Selasa, 24 Maret 2009

Bolic Pan..

Tips - tips pan bolic

To increase the distance range of wireless LAN antenna required with external gain a higher standard of antenna

  • external High Gain Antenna price relative expensive
  • Many items that are frequently found in everyday life that can be used to make the High Gain antenna in a way easy and cost light

    < strong> wajanbolic_antena.jpg

    Photo: Antenna WajanBolic

    PURPOSE

    • Sharing knowledge / experience in terms of making homebrew antenna Antenna WajanBolic and especially the things about the Wireless Network

      SCOPE

      In this Workshop akan WajanBolic made with Antenna Connector and Pigtail N

      overview WIRELESS / WiFi

      < span style = "font-size: 85%;"> WiFi (Wireless Fidelity) is a generic term for equipment or WLAN Wireless Lan. Normal family use the standard IEEE 802.11. Therefore supported by many vendors.

      < span style = ""> STANDARD Protocol

      < strong>

      Peralatan wireless used is to use standard IEEE 802.11x, where x is the sub's:

      style="border: 0.5pt solid windowtext; padding: 0pt; width: 100.5pt;color:transparent;" valign="top" width="134">

      style="font-size:85%;"> IEEE 802.11b IEEE 802.11b + < p> IEEE 802.11g

      style="BACKGROUND-COLOR: 0pt;" 2.4GHz5GHz5GHz < / span> 2.4GHz 2.4GHz 2.4GHz

      style="BACKGROUND-COLOR: 0pt;" 2 Mbps Mbps54 Mbps108 11 Mbps 22 Mbps 54 Mbps

      BASIC LAW

      Minister Decree No.2, 2005 about the use of the frequency band 2400-2483.5MHz who signed on 5 January 2005 the Minister of Transportation aleh M. Hatta Rajasa.

      Some of the important decision of the Minister of No .2 in 2005 is that you do not need permission from the government radio station to run the equipment at 2.4GHz frequency, but is limited to the:

      1st Maximum transmitter power is 100mW (20dBm).

      2nd Effective Isotropic Radiated Power / EIRP in antenna is 36dBm

      3. All equipment used must be approve / certified by POSTEL

      < strong> Antenna WAJANBOLIC

      < span style = "font-size: 85 %;">< strong>

      < strong>

      Why is WajanBolic?

      • pan: frying pan, kitchen tools make cooking
      • Bolic: parabolic
      • WajanBolic: parabolic antenna made from the pan

        Because it comes from the frying pan kesempurnaannya not comparable dg parabolic antenna factual. In the workshop will be made WajanBolic Antenna with N Connector and Pigtail with:



        Some of the lack of antenna WajanBolic:

        Because solid form of the influence of wind dish large enough so that require mounting to a tower strong enough

        Antenna 2.4 GHz < / p>

        < p style = "margin: 0pt; font-family: arial;">

        Some Antenna Design Example 2.4 GHz

        Most homebrew wifi antenna you have on the internet: yagi antenna, antenna cans (tincan antenna), antenna biquad, Helix antenna, slotted waveguide antenna. I always have the components in the antenna-design antenna page: N-type Connector & pigtail

        Connector: N-type Male, Female N-type, RP TNC Male, RP TNC Female, Pigtail

        Ok ..! we go to the making of WajanBolic

        Preparation

        Tools and materials that need to prepare in:

        MATERIAL

        1. pan diameter 36 "(the bigger the better diametr )
        2. PVC paralon thin diameter 3 "1 meter
        3. Doff 3 "(closed paralon PVC) 2 pieces
        4. aluminum foil
        5. Baut + mur size 12 or 14
        6. Connector N female
        7. copper wire No.3
        8. Double tape + lakban

          EQUIPMENT

          1. ruler
          2. knife / Cutter
          3. its tin solder +
          4. hacksaw

            estimates RATES

            < strong>

            < strong>

            Estimated price spent to purchase materials WajanBolic is less than Rp 100.000, -. Compare jikan you have to buy Grid 24db antenna, the only local product to Rp 500,000, - more and import could reach Rp 1.000.000, - more. Antenna or purchase price of the local grid is Rp 200,000, - while the import could reach Rp 300,000 more.

            development

            1. Prepare all materials and equipment needed.
            2. Lubangi pan right in the middle of the frying pan seukuran bolts 12 or 14, just one hole only.

              Then, measure diametr frying pan, frying pan depth and feeder / focus point. For more details please his tough image below.

              Example:

              parabolic dish dg D = 70 cm, d = 20 cm the distance from the center point focus dish: F = D ^ 2 / (16 * d) = 70 ^ 2 / (16 * 20) = 15.3 cm

              page focus on the point end of the feeder is installed. To get the maximum gain.

              1. Cut PVC paralon along 30 cm, and marked for its feeder distance (region-free aluminum foil). To determine the length of its feeder use the formula above.
              2. its hole in the paralon N Connector to place, to use the antenna formula cans. See bias in the http://www.saunalahti. fi/elepal/antenna2calc.php
              3. Cut copper wires that have been prepared in accordance with the size of the calculation results obtained from the website above. And solderkan on N Connector that has been prepared in the
              4. Selanjut it, wrapped with PVC paralon with aluminum foil on regions other than the feeder, I have the aluminum foil without glue, to paste it can use the double-tape
              5. Then pair with N connector to the PVC Paralon has dilubangi td
              6. At the doff (closed paralon PVC), which akan in pairs on the edge near the N Connector must give in aluminum foil, and doff the tide in the pan does not need to give it in aluminum foil
              7. And the pair are to doff PVC paralon
              8. Then, the pan was Mentioned in bolongi paired with a doff of his again, before its doff these dilubangi according to the size bautyang already prepared in, and tighten its secukup.
              9. Then live pair PVC paralon before frying pan to the pair already in the doff.
              10. And bolic pan is ready to be used for browsing, or at least for wardriving. < / li>

                 wajan5.jpg

                 wajan1.jpg

                < img src =" http://dedenthea.files.wordpress.com/2007/08/wajan2.jpg "alt =" wajan2.jpg "/>

                 wajan3.jpg

                < img src =" http://dedenthea.files.wordpress.com/2007/08/wajan4.jpg "alt =" wajan4.jpg "style =" width: 480px ; height: 281px; "width =" 480 "height =" 317 "/>

                < img src = "http://dedenthea.files.wordpress.com/2007/08/wajan8.jpg" alt = "wajan8.jpg" />

                 wajan9.jpg

                < img src = "http://dedenthea.files.wordpress.com/2007/08/wajan10.jpg" alt = "wajan10.jpg" />

                 wajan11.jpg

                < img src = "http://dedenthea.files.wordpress.com/2007/08/wajan16.jpg" alt = "wajan16.jpg" />

                How do I?
                See the following yah .....

                Jakarta - seek access to the Internet with frying pan and close the pot. Applications excited to make this people can enjoy the Internet with only capital Rp.350.000 only. How?



                Save the Internet and with the melting pot
                Jakarta - seek access to the Internet with frying pan and close the pot. Applications excited to make this people can enjoy the Internet with only capital Rp.350.000 only. How?

                If this is the Information Technology (IT) is able to eradicate poverty, technology that can ideally be reached many people. That is the basic philosophy that held a Widodo Onno Purbo. Former lecturer electro Institut Teknologi Bandung (ITB) is to develop Linux-based applications Wajanbolic.
                "One way to save the investment of equipment to access the Internet using wireless Internet equipment is to use techniques Wajanbolic E-goen. Technical Wajanbolic E-goen very creative with the Universal Serial Bus Wireless Local Area Network (WLAN USB), which added to the antenna cans, and extend the USB cable is using UTP cable and a frying pan as a reflector, "said Onno in the presentation.
                With this technique, the cost of customers can be pressed only about Rp. 350,000 but can enjoy 54Mbps speed Internet access.

                Close the pot and frying pan
                Peranti needed is an easily obtainable in the market, closed pan or frying pan berdiameter about 70 centimeters. Then, 3-inch pipe pralon for feeder, 1 fruit pralon close, pralon the 1-inch USB Wifi. Another pralon 1 inch, 1 large bolt and small bolts.
                Residual layer of aluminum is not a tape, to resurface pralon 3 inches. Do not forget, a layer of rubber pipe to cover electricity, pipes and electricity, for protecting the cable connection Unshielded Twisted Pair (UTP). UTP cable is a special cable for data transmission. Peranti hardware that is needed is a WLAN USB, USB 2.0 and USB Extender.
                This application is known by the name Wajanbolic E-goen, because the main ideas emerging from someone named Pak Gun from Yogyakarta. Information, the Pak Gun currently located in Purwakarta.
                Wajanbolic or also known with Pancibolic not Anyar applications. This concept is already there since 2005-early 2006. Only in 2007 again this dipopulerkan by Onno Purbo a roadshow around Australia to introduce a variety of IT applications for the cheap people of Indonesia. This application is already enjoyed by some people, especially pehobi oprek computers and the Internet.
                According to Onno, one of the difficulties in using a USB WLAN is to extend the USB cable to the computer. WLAN USB cable is very short usually carried less than one meter. To extend the WLAN USB cable to the computer in the house can connect to the antenna Wajanbolic outside the home can be done by using a USB extension cable USB Extender and cut the USB cable and connect it with the UTP cable.

                Free downloadable
                Main difficulty for the use of Linux to adopt this technique is the search for a suitable USB driver for USB WLAN is used. "I happened to use a USB LevelOne WLAN and WLAN USB JAHT that both use the same driver, the ZD1211 of Atheros," said Onno.
                Robstah itself has tried to install the driver ZD1211 in Fedora Core 5 that has been modified kernelnya using kernel 2.6.16.20. Onno far have not tried with the new kernel, 2.6.17.11. ZD1211 WLAN USB Driver can be downloaded in http://www.atheros.com/RD/downloads/download_ZD1211.htm. Some files that may be of interest to be taken and very helpful in the installation process there is the Linux (kernel 2.4/2.6), is the Driver 2_6_0_0, WPA Supplicant and Users Guide. Basically the various drivers that needed to Wajanbolic can be downloaded free from the Internet. For more detail on how to operate the Wajanbolic also in the entire virtual Jagat. Want to try?
                from http://www.sinarharapan.co.id/berita/0704/26/ipt01.html

                Script timer Session, Automatic Logout

                Many things happen if someone has successfully logged in as user, login and of course this is when users will use the services of a website, not due for another, such as the level of bad securities. Always have idle time. Idle here means the user does not do anything at all on the website, the page does not move, do not enter any input on the form, and it does not have any cause a website page terrefresh, in other words the user does not do anything on the website while he visited. Indeed strange that user.

                Script timer Session, Automatic Logout

                Many things happen if someone has successfully logged in as user, login and of course this is when users will use the services of a website, not due for another, such as the level of bad securities. Always have idle time. Idle here means the user does not do anything at all on the website, the page does not move, do not enter any input on the form, and it does not have any cause a website page terrefresh, in other words the user does not do anything on the website while he visited. Indeed strange that user. : D ~ ~. But things like this can happen if users are cool to visit the other, and forget that he will visit the website before. Of course the situation on the website the user visited previously regarded as the idle condition by website. No matter whatever happens in the previous website. Or other conditions, where a user who has 10 minutes left in the pc to its circumstances forget melogout accounts. Too seriously. Here is the function of the session really needed.
                There are two ways to set the session time, the first is a configuration change session timeout in the php.ini, the last way is to use the function time () and variable session that have been registered, in other words this is the last line is to design code that can be set the session time. Akan author does not explain how the first one. But the author will explain is how the second. The author will take an example case, this is to facilitate the logical explanation, and explanation of how work flows from the script that will be made.
                Case like this, "When the user has successfully logged in, there will be a session that is used as a benchmark to compare how long the user has been on the website page. When the time () that runs more than the value of session variable that will serve as the benchmark then the user will automatically terlogout ".

                The structure, algoritmanya akan like this:

                1. Provide a variable x, and now contains the added 30 seconds.
                2. Make a variable x as a session, which will membypass valuenya on each page, in other words, the contents of a variable x can be displayed on any page.
                3. Compare the present with the value of x is a variable.
                4. If the time is now less than the value of variable x, then the user is logged in the circumstances.
                5. If the time is now greater than the value of variable x, the condition of the user is logging out.
                6. If users do refresh the page, move the page, fill out the form, sessionnya before the time runs out then log on to the next 10 minutes.


                Yes, for the algorithm on the author for a 2 function, ie function login_validate () and login_check (). Simply provide the required script:

                Index.php file:



                The next file that is essentially,
                functions.php:



                Then admin.php, the line code in admin.php ibaratkan this author as a condition of the admin login has been successful. If more than 30 seconds then the user will be automatically logged out. Value of 30 seconds is taken from the $ timeout variable in the functions.php.

                Admin.php file:



                Then the login page usernya, login.php:


                Login Page ...!</ title> <br /> <br /><form action="index.php" method="post"> <br /><table bcolor="#DFDFDF" border="0"> <tbody> <tr> <td> username </ td> <td> <input name="username" type="text"> </ td> </ tr> <br /><tr> <td> password </ td> <td> <input name="password" type="password"> </ td> </ tr> <br /><tr> <td> <br /></ td> <td> <input name="submit" value="submit" type="submit"> </ td> </ tr> <br /></ tbody> </ table> <br /></ form> </ span> <span class="fullpost"> </ span> <span class="fullpost"> </ span> <span class="fullpost"> <br /> <br /> <br /> <br />Clearly visible on the line to 4 above, the login page has a page action, go to index.php, which then generate 2 POST variable, ie $ _POST [ 'username'] and $ _POST [ 'password']. This is the second variable, which was then checked on the page index.php. <br /> <br />And the last is logout.php: <br /> <br /> <br /> <br /> <br />How it works on the source code is quite simple, see index.php line code, <br /> <br />...... <br />if (($ _POST [ 'username'] == 'admin') & & ($ _POST [ 'password'] == 'admin')) <br />( <br />$ _SESSION [ 'User'] = $ _POST [ 'username']; <br />login_validate (); <br />header ( "location: admin.php"); <br />) <br /> <br />else if (empty ($ _POST [ 'username']) & & empty ($ _POST [ 'password'])) <br />( <br />header ( "location: login.php"); <br />) <br />.... <br /> <br />Explanation is as follows, If a user enter a username and password that match (in this case a username and password is admin) then the user will be given a session variable, ie $ _SESSION [ 'user'], and will be added a new variable that this variable will function as a timer, ie, <br /> <br />$ timeout = 30; <br /> <br />Variable is located in login_validate function () in functions.php script. While still in the login_validate, jump to the code underneath the line that is: <br /> <br />$ _SESSION [ "Expires_by"] = time () + $ timeout; <br /> <br />Is the actual location of the timer, intensity of the session is able to value passing though the page is different. Details, $ _SESSION [ "expires_by"] take the value from the time when user login the first time () in 30 seconds with the added kedepannya, that is, the contents of the variable $ timeout. <br /> <br />Well, from there, to see which have the function below it, in functions.php: <br /> <br />... <br />login_check function () ( <br /> $ exp_time = $ _SESSION [ "expires_by"]; <br /> if (time () <$ exp_time) (login_validate (); return true;) else (unset ($ _SESSION [ "expires_by"]); return false;)) .... Yes, see the line: $ exp_time = $ _SESSION [ "expires_by"]; Varibale $ exp_time that have a value of $ _SESSION [ "expires_by"], author kejelesannya To give an example like this, if the user logged in at the time of 5 hours, then $ _SESSION [ "expires_by"] contains 5 hours, 0 minutes, and seconds to 30. And naturally also note that the time will certainly continue to grow. But because it is in the function, variable $ _SESSION [ "expires_by"] this will not be increased, although the time () berlanjutnya continue. Jump to the next line: if (time () <$ exp_time) (login_validate (); return true; In line sederhananya is, if the time is now running small value from the value in the $ _SESSION [ "expires_by"], then add 30 seconds more, and if at the time time () equal to the value $ _SESSION [ "expires_by"] then the user will be automatically logged out more ... ... else (unset ($ _SESSION [ "expires_by"]); return false;) ... If the time is now running more than the value in the $ _SESSION [ "expires_by"], then do the logout. </span></p> <div style='clear: both;'></div> </div> <div class='itemhead'> <p class='post-footer-line post-footer-line-1'> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-control blog-admin pid-183722760'> <a href='https://www.blogger.com/post-edit.g?blogID=1142436348637559032&postID=4286794423428810132&from=pencil' title='Edit Entri'> <span class='quick-edit-icon'> </span> </a> </span> </span> </p> <p class='post-footer-line post-footer-line-2'> <span class='post-labels'> Label: <a href='https://nipenkku.blogspot.com/search/label/Script%20Organizer%20Session%20Time' rel='tag'>Script Organizer Session Time</a> </span> </p> <p class='post-footer-line post-footer-line-3'></p> </div></div> <div class='item entry'> <div class='itemhead'> <a name='1734152265491319226'></a> <h3> <a href='https://nipenkku.blogspot.com/2009/03/membuat-password-generator-alasan.html'>Script complete password generator</a> </h3> <small class='metadata'> <a class='comment-link' href='https://nipenkku.blogspot.com/2009/03/membuat-password-generator-alasan.html#comment-form' onclick=''> 0 komentar</a> <span class='chronodata'> Diposting oleh Nipenkku di <a class='timestamp-link' href='https://nipenkku.blogspot.com/2009/03/membuat-password-generator-alasan.html' title='permanent link'>06.49</a> </span> </small> </div> <div class='itemtext'> <p>Reason why the author made this topic for the title is sometimes some users, as well as web administrator password that is difficult to make good enough, and most of the search of the password that the password is expected to be far from fraudulent activities such as password cracking brute force method with a matching or password the method dictionary <br />Reason why the author made this topic for the title is sometimes some users, as well as web administrator password that is difficult to make good enough, and most of the search of the password that the password is expected to be far from fraudulent activities such as password cracking brute force method with a matching or password the method dictionary. As an article author who had created earlier, the concept of simple joomla password cracker. In the article on the show so easily get the password only with mencocokan the original password with the password dictionary. It later that the author is trying to explain to escort you to create a password that is secure, even as the author had previously said "There is no 100% safe in the virtual world." All have a risk of course. And for the implementation of all depends on your creativity in using the password generator. <br /><span class="fullpost"> <br /> <br />Script details are as follows: <br /> <br /> <br />/ / Password.gen.php <br /> <br />= 6) & & (! Is_null ($ num_chars))) ( <br /> <br /> $ password = ""; <br /> $ accepted_chars = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWYZ1234567890 ~!@#$%^&*+|}{:>?<"; srand (((int) ((double) microtime () * 1000003))); for ($ i = 1 ; $ i <= $ num_chars; $ i + +) ($ random_number = rand (0, (strlen ($ accepted_chars) -1)); $ password .= $ accepted_chars [$ random_number];) return $ password;) else (echo "Password must be more than 6";))?> <br /> <br /><title> Password Generator </ title> <br /> <br />Your password: <br /><span style="background-color: yellow;"> <b> <br /> <br /></ b> </ span> <br /> <br /><form action=""> "method =" post "> <br /><input name="size" value=""> "type =" text "> <br /><input name = "submit" value = "Create!" type = "submit"> <br /></ form> </ span> <span class="fullpost"> </ span> <span class="fullpost"> </ span> <span class="fullpost"> <br /> <br /> <br /> <br />Authors try to explain the essence of it ... <br /> <br />if ((is_numeric ($ num_chars)) & & ($ num_chars> = 6) & & (! is_null ($ num_chars))) ( <br />If inputan entered by the user is a number / numeric number, amount and character more than the 6-digit ... <br /> <br />$ password = ""; <br /> <br />$ accepted_chars = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUV WYZ1234567890 ~!@#$%^&*+|}{:>?<"; Prepare characters, numbers and special characters that will be used as a password. srand (((int) ((double) microtime () * 1000003))); Then Make randomisasi possible characters, numbers, or special characters that will take in a part of the password. for ($ i = 1; $ i <= $ num_chars; $ i + +) (Make the repetition of the inserted inputan ... $ random_number = rand (0, (strlen ($ accepted_chars) -1)); Create randomisasi selection characters, numbers, special characters, from the collection of characters that have been prepared in the previous ... $ password .= $ accepted_chars [$ random_number]; Enter the characters one by one taken into the variable $ password)</span></p> <div style='clear: both;'></div> </div> <div class='itemhead'> <p class='post-footer-line post-footer-line-1'> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-control blog-admin pid-183722760'> <a href='https://www.blogger.com/post-edit.g?blogID=1142436348637559032&postID=1734152265491319226&from=pencil' title='Edit Entri'> <span class='quick-edit-icon'> </span> </a> </span> </span> </p> <p class='post-footer-line post-footer-line-2'> <span class='post-labels'> Label: <a href='https://nipenkku.blogspot.com/search/label/Create%20Password%20Generator' rel='tag'>Create Password Generator</a> </span> </p> <p class='post-footer-line post-footer-line-3'></p> </div></div> <div class='item entry'> <div class='itemhead'> <a name='378468922127802177'></a> <h3> <a href='https://nipenkku.blogspot.com/2009/03/apa-itu-php-php-singkatan-dari-php.html'>What is PHP??</a> </h3> <small class='metadata'> <a class='comment-link' href='https://nipenkku.blogspot.com/2009/03/apa-itu-php-php-singkatan-dari-php.html#comment-form' onclick=''> 0 komentar</a> <span class='chronodata'> Diposting oleh Nipenkku di <a class='timestamp-link' href='https://nipenkku.blogspot.com/2009/03/apa-itu-php-php-singkatan-dari-php.html' title='permanent link'>06.36</a> </span> </small> </div> <div class='itemtext'> <p>PHP stands for PHP hypertext preprocessor programming language that is a web server-side that is open source. PHP is a script that integrates with HTML and are on the server (the server side HTML embedded scripting). PHP is a script that<br /><br /><span class="fullpost"><br />What is PHP<br />PHP stands for PHP hypertext preprocessor programming language that is a web server-side that is open source. PHP is a script that integrates with HTML and are on the server (the server side HTML embedded scripting). PHP is a script that<br /><br />What is PHP?<br /><br />14 September 2006 by supono<br /><br />What is PHP<br />PHP stands for PHP hypertext preprocessor programming language that is a web server-side that is open source. PHP is a script that integrates with HTML and are on the server (the server side HTML embedded scripting). PHP script is used to create dynamic web pages. Dynamic means that the page will display a page that is created when requested by the client. This mechanism causes the information received is always the latest client / up to date. All PHP scripts executed on the server where the script is executed<br /><br />History of PHP<br />View from the development, programming language has a very rapid growth with the number of users who continue to grow.<br /><br />1. PHP / FI<br />This is the embryo of the current PHP. First created by Rasmus Lerdorf in 1995, he was originally named this script "Personal Home Page Tools" which is a simple language from which the C programming language Personal Home Page This tool can communicate with the database and bersipat Open Source. Rasmus in the first programming language to create aims to keep the visitors who see the Bios on the web sitenya.<br />Perkembanganny, in mid 1997, the language PHP language more and more, seen from the number of statistical domains menggunkan PHP almost more than 50,000 web sites. Then, because the very rapid development, Rasmus develop this programming language, and in November 1997 appear PHP / FI version 2.0 which is the embryo of PHP 3<br /><br />2. PHP Version 3<br />PHP Version 3 is a version of bugs penyempurna-bugs in the PHP / FI version 1.0 and PHP / FI version 2.0. PHP Version 3 is developed by Andi Gutmans and Zeev Suraski in 1997 that successfully written perfectly at that time. Additional Features PHP Version 3 compared to previous versions, in addition to extra-fumgsi new functions, also supports multiple access to many databases, protokool management, and API. From version 3 is the abbreviation of PHP appear, that is PHP: hypertext preprocessor, and in 1998 almost 10% web site in the world to use PHP as a web server.<br /><br />3. PHP Version 4<br />In the winter of 1998, re-write the programming language PHP to make this programming language Reliability. Finally, in mid-1999 diperkenalkanlah PHP 4.0 version of the script using the Zend engine to improve the appearance (performance) and have very much support the extension of the library and its various modules. PHP version 4.0 also has advantages compared to previous versions, including support to several web servers, facilities HTTP session, the output buffer and system security. In the development, at that time was almost 20% the web server using PHP programming language as interpreternya.<br /><br />4. PHP version 5<br />In July 2005, showing the 5.0 version of PHP using Zend Engine 2.0 with the addition of some featur and some new objects. For information featur-featur new version of PHP 5.0, you can see in http://www.zend.com/zend/future.php. PHP version 5 is strongly support-based programming, Object Oriented Programming aka oop and emang the allotment for the oop.<br /><br /></span></p> <div style='clear: both;'></div> </div> <div class='itemhead'> <p class='post-footer-line post-footer-line-1'> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-control blog-admin pid-183722760'> <a href='https://www.blogger.com/post-edit.g?blogID=1142436348637559032&postID=378468922127802177&from=pencil' title='Edit Entri'> <span class='quick-edit-icon'> </span> </a> </span> </span> </p> <p class='post-footer-line post-footer-line-2'> <span class='post-labels'> Label: <a href='https://nipenkku.blogspot.com/search/label/Understanding%20of%20PHP%20and%20its%20use' rel='tag'>Understanding of PHP and its use</a> </span> </p> <p class='post-footer-line post-footer-line-3'></p> </div></div> <H2 class='date-header'>Senin, 23 Maret 2009</H2> <div class='item entry'> <div class='itemhead'> <a name='8691504910431510404'></a> <h3> <a href='https://nipenkku.blogspot.com/2009/03/ingin-menjadi-pembisnis-sukses.html'>Want to Become businessman Success??</a> </h3> <small class='metadata'> <a class='comment-link' href='https://nipenkku.blogspot.com/2009/03/ingin-menjadi-pembisnis-sukses.html#comment-form' onclick=''> 0 komentar</a> <span class='chronodata'> Diposting oleh Nipenkku di <a class='timestamp-link' href='https://nipenkku.blogspot.com/2009/03/ingin-menjadi-pembisnis-sukses.html' title='permanent link'>00.52</a> </span> </small> </div> <div class='itemtext'> <p>Follow Tips "below yah .....<br /><br />Friend - a friend, if you want to be entrepreneurs or want to become a successful PEMBISNIS. Is Compulsory reading this one. Because these tips will be very useful once you unttuk. Congratulations menikamati ..<br /><span class="fullpost"><br />So How PEMBISNIS the Success?<br />This is it .. Tips<br /><br />Tip 1: You must have the charisma<br /><br /><br />You have already felt karisma? Hehe ... you are the successful candidate. Really?<br /><br />If you need to deal directly with partners and clients, the charisma that helps. That is, charisma can extend your business network. Humble attitude and empathy is a powerful moment in the relationship.<br /><br />However, for matters related to the development of the brand or service website, charisma is not important. In fact, the more precisely a charisma that marketing people.<br /><br />Tip 2: You should be able to see the future<br /><br />Eit .. eit ... so this is not a soothsayer.<br /><br />Tips may want to explain that a business must be able to predict the future market situation. But, I think the ability to predict this can not really make money.<br /><br />You do not necessarily need to create opportunities. Just start your business and shape the opportunity. Then, create products that are good and necessary. Products you are sure akan itself. Rather than thinking about how to create great things, better kuasai small things you can do right now.<br /><br />You agree with me?<br /><br />Tip 3: Which offense<br /><br />He said, any criticism should be delivered customer you receive. There is a truth ... For the Internet business, even vitriolic criticism must be good.<br /><br />Despite criticism for trivial things, if you do not respond seriously to affect the revenue your site. So, do not cuekin criticism and suggestions from visitors to ya ...<br /><br />Tip 4: You have to dare to take big risks<br /><br />Do not have business in the field that you do not kuasai at all. Yes, I agree. At least this reduces the risk of failure.<br /><br />Because, with the business risk of the condition there. At least you have enough capital. Interest and ability in the field of business that you must also have. So you can not overcome the challenges the market at once.<br /><br />Tip 5: You must have the spirit of the coal<br /><br />You must have a spirit of extraordinary people to become rich. According to me, this one is important for motivation. Tanamkan you need two things in mind: Your power and prosperity.<br /><br />Believe that the site and blog can be field money. Origin of you still have desires to be rich. You certainly can Kemakmuran and holding power.<br /><br />But, sometimes you also need to follow your conscience. Because the business was never about money. If running continuously pursuing success, can be dangerous! You can quickly get tired. It's time we need a short break. Ngoyo not need too ...<br /><br />In fact, not all the tips that we can swallow raw ya? And, what you get after reading this article? Spirit to grow so rich? Let's rich with ....<br /></span></p> <div style='clear: both;'></div> </div> <div class='itemhead'> <p class='post-footer-line post-footer-line-1'> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-control blog-admin pid-183722760'> <a href='https://www.blogger.com/post-edit.g?blogID=1142436348637559032&postID=8691504910431510404&from=pencil' title='Edit Entri'> <span class='quick-edit-icon'> </span> </a> </span> </span> </p> <p class='post-footer-line post-footer-line-2'> <span class='post-labels'> Label: <a href='https://nipenkku.blogspot.com/search/label/Businessman%20Success%20Tips' rel='tag'>Businessman Success Tips</a> </span> </p> <p class='post-footer-line post-footer-line-3'></p> </div></div> <H2 class='date-header'>Minggu, 22 Maret 2009</H2> <div class='item entry'> <div class='itemhead'> <a name='794834683469600786'></a> <h3> <a href='https://nipenkku.blogspot.com/2009/03/apa-itu-hacker-dan-cracker.html'>What is the Hacker and cracker??</a> </h3> <small class='metadata'> <a class='comment-link' href='https://nipenkku.blogspot.com/2009/03/apa-itu-hacker-dan-cracker.html#comment-form' onclick=''> 0 komentar</a> <span class='chronodata'> Diposting oleh Nipenkku di <a class='timestamp-link' href='https://nipenkku.blogspot.com/2009/03/apa-itu-hacker-dan-cracker.html' title='permanent link'>06.31</a> </span> </small> </div> <div class='itemtext'> <p>We often hear the term Hacker and cracker. However, some of us that many did not know about the understanding of what the two terms. And here, I will tell what the Hacker and cracker. Let's browse more yup ...<br /><span class="fullpost"><br /> 1. History Hacker and cracker<br /><br />Hacker appear in the early 1960s among the members of the student organization's Tech Model Railroad Club in artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering development of computer technology and they operate with a number of Mainframe computers. The word hacker first appears with a positive meaning to mention a member who has expertise in the field of computers and able to create a computer program that is better than that has been designed together. Then in 1983, growing hacker analogy to mention someone who has a obsession to understand and control computer system. Section, in the year for the first time the FBI catch the computer criminals 414s based in Milwaukee USA. 414 is the code of their local area. Group, which was then called hacker is declared guilty piercing top 60 computer, the computer's property Cancer Center Memorial Sloan-Kettering to a computer owned by Los Alamos National Laboratory. One of the perpetrators are getting TESTIMONIALS immunity because, while the other 5 to get the punishment trial.<br /><br />Then in the next show other groups that breathe themselves hackers, but is not. They (especially adult men) who get satisfaction through the computer and break outmanoeuvre phone (phreaking). Hacker sejati call these people 'cracker' and do not like to interact with them. Hacker cracker sejati looked as lazy people, not<br />responsible, and not too smart. Hacker sejati not agree if it is said that someone with a security breach has been a hacker.<br /><br />The hackers meet once each year that is held every mid-July in Las Vegas. Ajang meeting hacker in the world is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.<br /><br /> 2. The Hacker and cracker<br /><br />1. Hacker<br /><br />The term Hacker Taking on someone who has a big interest to learn the computer system in detail and how to improve kapabilitasnya. The amount of interest owned by a hacker may have encouraged untik control over the system that most average users. So, hackers actually have a neutral connotation.<br /><br />Community in general, the term hacker is much tersalahgunakan or rancu with the term cracker. Especially when the discussion turned to crime. Where is the term for criminals that they actually mean is cracker.<br /><br />In the underground world of a hacker is usually through the following stages:<br />1. Mundane Person<br />2. Picassoseven<br />3. Wannabe<br />4. Larva<br />5. Hacker<br /><br />There are two levels of expertise based on the hacker, including:<br />1. Wizard<br />2. Teacher<br /><br />Hacker character itself is divided into two, they are more inclined to the nature of the cracker. Both characters are:<br />1. Dark-side Hacker<br />2. Malicious Hacker<br /><br />The stages by which they are to become a hacker. Actually difficult to say levels of the final end or hacker has been reached, because of course there is always something new to learn or found (gather information carefully and learn the basics of the same for a hacker) and it also depends on a feeling (feeling) . However, being a hacker is more menjurus thoughts on the matter.<br /><br />2. Cracker<br /><br />The term cracker free translations: Pembobol. People able to penetrate the code and key code (password) and the security system without the permission or not ethical. (Cracker) term was found by gadfly computer system to distinguish the use of computer aktivititas who violate the rules or to give the term a more activity based. This term also distinguish) (hacker as someone who advanced in the use of computer and its commands basically.<br /></span></p> <div style='clear: both;'></div> </div> <div class='itemhead'> <p class='post-footer-line post-footer-line-1'> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-control blog-admin pid-183722760'> <a href='https://www.blogger.com/post-edit.g?blogID=1142436348637559032&postID=794834683469600786&from=pencil' title='Edit Entri'> <span class='quick-edit-icon'> </span> </a> </span> </span> </p> <p class='post-footer-line post-footer-line-2'> <span class='post-labels'> Label: <a href='https://nipenkku.blogspot.com/search/label/Hacker%20vs%20Cracker' rel='tag'>Hacker vs Cracker</a> </span> </p> <p class='post-footer-line post-footer-line-3'></p> </div></div> <div class='item entry'> <div class='itemhead'> <a name='5766482408074436594'></a> <h3> <a href='https://nipenkku.blogspot.com/2009/03/mau-menjadi-pakar-it.html'>How to become a specialist IT?</a> </h3> <small class='metadata'> <a class='comment-link' href='https://nipenkku.blogspot.com/2009/03/mau-menjadi-pakar-it.html#comment-form' onclick=''> 0 komentar</a> <span class='chronodata'> Diposting oleh Nipenkku di <a class='timestamp-link' href='https://nipenkku.blogspot.com/2009/03/mau-menjadi-pakar-it.html' title='permanent link'>06.20</a> </span> </small> </div> <div class='itemtext'> <p>1. Passion, learning and practice<br /><br />The first thing that is very important to me is a passion, interest, love. Just like other areas, control areas of IT must be accompanied with the desire that menggebu-gebu. Why would you want to menekuni this field?<br /><br />IT does not control the field occurs in a flash time. He can not only created a seminar with the course. I see many people / students who come to the seminar and hope to become a champion. This is the same as we watch the game of soccer and then returned home hoping to become a champion direct football. Can not! To become a real expert take yearly, unless you just want to be a "specialist" (or often called celebrities IT).<br /><br />Learn and practice is a method that I do. Study here, including reading books, magazines and other sources of reference (if the Internet is now). If necessary, review the background theory. Practice trying to apply what you read to improve their skills (skill) and enrich the "library" you are the solution.<br /><br />For reading matter, including that I maniak. All I read. I read the fun things associated with computers began when I used to buy the magazine near the river Cikapundung (Bandung). Era that many foreign magazines that does not appear to be returned to the publisher but will be sold with a cover digunting. So, I started the magazine with the former! That is why I often wonder and annoyed with students who complain that he does not have the money to learn computers. If multiple books are now speaking of a computer affordable. If it is, I have to buy foreign magazines.<br /><br />For a matter of practice, which many complain do not have the money to buy a computer. Who ordered to buy a computer? To practice your computer does not need to have your own computer. There are many places to learn the computer, such as a lab on campus, and cafe. You can work there while studying. If you need to work without pay. When I learn UNIX (on Sun machines), I help admin in campus lab. I took the computer out the cable, settle other issues in voluntir for 1 year. Just after that I was trusted to manage one of the computers there, and eventually the entire network.<br /><br />2. Formal education, training, or learn yourself?<br /><br />There are those who give the example that the formal education in the IT world is not necessary because it can dipelajar own. Then they give examples of IT whiz around them who have no formal education in the field of IT. Bill Gates drop out of Harvard. Steve Jobs did not finish college. Many other examples. But, whether true that formal education is not needed? People forget that Bill Gates for a successful, there may be 10 thousand dropout who failed. Of course the news about the dropout who failed not so interesting to be told it can be considered natural. It will be strange if the success of dropout is considered normal. I still include the thought that formal education is needed because the foundation to give him, even though it is not a guarantee of success.<br /><br />So what about the people that are not formally educated? They may be successful, the origin would try harder. One path that can be implemented is with the training, even training in some places even have a value (value) is higher than usual in formal education. This is proven with more diakuinya certificate vendor (which notabene related to training, not with formal education) compared with ijasah universities.<br /><span class="fullpost"><br /><br /><br />I may include the categories through their own learning path. I do not have a certificate, but even issued a certificate. (See BRcertified.com.) Does Bill Gates have a certificate from Microsoft?) Formal IT education is very minimal because I when I study more science elektronikanya. If the electronics can be considered as IT, then I have a formal IT education. Of course education electronics background I was very helpful in understanding IT. However, if the order-sorted, my formal education programming is just programming in FORTRAN language. The control of other programming languages (perl, C, C + +, Java, and many others) comes from learning itself.<br /><br />In trying to learn my own search (book) the best reference, reference that is used by the other gamecock. (This approach may not necessarily suitable for you, but this is the "flow" or "madzhab" I choose.) How is the search for information in mailing lists, web sites, and to help other people. Sometimes this reference book is difficult to understand, but the long run I better understand why a reference is used. So I do not find the book "xyz for dummies" book or the translation is even confusing. If you want to act, find the best teacher. Do not search the usual teacher-usual course.<br /><br />Examples of books I use when studying for example:<br /><br /> * Book "camel" (O'Reilly edition) I use to learn languages perl. I choose this book because Larry Wall to write this book and the chance he is the author of the language perl. Lagian, then this is the only book that is perl. hi hi hi.<br /> * Book "dragon" (essay Aho and his friends) to learn the compiler.<br /> * Book-length Lippman (C + + Primer) when learning C + +. (This does not have the name of animals. Ha ha ha.)<br /><br />Excess use of books with the same book used by experts abroad is nyambung if we can discuss. So there is no difference between them and me.<br /><br />Note the name of the book. Usually given a nickname based on the book cover images (cover) from the book. For example the book "camel" has a cover image onta.<br /><br />3. Programming language should I kuasai?<br /><br />Always appear every time programming languages (and methodology) are new. At the time I learn programming, FORTRAN language and the flow chart is required by a programmer in mind. If the current language may be Java or C / C + + is more searchable. Similarly, the methodology that uses extreme or agile programming may be in increased leaf. For the development of web-based, PHP and ASP languages that are currently popular. (I prefer to use their own language perl.)<br /><br />So what? Do you need to know a new language? The answer is no. Only the "insanity" is doing just that. (In this case I may be among the "mad" because I am happy to try a language-a new language.) This is the most important basics of programming. Language only "means of communication." If you take C, for example, it is not too difficult to master another language (the same or similar filosofinya). However, if you do not have basic programming, it will be difficult to develop for. For example, I take language perl. Appear when the PHP language with the easy bit because I understand the principle, not much different with the perl language.<br /><br />4. Conclusion<br /><br />This paper attempts to answer one frequently asked questions by many people (students, the training / seminars, mass media). Hopefully this short article that can answer some questions you may have.<br /><br /></span></p> <div style='clear: both;'></div> </div> <div class='itemhead'> <p class='post-footer-line post-footer-line-1'> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-control blog-admin pid-183722760'> <a href='https://www.blogger.com/post-edit.g?blogID=1142436348637559032&postID=5766482408074436594&from=pencil' title='Edit Entri'> <span class='quick-edit-icon'> </span> </a> </span> </span> </p> <p class='post-footer-line post-footer-line-2'> <span class='post-labels'> Label: <a href='https://nipenkku.blogspot.com/search/label/How%20to%20Become%20an%20IT' rel='tag'>How to Become an IT</a> </span> </p> <p class='post-footer-line post-footer-line-3'></p> </div></div> <div class='item entry'> <div class='itemhead'> <a name='75943387403229112'></a> <h3> <a href='https://nipenkku.blogspot.com/2009/03/membuat-blog.html'>Very Easy to Make Blog ..</a> </h3> <small class='metadata'> <a class='comment-link' href='https://nipenkku.blogspot.com/2009/03/membuat-blog.html#comment-form' onclick=''> 0 komentar</a> <span class='chronodata'> Diposting oleh Nipenkku di <a class='timestamp-link' href='https://nipenkku.blogspot.com/2009/03/membuat-blog.html' title='permanent link'>05.32</a> </span> </small> </div> <div class='itemtext'> <p>Stage - Stage Make Blog<br /><br />1. Sign up in your google<br /> <br /> Because the entry to blogger, we must have an account at google mail (gmail). If you already have a login in Google, you stay logged in, you'll go to the Control Panel or Control Panel. Oh yes, you can select the language, whether English or the English language. Then click on the bottom right of the arrow labeled Create YOUR BLOG. So far, very easy and will continue to be easy.<br /><br />2. List of Blog, Complete Your Registration<br /> <br /> After you click the arrow that reads Create YOUR BLOG, the form will appear. This process will create a Google account that you can use on other Google services. If you already have a Google account perhaps from Gmail, Google Groups, or Orkut. A Google account can be used for access to all facilities provided by Google. If you already have a google account, you can directly log (incoming). To login to Google, you must log in using your email address.<br /><span class="fullpost"><br />Please complete.<br /><br /> 1. The email address you enter must already exist before. You will be sent to a confirmation email. If you use a false email or email that the new plan will be made, the registration may fail. You do not need to use email gmail.com. What email can.<br /> <br /> 2. Complete the other data.<br /><br /> 3. Mark "I accept the Terms of Service" as evidence that you agree. Once complete, click the arrow labeled continue.<br /><br />3. Create Blog (Choosing a Blog Name and Blog URL)<br /> <br /> After you successfully register, ekarang creating your blog with your name and complete address of your blog. For example, my blog is named with the name nipenkku. I choose blog address with the address http://nipenkku.blogspot.com. If you create a lens with the purpose of promoting your products or affiliate products, then choose a name, must contain the name of the product or service that you offer. For example, if you want to sell my ebook, you can choose the keywords such as motivation, success, positive thinking, words and other key customers.<br />You can check the blog ketersidaan address you choose. If available you can continue. If not available, then you must find creative new name or modify an existing address, for example, added abc, xzy, 101, and can also insert your own name. Continue to click the arrow labeled CONTINUE.<br /><br />4. Blog Template (Select the design in accordance with your taste)<br /><br /> Successful? Of course, successfully, the easy koq. Choose your template with a theme that match your taste. If there is no sesui with your taste, do not worry, later on many themes that you can install yourself. Now select the theme that only the process of blog can be completed. You can preview the themes by clicking the picture. Choosing a theme for your click (mark) bulatannya O. Then you click the arrow labeled CONTINUE.<br /><br />Not Easy to Create a Blog is? Happy Trying yupp.......<br />;p<br /><br /></span></p> <div style='clear: both;'></div> </div> <div class='itemhead'> <p class='post-footer-line post-footer-line-1'> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-control blog-admin pid-183722760'> <a href='https://www.blogger.com/post-edit.g?blogID=1142436348637559032&postID=75943387403229112&from=pencil' title='Edit Entri'> <span class='quick-edit-icon'> </span> </a> </span> </span> </p> <p class='post-footer-line post-footer-line-2'> <span class='post-labels'> Label: <a href='https://nipenkku.blogspot.com/search/label/How%20to%20Make%20a%20blog' rel='tag'>How to Make a blog</a> </span> </p> <p class='post-footer-line post-footer-line-3'></p> </div></div> <H2 class='date-header'>Sabtu, 14 Maret 2009</H2> <div class='item entry'> <div class='itemhead'> <a name='808983691280212135'></a> <h3> <a href='https://nipenkku.blogspot.com/2009/03/hecker-hacker-dengan-keahliannya-dapat.html'>Hacker</a> </h3> <small class='metadata'> <a class='comment-link' href='https://nipenkku.blogspot.com/2009/03/hecker-hacker-dengan-keahliannya-dapat.html#comment-form' onclick=''> 0 komentar</a> <span class='chronodata'> Diposting oleh Nipenkku di <a class='timestamp-link' href='https://nipenkku.blogspot.com/2009/03/hecker-hacker-dengan-keahliannya-dapat.html' title='permanent link'>08.38</a> </span> </small> </div> <div class='itemtext'> <p>Hacker<br /><br />Hacker can see with the expertise & fix software on the computer, and then usually in openly published on the Internet for the system to be better. Sialnya, few people take the bad information to evil - they are usually called cracker. Sialnya, few people take the bad information to evil - they are usually called cracker. Basically the hacker & cracker does not vary with the art world, here we are talking art Internet security network. Basically the hacker & cracker does not vary with the art world, here we are talking art Internet security network.<br /><br /><br />Hacker can see with the expertise & fix software on the computer, and then usually in openly publish on the Internet for the system to be better. Hacker can see with the expertise & fix software on the computer, and then usually in openly published on the Internet for the system to be better. Sialnya, few people take the bad information to evil - they are usually called cracker. Sialnya, few people take the bad information to evil - they are usually called cracker. Basically the hacker & cracker does not vary with the art world, here we are talking art Internet security network. Basically the hacker & cracker does not vary with the art world, here we are talking art Internet security network.<br /><br />I hope the science of network security in this paper is used for things that either - not the Hacker cracker. I hope the science of network security in this paper is used for things that either - not the Hacker cracker. Do not until you hit karma for using science to damage the property of others. Do not until you hit karma for using science to damage the property of others. Moreover, the current needs of hacker akan growing in Indonesia and many more who want to dotcommers IPO shares in the various exchanges. Moreover, the current needs of hacker akan growing in India and many more who want to dotcommers IPO shares in the various exchanges. Name & good value a dotcom can not fall to be valuable even if the dotcom collapse. Name & good value a dotcom can not fall to be valuable even if the dotcom collapse. In this case, the hackers can be expected in the security consultant for the dotcommers it - because the police HR & Indonesian security apparatus is very sad & very weak in the field of Information Technology & Internet. In this case, the hackers can be expected in the security consultant for the dotcommers it - because the police HR & Indonesian security apparatus is very sad & very weak in the field of Information Technology & Internet. What could make cybersquad, cyberpatrol private budayakan perhaps necessary for survival in dotcommers Indonesia on the Internet. What could make cybersquad, cyberpatrol private budayakan perhaps necessary for survival in Indonesia dotcommers on the Internet.<br /><br />Various security techniques in the Internet network can be obtained easily on the Internet, among others, in http://www.sans.org, http://www.rootshell.com, http://www.linuxfirewall.org/, http:// www.linuxdoc.org, http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/. Various security techniques in the Internet network can be easily obtained on the Internet, among others, in http://www.sans.org, http://www.rootshell.com, http://www.linuxfirewall.org/, http:// www.linuxdoc.org, http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/. Some of the techniques in the form of books that the number of its several hundred pages that can be taken for free (free). Some of the techniques in the form of books that the number of its several hundred pages that can be taken for free (free). Some Frequently Asked Questions (FAQ) about the security of the network can be obtained in http://www.iss.net/vd/mail.html, http://www.v-one.com/documents/fw-faq.htm. Some Frequently Asked Questions (FAQ) about the security of the network can be obtained in http://www.iss.net/vd/mail.html, http://www.v-one.com/documents/fw-faq . htm. And for the experimenter some script / program that is so can be obtained, among others, in http://bastille-linux.sourceforge.net/, http://www.redhat.com/support/docs/tips/firewall/firewallservice.html . And for the experimenter some script / program that is so can be obtained, among others, in http://bastille-linux.sourceforge.net/, http://www.redhat.com/support/docs/tips/firewall/ firewallservice.html.<br /><br />For readers who want to gain knowledge about the network can be downloaded for free from http://pandu.dhs.org, http://www.bogor.net/idkf/, http://louis.idaman.com/idkf . For readers who want to gain knowledge about the network can be downloaded for free from http://pandu.dhs.org, http://www.bogor.net/idkf/, http://louis.idaman.com/idkf . Some books softcopy form that can be taken free of charge can be taken from http://pandu.dhs.org/Buku-Online/. Some books softcopy form that can be taken free of charge can be taken from http://pandu.dhs.org/Buku-Online/. We must be especially grateful to the team that Pandu dimotori by I Made Wiryana for this. We must be especially grateful to the team that dimotori by Pandu I Made Wiryana for this. At this time, I do not know the place of a discussion on the techniques of hacking this - but it may be in part discussed in the mailing list information such as the kursus-linux@yahoogroups.com & linux-admin@linux.or.id operasikan by the Linux User Group Indonesia (KPLI) http://www.kpli.or.id. At this time, I do not know the place of a discussion on the techniques of hacking this - but it may be in part discussed in the mailing list information such as the kursus-linux@yahoogroups.com & linux-admin@linux.or . id operasikan by the Linux Users Group Indonesia (KPLI) http://www.kpli.or.id.<br /><br />The simplest way to see the weakness of the system is to explore how information from various vendors such as http://www.sans.org/newlook/publications/roadmap.htm # 3b on the weakness of the system that they own. The simplest way to see the weakness of the system is to explore how information from various vendors such as http://www.sans.org/newlook/publications/roadmap.htm # 3b on the weakness of the system that they own. In addition, monitoring the various mailing lists on the Internet related to network security such as in the list http://www.sans.org/newlook/publications/roadmap.htm # 3e. In addition, monitoring the various mailing lists on the Internet related to network security such as in the list http://www.sans.org/newlook/publications/roadmap.htm # 3e.<br /><br />Described by front-line Information Security Team, "Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks," fist@ns2.co.uk http://www.ns2.co.uk. Described by front-line Information Security Team, "Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks," fist@ns2.co.uk http://www.ns2.co.uk. A cracker usually men aged 16-25 years. A cracker usually men aged 16-25 years. Based on the statistics of Internet users in Indonesia, then in fact the majority of Internet users in Indonesia are children at a young age also. Based on the statistics of Internet users in Indonesia, then in fact the majority of Internet users in Indonesia are children at a young age also. Indeed, this age is the age that is the ideal draw in the new science of science, including the Internet, be pitied if we are not successful menginternetkan to 25,000 Indonesian schools s / d in 2002 - because the object of a future of Indonesia is in the hands of young children we. Indeed, this age is the age that is the ideal draw in the new science of science, including the Internet, to be pitied if we are not successful menginternetkan Korean schools to 25,000 s / d in 2002 - because the object of a future of Indonesia is in the hands of young children we.<br /><br />Well, the young are generally cracker cracking do to improve / use of resources in the network for its own sake. Well, the young are generally cracker cracking do to improve / use of resources in the network for its own sake. Generally, the cracker is opportunis. Generally, the cracker is opportunis. See the weaknesses with the system program mejalankan scanner. See the Weaknesses with the system program mejalankan scanner. After obtaining root access, cracker akan install back door (backdoor) and close all existing general weakness. After obtaining root access, cracker akan install back door (backdoor) and close all existing general weakness.<br /><br />As we know, most companies / dotcommers akan use the Internet to (1) they are hosting a web server, (2) e-mail communication and (3) provides access to web / internet to its employees. As we know, most companies / dotcommers akan use the Internet to (1) they are hosting a web server, (2) e-mail communication and (3) provides access to web / internet to its employees. Separation of Intranet and Internet network is generally carried out using the technique / software firewall and proxy server. Separation of Intranet and Internet network is generally carried out using the technique / software firewall and proxy server. View of the above conditions, the weakness in the system generally can penetrate through, for example with external Mailserver / outside that is used to facilitate access to the mail out of the company. View of the above conditions, the weakness in the system generally can penetrate through, for example with external Mailserver / outside that is used to facilitate access to the mail out of the company. In addition, by using the agressive-SNMP scanner & programs that force the SNMP community string can change the router into a bridge (bridge), which can then be used for the stepping stone for entry into the company's internal network (Intranet). In addition, by using the agressive-SNMP scanner & programs that force the SNMP community string can change the router into a bridge (bridge), which can then be used for the stepping stone for entry into the company's internal network (Intranet).<br /><br />Cracker protected so that during the attack, technique cloacking (masquerade) is done with the jump from the previous machine has been compromised (ditaklukan) through a telnet program or RSH. Cracker protected so that during the attack, technique cloacking (Masquerade) is done with the jump from the previous machine has been compromised (ditaklukan) through a telnet program or RSH. In the intermediary machine that uses Windows attack can be done with the jump from the Wingate. In the intermediary machine that uses Windows attack can be done with the jump from the Wingate. In addition, the jump can be done through the proxy device configuration is less good. In addition, the jump can be done through the proxy device configuration is less good.<br /><br />After a successful jump and enter the other systems, cracker like to probing of the network and collect the information necessary. After a successful jump and enter the other systems, cracker like to probing of the network and collect the necessary information. This is done in different ways, for example, (1) using the nslookup command to run the 'ls', (2) view HTML files on your webserver to identify other machines, (3) to see various documents on the FTP server, (4) connecting the self to mail server and use the command 'expn', and (5) mem-finger user machines in the other external. This is done in different ways, for example, (1) using the nslookup command to run the 'ls', (2) view HTML files on your webserver to Identify other machines, (3) to see various documents on the FTP server, (4) connecting the self to a mail server and use the command 'expn', and (5) mem-finger user machines in the other external.<br /><br />The next step, cracker akan identify which network components trusted by the system any. The next step, cracker akan Identify which network components trusted by the system any. Network components are the server administrator and machines that are usually in the most secure in the network. Network components are the server administrator and machines that are usually in the most secure in the network. Start with a check & export NFS access to a variety of critical directory such as / usr / bin, / etc and / home. Start with a check & export NFS access to a variety of critical directory such as / usr / bin, / etc and / home. Exploit weaknesses engine through the Common Gateway Interface (CGI), with access to the file / etc / hosts.allow. Exploit Weaknesses engine through the Common Gateway Interface (CGI), with access to the file / etc / hosts.allow.<br /><br />Next cracker network components need to identify the weak and the taklukan. Next cracker network components need to Identify the weak and the taklukan. Cracker can use the program in Linux like ADMhack, mscan, nmap and many other small scanner. Cracker can use the program in Linux like ADMhack, mscan, nmap and many other small scanner. Programs such as' ps' & 'netstat' in a trojan (horse TROYA remember the story? Classic story in ancient Greece) to hide the scanning process. Programs such as' ps' & 'netstat' in a trojan (horse TROYA remember the story? Classic story in ancient Greece) to hide the scanning process. For the cracker can use the advanced quite aggressive scanning for SNMP-men-scan equipment with SNMP. For the cracker can use the advanced quite aggressive scanning for SNMP-men-scan equipment with SNMP.<br /><br />After a successful cracker identify network components that can be weak and in taklukan, the cracker will run the program to the daemon program menaklukan weak in the server. After a successful cracker Identify the network components that can be weak and in taklukan, the cracker will run the program to the daemon program menaklukan weak in the server. The program is a daemon program on the server is usually running behind the screen (as a daemon / Satan). The program is a daemon program on the server is usually running behind the screen (as a daemon / Satan). Menaklukan success of this program akan daemon allows a cracker to gain access as' root '(administrator in the server). Menaklukan success of this program akan daemon allows a cracker to gain access as' root '(administrator in the server).<br /><br />To remove the impression, a cracker is usually cleaning operation 'clean-up' operation with a variety of ways to clean the log file. To remove the impression, a cracker is usually cleaning operation 'clean-up' operation with a variety of ways to clean the log file. And add the program to go from the back door 'backdooring'. And add the program to go from the back door 'backdooring'. Changing the file. Rhosts in / usr / bin for easy access to the engine in RSH & taklukan through csh. Changing the file. Rhosts in / usr / bin for easy access to the engine in RSH & taklukan through csh.<br /><br />Then a cracker can use a machine that is already ditaklukan for their own interests, for example, take the sensitive information that should not dibacanya; mengcracking machine from another machine with a jump in taklukan; install a sniffer to see / record the various traffic / communication through; can even turn off the system / how to run the network with the command 'rm-rf / &'. Then a cracker can use a machine that is already ditaklukan for their own interests, for example, take the sensitive information that should not dibacanya; mengcracking machine from another machine with a jump in taklukan; install a sniffer to see / record the various traffic / through communication; can even turn off the system / how to run the network with the command 'rm-rf / &'. The latter will be very fatal consequences because the system will be destroyed at all, especially if all the software on the hard disk letakan. The latter will be very fatal consequences because the system will be destroyed at all, especially if all the software on the hard disk letakan. The process of re-install the entire system must do, it will spin if this is done on machines that run mission critical. The process of re-install the entire system must do, it will spin if this is done on machines that run mission critical.<br /><br />Therefore, all machines & routers running mission critical should always check the security patch in & by the new software. Therefore, all machines & routers running mission critical should always check the security patch in & by the new software. Backup to be very important especially on machines that run mission critical terselamatkan from the cracker ulah men-disable system with 'rm-rf / &'. Backup to be very important especially on machines that run mission critical terselamatkan from the cracker ulah men-disable system with 'rm-rf / &'.<br /><br />For us the day-to-day romp in the Internet generally, there would be very appreciative of the existence of the hacker (not cracker). For us the day-to-day romp in the Internet generally, there would be very appreciative of the existence of the hacker (not cracker). Due to the blessings of Allah Internet hackers and we can now enjoy such as this, and even continue to refine the system to become better again. Due to the blessings of Allah Internet hackers and we can now enjoy such as this, and even continue to Refine the system to become better again. Various weaknesses in the system because the correct accomplishment colleagues hackers often do the repair page. Various Weaknesses in the system because the correct hackers Accomplishment colleagues often do the repair page. voluntarily for hobbies. voluntarily for hobbies. Moreover, often the results of hacking it in it for free on the Internet for the Internet community. Moreover, often the results of hacking it in it for free on the Internet for the Internet community. A value & cultural gotong royong glorious thus grow in the virtual world of the Internet generally seemed futuristic and far from the social sense. A & cultural value gotong royong glorious thus grow in the virtual world of the Internet generally seemed futuristic and far from the social sense.<br /><br />Development of the hobbiest hackers became important to the sustainability / survival vehicle on the Internet dotcommers Indonesia. Development of the hobbiest hackers became important to the sustainability / survival vehicle on the Internet dotcommers Indonesia. As one of fact, in the near future about Allah akan mid April 2001 in the invention hacking competition on the Internet to break a server that has been specified in advance. As one of fact, in the near future about Allah akan mid April 2001 in the Joint hacking competition on the Internet to break a server that has been Specified in advance. Hacking competition in motori by young people in the Linux User Group Indonesia (KPLI) of Semarang digerakan by children as young Kresno Aji (masaji@telkom.net), Agus Hartanto (hartx@writeme.com) & Lekso Budi Handoko (handoko @ riset.dinus.ac.id). Hacking in motori competition by young people in the Linux Users Group Indonesia (KPLI) of Semarang digerakan by children as young Kresno Aji (masaji@telkom.net), Agus Hartanto (hartx@writeme.com) & Lekso Budi Handoko (handoko @ research . dinus.ac.id). As children usually other young, they generally have capital insufficient - support & sponsor of course very useful and will be expected by colleagues this young. As usually other young children, they generally have insufficient capital - support & sponsor of course very useful and will be expected by this young colleagues.<br /><br />Hopefully all this will add to the spirit of readers, especially young readers, to move in the world of hackers mengasyikan and challenging. Hopefully all this will add to the spirit of readers, especially young readers, to move in the world of hackers mengasyikan and challenging. If the word Captain Jean Luc Picard in Movies Startrek Next Generation, "To boldly go where no one has gone before." If the word Captain Jean Luc Picard in Movies Startrek Next Generation, "To boldly go where no one has gone before."</p> <div style='clear: both;'></div> </div> <div class='itemhead'> <p class='post-footer-line post-footer-line-1'> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-control blog-admin pid-183722760'> <a href='https://www.blogger.com/post-edit.g?blogID=1142436348637559032&postID=808983691280212135&from=pencil' title='Edit Entri'> <span class='quick-edit-icon'> </span> </a> </span> </span> </p> <p class='post-footer-line post-footer-line-2'> <span class='post-labels'> Label: <a href='https://nipenkku.blogspot.com/search/label/Learning%20Hacking' rel='tag'>Learning Hacking</a> </span> </p> <p class='post-footer-line post-footer-line-3'></p> </div></div> <H2 class='date-header'>Rabu, 04 Maret 2009</H2> <div class='item entry'> <div class='itemhead'> <a name='1254305622365023830'></a> <h3> <a href='https://nipenkku.blogspot.com/2009/03/privacy-cyber.html'>Cyber Privacy</a> </h3> <small class='metadata'> <a class='comment-link' href='https://nipenkku.blogspot.com/2009/03/privacy-cyber.html#comment-form' onclick=''> 0 komentar</a> <span class='chronodata'> Diposting oleh Nipenkku di <a class='timestamp-link' href='https://nipenkku.blogspot.com/2009/03/privacy-cyber.html' title='permanent link'>01.01</a> </span> </small> </div> <div class='itemtext'> <p>Each active internet users around the world<br />certainly understand correctly, that the cyber world (online) is a world in which<br />all visitors are from the real world (offline). However, although<br />Therefore cyber world is not the same as the real world. Cyber world<br />the world is different, unique and interesting place to be. Either<br />two examples of the differences of this world, namely in terms of communicating<br />directly with each other. Opponent in the offline world we attend the talk<br />manifest before us, while in the online world, we do not talk opponent<br />kasat even have eyes. To bring the talk to her opponent<br />before us in virtual worlds is our own imagination. The<br />equipment such as pic chat, avatars, cam, and voice, is just<br />power tool to help us in the working brain berimajinasi at the time<br />that. Unique is not it?<br /><br /><span class="fullpost"><br />Uniqueness of other, more cyber world offers<br />things that are privacy. Must write down the username and<br />password must first register for each event in each<br />server that provides the facility to chat, e-mail, and<br />website, one of the proof of protection against privacy servers<br />users.<br />Chat in the world, for example, servers that are<br />we use is very or extremely protect protect its customers.<br />For example, when other people will add to or take ID<br />(nickname) to us is stored in the messenger list it, there is a quote<br />first from the server related to us as a friend to chat people<br />, and agree whether or not ID our add-in by the man? When<br />agree, we live to click the box labeled allow, if not<br />just click the box labeled block / reject / deny. When the chance we<br />when using a webcam chat, also can not be any person<br />can be opened (to accept) we cam. Process the same request ijinnya<br />like when someone you want to add a list of others in the ID to its list.<br />Another example, when we do not want to be online by the<br />that have been terlanjur to add our ID, easy course, use the technique<br />invisible, so all our cyber friends think we're off.<br />Then we choose to live, where the ID that we want to do. One<br />example again, if we feel disturbed by one of his attitude friend<br />we have a virtual terlanjur often use to chat with us<br />PM (private message), the technique can be set disiasati presence<br />offline, so that the friend thought it frustrating that we are not<br />online aliases are off on our individual online. Had friends<br />chat is frustrating that we have been very comfortable with the<br />we socialize in the cyber, too easy to complete,<br />"Tendang" only he's our list. But when he was already IN the tedaftar<br />our messenger list, first delete its ID, and do not linger<br />ignore-it or blocking its ID.<br /><br />But do not terlena with<br />facilities that function to protect internet users,<br />circumspection and vigilance still needed a Netter. And when<br />we experience things that are not desired, for example, our password<br />known people, or without us realize there are people who already know<br />many things about our private, that's not all one opponent to speak<br />us, also not a computer let alone a server. All the resultant<br />by our own carelessness, which is perhaps less at a time<br />response on the situation and the environment that we're enter<br />at the time, so that we unconsciously dijebak people to<br />broaden our privacy.<br /><br />So essentially berhati2lah with whom we deal with someone in the cyber world. what u see is not always what u get.<br /><br /></span></p> <div style='clear: both;'></div> </div> <div class='itemhead'> <p class='post-footer-line post-footer-line-1'> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-control blog-admin pid-183722760'> <a href='https://www.blogger.com/post-edit.g?blogID=1142436348637559032&postID=1254305622365023830&from=pencil' title='Edit Entri'> <span class='quick-edit-icon'> </span> </a> </span> </span> </p> <p class='post-footer-line post-footer-line-2'> <span class='post-labels'> Label: <a href='https://nipenkku.blogspot.com/search/label/The%20Cyber' rel='tag'>The Cyber</a> </span> </p> <p class='post-footer-line post-footer-line-3'></p> </div></div> <!--Can't find substitution for tag [adEnd]--> </div> <div class='blog-pager' id='blog-pager'> <span id='blog-pager-newer-link'> <a class='blog-pager-newer-link' href='https://nipenkku.blogspot.com/' id='Blog1_blog-pager-newer-link' title='Postingan Lebih Baru'>Postingan Lebih Baru</a> </span> <span id='blog-pager-older-link'> <a class='blog-pager-older-link' href='https://nipenkku.blogspot.com/search?updated-max=2009-03-04T01:01:00-08:00&max-results=7' id='Blog1_blog-pager-older-link' title='Postingan Lama'>Postingan Lama</a> </span> <a class='home-link' href='https://nipenkku.blogspot.com/'>Beranda</a> </div> <div class='clear'></div> <div class='blog-feeds'>;; <div class='feed-links'> Subscribe to: <a class='feed-link' href='https://nipenkku.blogspot.com/feeds/posts/default' target='_blank' type='application/atom+xml'>Postingan (Atom)</a> </div> </div> </div></div> </div> <!-- sidebar right --> <DIV id='sidebarright'> <div class='sidebar section' id='sidebar'><div class='widget HTML' data-version='1' id='HTML2'> <h2 class='title'>C A L E N D A R</h2> <div class='widget-content'> <script src="http://www.gmodules.com/ig/ifr?url=http://artistcampaign.googlepages.com/tezuka_calendar.xml&synd=open&w=150&h=55&title=Mushi-Mushi&lang=all&country=ALL&border=%23ffffff%7C3px%2C1px+solid+%23999999&output=js"></script> </div> <div class='clear'></div> </div><div class='widget HTML' data-version='1' id='HTML1'> <h2 class='title'>C L O C K</h2> <div class='widget-content'> <script src="http://www.clocklink.com/embed.js"></script><script language="JavaScript" type="text/javascript">obj=new Object;obj.clockfile="5010-blue.swf";obj.TimeZone="JOG";obj.width=180;obj.height=50;obj.wmode="transparent";showClock(obj);</script> </div> <div class='clear'></div> </div></div> <div class='diana'> <p> By : <br/> <a href='http://www.skincorner.com' title='SkinCorner'><img alt='Free Blog Templates' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhF1J3Fmb252-CMmBS4anXOptXu7Jq7qE4tPTKMR6oeL_2ukrJ5Xa_iQA9qyc4EQh7LlxwXpOdwjX6BPAp_1_a_wvLTcnCt_ZnUumJjTRnqL09nl1EDt6asPJJlyVnAogKSc1eeW8Fg5lU/s1600/sclogo.jpg' style='border: 0;'/></a> </p> </div> <!-- end credits --> </DIV> <!-- bagian antara--> <div class='clear'></div> </div> <div id='footer-wrapper'> </div><!-- end footer-wrapper --> <div id='lower-footer'> <div class='footer no-items section' id='footer'></div> <div class='credits'> <!-- Appreciate me by NOT REMOVE OR CHANGE MY LINK.Thank You. Please DO NOT REMOVE MY LINKS! --> <a href='https://nipenkku.blogspot.com/'>All About IT ( Information Technology )</a> | Design by <a href='http://skincorner.com'> SkinCorner</a> </div></div> </div></div> <script type="text/javascript" src="https://www.blogger.com/static/v1/widgets/2538535903-widgets.js"></script> <script type='text/javascript'> window['__wavt'] = 'AOuZoY7GvpHcSc4y6k021kvzmt4ZFXuNoQ:1744351620011';_WidgetManager._Init('//www.blogger.com/rearrange?blogID\x3d1142436348637559032','//nipenkku.blogspot.com/2009/03/','1142436348637559032'); _WidgetManager._SetDataContext([{'name': 'blog', 'data': {'blogId': '1142436348637559032', 'title': 'All About IT ( Information Technology )', 'url': 'https://nipenkku.blogspot.com/2009/03/', 'canonicalUrl': 'http://nipenkku.blogspot.com/2009/03/', 'homepageUrl': 'https://nipenkku.blogspot.com/', 'searchUrl': 'https://nipenkku.blogspot.com/search', 'canonicalHomepageUrl': 'http://nipenkku.blogspot.com/', 'blogspotFaviconUrl': 'https://nipenkku.blogspot.com/favicon.ico', 'bloggerUrl': 'https://www.blogger.com', 'hasCustomDomain': false, 'httpsEnabled': true, 'enabledCommentProfileImages': true, 'gPlusViewType': 'FILTERED_POSTMOD', 'adultContent': false, 'analyticsAccountNumber': '', 'encoding': 'UTF-8', 'locale': 'id', 'localeUnderscoreDelimited': 'id', 'languageDirection': 'ltr', 'isPrivate': false, 'isMobile': false, 'isMobileRequest': false, 'mobileClass': '', 'isPrivateBlog': false, 'isDynamicViewsAvailable': true, 'feedLinks': '\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22All About IT ( Information Technology ) - Atom\x22 href\x3d\x22https://nipenkku.blogspot.com/feeds/posts/default\x22 /\x3e\n\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/rss+xml\x22 title\x3d\x22All About IT ( Information Technology ) - RSS\x22 href\x3d\x22https://nipenkku.blogspot.com/feeds/posts/default?alt\x3drss\x22 /\x3e\n\x3clink rel\x3d\x22service.post\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22All About IT ( Information Technology ) - Atom\x22 href\x3d\x22https://www.blogger.com/feeds/1142436348637559032/posts/default\x22 /\x3e\n', 'meTag': '', 'adsenseHostId': 'ca-host-pub-1556223355139109', 'adsenseHasAds': false, 'adsenseAutoAds': false, 'boqCommentIframeForm': true, 'loginRedirectParam': '', 'view': '', 'dynamicViewsCommentsSrc': '//www.blogblog.com/dynamicviews/4224c15c4e7c9321/js/comments.js', 'dynamicViewsScriptSrc': '//www.blogblog.com/dynamicviews/3d05552398782a47', 'plusOneApiSrc': 'https://apis.google.com/js/platform.js', 'disableGComments': true, 'interstitialAccepted': false, 'sharing': {'platforms': [{'name': 'Dapatkan link', 'key': 'link', 'shareMessage': 'Dapatkan link', 'target': ''}, {'name': 'Facebook', 'key': 'facebook', 'shareMessage': 'Bagikan ke Facebook', 'target': 'facebook'}, {'name': 'BlogThis!', 'key': 'blogThis', 'shareMessage': 'BlogThis!', 'target': 'blog'}, {'name': 'X', 'key': 'twitter', 'shareMessage': 'Bagikan ke X', 'target': 'twitter'}, {'name': 'Pinterest', 'key': 'pinterest', 'shareMessage': 'Bagikan ke Pinterest', 'target': 'pinterest'}, {'name': 'Email', 'key': 'email', 'shareMessage': 'Email', 'target': 'email'}], 'disableGooglePlus': true, 'googlePlusShareButtonWidth': 0, 'googlePlusBootstrap': '\x3cscript type\x3d\x22text/javascript\x22\x3ewindow.___gcfg \x3d {\x27lang\x27: \x27id\x27};\x3c/script\x3e'}, 'hasCustomJumpLinkMessage': false, 'jumpLinkMessage': 'Baca selengkapnya', 'pageType': 'archive', 'pageName': 'Maret 2009', 'pageTitle': 'All About IT ( Information Technology ): Maret 2009'}}, {'name': 'features', 'data': {}}, {'name': 'messages', 'data': {'edit': 'Edit', 'linkCopiedToClipboard': 'Tautan disalin ke papan klip!', 'ok': 'Oke', 'postLink': 'Tautan Pos'}}, {'name': 'template', 'data': {'name': 'custom', 'localizedName': 'Khusus', 'isResponsive': false, 'isAlternateRendering': false, 'isCustom': true}}, {'name': 'view', 'data': {'classic': {'name': 'classic', 'url': '?view\x3dclassic'}, 'flipcard': {'name': 'flipcard', 'url': '?view\x3dflipcard'}, 'magazine': {'name': 'magazine', 'url': '?view\x3dmagazine'}, 'mosaic': {'name': 'mosaic', 'url': '?view\x3dmosaic'}, 'sidebar': {'name': 'sidebar', 'url': '?view\x3dsidebar'}, 'snapshot': {'name': 'snapshot', 'url': '?view\x3dsnapshot'}, 'timeslide': {'name': 'timeslide', 'url': '?view\x3dtimeslide'}, 'isMobile': false, 'title': 'All About IT ( Information Technology )', 'description': '', 'url': 'https://nipenkku.blogspot.com/2009/03/', 'type': 'feed', 'isSingleItem': false, 'isMultipleItems': true, 'isError': false, 'isPage': false, 'isPost': false, 'isHomepage': false, 'isArchive': true, 'isLabelSearch': false, 'archive': {'year': 2009, 'month': 3, 'rangeMessage': 'Menampilkan postingan dari Maret, 2009'}}}]); _WidgetManager._RegisterWidget('_NavbarView', new _WidgetInfo('Navbar1', 'navbar', document.getElementById('Navbar1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HeaderView', new _WidgetInfo('Header1', 'header', document.getElementById('Header1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_LabelView', new _WidgetInfo('Label2', 'sidebar-left', document.getElementById('Label2'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogArchiveView', new _WidgetInfo('BlogArchive1', 'sidebar-left', document.getElementById('BlogArchive1'), {'languageDirection': 'ltr', 'loadingMessage': 'Memuat\x26hellip;'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_ProfileView', new _WidgetInfo('Profile1', 'sidebar-left', document.getElementById('Profile1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogView', new _WidgetInfo('Blog1', 'main', document.getElementById('Blog1'), {'cmtInteractionsEnabled': false, 'lightboxEnabled': true, 'lightboxModuleUrl': 'https://www.blogger.com/static/v1/jsbin/3337823330-lbx.js', 'lightboxCssUrl': 'https://www.blogger.com/static/v1/v-css/3681588378-lightbox_bundle.css'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML2', 'sidebar', document.getElementById('HTML2'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML1', 'sidebar', document.getElementById('HTML1'), {}, 'displayModeFull')); </script> </body> </html>