&gt;&lt;br /&gt;ROUTER&lt;br&gt;&lt;br /&gt;Router adalah jenis khusus dari komputer, yang secara dasar mempunyai komponen yang sama seperti: CPU, memory(ROM, RAM, NVRAM, FLASH), system bus, dan berbagai perantara input/output. Namun router didesain untuk fungsi khusus yang tidak ada di dalam PC, seperti ruter dapat menghubungkan dan menentukan jalur terbaik untuk pengiriman data dalam jaringan.&lt;br&gt;&lt;br /&gt;Seperti juga PC, Router memerlukan sistem operasi untuk menjalankan program aplikasi, router menggunakan Internetwork Operating System (IOS) untuk menjalankan file konfigurasi. File ini berisi instruksi dan parameter yang mengontrol alur lalu lintas data melalui router.&lt;br&gt;&lt;br /&gt;Router menggunakan table dan protokol routing untuk meneruskan paket. File konfigurasi menetapkan seluruh informasi untuk kepastian setup dan menggunakan routing dan routed protocols yang tersedia.&lt;br&gt; &lt;br /&gt;Komponen internal yang utama dari ruter adalah RAM, NVRAM, FLASH MEMORY, ROM dan INTERFACE.&lt;br&gt; &lt;br /&gt;RAM.&lt;br&gt;&lt;br /&gt;- Menyimpan konfigurasi yang sedang berjalan dan sistem ios yang aktif.&lt;br /&gt;- Menyimpan ARP cache (Address Resolution Protocol)&lt;br /&gt;- Menyimpan fast-switching cache &lt;br /&gt;- Menyimpan buffer paket &lt;br /&gt;- Memelihara antrian paket &lt;br /&gt;- Menyimpan memori sementara untuk file konfigurasi ruter selama ruter hidup &lt;br /&gt;- Akan terhapus bila ruter di matikan atau re-start&lt;br&gt;&lt;br /&gt;NVRAM&lt;br&gt;&lt;br /&gt;- Menyimpan file konfigurasi start-up (awal)&lt;br /&gt;- Menyimpan file walau ruter dimatikan atau di re-start.&lt;br&gt;&lt;br /&gt;FLASH MEMORY&lt;br&gt;&lt;br /&gt;- Menyimpan IOS image &lt;br /&gt;- Memungkinkan update software tanpa menghapus dan mengganti chips pada prosesor. &lt;br /&gt;- Menyimpan file walau router dimatikan atau di re-start &lt;br /&gt;- Menyimpan lebih dari satu versi software IOS &lt;br /&gt;- Merupakan alat elektrik yang ROM yang bisa dihapus dan diprogram kembali (EEPROM) &lt;br&gt;&lt;br /&gt;ROM&lt;br&gt;&lt;br /&gt;- Melakukan diagnosa untuk power-on self test (POST) &lt;br /&gt;- Menyimpan program boot dan software sistem operasi dasar &lt;br /&gt;- Untuk upgrade software diperlukan mengganti chips pada motherboard&lt;br&gt;&lt;br /&gt;INTERFACE&lt;br&gt;&lt;br /&gt;- Menghubungkan router ke jaringan untuk meneruskan paket.&lt;br /&gt;- Dapat terpasang pada motherboard ataupun modul terpisah.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/7148965165479603392/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2008/12/wide-area-network-wan-dan-router.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7148965165479603392'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/7148965165479603392'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2008/12/wide-area-network-wan-dan-router.html' title='Wide Area Network (WAN) dan Router'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-3354946156223972983</id><published>2008-12-25T17:59:00.000-08:00</published><updated>2011-08-22T22:45:27.280-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><title type='text'>Keamanan Sistem Internet</title><content type='html'>&lt;p align=&quot;justify&quot;&gt;&lt;br /&gt;Untuk melihat keamanan sistem Internet perlu diketahui cara kerja sistem Internet. Antara lain, yang perlu diperhatikan adalah hubungan antara komputer di Internet, dan protokol yang digunakan. Internet merupakan jalan raya yang dapat digunakan oleh semua orang (public). Untuk mencapai server tujuan,&lt;span class=&quot;fullpost&quot;&gt; paket informasi harus melalui beberapa sistem (router, gateway, hosts, atau perangkat-perangkat komunikasi lainnya) yang kemungkinan besar berada di luar kontrol dari kita. Setiap titik yang dilalui memiliki potensi untuk dibobol, disadap, dipalsukan [22].&lt;br /&gt;Kelemahan sebuat sistem terletak kepada komponen yang paling lemah. Asal usul Internet kurang memperhatikan masalah keamanan. Ini mungkin dikarenakan unsur kental dari perguruan tinggi dan lembaga penelitian yang membangun Internet. Sebagai contoh, IP versi 4 yang digunakan di Internet banyak memiliki kelemahan. Hal ini dicoba diperbaiki dengan IP Secure dan IP versi 6.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/3354946156223972983/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2008/12/keamanan-sistem-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/3354946156223972983'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/3354946156223972983'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2008/12/keamanan-sistem-internet.html' title='Keamanan Sistem Internet'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-161665624618812374</id><published>2008-12-23T08:13:00.000-08:00</published><updated>2011-08-22T22:43:26.247-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Computer"/><title type='text'>Cryptography</title><content type='html'>&lt;p align=&quot;justify&quot;&gt;Cryptography comes from the Greek words for &quot;secret writing&quot;. It has a long and colorful history going back thousands of years. In this section we will just sketch some of the highlights, as background information for what follows. For a complete history of cryptography, Kahn&#39;s (1995) book is recommended reading. For a comprehensive treatment of the current state-of-the-art in security and cryptographic algorithms, protocols, and applications, see (Kaufman et al., 2002). For a more mathematical approach, see &lt;span class=&quot;fullpost&quot;&gt;(Stinson, 2002). For a less mathematical approach, see (Burnett and Paine, 2001).&lt;br /&gt;Professionals make a distinction between ciphers and codes. A cipher is a character-for-character or bit-for-bit transformation, without regard to the linguistic structure of the message. In contrast, a code replaces one word with another word or symbol. Codes are not used any more, although they have a glorious history. The most successful code ever devised was used by the U.S. armed forces during World War II in the Pacific. They simply had Navajo Indians talking to each other using specific Navajo words for military terms, for example chay-dagahi-nailtsaidi (literally: tortoise killer) for antitank weapon. The Navajo language is highly tonal, exceedingly complex, and has no written form. And not a single person in Japan knew anything about it.&lt;br /&gt;In September 1945, the San Diego Union described the code by saying &quot;For three years, wherever the Marines landed, the Japanese got an earful of strange gurgling noises interspersed with other sounds resembling the call of a Tibetan monk and the sound of a hot water bottle being emptied.&quot; The Japanese never broke the code and many Navajo code talkers were awarded high military honors for extraordinary service and bravery. The fact that the U.S. broke the Japanese code but the Japanese never broke the Navajo code played a crucial role in the American victories in the Pacific.&lt;br /&gt;&lt;br /&gt;corps, diarists, and lovers. Of these, the military has had the most important role and has shaped the field over the centuries. Within military organizations, the messages to be encrypted have traditionally been given to poorly-paid, low-level code clerks for encryption and transmission. The sheer volume of messages prevented this work from being done by a few elite specialists.&lt;br /&gt;Until the advent of computers, one of the main constraints on cryptography had been the ability of the code clerk to perform the necessary transformations, often on a battlefield with little equipment. An additional constraint has been the difficulty in switching over quickly from one cryptographic method to another one, since this entails retraining a large number of people. However, the danger of a code clerk being captured by the enemy has made it essential to be able to change the cryptographic method instantly if need be.&lt;br /&gt;&lt;br /&gt;The messages to be encrypted, known as the plaintext, are transformed by a function that is parameterized by a key. The output of the encryption process, known as the ciphertext, is then transmitted, often by messenger or radio. We assume that the enemy, or intruder, hears and accurately copies down the complete ciphertext.&lt;br /&gt;However, unlike the intended recipient, he does not know what the decryption key is and so cannot decrypt the ciphertext easily. Sometimes the intruder can not only listen to the communication channel (passive intruder) but can also record messages and play them back later, inject his own messages, or modify legitimate messages before they get to the receiver (active intruder). The art of breaking ciphers, called cryptanalysis, and the art devising them (cryptography) is collectively known as cryptology.&lt;br /&gt;It will often be useful to have a notation for relating plaintext, ciphertext, and keys. We will use C = EK(P) to mean that the encryption of the plaintext P using key K gives the ciphertext C. Similarly, P = DK(C) represents the decryption of C to get the plaintext again.&lt;br /&gt;&lt;br /&gt;This notation suggests that E and D are just mathematical functions, which they are. The only tricky part is that both are functions of two parameters, and we have written one of the parameters (the key) as a subscript, rather than as an argument, to distinguish it from the message.&lt;br /&gt;A fundamental rule of cryptography is that one must assume that the cryptanalyst knows the methods used for encryption and decryption. In other words, the cryptanalyst knows how the encryption method, E, and decryption, D,of Fig. 8-2 work in detail. The amount of effort necessary to invent, test, and install a new algorithm every time the old method is compromised (or thought to be compromised) has always made it impractical to keep the encryption algorithm secret. Thinking it is secret when it is not does more harm than good.&lt;br /&gt;This is where the key enters. The key consists of a (relatively) short string that selects one of many potential encryptions. In contrast to the general method, which may only be changed every few years, the key can be changed as often as required. Thus, our basic model is a stable and publicly-known general method parameterized&lt;br /&gt;by a secret and easily changed key. The idea that the cryptanalyst knows the algorithms and that the secrecy lies exclusively in the keys is called Kerckhoff&#39;s principle, named after the Flemish military cryptographer Auguste Kerckhoff who first stated it in 1883 (Kerckhoff, 1883). Thus, we have: Kerckhoff&#39;s principle: All algorithms must be public; only the keys are secret The nonsecrecy of the algorithm cannot be emphasized enough. Trying to keep the algorithm secret, known in the trade as security by obscurity, never works. Also, by publicizing the algorithm, the cryptographer gets free consulting from a large number of academic cryptologists eager to break the system so they can publish papers demonstrating how smart they are. If many experts have tried to break the algorithm for 5 years after itspublication and no one has succeeded, it is probably pretty solid.&lt;br /&gt;Since the real secrecy is in the key, its length is a major design issue. Consider a simple combination lock. The general principle is that you enter digits in sequence. Everyone knows this, but the key is secret. A key length of two digits means that there are 100 possibilities. A key length of three digits means 1000 possibilities, and a key length of six digits means a million. The longer the key, the higher the work factor the cryptanalyst has to deal with. The work factor for breaking the system by exhaustive search of the key space is exponential in the key length. Secrecy comes from having a strong (but public) algorithm and a long key. To prevent your kid brother from reading your e-mail, 64-bit keys will do. For routine commercial use, at least 128 bits should be used. To keep major governments at bay, keys of at least 256 bits, preferably more, are needed.&lt;br /&gt;From the cryptanalyst&#39;s point of view, the cryptanalysis problem has three principal variations. When he has a quantity of ciphertext and no plaintext, he is confronted with the ciphertext-only problem. The cryptograms that appear in the puzzle section of newspapers pose this kind of problem. When the cryptanalyst has some matched&lt;br /&gt;ciphertext and plaintext, the problem is called the known plaintext problem. Finally, when the cryptanalyst has the ability to encrypt pieces of plaintext of his own choosing, we have the chosen plaintext problem. Newspaper cryptograms could be broken trivially if the cryptanalyst were allowed to ask such questions as: What is the encryption of ABCDEFGHIJKL?&lt;br /&gt;Novices in the cryptography business often assume that if a cipher can withstand a ciphertext-only attack, it is secure. This assumption is very naive. In many cases the cryptanalyst can make a good guess at parts of the plaintext. For example, the first thing many computers say when you call them up is login: . Equipped with some&lt;br /&gt;matched plaintext-ciphertext pairs, the cryptanalyst&#39;s job becomes much easier. To achieve security, the cryptographer should be conservative and make sure that the system is unbreakable even if his opponent can encrypt arbitrary amounts of chosen plaintext.&lt;br /&gt;Encryption methods have historically been divided into two categories: substitution ciphers and transposition ciphers. We will now deal with each of these briefly as background information for modern cryptography.&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/161665624618812374/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2008/12/cryptography.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/161665624618812374'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/161665624618812374'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2008/12/cryptography.html' title='Cryptography'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-5970341567411591772</id><published>2008-12-21T20:32:00.000-08:00</published><updated>2011-08-22T22:46:14.877-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Computer"/><title type='text'>Intrussion Detection System</title><content type='html'>&lt;p align=&quot;justify&quot;&gt;Jaringan atau dalam bahasa inggrisnya network saat ini merupakan salah satu teknologi yang sanagt penting dalam perkembangan IT. Bill Gates dalam bukunya yang berjudul &quot;Speed of Throught&quot; membahas tentang dunia baru yang disebut dengan dunia web, yang menurutnya akan menjadi hal yang sangat penting dan menjadi saraf dalam perkembangan IT.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Jaringan memudahkan user untuk mampu berkomunikasi dalam jarak yang tak terbatas. Antara Indonesia dan Inggris dapat dicapai dengan hitungan detik tanpa kita harus naik pesawat dan berkunjung bertemu dengan Ratu Elisabeth untuk tahu seluk beluk negara Inggris.&lt;br /&gt;&lt;br /&gt;perkembangan terknologi ini merupakan akibat dari perkembangan teknolog jaringan yang sudahsnagat pesat saat ini. Mulai dari LAN, MAN, dan WAN yang merupakan spesifikasi jaringan berdasar jarak jangkauan area. Seiring dengan hal ini juga, tingkat keamanan sebuah jaringan menjadi hal yang sangat penting. Keamanan jaringan menjadi hal yang perlu sangat diperhatikan.&lt;br /&gt;&lt;br /&gt;Dalam jaringan ada banyak hal yang terkait baik itu dari segi hardware maupun software. pada kesempatan kali ini, saya akan sedikit berbagi tentang apa yang disebut IDS(Intrussion Detection System). IDS merupakan salah satu hal yang menjadi sangat penting mengingat apa yang disebut dengan firewall.&lt;br /&gt;&lt;br /&gt;Firewall merupakan pengaman system jaringan dengan prinsip menjaga dan mengamankan jaringan dari kejahatan maupun kejahilan diluar jaringan. Firewall mampu melakukan filtrasi terhadap hal yang tidak dizinkan memasuki jaringan dengan ketentuan-ketentuan tertentu. Hal ini tentunya sungguha akan sangat membantu para ADmin jaringan untuk memantau dan maintenance jaringan.&lt;br /&gt;&lt;br /&gt;Tetapi ternyata kejahatn terhadap jaringan bukan hnaya berasal dari luar jaringan saja, tapi juga ancaman dari dalam jaringan itu sendiri. Intrusion detection system (IDS) merupakan penghambat atas semua serangan yang akan menggangu sebuah jaringan. IDS memberi peringatan kepada administrator server saat terjadi sebuah aktivitas tertentu yang tidak diinginkan administrator sebagai penanggung jawab sebuah sistem. Selain memberikan peringatan, IDS juga mampu melacak jenis aktivitas yang merugikan sebuah sistem. Suatu IDS akan melakukan pengamatan (monitoring) terhadap paket-paket yang melewati jaringan dan berusaha menemukan apakah terdapat paket-paket yang berisi aktivitas yang mencurigakan sekaligus melakukan tindak lanjut pencegahan. Pada dasarnya terdapat dua macam IDS, yaitu Host – Based dan Network Based.&lt;br /&gt;&lt;br /&gt;IDS host-based bekerja pada host yang akan dilindungi. IDS jenis itu dapat melakukan berbagai macam tugas untuk mendeteksi serangan-serangan yang dilakukan pada host tersebut. keunggulan IDS host-based adalah pada tugas-tugas yanga berhubungan dengan kemanan file, misalnya ada tidaknya file yang telah diubah atau ada tidaknya usaha untuk dapat akses ke file-file yang sensitive.&lt;br /&gt;&lt;br /&gt;IDS network-based biasa berupa suatu mesin yang khusus dipergunakan untuk melakukan monitoring terhadap seluruh segmen dari jaringan.IDS network-based akan mengumpulkan paket-paket data yang terdapat pada jaringan dan kemudian menganalisisnya serta menentukan apakah paket-paket tersebut  berupa suatu paket yang normal atau suatu serangan atau berupa aktivitas yanga mencurigakan.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/5970341567411591772/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2008/12/intrussion-detection-system.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/5970341567411591772'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/5970341567411591772'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2008/12/intrussion-detection-system.html' title='Intrussion Detection System'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3272875449860424148.post-6033145512756399060</id><published>2008-12-18T18:57:00.000-08:00</published><updated>2011-08-22T22:45:27.281-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><title type='text'>Network Security part 2</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM-I6w7wvyupi3mViglYyR87h3YLAp8UU8zonZfSqFP6SvShtGUpKq_Y-yhg6YFxTrkOcSx-pmv4T7UsNaVW1YZz68hXbBvIvFTdE8KUaftj-eqzVn3LgY5ensdwjh9xXwp7m48AlDBIA/s1600-h/network+security,+know+it+all.PNG&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 87px; height: 106px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM-I6w7wvyupi3mViglYyR87h3YLAp8UU8zonZfSqFP6SvShtGUpKq_Y-yhg6YFxTrkOcSx-pmv4T7UsNaVW1YZz68hXbBvIvFTdE8KUaftj-eqzVn3LgY5ensdwjh9xXwp7m48AlDBIA/s200/network+security,+know+it+all.PNG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5281332493765051154&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;b&gt;Principles of Ciphers&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Encryption transforms a message in such a way that it becomes unintelligible to any party that does not have the secret of how to reverse the transformation. The sender applies an encryption function to the original plaintext message, resulting in a ciphertext message that is sent over the network. The receiver applies a secret decryption function—the inverse of the encryption function—to recover the original plaintext. The ciphertext transmitted across the network is unintelligible to any eavesdropper, assuming she doesn’t know the decryption function. The transformation represented by an encryption function and its corresponding decryption function is called a cipher.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;Cryptographers have been led to the principle, first stated in 1883, that encryption and decryption functions should be parameterized by a key, and furthermore that the functions should be considered public knowledge—only the key need be secret. Thus, the ciphertext produced for a given plaintext message depends on both the encryption function and the key. One reason for this principle is that if you depend on the cipher being kept secret, then you have to retire the cipher (not just the keys) when you believe it is no longer secret. This means potentially frequent changes of cipher, which is problematic since it takes a lot of work to develop a new cipher. Also, one of the best ways to know that a cipher is secure is to use it for a long time—if no one breaks it, it’s probably secure. (Fortunately, there are plenty of people who will try to break ciphers and who will let it be widely known when they have succeeded, so no news is generally good news.)&lt;br /&gt;Thus, there is considerable cost and risk in deploying a new cipher. Finally, parameterizing a cipher with keys provides us with what is in effect a very large family of ciphers; by switching keys we essentially switch ciphers, thereby limiting&lt;br /&gt;the amount of data that a cryptanalyst (code-breaker) can use to try to break our&lt;br /&gt;key/cipher, and the amount she can read if she succeeds.&lt;br /&gt;The basic requirement for an encryption algorithm is that it turns plaintext&lt;br /&gt;into ciphertext in such a way that only the intended recipient—the holder of the&lt;br /&gt;decryption key—can recover the plaintext. What this means is that encrypted&lt;br /&gt;messages cannot be read by people who do not hold the key.&lt;br /&gt;It is important to realize that when a potential attacker receives a piece of&lt;br /&gt;ciphertext, he may have more information at his disposal than just the ciphertext&lt;br /&gt;itself. For example, he may know that the plaintext was written in English, which&lt;br /&gt;means that the letter e occurs more often in the plaintext that any other letter; the&lt;br /&gt;frequency of many other letters and common letter combinations can also be predicted.&lt;br /&gt;This information can greatly simplify the task of fi nding the key. Similarly,&lt;br /&gt;he may know something about the likely contents of the message; for example,&lt;br /&gt;the word “ login ” is likely to occur at the start of a remote login session. This may enable a known plaintext attack, which has a much higher chance of success&lt;br /&gt;than a ciphertext only attack. Even better is a chosen plaintext attack, which may&lt;br /&gt;be enabled by feeding some information to the sender that you know the sender&lt;br /&gt;is likely to transmit—such things have happened in wartime, for example.&lt;br /&gt;The best cryptographic algorithms, therefore, can prevent the attacker from&lt;br /&gt;deducing the key even when the individual knows both the plaintext and the&lt;br /&gt;ciphertext. This leaves the attacker with no choice but to try all the possible&lt;br /&gt;keys—exhaustive, “ brute-force ” search. If keys have n bits, then there are 2 n possible values for a key (each of the n bits could be either a zero or a one). An attacker could be so lucky as to try the correct value immediately, or so unlucky as to try every incorrect value before fi nally trying the correct value of the key, therefore, she would have tried all 2 n possible values; the average number of guesses to discover the correct value is halfway between those extremes, 2 n /2. This can be made computationally impractical by choosing a suffi ciently large key space and by making the operation of checking a key reasonably costly. What makes this diffi cult is that computing speeds keep increasing, making formerly infeasible computations feasible. Furthermore, although we are concentrating on the security of data as it moves through the network—that is, the data is sometimes vulnerable for only a short period of time—in general, security people have to consider the vulnerability of data that needs to be stored in archives for tens of years. This argues for a generously large key size. On the other hand, larger keys make encryption and decryption slower Most ciphers are block ciphers : they are defi ned to take as input a plaintext block of a certain fi xed size, typically 64 to 128 bits. Using a block cipher to encrypt each block independently—known as electronic codebook (ECB) mode encryption—has the weakness that a given plaintext block value will always result in the same ciphertext block. Hence recurring block values in the plaintext are recognizable as such in the ciphertext, making it much easier for a cryptanalyst to break the cipher.&lt;br /&gt;To prevent this, block ciphers are always augmented to make the ciphertext for a block vary depending on context. Ways in which a block cipher may be augmented are called modes of operation . A common mode of operation is cipher block chaining (CBC), in which each plaintext block is XORed with the previous block’s ciphertext before being encrypted. The result is that each block’s ciphertext depends in part on the preceding blocks (i.e., on its context). Since the first plaintext block has no preceding block, it is XORed with a random number. That random number, called an initialization vector (IV) , is included with the series of ciphertext blocks so that the fi rst ciphertext block can be decrypted. This mode is illustrated in Figure 1.2 . Another mode of operation is counter mode , in which successive values of a counter (e.g., 1, 2, 3, . . .) are incorporated into the encryption of successive blocks of plaintext.&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Reference to : Network Security, Know it All.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://fuadkp.blogspot.com/feeds/6033145512756399060/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://fuadkp.blogspot.com/2008/12/network-security-2.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/6033145512756399060'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3272875449860424148/posts/default/6033145512756399060'/><link rel='alternate' type='text/html' href='http://fuadkp.blogspot.com/2008/12/network-security-2.html' title='Network Security part 2'/><author><name>Fuadkp</name><uri>http://www.blogger.com/profile/06426942133254146360</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg28naH-n0rD6PfKpVRhSQarCz096g_gDfEoIgaI3rqUObcATmNbswWakmXWXRE6eXCnkABJVOE-7B_flom0YBZReOglcT52E7j8Fgp9PR4T6HvPujkHU_9_bNV2qP3/s220/26303_1281531432424_1054216087_30669164_5824494_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM-I6w7wvyupi3mViglYyR87h3YLAp8UU8zonZfSqFP6SvShtGUpKq_Y-yhg6YFxTrkOcSx-pmv4T7UsNaVW1YZz68hXbBvIvFTdE8KUaftj-eqzVn3LgY5ensdwjh9xXwp7m48AlDBIA/s72-c/network+security,+know+it+all.PNG" height="72" width="72"/><thr:total>0</thr:total></entry></feed>