Senin, 27 Juli 2009

Hard drive gone bad


Hard drive gone bad

The most common problems originate
from corruption of the master boot record, FAT, or directory.
Those are soft problems which can usually be taken care of
with a combination of tools like Fdisk /mbr to refresh the
master boot record followed by a reboot and Norton disk doctor
or Spinneret.

The most common hardware problems are a bad controller, a bad
drive motor, or a bad head mechanism.

1. Can the BIOS see and identify the hard drive correctly? If
it can't, then the hard drives onboard controller is bad.

2. Does the drive spin and maintain a constant velocity? If it
does, that's good news. The motor is functioning.

3. If the drive surges and dies, the most likely cause is a
bad controller (assuming the drive is cool). A gate allowing
the current to drive the motor may not be staying open. The
drive needs a new controller.

4. Do you hear a lot of head clatter when the machine is
turned on and initialized (but before the system attempts to
access the hard drive). Head clatter would indicate that the
spindle bearings are sloppy or worn badly. Maybe even lose and
flopping around inside.

5. There is always the possibility that the controller you are
using in the machine has gone south.

1. If the drive spins, try booting to the A> prompt, run Fdisk
and check to see if Fdisk can see a partition on the hard
drive. If Fdisk can see the partition, that means that it can
access the drive and that the controller electronics are
functioning correctly. If there is no head clatter, it may be
just a matter of disk corruption which commonly occurs when a
surge hits you machine and overwhelms the power supply voltage
regulator. It commonly over whelms the system electronics
allowing an EM pulse to wipe out the master boot record, file
allocations table, and primary directory. Fdisk can fix the
master boot record and Norton Disk Doctor can restore the FAT
and Directory from the secondaries.
2. The drive spins but Fdisk can't see it. Try the drive in
another system and repeat the test to confirm that Fdisk can't
read through the drives onboard controller. If it sees it in
another system, then your machines hard drive interface is
bad. You can try an upgraded or replacement controller card
like a Promise or CMD Technologies (there are others) in you
machine after disabling the integrated controller in the BIOS,
but if the integrated controller went south, it may just be
symptomatic of further failures and you'd be wise to replace
the motherboard. Trying the drive in another machine also
eliminates the variable that your machines 12 volt power
output being bad

3. If you get head clatter but a constant velocity on the
drive motor (no surging), you might try sticking the hard
drive in the freezer for about 12 hours. This is an old trick
from back in the days of the MFM/ESDI driver era. This can
cause the drive components to shrink enough to make the track
marker align with the tracks. We don't see that kind of
platter spindle wear much anymore, but back in the old days,
the balancing and bearings weren't as good. Still, under the
right circumstances, it might help. It would depend on how old
the drive is and how many hours of wear have occurred. You
have to be quick to get your info off the drive when it works.
Back then, the drives were much smaller, so there wasn't so
much to copy. So, go after the important data first.

4. The drive doesn't spin. Either the onboard controller is
bad or the motor is bad (assuming you did try the drive in
another machine). It's time to hit the net and local
independent shops to see if you can locate another drive of
the same make and model that's good. Since the drive is
probably an older drive and no longer in distribution, your
best bet is to find an identical used drive. If you know
someone with the same make and model, you might be wise to try
and persuade them to sell you their drive with an offer of
providing them with a free upgraded drive. If you can locate
an identical drive, start with the controller replacement ...
this is the simplest and least invasive. If swapping the
controller doesn't produce the desire result, you can tear
into the drive and swap the motors. While you have both drive
opened up to accomplish this, scrutinize the platters, heads
and armatures. You might even hook the drive up and power it
from a system with both drives attached. This way, you could
see anything that deviates between the actions of both drives
when they are initialized. Swapping patters is unlikely to
produce any positive result. They are a balanced system like
the tires on your car and I suspect that the balance will be
different for each drive as will other variables.

5. There's always Ontrack Corp. who will attempt to recoup
your info starting at $500 and going up from there. They don't
fix and return the drive either.


If the info is all that important to you, I would seek some
professional and experience technician in your locality who
makes his living from servicing and building computer systems
... not just selling them. If you have had much experience
salvaging information from bad hard drives, your likelihood of


success is low. In the case of soft corruption, all utilities
have their eccentricities. Often times, Norton Disk Doctor
will go too far (if you let it). It's wise to just let those
utilities small steps and then have a look at the drive and
see if you can copy it off. Norton will go so far as to rename
directories and files, and even delete them or break them up
into fragments which are useless.

Get unlimited bandwidth for free

Get unlimited bandwidth from your host for free


NOTE: This applies only to specific hosting companies, due to the
specific setup needed and does have its drawbacks.

While setting up hosting space with a specific company I often deal
with, I noticed that they used a shared IP. (IP shared by two or more
websites/domains.) Well, the rates for unlimited bandwidth were
around $50+ per month, which I found unreasonable. I didnt require
much space, and didnt want to be limited to a mere 3 gig of traffic
per month.

Back on track... When setting up the acct, the hosting company needs
to know the domain name so that they can direct it accordingly.
(example: 'http://www.123.4.567.890/~user1/ ,
'http://www.123.4.567.890/~user2/ etc)

At this point you can give a url that doesnt belong to you at all. As
long as the nameservers dont change, that should have absolutly no
negative effects on you or your site whatsoever.

How it works is this:
The host propogates you a certain amount space on its servers, and
monitors the traffic that enters their space through the domain its
registered under. Being that the domain isn't connected to the site
at all, it registers ZERO traffic.

Zero traffic registered = can't possibly go over bandwidth
restrictions
can't possibly go over bandwidth restrictions = free unlimited
bandwidth

Now the problems with this (besides the ethical ones) is that your
host may offer X amount of mail addys with the acct
(you@y...) and these will not work, as the name isnt on their
DNS. However, some domain companies allow you to set it up
regardless. Another problem seems to be strictly cosmetic, but can be
highly problematic... Once you attach the domain you want onto the
site, each page comes up/w the ip/UN the host propagated to your
acct. Its at this point where you have to have a phenominal 10-15
character alphanumerical or better (#, &, etc) pw, or your site will
be vulnerable to attack since the attacker already has your UN. This
only gives attackers a slight advantage as the amount of time it
would take to brute force a 10 character pw @ a rate of 1,000,000 per
second is 10 years. Add numbers and case sensitivity to that and it
becomes approx 26,980 years.

While I'm on it, I may as well add that if you use this method,
obviously you are going to be using the lowest cost hosting plan
available, which in turn will offer the least amount of space. Thats
why free hosts were invented.

Free hosts suck as a general rule. Who wants a site smothered in ads?
However, if you upload all your programs, graphics and other large
files (have a backup of course) to a reliable free host and target
them accordingly from your site you have just freed up a signifigant
amount of space. The only setback/w this is having to keep an index
card or file around/w your pws, as you should never use the same one
twice, and want to use complicated ones.

Minggu, 19 Juli 2009

Hacking Menggunakan DOS



Microsoft DOS datang dengan beberapa hacking tool tersembunyi yang akan saya diskusikan disini. Tool ini dapat ditemukan pada direktori c:\windows jika anda menggunakan win98 dan jika anda menggunakan winxp maka tool ini berada pada C:\winxp\system32. WinXP, Win2000 dan WinNT dirilis dengan beberapa tool internet tambahan. Jadi jika anda masih menggunakan win98 maka saya menyarankan agar menggantinya dengan WinXP. Yang tentunya memiliki fitur securiti tambahan dan perintah hacking internet yang bagus. Dalam manual ini saya akan membahas mengenai beberapa perintah yang ditemukan pada Win98 dan winXP

Jadi bagi pengguna window, berikut ini perintah-perintah hacking pada DOS.

1. ping
2. tracert
3. telnet
4. ftp
5. netstat

OK, inilah keterangannya.

1. ping

Utiliy ini digunakan untuk mencari keberadaan remote host. Yan gmengirmkan sebuah signal SYN ke remote host dan jika remote host membalas maka berarti memang ada suatu remote machine.

Cobalah anda ketik perintah ini:
C:\windows>ping/?
*************
Newbie tip: mengetik '/?' setelah perintah dos menampilkan helpnya. Jadi bagaimana anda belajar aneka perintah dos. Bukankah WinXP, WinNT dan Win2000 juga memiliki perintah ‘help’ untuk menampilkan seluruh perintah dos.
*************
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] destination-list
Options:
-t Ping the specified host until stopped.
To see statistics and continue - type Control-Break;
To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don't Fragment flag in packet.
-i TTL Time To Live.
-v TOS Type Of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.
-j host-list Loose source route along host-list.
-k host-list Strict source route along host-list.
-w timeout Timeout in milliseconds to wait for each reply.



Jadi saya dapat melakukan ping ke ip address apapun atau domain name untuk memeriksa keberadaannya di internet. Sebagai contoh saya mengetik “ping localhost” maka saya mendapatkan.
Pinging chintan [127.0.0.1] with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128
Reply from 127.0.0.1: bytes=32 time<10ms TTL=128
Reply from 127.0.0.1: bytes=32 time<10ms TTL=128
Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

************
Newbie tip: 'localhost' adalah ip 127.0.0.1 dan merupakan ip address kita sendiri. Juga dikenal sebagai loopback ip. Tapi saat anda terhubung ke internet anda akan diberi ip baru oleh isp anda sebagai identifikasi diri anda. Anda dapat mencari tahu ip anda dengan mengetik”winipcfg” pada menu Start-Run bagi pengguna Win98, sedangkan yang lainnya hanya mengetikkan “ipconfig” pada command prompt.
***********

Hal ini menunjukkan kepada saya bahwa 32 byte data dikirim ke 127.0.0.1 dan dibalas kembali kurang dari 10ms. TTL adalah Time To Live dan nilai range dari 0 hingga 255 (default 128). Sekarang biar kita lihat apa yang terjadi jika saya mengetik “ping www.yahoo.com”

Pinging www.yahoo.akadns.net [66.218.71.87] with 32 bytes of data:






Reply from 66.218.71.87: bytes=32 time=3448ms TTL=54
Reply from 66.218.71.87: bytes=32 time=2276ms TTL=54
Reply from 66.218.71.87: bytes=32 time=1799ms TTL=54
Reply from 66.218.71.87: bytes=32 time=2850ms TTL=54

Ping statistics for 66.218.71.87:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1799ms, Maximum = 3448ms, Average = 2593ms



Tapi bagaimana ping tersebut digunakan oleh para hacker? Baiklah, ada dua opsi ‘|’ dan ‘-t’ yang mematikan. -| digunakan untuk spesifikasi ukuran buffer yang dikirimkan (defaultnya 32 byte) bagaimana jika saya mengetik “ping -| 65600 target.com” maka hal ini akan membawa maut 65600 paket data ke target.com yang lebih tinggi dari kapasitas TCP/IP 65535. Tindakan ini menyebabkan target.com menjadi hang dan harus di restart.

Dan jika saya mengetik “ping –t target.com” hal ini akan meneruskan pengiriman 32 byte data ke target.com hingga menghabiskan resource dan menyebabkan hang. Dua jenis serangan diatas dikenal sebagai ping attack bagi penyerang Dos.

***********
Newbie tip: 'Dos' yang terakhir disebutkan adalah Denial of service yang dilancarkan oleh hacker untuk menghentikan service pada remote machine.
***********
Catatan: Jenis serangan ini dimasa lalu sering digunakan, namun saat ini pada sistem yang telah diperbarui hal tersebut tidak akan bekerja lagi.

2. Tracert

Perintah Tracert melakukan penjejakan ke remote machine. Sebelum request kita menjangkau remote machine melalui router yang berbeda diantaranya. Tool tracert (dikenal sebagai ‘traceroute’ pada unix) pada awalnya dirancang untuk mencari router mana yang mengalami masalah. Perintah tersebut menunjukkan ip address router yang dilalui request kita sebelum menjangkau remote maching. Sebagai contoh, jika saya mengetik “tracert http://www.yahoo.com/” pada dos prompt maka akan terdapat:

Tracing route to www.yahoo.akadns.net [66.218.71.87]
over a maximum of 30 hops:

1 * 2296 ms 2025 ms dialpool-210-214-55-11.maa.sify.net [210.214.55.11]
2 2446 ms 2025 ms 2301 ms dialpool-210-214-55-2.maa.sify.net [210.214.55.2]
3 1899 ms 2066 ms 2450 ms lan-202-144-32-177.maa.sify.net [202.144.32.177]
4 * 2885 ms 2749 ms lan-202-144-83-4.maa.sify.net [202.144.83.4]
5 * * * Request timed out.
6 * * * Request timed out.
7 * * * Request timed out.
8 * * * Request timed out.
9 * * * Request timed out.
10 * 3408 ms * www.yahoo.akadns.net [66.218.71.87]
11 * * * Request timed out.
12 * * * Request timed out.
13 * * * Request timed out.
14 * * * Request timed out.
15 * * * Request timed out.
16 * * * Request timed out.
17 482 ms 698 ms 624 ms w8.scd.yahoo.com [66.218.71.87]

Trace complete.

Baris pertama memberitahukan kita ip mana yang menjejaki dan kemudian jumlah hop. Jumlah hop tergantung pada jumlah server yang ada diantaranya. Setelah memulai tracing. Request pertama saya melalui sify.net (nama ISP server saya) kemudian melalui server yang berbeda dan terakhir menjangkau w8.scd.yahoo.com. Jadi kita dapat melihat berapa lama prosedurnya. Kapanpun anda membuka http://www.yahoo.com/ dalam web browser, request anda selalu melalui isp dulu (untuk mendapatkan ip dari http://www.yahoo.com/ dari daftar nama domainnya) kemudian server lain dalam jalur tersebut dan terakhir pada yahoo.
Jadi bagaimana tracert digunakan oleh para hacker. Perintah ini digunakan untuk mencari firewall dan melumpuhkannya. Tracer digunakan bersamaan dengan nmap dapat mengetahui ip sebenarnya dimana firewall terpasang, kemudian hacker tersebut akan melumpuhkannya. Untuk contoh diatas kita melihat bahwa proses tracing terhenti pada w8.scd.yahoo.com. Namun hal ini bukanlah tujuan sebenarnya. Hal itu dikarenakan dihentikan oleh firewall. Mengenai masalah firewall akan kita bahas dalam artikel tersendiri.

3. Telnet

Jika anda menggunakan windows maka ‘telnet’ merupakan hacking tool terhebat bagi anda. Sebenarnya merupakan sebuah terminal yang dapat mengakses remote machine dan menggunakan service-nya. Melalui telnet anda dapat menentukan suatu koneksi antara mesin anda dan remote machine melalui port tertentu.

***********
Newbie tip: Disini saya membicarakan tentang virtual port. Tidak secara fisik yang anda lihat dibalik CPU anda. Hanya sebagai physical port yang digunakan untuk koneksi ke hardware dan dengan cara yang sama virtual port digunakan untuk koneksi pada software. TCP/IP memiliki 65,535 virtual port.
***********
Jika anda mengentik “telnet target.com” maka anda terhubung ke target.com pada prot no. 23 (port yang menjalankan telnet service). Anda juga bisa terhubung ke suatu port lainnya dengan mengetik nomor port setelah target.com. sebagai contoh jika saya ingin terhubung ke port no. 25 (SMTP service) maka salya akan mengetik “telnet target.com 25”.
***********
Newbie tip: Setiap port menjalankan service tertentu. Untuk mendaptkan daftar service yang dijalankan pada port tertentu yang bukalah “C:\windows\services" pada notepad.
***********
Sesaat anda terhubung ke sebuah remote machine pada port tertentu, sebuah window popup telnet dengan daemon yang menjalankan port tersebut menunggu anda mengetikkan perintah. Sebagai contoh “telnet http://www.cyberspace.org/” maka seperti gambar dibawah inilah yang saya dapatkan.




Saya harus login disana dan mengetik suatu password dan saya mendapatkan linux shell prompt. Baiklah jika anda mengetikan newuser disana untuk mendapatkan sebuah LoginID dan Password. Dan stelah itu saya menyiapkan perintah untuk mengeksekusi secara remote.

Well, http://www.cyberspace.org/ memiliki server Linux. Jadi jika anda tidak familiar dengan Linux anda tidak akan mampu menggunakan service-nya.



4. FTP

FTP adalah File Transfer Protocol. Melalui ini anda dapat mendownload atau mengupload file. Dan apa yang hacker inginkan dari ini? Benar!! Tinggal mengeti “ftp target.com” dan daemon banner akan ditampilkan. Tapi disini, dengan tujuan menampilkan file transfer pertama kali anda harus login. Beberapa website mengijinkan adanya naonymous login. Contohnya mengetikkan login “anonymous” dan email-address anda sebagai password. Tentunya anda harus mengetikkan email palsu. Sekarang anda boleh mulai mendownload dan mengupload file. Namun untuk itu anda adanya suatu perintah. Pada FTP prompt anda dapat mengetikkan “?”. Maka akan ditampilkan sbb:


! delete literal prompt send
? debug ls put status
append dir mdelete pwd trace
ascii disconnect mdir quit type
bell get mget quote user
binary globe mkdir recv verbose
bye hash mls remotehelp
cd help mput rename
close lcd open rmdir

Untuk mendaptkan bantuan pada berbagai perintah contohnya perintah delete, mengetikan “? Delete”. Beberapa perintah penting lainnya adalah:

1. 'pwd' to know the present directory at remote machine.
contohnya. ftp>pwd
/etc/home
2. 'lcd' to change the local directory.
contohnya. ftp>lcd C:\windows
local directory now C:\windows
3. 'cd' to change the remote directory.
contohnya. ftp>cd /etc
remote directory now /etc
4. 'mput' to send multiple files to remote machine.
contohnya. ftp>mput *.*
sends all files from C:\windows to /etc
5. 'mget' to get multiple files from remote machine.
contohnya. ftp>mget *.*
gets all files from /etc to C:\windows
6. 'open' to establish a connection with remote host.
contohnya. ftp>open www.target.com
7. 'bye' closes the connection and quits from ftp

Untuk perintah lainnya dari ftp silakan lihat help mereka.

Sekarang pada yang port FTP (prot 21) adalah membuka http://www.nosecurity.com/. Seorang hacker akan terhubung ke situs tersebut menggunakan “ftp http://www.nosecurity.com/” pada dos prompt. Kemudian dia akan mencoba login secara anonymous. Dengan anggapan bahwa http://www.nosecurity.com/ menggunakan linux server, maka hacker tersebut akan mengtikkan perintah “get /etc/apsswd” untuk mendaptkan file password dan mengcracknya. Jika anda adalah seorang hacker, maka jangan lupa untuk menghapus log tersebut.



5. netstat

Anda dapat menentukan suatu koneksi dengan remote machine pada port tertentu, hanya saat port tersebut dibuka pada remote machine. Sebagai contoh, jika anda ingin menentukan sebuah koneksi dengan http://www.target.com/ pada port 23 (telnet) maka port tersebut seharusnya terbuka pada http://www.target.com/. Dan seluruh aktifitas hacking umumnya menggunakan port yang terbuka. Mengetikkan “netstat /?” pada dos prompt memberikan:


Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s
option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the -p option may be used to specify
a subset of the default.
interval Redisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.

Opsi akan menjelaskan fungsinya masing-masing. Dan yang terpenting adalah opsi –a dan –n. Opsi –a menampilkan seluruh port yang terbuka pada mesin tersebut. Dan jika saya menggunakan opsi –n maka akan menunjukkan ip address sebagai ganti dari domain. Saya mendapatkan hal berikut ini jika saya mengetik “netstat –a” pada command prompt.


Active Connections

Proto Local Address Foreign Address State
TCP chintan:1027 0.0.0.0:0 LISTENING
TCP chintan:80 0.0.0.0:0 LISTENING
TCP chintan:135 0.0.0.0:0 LISTENING
TCP chintan:6435 0.0.0.0:0 LISTENING
TCP chintan:1025 0.0.0.0:0 LISTENING
TCP chintan:1026 0.0.0.0:0 LISTENING
TCP chintan:1028 0.0.0.0:0 LISTENING
TCP chintan:1309 0.0.0.0:0 LISTENING
TCP chintan:1310 0.0.0.0:0 LISTENING
TCP chintan:1285 rumcajs.box.sk:80 ESTABLISHED
TCP chintan:1296 l an-202-144-78-3.maa.sify.net:80 CLOSE_WAIT
TCP chintan:1297 lan-202-144-65-14.sify.net:80 ESTABLISHED
TCP chintan:1310 cdn-v13.websys.aol.com:80 ESTABLISHED
TCP chintan:1220 aiedownload.cps.intel.com:ftp ESTABLISHED

”Proto” menyatakan nama protocol tersebut, “localaddress” memberikan ipaddress kita dan port yang terbuka. “Foreign Address” menyatkaan ipaddress dengan namor port yang terhubung ke kita. “State” menyatakan pernyataan saat ini jika suatu koneksi “established” atau listening atau hanya “waiting”.

Sebagai contoh jika saya membuka http://www.yahoo.com/ maka saat saya menjalankan “netstat –a” saya akan mendapatkan masukan seperti ini:

"TCP 203.43.50.81:2034 www.yahoo.com:80 ESTABLISHED"

Komputer saya dengan ip 203.43.50.81 melalui port 2034 terhubung dengan yahoo pada port 80


*************
Newbie tip: Dengna cara ini anda bisa mendapatkan ip seseorang yang chatting dengan ada. Pertama kali jalankan “netstat –an” dan lihat dibawah foreign ip address. Sekarang mulailah private chating dengan orang lain. Juga jalankan “netstat –an” dan anda akan mendapatkan satu lagin foreign ip pada akhirnya. Inilah ip orang tersebut.
*************



For any questions on this commands please feel free to mail me. My email address is chesschintan@hotmail.com


Cara membuat Form "Email Subscriber"


Seperti yang kamu lihat, disebelah kanan blog ini ada sebuah kotak yang berisi kotak untuk mengisikan alamat email dan sebuah tombol yang ada tulisan "Berlangganan Trik Baru". Nha dalam trik dan tips kali ini kita akan belajar kelompok tentang bagaimana membuat kotak tersebut. Oh ya, perlu dijelasin dulu nih apa fungsi dari form tersebut. Form tersebut fungsinya adalah untuk mempermudah para pembaca blog kita agar bisa berlangganan atau mendapatkan info terbari postingan kita melalui email mereka. Jadi jika memposting artikel baru maka para pelanggan/pembaca yang sudah memasukkan email mereka melalui form tersebut akan secara otomatis mendapatkan kiriman email yang berisi postingan terbaru kita. Mudeng ra? wes pokoke ngono lah.
Beginilah cara membuat form "Email Subscriber" tersebut :

1. Kunjungi situs ini : http://www.feedburner.com
2. Saat pertama kali datang kamu akan langsung disodori kotak untuk mengisikan alamat feed blogmu yang akan dibakar :D
3. Biasanya alamat feed blog kamu seperti ini http://NAMABLOGMU.blogspot.com/feeds/posts/default , ganti tulisan NAMABLOGMU dengan nama alamat blogmu.
3. Isikan nama feed blogmu tadi dalam kotak yang disodorkan tersebut, jika blogmu itu isinya hanya video2 maka beri tanda centang pada kotak "I am a podcaster", jika tidak ya gak usah dicentang. Kemudian klik tombol "next"
4. Setelah itu kamu akan disodori lagi dengan form pendaftaran, isikan data2 yg diperlukan disana, trus klik tombol "Activate Feed"
5. Nha kalo berhasil nanti akan ada informasi "Congrats! your ......".
6. Dibawahnya akan ada tombol "Next" dan link "Skip directly to feed management" kali ini pilih yang link "Skip directly to feed management", sebenarnya lewat tombol "next" bisa sih tapi biar seru kita lewat jalan lain aja.
7 Kemudian nanti akan ada beberapa menu, kali ini pilih menu "Publicize"
8. Setelah itu disebelah kiri akan muncul beberapa menu. PIlih menu "Email Subscriptions".
9. Kemudian klik tombol "Activate"
10. Nha setelah itu nanti akan ada beberapa kotak yang berisi kode2. Nha kalo km pinginnya yang berbentuk form maka pilih kode yang ada di kotak "Subsciption Form Code".
11. Copy kode yang ada dalam kotak tadi, trus klik tombol "Save" untuk mengaktifkan layanan tersebut.
12. Cara pasangnya, Login ke blogger, pilih "layout --> Add a Gadget --> HTMl/Java Script" nha paste kode yang sudah kamu copy tadi disana.

Sekarang coba dilihat blogmu, udah ada kan form untuk "Email Subscriber".



Trus kalo mo nampilin jumlah reder yang berlanganan gini caranya :
- Login ke feedburner kemudian pilih feed blogmu
- Trus masuk ke menu "Publicize --> FeedCount" nha disitu scriptnya yang harus km copy dan pasang di blogmu.

Membuat blog/web dengan wordpress


Saat ini pembuatan blog atau web site terbilang cukup mudah, hal ini karena adanya suatu sistem yang disebut Content Management System (CMS), yang bisa dikatakan sebagai template web site. Dengan CMS kita tinggal mengupload (copy) CMS ini ke server, menginstallnya setelah selesai tinggal masuk ke administrator untuk mengatur dan mengisi artikel yang diinginkan. Banyaknya CMS opensource yang tersedia kadang membuat kita bingung untuk memilihnya. Tetapi jika masih awam dengan CMS, apalagi belum banyak tahu tentang web programming seperti saya, maka sebaiknya memilih yang sederhana dan mudah, seperti wordpress.
Jika para blogger / pengguna wordpress ditanya mengapa kok menggunakan wordpress? Mungkin sebagian akan menjawab karena kemudahannya dan konfigurasi yang relatif sederhana. Bagi pengguna awal biasanya tidak memerlukan waktu lama untuk bisa menguasai dan memahaminya. Sederhana bukan berarti minim fasilitas. Memang fasilitas bawaan wordpress sendiri mungkin masih belum mencukupi jika anda ingin web dengan berbagai fasilitas yang wah, tetapi dengan besarnya komunitas dan dukungan plugins yang begitu banyak, kita tinggal menambahkan fasilitas apa yang diinginkan. Mulai dari konfigurasi administrasi, statistik, forum, iklan, artikel, kalender, dan sebagainya.
Bagaimana belajar membuat blog/web site dengan wordpress secara off-line ? Untuk melakukan hal itu diperlukan beberapa komponen yaitu : Apache ( berfungsi sebagai server ), MySQL (Database) dan PHP (bahasa pemrograman web). Coba ikuti langkah-langkah berikut :
A. Menginstall Apache, MySQL dan PHP
1. Download Apache dan MySQL dalam satu paket Apache friends yaitu xampplite (basic package) dari situs www.apachefriends.org, www.xampp.org atau dari http://sourceforge.net (ukuran sekitar 46 MB) yang bentuk zip atau exe (diinstall terlebih dulu). Untuk mudahnya pilih saja yang zip.



2. Extract xampplite ke drive yang diinginkan, misalnya C:\xampplite ( memerlukan space hardisk sekitar 115 MB ). Jika download yang exe, install terlebih dahulu.
3. Untuk mengetest apakan xampplite berhasil, buka folder C:\xampplite, jalankan xampp-control.exe dan klik start di baris Apache dan MySql, tunggu sampai ada tanda
bahwa keduanya berjalan dengan keterangan tulisan running.

4. Setelah keduanya berjalan ( ada keterangan running ) kemudian buka web browser anda ( mozilla firefox atau internet explorer ) dan ketikkan localhost lalu tekan enter. Maka jika instalasi berhasil akan ditampilkan pesan :
Welcome to XAMPP for Windows Version …..
Congratulations:
You successfully installed XAMPP on this system!

B. Menginstall Wordpress
1. Download wordpress terbaru dari alamat resmi wordpress, yaitu : http://wordpress.org, atau langsung download file ini http://wordpress.org/latest.zip ( terkadang tidak bisa download dengan download manager seperti flashget, DAP, IDM dan sebagainya, jadi gunakan saja download standard bawaan browser, misalnya dengan klik kanan dan pilih menu Save As.. atau Save Link As.. ukuran sekitar 1 MB ).
2. Extract latest.zip tersebut di folder htdocs, dari langkah diatas berarti di folder C:\xampplite\htdocs ( copykan file latest.zip ke folder htdocs, kemudian klik kanan dan pilih extract here dengan program 7zip, Winzip atau Winrar), akan dihasilkan folder wordpress yang berisi tiga folder, yaitu : wp-admin, wp-content dan wp-includes . Juga beberapa file *.php lainnya.
3. Folder wordpress itulah yang nantinya menjadi nama web yang akan dibuka melalui URL, sehingga bisa kita rename terlebih dahulu, misalnya dari wordpress di ganti menjadi ebsoft sehingga kita nanti membuka web lokal kita dengan mengetikkan http://localhost/ebsoft ( tapi hal itu nanti ).
4. Agar bisa dijalankan, maka wordpress harus diinstall terlebih dulu. Sebelumnya ada beberapa konfigurasi yang harus dilakukan ( pastikan Apache dan MySQL telah dijalankan, seperti langkah A nomor 3 diatas )
1. Buka browser dan ketik localhost, kemudian pilih menu sebelah kiri bagian bawah phpMyAdmin ( atau langsung ketikkan di alamat browser http://localhost/phpmyadmin/
2. Buat database baru dengan mengetikkan nama database di bawah keterangan Create new database, misalnya ebsoftdb kemudian klik Create.
5. Setelah berhasil dibuat database baru, buka file wp-config-sample.php ( di folder C:\xampplite\htdocs\ebsoft ) dengan text editor seperti Notepad, dan ubah
datanya seperti berikut ( ini berdasarkan langkah diatas ) : putyourdbnamehere diganti ebsoftdb ( nama database
yang telah dibuat sebelumnya ) lalu usernamehere diganti root dan hapus text yourpasswordhere sehingga tinggal titik dua (”), kemudian simpan dan close.
6. Ubah nama file wp-config-sample.php menjadi wp-config.php .
7. Langkah selanjutnya menginstall wordpress. Buka web browser kemudian isikan alamat URL : http://localhost/ebsoft/wp-admin/install.php akan
ditampilkan tampilan welcome oleh wordpress.

8. Isikan Blog Title dan alamat email, kemudian klik Install Wordpress >>
9. Jika berhasil akan ditampilkan tampilan wordpress, success! Dan ingat password yang tampil , atau catat.

10. Untuk memulai pengaturan, mengisi artikel dan sebagainya, bisa langsung masuk ke admin panel, dengan mengklik link log in ( dari tampilan sebelumnya) atau wp-login.php. Atau bisa juga langsung mengetikkan alamat http://localhost/ebsoft/wp-login.php di web browser.

11. Ketikkan username : admin dan isikan password yang tampil sebelumnya, kemudian klik login>>
12. Selesai… selanjutnya kita dapat mulai menulis artikel, menjelajahi dan mempelajari menu-menunya, jangan lupa mengganti passwordnya melalui menu User dan klik edit untuk username admin.

Sabtu, 18 Juli 2009

Memory Upgrade Guide




Table of Contents:

Intro
I.Supplies needed and costs
II.Steps before installation and preparation
III.The Installation of the Memory
IV.CMOS Check
V.Conclusion
VI.Tools and Utilities
VII.Contact Info

Intro

Is your PC running slow? Well memory upgrades are about the cheapest upgrade that you can do to improve your computers performance drastically. This will be a easy tutorial to understand so you can pop in your memory and determine from now
on out what you have inside your computer. This will be a step by step guide to install Simms and Dimm memmory. Simms memory slots are small and a whiteish color. Dimm memory slots are longer in length and are black. So please when following this tutorial please do not skip read, read carefully or it could end up costing you money. So enjoy this tutorial from Blacksun.box.sk. And for more hardware installation guides visit Blacksun Research Facility.

I.Supplies needed and costs

Supplies you need will be:

Memory ($50(32MB)-$200(128MB)) - www.kingston.com - www.crucial.com

Phillips Screwdriver (Should have)

Anti-static wrist strap(optional)

II.Steps before installation and preparation

Before we start getting into the installation you should have already looked inside your computer for what type of memory your computer support. If you have 2 or more white slots open means you need 72 pin SIMMS memory. SIMMS must be put
in pairs. DIMM on the other hand can go in by itself, so it doesnt need a pair. Clear a space on a desk or table and unplug your computer and carry the case where it is well lighted. Remove the screws holding the out shell of your case, and remove out shell. Now you should be able to see the motherboard and all the insides. Now look for your memory slots on your mother board, If you can not see them then you might have to move or take some stuff out to be able to move around inside but you probly wont have to. So you know, the box in the top left with red, yellow, and black cables coming out is the power supply.

III.The Installation of the Memory

Ok. Now your ready to install the memory.

If you are installing SIMMs memory then...
Grab one of the sticks of memory and slide it into slot from the top at a 60 degree angle(Ex.\.). Once you have it slid all the way in,push it to a upright position until you hear it click. Now put in its pair. Then re-connect the cables and moniter and turn on the power. On the boot up screen look at the memory count will be like 32838k(32MB) of memory. Make sure its reading the memory. If that number varies significantly from what you were expecting contact manufacturer or dealer you bought your memory from.

If you are installing DIMM memory then...
Grab one of the sticks of DIMM memory and line it up to the DIMM Socket so the grooves in the memory stick are the same on the motherboard. Once lined up push the white arms on the top and bottom of the DIMM socket to a outward position so they are not in the way of the memory. Now press firmly on the top and bottom until the white arms come in locking the memory in place.Then re-connect the cables and moniter and turn on the power. On the boot up screen look at the memory count will be like 32838k(32MB) of memory. Make sure its reading the memory. If that number varies significantly from what you were expecting contact manufacturer or dealer you bought your memory from.

IV.CMOS Check

On boot enter your PC should recognize the memory. Not many systems require you but if its required you will get a error message. Then enter your systems setup.

V.Conclusion

Once windows is booted up check out the new memory and make sure it is working properly. I hope this helped you in the steps of installing or upgrading your new memory. If you have any suggestions or questions feel free to email me. More tutorials to come and soon a HTML version with picture references.


VI.Tools and Utilities

Disk Copy Utility
--(http://www.powerquest.com)

VII.Contact Info:

Written by: TriÇker
Email:Cadtrick@hotmail.com
ICQ:40884568
AIM:zTrickerz
Web:http://tricksoft.net

PC Hardware

This isn't so much a tutorial, as it doesn't actually teach you much.. It's more a text on hardware for those of you sick of newbie tutorials, and looking for something interesting and non-dangerous. This is mainly about motherboard stuff, but I stuck something about HDs, mice and Gfx cards at the end. Hey, if people like it and tell me, I might even stretch and do al the other computer bits and bobs. ;)

Content

The Bios
(I) Functions
(II) Static + Passwords

Processors
(I) Fetch-Execute
(II) Clock Ticks
(III) Funky Athlon fridge chip.

The Clock
(I) What does it look like?
(II) Waves
(III) Some ASCII Art. ;)
(IV) What is Digital? (unrelated to Microns, but hey.)
(V) Howcome Digital can't be conceived in real life?
(VI) What does digital represent?
(VII) What is Binary?
(VIII) How do I translate between number systems?
(IX) sums?
(X) Use Wincalc.

Chipset
(I) A what?
(II) Assembler and Machine Code
(III) Intel ones.

Microns
(I) Moore's Law
(II) Predictions / Intel. V. AMD. (Go, AMD!)

Hard Drives
(I) Origin
(II) How they work
(III) FIrst computer

Mice
(I) Rollers
(II) Cleaning
(III) Keyboard crud

Gfx Cards
(I) Built in v. NOT
(II) Components
(III) Stay away from S3s! warning
(IV) 3D and 2D cards



The BIOS.
This contains instructions which are specific for that particular motherboard. Those programs and instructions will remain in the PC throughout its life; usually they are not altered. However, it is possible to get replacement / upgrade BIOS's. Primarily the ROM code holds start-up instructions. In fact there are several different programs inside the start-up instructions, but for most users, they are all woven together. You can differentiate between: * POST (Power On Self Test)

* The Setup instructions, which connect with the CMOS instructions

* BIOS instructions, which connect with the various hardware peripherals

* The Boot instructions, which call the operating system (DOS, OS/2, or Windows)


Note: Only very old or different OS's are stored on ROM, such as OS/2. This is actually a much more efficient system.
BIOS's are static sensitive, so take care when handling them. They can also be PWord protected... if you ever get round to doing this, don't forget the password. As you don't use the BIOS PWord often, this is easy to do. Don't. it's bloody hard getting the PWord back.





Chipset
We all know what assembly language is, do we not? It is the programming language that is most native to a computer. The instructions go directly to the chip (more or less). (Assembly actually lays on top of Machine code, which is the real native: Assembler is a more human-friendly version)... Each chip has their own different version of assembler/machine code, called its _chipset_. Each new type of chip comes with an upgraded chipset: for example, the Intel MMX chip incorporated the...wait for it... MMX chipset! There are also chipsets such as 3D!Now. THe most basic of commands between, say, Intel and AMD are the same: they have to be in order for the two to be compatible, but more advanced things are different. This is why Alpha chips are incompatible with windows: The chipset is completely different.
Intel has hitherto been the leader in supplying chip sets to the Pentium motherboard. Therefore, let us just mention their chip sets, which have astronomical names. The Neptune chip set (82434NX) was introduced in June 1994. It replaced the Mercury set (82434LX). In both chip sets, there were problems with the PCI bus. In January 1995 Intel introduced the first Triton, where everything worked. This chip set supports some new features: it supports EDO RAM, and it offers bus master integrated EIDE control and NSP (Native Signal Processing - one of the many new creations, which was soon forgotten).
The sorts of things that new chipsets are used for are varied... for example, The Intel TX Chipset, for example, supports SDRam and UltraDMA (But the TX-set cannot cache above 64 MB RAM, and that is a problem.), while AMD chips have their own special Graphics chipset, which is better for that task.

Microns
The CPUs have doubled their calculating capacity every 18 months. This is called "Moore's Law" and was predicted in 1965 by Gordon Moore. He was right for more than 30 years. The latest CPUs use internal wiring only 0.25 microns wide (1/400 of a human hair). But if Moore's Law has to be valid into the next century, more transistors have to be squeezed onto silicon layers. And now there is a new hope. IBM has for the first time succeeded in making copper conductors instead of aluminum. Copper is cheaper and faster, but the problem was to isolate it from the silicon. The problem has been solved with a new type of coating, and now chips can be designed with 0.13 micron technology. The technology is expected later to work with just 0.05 micron wiring! Texas Instruments announced on August 27th 1998 that they expect 0.07 micron CMOS processing in the year 2001. At the time of writing, AMD chips run at .27 microns (?) and Intel at .33. This explains why AMD chips are hotter, as there is less wire, and therefore more probability of the electrons that the electricity is comprised of hitting the side of the wires, and creating heat.

Hard Drives
Hard drives work in much the same way as a floppy disk does. They can, however, store a much larger capacity of data, and therefore are much more fragile, and compact . For this reason, they are hermetically sealed. NEVER OPEN ONE IF YOU WANT TO USE IT AGAIN. There is, inside, 3 or 4 goldy-brown circular plates on which the data is stored. These are much the same as the ones inside a floppy disk, except that they are not 'floppy' but hard, or stiff. The data is stored on the platters magnetically, which explains why floppy disks have a "keep magnets away from me" warning on boxes u buy them in.
IBM introduced the first hard disk in 1957, when data usually was stored on tapes. The first 305 RAMAC (Random Access Method of Accounting and Control) consisted of 50 platters, 24 inch diameter, with a total capacity of 5 MB, a huge storage medium for its time. It cost $35,000 annually in leasing fees (IBM would not sell it outright) and was twice the size of a refrigerator.
In the early 80s, HD's became the preferred storage medium as opposed to floppy drives (these were previously used due to increased reliability). IBM's PS/2 (one of which I have - yay) was one of the first PCs to be equipped with a Hard drive. I think.

Mice
Mice are, as we all know, Input devices, and as we also know, they tell where you are on the mousemat by moving a ball in the bottom. Which you can see. But how does it read how the ball is moving? Well, inside the mouse are 2 rollers, at 90 degrees to each other. When you move the mouse, u move the ball, and thus the rollers. THe rollers have some little discs on the end of them with slits in, and either side of the disc are light-readers, so that when you move tha ball, the mouse can tell because light flasles on and off in its light reader. There is also a 3rd non-functional roller to keep the ball rolling smoothly. Note: It is perfectly safe to turn your mouse upside down ,. take the ball out and look inside, as long as you don't prod anything too hard (twiddle the rollers by all means, just don't stick bits of paper in there). It is also a good idea to get a blunt knife or screw driver and clean the crud off the rollers every few weeks... it solidifies into little rings around the rollers, and works to the detriment of the mouse. If it isn't cleaned off, it can also, fallinto the mouse, and reak havok with the insides. :) The same sort of crud builds up in keyboards, but is harder to remove. ;)

GFX Cards
A video card is typically an adapter, a removable expansion card in the PC. Thus, it can be replaced! The video card can also be an integral part of the system board...This is the case in certain brands of PCs and is always the case in lap tops. This is not nice, as it is hard to upgrade to a better card. On a OC with a non-removable gfx or sound card, the normal procedure if you _do_ want to replace it is to disable the built-in graphics card using jumpers or dip switches... consult your motherboard manual. ;) Regardless of whether it is replaceable or integrated, it consists of three components:

* A video chip of some brand (ATI, Matrox, S3, Cirrus Logic, or Tseng, to name some of the better known). The video chip creates the signals, which the screen must receive to form an image.
* Some kind of RAM (EDO, SGRAM, or VRAM, which are all variations of the regular RAM). Memory is necessary, since the video card must be able to remember a complete screen image at any time.
* A RAMDAC - a chip converting digital/analog signals.

NOTE: Never buy an S3. Never. Ever. I've had lots, they're all useless. Remember that.

All ordinary graphics cards can show 3D games. That is really no special trick. The problem is to present them smoothly and fast. If the PC’s video card is made for 2D execution only, the CPU must do the entire workload of geometric transformations etc.! And that task can cause even the fastest CPU to walk with a limp. In recent years there has been an enormous development in 3D graphics cards. Let me briefly describe those here.

There are two types of graphics cards, which can be used for 3D acceleration:

Combination 2D/3D cards. These are ordinary graphics cards, which have been equipped with extra 3D power.
The pure 3D cards, which only work as accelerators. These cards require that there also is an ordinary (2D) graphics card in the PC.
Of course the pure 3D card yields the best acceleration, but there are also good combination cards on the market.

Njan