PERANG CYBER RI-AUSTRALIA
Perang cyber antara hacker Indonesia melawan hacker Australia telah dimulai. Hacker kedua negara sudah saling melakukan serangan Distributed denial of Service (DdoS)ke server-server negara lawan sejak pertengahan bulan ini.
Perihal saling serang ini diungkapkan Predator, seorang hacktivis dari kelompok hacker "Hiddenline" kepada detikcom, Kamis (28/11/2002). Menurutnya serangan DdoS hacker Australia ke sebuah ISP di Yogyakarta bisa jadi merupakan serangan balasan.
"Saya rasa itu mungkin balasan dari pihak Aussie atas aktivitas DdoS yang datang dari Yogyakarta.Anggota kami pertengahan bulan ini aktif menyerang 203 (prefiks nomor IP Australia - Red) secara DdoS", tulis Predator dalam emailnya.
Serangan tersebut menurut Preadator dilakukan dari Yogyakarta dan tercatat memiliki nomor IP dari daerah tersebut.
Seperti diberitakan detikcom sebelumnya, selama satu pekan terakhir, sebuah perusahaan internet service provider (ISP) di Yogyakarta berulang kali terkena serangan DdoS yang dilakukan melalui ISP Telstra Internet di Canberra, Australia.
Hacker tersebut melakukan serangan DdoS melalui port User Datagram Protocol (UDP). Akibat serangan ini, bandwith ISP tersebut menjadi penuh sesak dan para pelanggan tidak dapat melakukan akses internet sebagai mana mestinya.
Saling serang antara hacker Indonesia dan Australia dimulai dengan serangan mass defacing hacker Indonesia ke situs-situs internet Australia. Serangan cyber ini disulut aksi sweeping gaya Rambo yang dilakukan pihak kepolisian dan badan intelejen ASIO terhadap warga negara Indonesia di Australia akhir bulan lalu.
Perang cyber kali ini bukan yang pertama kali bagi kalangan hacker Indonesia. Pada 1998, sempat terjadi perang cyber melawan hacker-hacker Cina pasca kerusuhan Mei tahun itu. Pada 1999 terjadi perang cyber melawan Portugis sebelum jajak pendapat di Timor Timur.
Perang cyber melawan Portugis berubah menjadi perang cyber melawan Australia ketika negara tersebut mulai turut campur setelah terjadinya kerusuhan pasca jajak pendapat.
Isnin, 8 November 2010
PERANG CYBER
JENAYAH CYBER
Bagaimanapun ramai pengguna komputer tidak tahu bagaimana mendapat maklumat atau perlindungan sekiranya berlaku sesuatu mencurigakan seperti pencerobohan ke atas komputer, laman web atau emel.
Pertama kali diperkenalkan pada 1997 dan dikenali sebagai Malaysian Computer Emergency Response Team (MyCert) di bawah kendalian MIMOS Berhad (MIMOS) bertujuan mengawal selia pengguna internet di Malaysia.
Bagaimanapun, pada 24 Januari 1998 MyCERT diberi peranan yang lebih luas dan dijadikan sebagai National ICT Security and Emergency Response Centre (NISER) untuk mengawal ICT negara.
NISER dirasmikan oleh Perdana Menteri Datuk Seri Abdullah Ahmad Badawi pada 10 April 2001. NISER kemudian dikeluarkan dari MIMOS dan dijadikan entiti berasingan dan dikenali sebagai CyberSecurity Malaysia pada Mac 2007.
Pemangku Ketua Pegawai Eksekutif CyberSecurity Malaysia, Lt Kol (B) Husin Jazri, berkata agensi di bawah Kementerian Sains Teknologi dan Inovasi (MOSTI) itu akan menjadi pusat rujukan pakar keselamatan siber kepada mana-mana agensi kerajaan lain dan syarikat swasta, termasuk orang perseorangan bagi mendapatkan khidmat nasihat berkaitan dengan keselamatan dan pencegahan jenayah di alam siber.
“CyberSecurity Malaysia beroperasi sebagai syarikat kerajaan bukan berlandaskan keuntungan dan berada di kawalselia MOSTI.
“Agensi ini juga bukan badan penguatkuasa, sebaliknya agensi teknikal yang boleh membantu pengguna internet menangani ancaman siber serta memberi khidmat nasihat dan bertindak sebagai biro aduan awam bagi pengguna internet.
“CyberSecurity Malaysia adalah agensi teknikal dan menjadi biro pengaduan kepada pengguna dalam menyelesaikan masalah keselamatan internet di Malaysia,’ katanya.
CyberSecurity Malaysia ialah pusat koordinasi setempat untuk keselamatan pengguna siber kebangsaan dan ditubuhkan dengan objektif untuk melindungi, membimbing, promosi di samping merangka strategi dalam menangani isu keselamatan siber di Malaysia.
Peranan CyberSecurity Malaysia membabitkan pencegahan jenayah di samping mempromosikan standard dan pengalaman terbaik keselamatan maklumat, membantu mangsa jenayah siber, juruperunding kepada Kerajaan dan mengurangkan pencerobohan ke atas sistem dan rangkaian teknologi maklumat di Malaysia.
Menerusi CyberSecurity Malaysia lima perkhidmatan diperkenalkan kepada orang ramai iaitu ‘Cyber999 atau Tindakbalas Kecemasan Komputer’, ‘Forensik Siber’, ‘Jaminan Keselamatan Maklumat’, ‘Pengurusan Keselamatan Maklumat ’ dan ‘Latihan dan Pembudayaan”.
Orang ramai yang berdepan dengan masalah keselamatan siber boleh mendapatkan khidmat daripada CyberSecurity yang beroperasi bermula jam 8.30 pagi hingga 5.30 petang hari Isnin hingga Jumaat. CyberSecurity Malaysia juga membuka komunikasi kecemasan 24 jam melalui emel, sms dan telefon.
Khidmat percuma ketika kecemasan diberikan dan orang ramai boleh menghubungi CyberSecurity Malaysia di alamat Level 7, Sapura@Mines, 7 Jalan Tasik, The Mines Resort City, 43300 Seri Kembangan, Selangor atau hubungi talian 03-89926888, faks 03-03-89453250, emelkan ke info@cybersecurity.org.my atau lawati laman web www.cybersecurity.org.my
Selasa, 2 November 2010
Selasa, 29 Jun 2010
Differencess between internet,intranet,extranet
Intranet: Operates much the same as the Internet but is restricted to a single corporate entity that has full control and management over it. Able to maximize restrictions over users.
Extranet: is an extension of an Intranet over the Internet for remote users. Typically it is heavily restricted for security reasons to a virtual private network (VPN) connection for Telecommuters or other offsite users.
Ethernet is the standard cable for computers to hook up to the network. It is also used for network devices (Routers, modems & switches) to interface with each other.
Ring topology
Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link[1]. A node failure or cable break might isolate every node attached to the ring. FDDI networks overcome this vulnerability by sending data on a clockwise and a counterclockwise ring: in the event of a break data is wrapped back onto the complementary ring before it reaches the end of the cable, maintaining a path to every node along the resulting "C-Ring". 802.5 networks -- also known as IBM Token Ring networks -- avoid the weakness of a ring topology altogether: they actually use a star topology at the physical layer and a Multistation Access Unit (MAU) to imitate a ring at the datalink layer.
Many ring networks add a "counter-rotating ring" to form a redundant topology. Such "dual ring" networks include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI), and Resilient Packet Ring.
Star topology
The star topology reduces the chance of network failure by connecting all of the systems to a central node. When applied to a bus-based network, this central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the rest of the systems will be unaffected. [2]
It is also designed with each node (file servers, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator.
Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It is also acts as a repeater for the data flow. This configuration is common with twisted pair cable. However, it can also be used with coaxial cable or optical fibre cable.
Contents [hide]
1 Advantages
2 Disadvantages
3 References
4 See also
Bus topology
Ahad, 20 Jun 2010
Network topology
Topology can be considered as a virtual shape or structure of a network. This shape actually does not correspond to the actual physical design of the devices on the computer network. The computers on the home network can be arranged in a circle shape but it does not necessarily mean that it presents a ring topology.
Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. The study of network topology uses graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical.
A Local Area Network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN has one or more links to one or more nodes in the network and the mapping of these links and nodes in a graph results in a geometrical shape that may be used to describe the physical topology of the network. Likewise, the mapping of the data flow between the nodes in the network determines the logical topology of the network. The physical and logical topologies may or may not be identical in any particular
Network architecture
It may also be defined as the science and art of selecting and interconnecting hardware components to create computers that meet fComputer architecture comprises at least three main subcategories:[1]
Instruction set architecture, or ISA, is the abstract image of a computing system that is seen by a machine language (or assembly language) programmer, including the instruction set, word size, memory address modes, processor registers, and address and data formats.
Microarchitecture, also known as Computer organization is a lower level, more concrete and detailed, description of the system that involves how the constituent parts of the system are interconnected and how they interoperate in order to implement the ISA.[2] The size of a computer's cache for instance, is an organizational issue that generally has nothing to do with the ISA. unctional, performance and cost goals.
Computer network
Sabtu, 15 Mei 2010
CD
CD-ROMs are popularly used to distribute computer software, including games and multimedia applications, though any data can be stored (up to the capacity limit of a disc). Some CDs hold both computer data and audio with the latter capable of being played on a CD player, while data (such as software or digital video) is only usable on a computer (such as ISO 9660 format PC CD-ROMs). These are called enhanced CDs.
Although many people use lowercase letters in this acronym, proper presentation is in all capital letters with a hyphen between CD and ROM. It was also suggested by some,[who?] especially soon after the technology was first released, that CD-ROM was an acronym for "Compact Disc read-only-media", or that it was a more "correct" definition. This was not the intention of the original team who developed the CD-ROM, and common acceptance of the "memory" definition is now almost universal. This is probably in no small part due to the widespread use of other "ROM" acronyms such as Flash-ROMs and EEPROMs where "memory" is usually the correct term.[citation needed]
At the time of the technology's introduction it had far more capacity than computer hard drives common at the time, although the reverse is now true though some experimental descendants of it such as Holographic versatile disc may not have more space than today's biggest hard drive.
Pendrive
Pen drives are classified as NAND style data storage devices. Equipped with a large amount of memory capacity, the pen drive is considered to be an improvement on both the older floppy drive disks and the more modern compact disks that are often used to copy data and reload the files on a different hard drive. Even a pen drive with a relatively low storage capacity tends to provide plenty of space for a number of files. The types of files that can be loaded onto a pen drive are all the common types that can be housed on any hard drive. This makes it possible for persons to copy photos, spreadsheets, word processing documents, movie clips, music tracks, and just about any other type of file.
Utilizing a pen drive is a simple task. One end of the drive is equipped with a USB connector at one end. The connector is inserted into the USB port on a desktop or laptop and activated. Once the pen drive is in place, it is possible to drop and drag files into the memory of the drive, or forward the files to the drive. The process is no more difficult than attaching files to an email or copying files onto a disk.
Because there are several different operating systems in common use today, there are various types of levels of the pen drive that are configured to work with each system. Even persons who are using an older operating system can usually find a pen drive that is compatible. As long as the desktop or laptop is constructed with a USB port, and the pen drive is compatible with the operating system, the pen drive will provide practical and easy transmission of data from one hard drive to another one in a matter of minutes.
Rabu, 5 Mei 2010
function of operating system
2) to handle disk input/output settings.
3) loaded in the memory at bootup and remain in the memory at all time.
4) to provid the OS with the machanism in order to see the additional memory.
5) used to access the high memory area. (himem.sys )
6) it allows the rest of the OS and its programs to interact directry with the system hardware and the system BIOS.
7) it sets particular values corresponding to the windows environment.
8) used to run particular programs during startup.
OpErAtInG SyStEm,,
Because early computers were often built for only a single task, operating systems did not exist in their proper form until the 1960s.[4] As computers evolved into being devices that could run different programs in succession, programmers began putting libraries of common programs (in the form of computer code) onto the computer in order to avoid duplication and speed up the process. Eventually, computers began being built to automatically switch from one task to the next. The creation of runtime libraries to manage processing and printing speed came next, which evolved into programs that could interpret different types of programming languages into machine code. When personal computers by companies such as Apple Inc., Atari, IBM and Amiga became popular in the 1980s, vendors began adding features such as software scheduling and hardware maintenance.
An operating system can be divided into many different parts. One of the most important parts is the kernel, which controls low-level processes that the average user usually cannot see: it controls how memory is read and written, the order in which processes are executed, how information is received and sent by devices like the monitor, keyboard and mouse, and deciding how to interpret information received by networks. The user interface is the part of the operating system that interacts with the computer user directly, allowing them to control and use programs. The user interface may be graphical with icons and a desktop, or textual, with a command line. Another similar feature is an Application programming interface, which is a set of services and code libraries that let applications interact with one another, as well as the operating system itself. Depending on the operating system, many of these components may not be considered an actual part. For example, Windows considers its user interface to be part of the operating system, while many versions of Linux do not.
Random-access memory(RAM)
By contrast, storage devices such as magnetic discs and optical discs rely on the physical movement of the recording medium or a reading head. In these devices, the movement takes longer than data transfer, and the retrieval time varies based on the physical location of the next item.
The word RAM is often associated with volatile types of memory (such as DRAM memory modules), where the information is lost after the power is switched off. Many other types of memory are RAM, too, including most types of ROM and a type of flash memory called NOR-Flash.
Random-access memory(RAM)
By contrast, storage devices such as magnetic discs and optical discs rely on the physical movement of the recording medium or a reading head. In these devices, the movement takes longer than data transfer, and the retrieval time varies based on the physical location of the next item.
The word RAM is often associated with volatile types of memory (such as DRAM memory modules), where the information is lost after the power is switched off. Many other types of memory are RAM, too, including most types of ROM and a type of flash memory called NOR-Flash.
Read-only memory(ROM)
In its strictest sense, ROM refers only to mask ROM (the oldest type of solid state ROM), which is fabricated with the desired data permanently stored in it, and thus can never be modified. However, more modern types such as EPROM and flash EEPROM can be erased and re-programmed multiple times; they are still described as "read-only memory"(ROM) because the reprogramming process is generally infrequent, comparatively slow, and often does not permit random access writes to individual memory locations. Despite the simplicity of mask ROM, economies of scale and field-programmability often make reprogrammable technologies more flexible and inexpensive, so mask ROM is rarely used in new products as of 2007[update].
sEcOnDaRy StOrAgE,,,
In modern computers, hard disk drives are usually used as secondary storage. The time taken to access a given byte of information stored on a hard disk is typically a few thousandths of a second, or milliseconds. By contrast, the time taken to access a given byte of information stored in random access memory is measured in billionths of a second, or nanoseconds. This illustrates the very significant access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically about a million times slower than memory. Rotating optical storage devices, such as CD and DVD drives, have even longer access times. With disk drives, once the disk read/write head reaches the proper placement and the data of interest rotates under it, subsequent data on the track are very fast to access. As a result, in order to hide the initial seek time and rotational latency, data are transferred to and from disks in large contiguous blocks.
When data reside on disk, block access to hide latency offers a ray of hope in designing efficient external memory algorithms. Sequential or block access on disks is orders of magnitude faster than random access, and many sophisticated paradigms have been developed to design efficient algorithms based upon sequential and block access . Another way to reduce the I/O bottleneck is to use multiple disks in parallel in order to increase the bandwidth between primary and secondary memory.[2]
Some other examples of secondary storage technologies are: flash memory (e.g. USB flash drives or keys), floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives.
The secondary storage is often formatted according to a file system format, which provides the abstraction necessary to organize data into files and directories, providing also additional information (called metadata) describing the owner of a certain file, the access time, the access permissions, and other information.
Most computer operating systems use the concept of virtual memory, allowing utilization of more primary storage capacity than is physically available in the system. As the primary memory fills up, the system moves the least-used chunks (pages) to secondary storage devices (to a swap file or page file), retrieving them later when they are needed. As more of these retrievals from slower secondary storage are necessary, the more the overall system performance is degraded.
PrImArY sToRaGe,,,
Historically, early computers used delay lines, Williams tubes, or rotating magnetic drums as primary storage. By 1954, those unreliable methods were mostly replaced by magnetic core memory, which was still rather cumbersome. Undoubtedly, a revolution was started with the invention of a transistor, that soon enabled then-unbelievable miniaturization of electronic memory via solid-state silicon chip technology.
This led to a modern random-access memory (RAM). It is small-sized, light, but quite expensive at the same time. (The particular types of RAM used for primary storage are also volatile, i.e. they lose the information when not powered).
As shown in the diagram, traditionally there are two more sub-layers of the primary storage, besides main large-capacity RAM:
Processor registers are located inside the processor. Each register typically holds a word of data (often 32 or 64 bits). CPU instructions instruct the arithmetic and logic unit to perform various calculations or other operations on this data (or with the help of it). Registers are technically among the fastest of all forms of computer data storage.
Processor cache is an intermediate stage between ultra-fast registers and much slower main memory. It's introduced solely to increase performance of the computer. Most actively used information in the main memory is just duplicated in the cache memory, which is faster, but of much lesser capacity. On the other hand it is much slower, but much larger than processor registers. Multi-level hierarchical cache setup is also commonly used—primary cache being smallest, fastest and located inside the processor; secondary cache being somewhat larger and slower.
Main memory is directly or indirectly connected to the central processing unit via a memory bus. It is actually two buses (not on the diagram): an address bus and a data bus. The CPU firstly sends a number through an address bus, a number called memory address, that indicates the desired location of data. Then it reads or writes the data itself using the data bus. Additionally, a memory management unit (MMU) is a small device between CPU and RAM recalculating the actual memory address, for example to provide an abstraction of virtual memory or other tasks.
As the RAM types used for primary storage are volatile (cleared at start up), a computer containing only such storage would not have a source to read instructions from, in order to start the computer. Hence, non-volatile primary storage containing a small startup program (BIOS) is used to bootstrap the computer, that is, to read a larger program from non-volatile secondary storage to RAM and start to execute it. A non-volatile technology used for this purpose is called ROM, for read-only memory (the terminology may be somewhat confusing as most ROM types are also capable of random access).
Many types of "ROM" are not literally read only, as updates are possible; however it is slow and memory must be erased in large portions before it can be re-written. Some embedded systems run programs directly from ROM (or similar), because such programs are rarely changed. Standard computers do not store non-rudimentary programs in ROM, rather use large capacities of secondary storage, which is non-volatile as well, and not as costly.
Recently, primary storage and secondary storage in some uses refer to what was historically called, respectively, secondary storage and tertiary storage.[1]
StOrAgE,,
In contemporary usage, memory usually refers to a form of semiconductor storage known as random-access memory (RAM) and sometimes other forms of fast but temporary storage. Similarly, storage today more commonly refers to mass storage — optical discs, forms of magnetic storage like hard disk drives, and other types slower than RAM, but of a more permanent nature. Historically, memory and storage were respectively called main memory and secondary storage. The terms internal memory and external memory are also used.
The contemporary distinctions are helpful, because they are also fundamental to the architecture of computers in general. The distinctions also reflect an important and significant technical difference between memory and mass storage devices, which has been blurred by the historical usage of the term storage. Nevertheless, this article uses the traditional nomenclature.
Khamis, 29 April 2010
hot news,,(harian metro)
TANAH MERAH: “Saya terdengar suara jeritan bayi tapi tak tahu di mana. Sebaik membuka pintu rumah, saya terkejut apabila mendapati seorang bayi dibalut dengan kain selimut ditinggalkan di beranda rumah,” kata Sukma Abdullah, 53.
MALANG...bayi yang ditinggalkan
Menurut Sukma, sebelum itu dia sedang bersiap untuk tidur sebelum dikejutkan dengan suara tangisan bayi.
Katanya, dia yang tinggal berseorangan agak takut kemungkinan diganggu ‘makhluk halus,’ namun sangkaannya meleset apabila dikejutkan dengan kehadiran bayi itu.
“Ketika itu, saya ingin masuk tidur tapi terdengar suara bayi. Saya takut dan turut menyangka tangisan itu adalah anak jiran yang mungkin sakit.
“Saya kemudian memeriksa dalam rumah sebelum membuka tingkap dekat pintu utama. Saya terkejut kerana ternampak ada ‘benda’ di beranda rumah sebelum memberanikan diri membuka pintu untuk melihat dari dekat. Saya terkejut mendapati ia seorang bayi,” katanya.
Sukma berkata, dia yang panik kemudian terus memberitahu jiran berhampiran sebelum menghubungi polis.
Katanya, dia turut hairan bagaimana ada individu boleh meninggalkan bayi di situ sedangkan terdapat ramai orang lalu lalang di depan rumahnya untuk mengunjungi pasar malam.
“Bayi itu ditinggalkan dalam keadaan sempurna dan sihat cuma terdapat sedikit kesan darah,” katanya.
Bayi seberat 3.3 kilogram itu dikatakan baru berusia dua hari dan masih bertali pusat.
Ketua Polis Daerah Tanah Merah, Deputi Superintendan Abdul Aziz Mahmud, berkata, pihaknya bergegas ke tempat kejadian sebaik menerima maklumat awam.
Katanya, bayi terbabit didapati dalam keadaan berbungkus dengan kain tuala dan selimut.
“Bayi terbabit kemudian dibawa ke Hospital Tanah Merah bagi mendapatkan rawatan segera di unit kecemasan sejurus kemudian.
“Setakat ini bayi itu ditempatkan di Wad Penjagaan Kanak-kanak dan suspek masih dicari,” katanya.
Menurutnya, polis turut meminta kerjasama pegawai Pejabat Pelajaran Daerah selain orang ramai untuk membantu siasatan.
“Semakan akan dibuat di sekolah menengah bagi mengenal pasti pelajar yang tidak hadir ke sekolah untuk tempoh beberapa hari dan beberapa klinik swasta sekitar daerah bagi membantu siasatan.
“Mereka mempunyai maklumat boleh menghubungi Inspektor Mardiana di talian 09-9557704,” katanya.
HOW TO INSTALL OFFICE 2007
Step 1: Insert the Microsoft Office 2007 Enterprise CD. If the Setup Wizard does not automatically begin, then click Start > Run > D:\setup.exe
Step 2: Enter the Product Key from the back of the CD jacket. Note: This is a unique code. Please keep in a safe place!
Click Continue.
Step 3: Check the box "I accept the terms of this agreement" and click the Continue button.
Step 4: Choose an installation option, Upgrade (removes Office 2003) or Customize (keeps Office 2003 installed and adds Office 2007, allowing you to use them both).
Note: Outlook 2003 will be uninstalled in either option. Outlook will be updated and your user settings and mail will migrate to the new version.
If you click Upgrade, go on to Step 5.
If you click Customize, go on to Step 4a.
Step 4a: Click the radio button for "Keep all previous versions."
Click the Installation Options tab, left-click the first drop down box and click Run all from My Computer
Click Install Now.
Step 5: Installation will begin. It may take 15-30 minutes to finish.
Step 6: Click Close to complete the installation.
Step 7: The first time you launch any Office program, you will be prompted to activate the software. As long as you have an active Internet connection, choose the default option and click Next.
Step 8: When the activation finishes, click Close.
Step 9: Click OK to finish.
If you have any questions or problems, contact your departmental computing consultant or the Help Desk (84357).
August 16, 2007
Rabu, 28 April 2010
IP Address
The designers of TCP/IP defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 or IPv4, is still in use today. However, due to the enormous growth of the Internet and the resulting depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995[3] and last standardized by RFC 2460 in 1998.[4] Although IP addresses are stored as binary numbers, they are usually displayed in human-readable notations, such as 208.77.188.166 (for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6).
The Internet Protocol also routes data packets between networks; IP addresses specify the locations of the source and destination nodes in the topology of the routing system. For this purpose, some of the bits in an IP address are used to designate a subnetwork. The number of these bits is indicated in CIDR notation, appended to the IP address; e.g., 208.77.188.166/24.
As the development of private networks raised the threat of IPv4 address exhaustion, RFC 1918 set aside a group of private address spaces that may be used by anyone on private networks. They are often used with network address translators to connect to the global public Internet.
The Internet Assigned Numbers Authority (IANA), which manages the IP address space allocations globally, cooperates with five Regional Internet Registries (RIRs) to allocate IP address blocks to Local Internet Registries (Internet service providers) and other entities.
BeRiTa tErKiNi (28 April 2010)
Central Processer Unit (CPU)
Early CPUs were custom-designed as a part of a larger, sometimes one-of-a-kind, computer. However, this costly method of designing custom CPUs for a particular application has largely given way to the development of mass-produced processors that are made for one or many purposes. This standardization trend generally began in the era of discrete transistor mainframes and minicomputers and has rapidly accelerated with the popularization of the integrated circuit (IC). The IC has allowed increasingly complex CPUs to be designed and manufactured to tolerances on the order of nanometers. Both the miniaturization and standardization of CPUs have increased the presence of these digital devices in modern life far beyond the limited application of dedicated computing machines. Modern microprocessors appear in everything from automobiles to cell phones and children's toys.
internet
Most traditional communications media, such as telephone and television services, are reshaped or redefined using the technologies of the Internet, giving rise to services such as Voice over Internet Protocol (VoIP) and IPTV. Newspaper publishing has been reshaped into Web sites, blogging, and web feeds. The Internet has enabled or accelerated the creation of new forms of human interactions through instant messaging, Internet forums, and social networking sites.
The origins of the Internet reach back to the 1960s when the United States funded research projects of its military agencies to build robust, fault-tolerant and distributed computer networks. This research and a period of civilian funding of a new U.S. backbone by the National Science Foundation spawned worldwide participation in the development of new networking technologies and led to the commercialization of an international network in the mid 1990s, and resulted in the following popularization of countless applications in virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population uses the services of the Internet.
The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.
Selasa, 20 April 2010
cross cable (cat5 )
Khamis, 25 Mac 2010
computer keyboard
In normal usage, the keyboard is used to type text and numbers into a word processor, text editor or other program. In a modern computer, the interpretation of keypresses is generally left to the software. A computer keyboard distinguishes each physical key from every other and reports all keypresses to the controlling software. Keyboards are also used for computer gaming, either with regular keyboards or by using keyboards with special gaming features, which can expedite frequently used keystroke combinations. A keyboard is also used to give commands to the operating system of a computer, such as Windows' Control-Alt-Delete combination, which brings up a task window or shuts down the machine.