BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Isnin, 8 November 2010

PERANG CYBER

PERANG CYBER RI-AUSTRALIA

Perang cyber antara hacker Indonesia melawan hacker Australia telah dimulai. Hacker kedua negara sudah saling melakukan serangan Distributed denial of Service (DdoS)ke server-server negara lawan sejak pertengahan bulan ini.

Perihal saling serang ini diungkapkan Predator, seorang hacktivis dari kelompok hacker "Hiddenline" kepada detikcom, Kamis (28/11/2002). Menurutnya serangan DdoS hacker Australia ke sebuah ISP di Yogyakarta bisa jadi merupakan serangan balasan.

"Saya rasa itu mungkin balasan dari pihak Aussie atas aktivitas DdoS yang datang dari Yogyakarta.Anggota kami pertengahan bulan ini aktif menyerang 203 (prefiks nomor IP Australia - Red) secara DdoS", tulis Predator dalam emailnya.

Serangan tersebut menurut Preadator dilakukan dari Yogyakarta dan tercatat memiliki nomor IP dari daerah tersebut.

Seperti diberitakan detikcom sebelumnya, selama satu pekan terakhir, sebuah perusahaan internet service provider (ISP) di Yogyakarta berulang kali terkena serangan DdoS yang dilakukan melalui ISP Telstra Internet di Canberra, Australia.

Hacker tersebut melakukan serangan DdoS melalui port User Datagram Protocol (UDP). Akibat serangan ini, bandwith ISP tersebut menjadi penuh sesak dan para pelanggan tidak dapat melakukan akses internet sebagai mana mestinya.

Saling serang antara hacker Indonesia dan Australia dimulai dengan serangan mass defacing hacker Indonesia ke situs-situs internet Australia. Serangan cyber ini disulut aksi sweeping gaya Rambo yang dilakukan pihak kepolisian dan badan intelejen ASIO terhadap warga negara Indonesia di Australia akhir bulan lalu.

Perang cyber kali ini bukan yang pertama kali bagi kalangan hacker Indonesia. Pada 1998, sempat terjadi perang cyber melawan hacker-hacker Cina pasca kerusuhan Mei tahun itu. Pada 1999 terjadi perang cyber melawan Portugis sebelum jajak pendapat di Timor Timur.

Perang cyber melawan Portugis berubah menjadi perang cyber melawan Australia ketika negara tersebut mulai turut campur setelah terjadinya kerusuhan pasca jajak pendapat.

JENAYAH CYBER

JENAYAH tidak hanya berlaku di alam nyata sebaliknya dalam perkembangan teknologi maklumat yang semakin pantas dan sentiasa berubah setiap masa ia dapat berlaku hanya dengan menaip di papan kekunci komputer.

Bagaimanapun ramai pengguna komputer tidak tahu bagaimana mendapat maklumat atau perlindungan sekiranya berlaku sesuatu mencurigakan seperti pencerobohan ke atas komputer, laman web atau emel.

Pertama kali diperkenalkan pada 1997 dan dikenali sebagai Malaysian Computer Emergency Response Team (MyCert) di bawah kendalian MIMOS Berhad (MIMOS) bertujuan mengawal selia pengguna internet di Malaysia.

Bagaimanapun, pada 24 Januari 1998 MyCERT diberi peranan yang lebih luas dan dijadikan sebagai National ICT Security and Emergency Response Centre (NISER) untuk mengawal ICT negara.

NISER dirasmikan oleh Perdana Menteri Datuk Seri Abdullah Ahmad Badawi pada 10 April 2001. NISER kemudian dikeluarkan dari MIMOS dan dijadikan entiti berasingan dan dikenali sebagai CyberSecurity Malaysia pada Mac 2007.

Pemangku Ketua Pegawai Eksekutif CyberSecurity Malaysia, Lt Kol (B) Husin Jazri, berkata agensi di bawah Kementerian Sains Teknologi dan Inovasi (MOSTI) itu akan menjadi pusat rujukan pakar keselamatan siber kepada mana-mana agensi kerajaan lain dan syarikat swasta, termasuk orang perseorangan bagi mendapatkan khidmat nasihat berkaitan dengan keselamatan dan pencegahan jenayah di alam siber.

“CyberSecurity Malaysia beroperasi sebagai syarikat kerajaan bukan berlandaskan keuntungan dan berada di kawalselia MOSTI.

“Agensi ini juga bukan badan penguatkuasa, sebaliknya agensi teknikal yang boleh membantu pengguna internet menangani ancaman siber serta memberi khidmat nasihat dan bertindak sebagai biro aduan awam bagi pengguna internet.

“CyberSecurity Malaysia adalah agensi teknikal dan menjadi biro pengaduan kepada pengguna dalam menyelesaikan masalah keselamatan internet di Malaysia,’ katanya.

CyberSecurity Malaysia ialah pusat koordinasi setempat untuk keselamatan pengguna siber kebangsaan dan ditubuhkan dengan objektif untuk melindungi, membimbing, promosi di samping merangka strategi dalam menangani isu keselamatan siber di Malaysia.

Peranan CyberSecurity Malaysia membabitkan pencegahan jenayah di samping mempromosikan standard dan pengalaman terbaik keselamatan maklumat, membantu mangsa jenayah siber, juruperunding kepada Kerajaan dan mengurangkan pencerobohan ke atas sistem dan rangkaian teknologi maklumat di Malaysia.

Menerusi CyberSecurity Malaysia lima perkhidmatan diperkenalkan kepada orang ramai iaitu ‘Cyber999 atau Tindakbalas Kecemasan Komputer’, ‘Forensik Siber’, ‘Jaminan Keselamatan Maklumat’, ‘Pengurusan Keselamatan Maklumat ’ dan ‘Latihan dan Pembudayaan”.

Orang ramai yang berdepan dengan masalah keselamatan siber boleh mendapatkan khidmat daripada CyberSecurity yang beroperasi bermula jam 8.30 pagi hingga 5.30 petang hari Isnin hingga Jumaat. CyberSecurity Malaysia juga membuka komunikasi kecemasan 24 jam melalui emel, sms dan telefon.

Khidmat percuma ketika kecemasan diberikan dan orang ramai boleh menghubungi CyberSecurity Malaysia di alamat Level 7, Sapura@Mines, 7 Jalan Tasik, The Mines Resort City, 43300 Seri Kembangan, Selangor atau hubungi talian 03-89926888, faks 03-03-89453250, emelkan ke info@cybersecurity.org.my atau lawati laman web www.cybersecurity.org.my

Selasa, 2 November 2010

Selasa, 29 Jun 2010

Differencess between internet,intranet,extranet

Internet: Is now the World Wide Web (WWW) network of computers that is dispersedly managed with minimal restriction. It is what you have asked this question over.

Intranet: Operates much the same as the Internet but is restricted to a single corporate entity that has full control and management over it. Able to maximize restrictions over users.

Extranet: is an extension of an Intranet over the Internet for remote users. Typically it is heavily restricted for security reasons to a virtual private network (VPN) connection for Telecommuters or other offsite users.
Ethernet is the standard cable for computers to hook up to the network. It is also used for network devices (Routers, modems & switches) to interface with each other.

Ring topology

A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.

Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link[1]. A node failure or cable break might isolate every node attached to the ring. FDDI networks overcome this vulnerability by sending data on a clockwise and a counterclockwise ring: in the event of a break data is wrapped back onto the complementary ring before it reaches the end of the cable, maintaining a path to every node along the resulting "C-Ring". 802.5 networks -- also known as IBM Token Ring networks -- avoid the weakness of a ring topology altogether: they actually use a star topology at the physical layer and a Multistation Access Unit (MAU) to imitate a ring at the datalink layer.

Many ring networks add a "counter-rotating ring" to form a redundant topology. Such "dual ring" networks include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI), and Resilient Packet Ring.

Star topology

Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages.[1] Thus, the hub and leaf nodes, and the transmission lines between them, form a graph with the topology of a star. If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own transmission, delayed by the two-way transmission time (i.e. to and from the central node) plus any delay generated in the central node. An active star network has an active central node that usually has the means to prevent echo-related problems.

The star topology reduces the chance of network failure by connecting all of the systems to a central node. When applied to a bus-based network, this central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the rest of the systems will be unaffected. [2]

It is also designed with each node (file servers, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator.

Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It is also acts as a repeater for the data flow. This configuration is common with twisted pair cable. However, it can also be used with coaxial cable or optical fibre cable.

Contents [hide]
1 Advantages
2 Disadvantages
3 References
4 See also

Bus topology

A bus topology connects each computer (nodes) to a single segment trunk (a communication line, typically coax cable, that is referred to as the 'bus'. The signal travels from one end of the bus to the other. A terminator is required at each to absorb the signal so as it does not reflect back across the bus. A media access method called CSMA/MA is used to handle the collision that occur when two signals placed on the wire at the same time. The bus topology is passive. In other words, the computers on the bus simply 'listen' for a signal; they are not responsible for moving the signal along.

Ahad, 20 Jun 2010

Network topology


Network topology is defined as the interconnection of the various elements (links, nodes, etc.) of a computer network.[1][2] Network Topologies can be physical or logical. Physical Topology means the physical design of a network including the devices, location and cable installation. Logical topology refers to the fact that how data actually transfers in a network as opposed to its physical design.

Topology can be considered as a virtual shape or structure of a network. This shape actually does not correspond to the actual physical design of the devices on the computer network. The computers on the home network can be arranged in a circle shape but it does not necessarily mean that it presents a ring topology.

Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. The study of network topology uses graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical.

A Local Area Network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN has one or more links to one or more nodes in the network and the mapping of these links and nodes in a graph results in a geometrical shape that may be used to describe the physical topology of the network. Likewise, the mapping of the data flow between the nodes in the network determines the logical topology of the network. The physical and logical topologies may or may not be identical in any particular

Network architecture


In computer science and computer engineering, computer architecture or digital computer organization is the conceptual design and fundamental operational structure of a computer system. It is a blueprint and functional description of requirements and design implementations for the various parts of a computer, focusing largely on the way by which the central processing unit (CPU) performs internally and accesses addresses in memory.
It may also be defined as the science and art of selecting and interconnecting hardware components to create computers that meet fComputer architecture comprises at least three main subcategories:[1]
Instruction set architecture, or ISA, is the abstract image of a computing system that is seen by a machine language (or assembly language) programmer, including the instruction set, word size, memory address modes, processor registers, and address and data formats.
Microarchitecture, also known as Computer organization is a lower level, more concrete and detailed, description of the system that involves how the constituent parts of the system are interconnected and how they interoperate in order to implement the ISA.[2] The size of a computer's cache for instance, is an organizational issue that generally has nothing to do with the ISA. unctional, performance and cost goals.

Computer network


A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of types and categories and also presents the basic components of a network.

Sabtu, 15 Mei 2010

CD




CD-ROM (pronounced /ˌsiːˌdiːˈrɒm/, an acronym of "compact disc read-only memory") is a pre-pressed compact disc that contains data accessible to, but not writable by, a computer for data storage and music playback, the 1985 “Yellow Book” standard developed by Sony and Philips adapted the format to hold any form of binary data.[1]
CD-ROMs are popularly used to distribute computer software, including games and multimedia applications, though any data can be stored (up to the capacity limit of a disc). Some CDs hold both computer data and audio with the latter capable of being played on a CD player, while data (such as software or digital video) is only usable on a computer (such as ISO 9660 format PC CD-ROMs). These are called enhanced CDs.
Although many people use lowercase letters in this acronym, proper presentation is in all capital letters with a hyphen between CD and ROM. It was also suggested by some,[who?] especially soon after the technology was first released, that CD-ROM was an acronym for "Compact Disc read-only-media", or that it was a more "correct" definition. This was not the intention of the original team who developed the CD-ROM, and common acceptance of the "memory" definition is now almost universal. This is probably in no small part due to the widespread use of other "ROM" acronyms such as Flash-ROMs and EEPROMs where "memory" is usually the correct term.[citation needed]
At the time of the technology's introduction it had far more capacity than computer hard drives common at the time, although the reverse is now true though some experimental descendants of it such as Holographic versatile disc may not have more space than today's biggest hard drive.

Pendrive





Pen drives are classified as NAND style data storage devices. Equipped with a large amount of memory capacity, the pen drive is considered to be an improvement on both the older floppy drive disks and the more modern compact disks that are often used to copy data and reload the files on a different hard drive. Even a pen drive with a relatively low storage capacity tends to provide plenty of space for a number of files. The types of files that can be loaded onto a pen drive are all the common types that can be housed on any hard drive. This makes it possible for persons to copy photos, spreadsheets, word processing documents, movie clips, music tracks, and just about any other type of file.
Utilizing a pen drive is a simple task. One end of the drive is equipped with a USB connector at one end. The connector is inserted into the USB port on a desktop or laptop and activated. Once the pen drive is in place, it is possible to drop and drag files into the memory of the drive, or forward the files to the drive. The process is no more difficult than attaching files to an email or copying files onto a disk.
Because there are several different operating systems in common use today, there are various types of levels of the pen drive that are configured to work with each system. Even persons who are using an older operating system can usually find a pen drive that is compatible. As long as the desktop or laptop is constructed with a USB port, and the pen drive is compatible with the operating system, the pen drive will provide practical and easy transmission of data from one hard drive to another one in a matter of minutes.

Rabu, 5 Mei 2010

function of operating system

1) to interprate the commands executed by the user.
2) to handle disk input/output settings.
3) loaded in the memory at bootup and remain in the memory at all time.
4) to provid the OS with the machanism in order to see the additional memory.
5) used to access the high memory area. (himem.sys )
6) it allows the rest of the OS and its programs to interact directry with the system hardware and the system BIOS.
7) it sets particular values corresponding to the windows environment.
8) used to run particular programs during startup.

OpErAtInG SyStEm,,


An operating system is the software on a computer that manages the way different programs use its hardware, and regulates the ways that a user controls the computer.[1][2] Operating systems are found on almost any device that contains a computer with multiple programs—from cellular phones and video game consoles to supercomputers and web servers. Some popular modern operating systems for personal computers include Microsoft Windows, Mac OS X, and Linux[3] (see also: list of operating systems, comparison of operating systems).
Because early computers were often built for only a single task, operating systems did not exist in their proper form until the 1960s.[4] As computers evolved into being devices that could run different programs in succession, programmers began putting libraries of common programs (in the form of computer code) onto the computer in order to avoid duplication and speed up the process. Eventually, computers began being built to automatically switch from one task to the next. The creation of runtime libraries to manage processing and printing speed came next, which evolved into programs that could interpret different types of programming languages into machine code. When personal computers by companies such as Apple Inc., Atari, IBM and Amiga became popular in the 1980s, vendors began adding features such as software scheduling and hardware maintenance.
An operating system can be divided into many different parts. One of the most important parts is the kernel, which controls low-level processes that the average user usually cannot see: it controls how memory is read and written, the order in which processes are executed, how information is received and sent by devices like the monitor, keyboard and mouse, and deciding how to interpret information received by networks. The user interface is the part of the operating system that interacts with the computer user directly, allowing them to control and use programs. The user interface may be graphical with icons and a desktop, or textual, with a command line. Another similar feature is an Application programming interface, which is a set of services and code libraries that let applications interact with one another, as well as the operating system itself. Depending on the operating system, many of these components may not be considered an actual part. For example, Windows considers its user interface to be part of the operating system, while many versions of Linux do not.

Random-access memory(RAM)


Random-access memory (RAM) is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order (i.e., at random). "Random" refers to the idea that any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data.[1]
By contrast, storage devices such as magnetic discs and optical discs rely on the physical movement of the recording medium or a reading head. In these devices, the movement takes longer than data transfer, and the retrieval time varies based on the physical location of the next item.
The word RAM is often associated with volatile types of memory (such as DRAM memory modules), where the information is lost after the power is switched off. Many other types of memory are RAM, too, including most types of ROM and a type of flash memory called NOR-Flash.

Random-access memory(RAM)



Random-access memory (RAM) is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order (i.e., at random). "Random" refers to the idea that any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data.[1]
By contrast, storage devices such as magnetic discs and optical discs rely on the physical movement of the recording medium or a reading head. In these devices, the movement takes longer than data transfer, and the retrieval time varies based on the physical location of the next item.
The word RAM is often associated with volatile types of memory (such as DRAM memory modules), where the information is lost after the power is switched off. Many other types of memory are RAM, too, including most types of ROM and a type of flash memory called NOR-Flash.

Read-only memory(ROM)


Read-only memory (usually known by its acronym, ROM) is a class of storage media used in computers and other electronic devices. Because data stored in ROM cannot be modified (at least not very quickly or easily), it is mainly used to distribute firmware (software that is very closely tied to specific hardware, and unlikely to require frequent updates)
In its strictest sense, ROM refers only to mask ROM (the oldest type of solid state ROM), which is fabricated with the desired data permanently stored in it, and thus can never be modified. However, more modern types such as EPROM and flash EEPROM can be erased and re-programmed multiple times; they are still described as "read-only memory"(ROM) because the reprogramming process is generally infrequent, comparatively slow, and often does not permit random access writes to individual memory locations. Despite the simplicity of mask ROM, economies of scale and field-programmability often make reprogrammable technologies more flexible and inexpensive, so mask ROM is rarely used in new products as of 2007[update].

sEcOnDaRy StOrAgE,,,

Secondary storage (or external memory) differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage. Secondary storage does not lose the data when the device is powered down—it is non-volatile. Per unit, it is typically also two orders of magnitude less expensive than primary storage. Consequently, modern computer systems typically have two orders of magnitude more secondary storage than primary storage and data is kept for a longer time there.
In modern computers, hard disk drives are usually used as secondary storage. The time taken to access a given byte of information stored on a hard disk is typically a few thousandths of a second, or milliseconds. By contrast, the time taken to access a given byte of information stored in random access memory is measured in billionths of a second, or nanoseconds. This illustrates the very significant access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically about a million times slower than memory. Rotating optical storage devices, such as CD and DVD drives, have even longer access times. With disk drives, once the disk read/write head reaches the proper placement and the data of interest rotates under it, subsequent data on the track are very fast to access. As a result, in order to hide the initial seek time and rotational latency, data are transferred to and from disks in large contiguous blocks.
When data reside on disk, block access to hide latency offers a ray of hope in designing efficient external memory algorithms. Sequential or block access on disks is orders of magnitude faster than random access, and many sophisticated paradigms have been developed to design efficient algorithms based upon sequential and block access . Another way to reduce the I/O bottleneck is to use multiple disks in parallel in order to increase the bandwidth between primary and secondary memory.[2]
Some other examples of secondary storage technologies are: flash memory (e.g. USB flash drives or keys), floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives.
The secondary storage is often formatted according to a file system format, which provides the abstraction necessary to organize data into files and directories, providing also additional information (called metadata) describing the owner of a certain file, the access time, the access permissions, and other information.
Most computer operating systems use the concept of virtual memory, allowing utilization of more primary storage capacity than is physically available in the system. As the primary memory fills up, the system moves the least-used chunks (pages) to secondary storage devices (to a swap file or page file), retrieving them later when they are needed. As more of these retrievals from slower secondary storage are necessary, the more the overall system performance is degraded.

PrImArY sToRaGe,,,

Primary storage (or main memory or internal memory), often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required. Any data actively operated on is also stored there in uniform manner.
Historically, early computers used delay lines, Williams tubes, or rotating magnetic drums as primary storage. By 1954, those unreliable methods were mostly replaced by magnetic core memory, which was still rather cumbersome. Undoubtedly, a revolution was started with the invention of a transistor, that soon enabled then-unbelievable miniaturization of electronic memory via solid-state silicon chip technology.
This led to a modern random-access memory (RAM). It is small-sized, light, but quite expensive at the same time. (The particular types of RAM used for primary storage are also volatile, i.e. they lose the information when not powered).
As shown in the diagram, traditionally there are two more sub-layers of the primary storage, besides main large-capacity RAM:
Processor registers are located inside the processor. Each register typically holds a word of data (often 32 or 64 bits). CPU instructions instruct the arithmetic and logic unit to perform various calculations or other operations on this data (or with the help of it). Registers are technically among the fastest of all forms of computer data storage.
Processor cache is an intermediate stage between ultra-fast registers and much slower main memory. It's introduced solely to increase performance of the computer. Most actively used information in the main memory is just duplicated in the cache memory, which is faster, but of much lesser capacity. On the other hand it is much slower, but much larger than processor registers. Multi-level hierarchical cache setup is also commonly used—primary cache being smallest, fastest and located inside the processor; secondary cache being somewhat larger and slower.
Main memory is directly or indirectly connected to the central processing unit via a memory bus. It is actually two buses (not on the diagram): an address bus and a data bus. The CPU firstly sends a number through an address bus, a number called memory address, that indicates the desired location of data. Then it reads or writes the data itself using the data bus. Additionally, a memory management unit (MMU) is a small device between CPU and RAM recalculating the actual memory address, for example to provide an abstraction of virtual memory or other tasks.
As the RAM types used for primary storage are volatile (cleared at start up), a computer containing only such storage would not have a source to read instructions from, in order to start the computer. Hence, non-volatile primary storage containing a small startup program (BIOS) is used to bootstrap the computer, that is, to read a larger program from non-volatile secondary storage to RAM and start to execute it. A non-volatile technology used for this purpose is called ROM, for read-only memory (the terminology may be somewhat confusing as most ROM types are also capable of random access).
Many types of "ROM" are not literally read only, as updates are possible; however it is slow and memory must be erased in large portions before it can be re-written. Some embedded systems run programs directly from ROM (or similar), because such programs are rarely changed. Standard computers do not store non-rudimentary programs in ROM, rather use large capacities of secondary storage, which is non-volatile as well, and not as costly.
Recently, primary storage and secondary storage in some uses refer to what was historically called, respectively, secondary storage and tertiary storage.[1]

StOrAgE,,

Computer data storage, often called storage or memory, refers to computer components, devices, and recording media that retain digital data used for computing for some interval of time. Computer data storage provides one of the core functions of the modern computer, that of information retention. It is one of the fundamental components of all modern computers, and coupled with a central processing unit (CPU, a processor), implements the basic computer model used since the 1940s.
In contemporary usage, memory usually refers to a form of semiconductor storage known as random-access memory (RAM) and sometimes other forms of fast but temporary storage. Similarly, storage today more commonly refers to mass storageoptical discs, forms of magnetic storage like hard disk drives, and other types slower than RAM, but of a more permanent nature. Historically, memory and storage were respectively called main memory and secondary storage. The terms internal memory and external memory are also used.
The contemporary distinctions are helpful, because they are also fundamental to the architecture of computers in general. The distinctions also reflect an important and significant technical difference between memory and mass storage devices, which has been blurred by the historical usage of the term storage. Nevertheless, this article uses the traditional nomenclature.

Khamis, 29 April 2010

hot news,,(harian metro)

Tangisan suara halus

Oleh Nor Hazwani Hamat

2010/04/29
E-mel  Artikel Cetak  Artikel Tanda  Artikel Besarkan Saiz Teks Kecilkan Saiz Teks Komen  Artikel

TANAH MERAH: “Saya terdengar suara jeritan bayi tapi tak tahu di mana. Sebaik membuka pintu rumah, saya terkejut apabila mendapati seorang bayi dibalut dengan kain selimut ditinggalkan di beranda rumah,” kata Sukma Abdullah, 53.

MALANG...bayi yang ditinggalkan
MALANG...bayi yang ditinggalkan
Dia menemui seorang bayi lelaki di rumahnya di Jalan Wan Ahmad, dekat sini, kira-kira jam 12.30 tengah malam semalam.


Menurut Sukma, sebelum itu dia sedang bersiap untuk tidur sebelum dikejutkan dengan suara tangisan bayi.


Katanya, dia yang tinggal berseorangan agak takut kemungkinan diganggu ‘makhluk halus,’ namun sangkaannya meleset apabila dikejutkan dengan kehadiran bayi itu.


“Ketika itu, saya ingin masuk tidur tapi terdengar suara bayi. Saya takut dan turut menyangka tangisan itu adalah anak jiran yang mungkin sakit.


“Saya kemudian memeriksa dalam rumah sebelum membuka tingkap dekat pintu utama. Saya terkejut kerana ternampak ada ‘benda’ di beranda rumah sebelum memberanikan diri membuka pintu untuk melihat dari dekat. Saya terkejut mendapati ia seorang bayi,” katanya.


Sukma berkata, dia yang panik kemudian terus memberitahu jiran berhampiran sebelum menghubungi polis.


Katanya, dia turut hairan bagaimana ada individu boleh meninggalkan bayi di situ sedangkan terdapat ramai orang lalu lalang di depan rumahnya untuk mengunjungi pasar malam.


“Bayi itu ditinggalkan dalam keadaan sempurna dan sihat cuma terdapat sedikit kesan darah,” katanya.

Bayi seberat 3.3 kilogram itu dikatakan baru berusia dua hari dan masih bertali pusat.


Ketua Polis Daerah Tanah Merah, Deputi Superintendan Abdul Aziz Mahmud, berkata, pihaknya bergegas ke tempat kejadian sebaik menerima maklumat awam.


Katanya, bayi terbabit didapati dalam keadaan berbungkus dengan kain tuala dan selimut.


“Bayi terbabit kemudian dibawa ke Hospital Tanah Merah bagi mendapatkan rawatan segera di unit kecemasan sejurus kemudian.

“Setakat ini bayi itu ditempatkan di Wad Penjagaan Kanak-kanak dan suspek masih dicari,” katanya.


Menurutnya, polis turut meminta kerjasama pegawai Pejabat Pelajaran Daerah selain orang ramai untuk membantu siasatan.


“Semakan akan dibuat di sekolah menengah bagi mengenal pasti pelajar yang tidak hadir ke sekolah untuk tempoh beberapa hari dan beberapa klinik swasta sekitar daerah bagi membantu siasatan.


“Mereka mempunyai maklumat boleh menghubungi Inspektor Mardiana di talian 09-9557704,” katanya.

HOW TO INSTALL OFFICE 2007

Step 1: Insert the Microsoft Office 2007 Enterprise CD. If the Setup Wizard does not automatically begin, then click Start > Run > D:\setup.exe

Step 2: Enter the Product Key from the back of the CD jacket. Note: This is a unique code. Please keep in a safe place!

Click Continue.

Step 3: Check the box "I accept the terms of this agreement" and click the Continue button.

Step 4: Choose an installation option, Upgrade (removes Office 2003) or Customize (keeps Office 2003 installed and adds Office 2007, allowing you to use them both).

Note: Outlook 2003 will be uninstalled in either option. Outlook will be updated and your user settings and mail will migrate to the new version.

If you click Upgrade, go on to Step 5.

If you click Customize, go on to Step 4a.

Step 4a: Click the radio button for "Keep all previous versions."

Click the Installation Options tab, left-click the first drop down box and click Run all from My Computer

Click Install Now.

Step 5: Installation will begin. It may take 15-30 minutes to finish.

Step 6: Click Close to complete the installation.

Step 7: The first time you launch any Office program, you will be prompted to activate the software. As long as you have an active Internet connection, choose the default option and click Next.

Step 8: When the activation finishes, click Close.

Step 9: Click OK to finish.

If you have any questions or problems, contact your departmental computing consultant or the Help Desk (84357).

August 16, 2007

Rabu, 28 April 2010

IP Address


An Internet Protocol (IP) address is a numerical label that is assigned to devices participating in a computer network, that uses the Internet Protocol for communication between its nodes.[1] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[2]
The designers of TCP/IP defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 or IPv4, is still in use today. However, due to the enormous growth of the Internet and the resulting depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995[3] and last standardized by RFC 2460 in 1998.[4] Although IP addresses are stored as binary numbers, they are usually displayed in human-readable notations, such as 208.77.188.166 (for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6).
The Internet Protocol also routes data packets between networks; IP addresses specify the locations of the source and destination nodes in the topology of the routing system. For this purpose, some of the bits in an IP address are used to designate a subnetwork. The number of these bits is indicated in CIDR notation, appended to the IP address; e.g., 208.77.188.166/24.
As the development of private networks raised the threat of IPv4 address exhaustion, RFC 1918 set aside a group of private address spaces that may be used by anyone on private networks. They are often used with network address translators to connect to the global public Internet.
The Internet Assigned Numbers Authority (IANA), which manages the IP address space allocations globally, cooperates with five Regional Internet Registries (RIRs) to allocate IP address blocks to Local Internet Registries (Internet service providers) and other entities.

BeRiTa tErKiNi (28 April 2010)


BATU PAHAT: Penduduk sekitar Bukit Perdana 2 di sini, dilanda kebimbangan apabila kawasan bukit yang ditarah berdekatan rumah tangki air yang memuatkan beribu gelen simpanan air untuk penduduk seolah-olah dibiarkan tanpa kerja baik pulih dilakukan mahupun pengawasan daripada pihak pemaju. Lebih menakutkan kedudukan bukit berkenaan yang dipenuhi batu-batu besar itu tidak sampai 50 meter daripada lapan unit rumah berkembar dua yang baru selesai pembinaannya tetapi belum dimasuki pembelinya dan berselang dengan rumah penduduk yang sudah berpenghuni. Malah, apa yang lebih membimbangkan ketiadaan pagar mahupun hadangan yang dibina bagi menutupi kawasan itu bagi mengelakkan struktur tanah atau batu memasuki kawasan jalan rumah penduduk. Keadaan itu menyebabkan ia mudah dimasuki kanak-kanak, apatah lagi di belakang bukit itu ada kawasan air bukit yang mengalir dan menjadi tumpuan golongan itu bermain atau mandi-manda. Tinjauan mendapati keadaan bukit berkenaan berupaya untuk ‘bergerak’ berikutan batu-batu besar serta tanah di situ kelihatan tidak mampat apatah lagi jika hujan lebat, dibimbangi tragedi tanah runtuh seperti di Bukit Antarabangsa berulang. Penduduk Bukit Perdana, Kamal Muhamad, 60, seorang pesara, berkata kawasan bukit yang ditarah itu merbahaya kepada penduduk setempat apatah lagi rumah tangki taman taman itu terletak betul-betul di tepi cerun bukit berkenaan. “Saya tidak dapat membayangkan apa yang akan berlaku kepada rumah tangki yang memuatkan beribu-ribu gelen air jika ditakdirkan struktur tanah di situ tidak lagi mampu bertahan serta bergerak bersama-sama batu besar berkenaan. Saya pun tidak tahu apakah pembeli rumah di depan bukit yang ditarah itu menyedari apa yang berlaku terhadap bukit di depan rumah mereka. “Sebelum ini kawasan bukit itu dipenuhi pokok menghijau dan keadaan amat nyaman sekali. Saya tidak pasti apa yang mahu dilakukan terhadap bukit itu sehingga ia ditarah, sehingga beberapa lori masuk dan mengangkut tanah sebelum ia ditinggalkan terbiar beberapa minggu lalu,” katanya. George Choo, 46, seorang eksekutif yang tinggal selang beberapa baris daripada kawasan bukit yang ditarah berkenaan berkata, beliau sekeluarga turut berasa bimbang dengan keselamatan mereka. “Saya tidak pasti sama ada bukit itu stabil atau tidak tetapi apabila hujan, air tanah berwarna merah akan mengalir mengotorkan jalan di sini menyebabkan perasaan bimbang jika terjadi tanah runtuh. “Saya harap pihak pemaju atau berkuasa dapat memantau kawasan berkenaan atau seelok-eloknya bina penghadang atau pun kawasan bukit itu dibaiki bagi mengelakkan kejadian buruk berlaku lebih-lebih lagi rumah tangki air itu jelas kelihatan berada di cerun bukit,” katanya. Seorang lagi penduduk, Wan Halimaton Saadiah Mohd Ismail, 28, yang juga suri rumah berkata, kawasan bukit berkenaan menjadi kawasan tumpuan penduduk sekitar disebabkan wujud air terjun mini ekoran air bukit yang mengalir. “Kawasan air bukit mengalir terletak bersebelahan dengan kawasan bukit ditarah itu. Jika dulu saya membiarkan anak saya bermain bersama rakannya, kini saya tidak benarkan lagi berikutan bimbang jika terjadi perkara tidak diingini,” katanya.

Colour code


Central Processer Unit (CPU)


The Central Processing Unit (CPU) or the processor is the portion of a computer system that carries out the instructions of a computer program, and is the primary element carrying out the computer's functions. This term has been in use in the computer industry at least since the early 1960s [1]. The form, design and implementation of CPUs have changed dramatically since the earliest examples, but their fundamental operation remains much the same.
Early CPUs were custom-designed as a part of a larger, sometimes one-of-a-kind, computer. However, this costly method of designing custom CPUs for a particular application has largely given way to the development of mass-produced processors that are made for one or many purposes. This standardization trend generally began in the era of discrete transistor mainframes and minicomputers and has rapidly accelerated with the popularization of the integrated circuit (IC). The IC has allowed increasingly complex CPUs to be designed and manufactured to tolerances on the order of nanometers. Both the miniaturization and standardization of CPUs have increased the presence of these digital devices in modern life far beyond the limited application of dedicated computing machines. Modern microprocessors appear in everything from automobiles to cell phones and children's toys.

internet


The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope that are linked by a broad array of electronic and optical networking technologies. The Internet carries a vast array of information resources and services, most notably the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail.
Most traditional communications media, such as telephone and television services, are reshaped or redefined using the technologies of the Internet, giving rise to services such as Voice over Internet Protocol (VoIP) and IPTV. Newspaper publishing has been reshaped into Web sites, blogging, and web feeds. The Internet has enabled or accelerated the creation of new forms of human interactions through instant messaging, Internet forums, and social networking sites.
The origins of the Internet reach back to the 1960s when the United States funded research projects of its military agencies to build robust, fault-tolerant and distributed computer networks. This research and a period of civilian funding of a new U.S. backbone by the National Science Foundation spawned worldwide participation in the development of new networking technologies and led to the commercialization of an international network in the mid 1990s, and resulted in the following popularization of countless applications in virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population uses the services of the Internet.
The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.

Selasa, 20 April 2010

colour code












colour code


straight cable cat5

cross cable (cat5 )


Typically the ports on a hub are MDIX ports. This allows the machine at the other end to utilize its MDI Port (which is what typically a NIC card uses) without the need for a crossover cable. When I say that the ports on the hub are MDIX ports, what I mean is that one of the functions of the hub is to automatically perform the crossover functions, which are required to properly align the cables with each other. When no hub or switch is used, your cable itself must physically perform these crossover functions. To expand on this a little, when using a hub or switch, the Transmit wires on the workstation need to be connected to the Receive wires on the hub; likewise, the Receive wires on the hub need to be connected to the Transmit wires on the workstation. But if you remember what we stated earlier - cables which are run from PC to Hub are 'straight through' type cables. This is because the hub is providing the required crossover functions internally for you. Thus, when you connect two machines together without the use of a hub or switch, a crossover cable is required - because both 'ends' are essentially the same - a NIC Card. The crossover function must take place somewhere, and since there is no hub or switch to do it for you, the cable must. Now that we know what a crossover cable is for, let's talk for a few about types of cabling. The two most common unshielded twisted-pair (UTP) network standards are the 10 Mbit (10BASE-T Ethernet) and the 100Mbit (100BASE-TX Fast Ethernet). In order for a cable to properly support 100 Mbit transfers, it must be rated Category 5 (or CAT 5). This type of low loss extended frequency cable will support 10 Base T, 100 Base-T and the newer 100VG-AnyLAN applications. Other types of cabling include Category 3 which supports data rates up to 16 Mbps, and Category 1 which only supports speeds up to 1Mbps. The cable we are about to make is considered Category 5, and will work on both 10 Mbit and 100 Mbit systems, assuming all components used (cables and jacks) are rated for Category 5. What you need Cable - Be sure the cable(s) you are using is properly rated for CAT 5. It should state clearly on the jacket of the cable, what it is rated at. One option that you have when selecting your cable is to use a pre-made normal 'straight through' cable, and simply whack off one of the ends, and replace with a new "Crossed Over" end. For the purpose of this article, though, we aren't going to go that route. We are going to make the whole thing from scratch - using bulk CAT 5 cable.

Khamis, 25 Mac 2010

computer keyboard


In computing, a keyboard is an input device, partially modeled after the typewriter keyboard, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches. A keyboard typically has characters engraved or printed on the keys and each press of a key typically corresponds to a single written symbol. However, to produce some symbols requires pressing and holding several keys simultaneously or in sequence. While most keyboard keys produce letters, numbers or signs (characters), other keys or simultaneous key presses can produce actions or computer commands.
In normal usage, the keyboard is used to type text and numbers into a word processor, text editor or other program. In a modern computer, the interpretation of keypresses is generally left to the software. A computer keyboard distinguishes each physical key from every other and reports all keypresses to the controlling software. Keyboards are also used for computer gaming, either with regular keyboards or by using keyboards with special gaming features, which can expedite frequently used keystroke combinations. A keyboard is also used to give commands to the operating system of a computer, such as Windows' Control-Alt-Delete combination, which brings up a task window or shuts down the machine.