What is LINUX ?


Linux (Kernel) is a computer operating system that started from a hobby project Linus Torvalds, a student of Helsinki University, Finland. Linus terinpirasi Minix, a small UNIX system developed by Prof.. Andrew Tanenbaum of derfein University, Amsterdam

Currently Linux is a Unix system is very complete, and is used for network software development and even for daily work. Linux is an alternative operating system is now much better and better.

To operate Linux requires considerable intelligence techniques, because not as easy to operate using a more popular operating system, such as Windows, Apple Mac Computer, or OS / 2 IBM. However, because of the volunteer developers themselves will adore the quality of his hard work, Linux is becoming quite well known with the advantages of the system is efficient and rare crashes.

Various Linux Distro

Linux has developed very quickly. It could be possible Because Linux was developed by a diverse group of people. This diversity includes the level of knowledge,, experience, and geographic. So that these groups can communicate quickly and efficiently, internet mennjadi right choice, because the Linux kernel is developed with independent businesses, many applications are available, for example, C Compiler uses gee from the Free Software Foundation's GNU Project. The compiler is widely used in Hewlett Packard and Sun environments. Right now, a lot of Linux applications that can be used for office purposes such as for spreadsheets, word processor, database and graphics editor program has a function and look like Microsoft Office, the Star Office. In addition, Corel version is also available for Linux and applications like matlab on Linux known Scilab. It is available in a variety of Linux distributions (often called distros).

Bundle of distro is a Linux kernel, along with basic Linux system, the installation program, basic tools, and other programs that are useful in accordance with the purpose of making distributions. There are several Linux distributions, including;

Redhat

Debian

Slackware

SuSe

Mandrake

Win linux

Linux, or more correctly GNU / Linux is an operating system that runs on most types of computers are known, including the popular PC-based Intel, which most people use and Mchintos up to large mainframes and super computers.

GNU / Linux will quickly sweep the world of computer development, ranging from individual users through small companies, large corporations as well as in the government department.

GNU / Linux is based on Open Source Software Software gratis.Keadaan source code is available for licensing for open source software allows us to see and modify the software and share the changes you've made it free to anyone.

There are several advantages of open source software:

Price TCO (Total Cost of Ownership) system based on GNU / Linux is smaller, almost of half, compared to the system that has the property (Copy Right) Such windows (Microsoft). Aseperampatnya bus instead or even less than that.

Security system GNU / Linux system is much more resistant than the Offer and certain owned by a company.

Diversity you have the freedom to intervene and match and change the desired software with GNU / Linux.

Transparency dengna availability of source code, you can be satisfied that the program that we make as we want (Not entirely true in the windows system as an example, that Windows is keeping all the secrecy that exists in our computer).

Powered by GNU / Linux, there is no one who can violate secar perusahaanpun constantly rights and your privacy.

GNU / Linux has advanced unity point where computer users with the ability of even the most being able to replace them with the old operating system GNU / Linux without losing their old data-based windows.

Install Skype In Ubuntu



Skype installer for Linux Ubuntu 13:04 can be downloaded from the official website. For 64-bit platforms use the command below to download via the terminal.

wget http://download.skype.com/linux/skype-4.1.0.20.tar.bz2

Now Extract + Installing skype :
Use this command :

tar xjvf skype-4.1.0.20.tar.bz2
./skype

If You Download Skype From Skype Website
Use This Command

cd /Downloads
ls
sudo dpkg -i [filename].deb


All done :)
Enjoy





Add New Port in Linux Vps

1.  Login to the VPS via putty or bitvise (remember user must be root). If Your are Using  Bitvise press Open New Terminal Console after successful login. To check open ports on your ssh typing the following command:
# Netstat-ntulp

2. Install nano for easy editing as I comfortably use nano, by typing the command:
# Yum install nano
wait until the installation is complete.


3. Once it's finished installing nano, then type the command again:
# Nano / etc / ssh / sshd_config
Then edit as shown. Use the arrows on your keyboard to move.
Then add the port what do you want to add
in this TUT i will add port 443




Then press Ctrl + X and press Y and Enter.
completed, but port 443 can not be used because it must be restarted first

now type the command:
# Service sshd restart

And All Done
Thanks For Reading :)

Install XAMPP 1.8.1 on Ubuntu


On this post I will give you an easy tutorial how to install XAMPP 1.8.1 on Ubuntu via PPA 12.10/12.04/Linux Mint 13. In the latest version of XAMPP web server, there are several updates including:

Apache 2.4.3
MySQL 5.5.27
PHP 5.4.7
phpMyAdmin 3.5.2.2

To install XAMPP 1.8.1, follow the steps below:

Open  Terminal (Ctrl + Alt + T) and XAMPP install with this command:

sudo add-apt-repository ppa:upubuntu-com/xampp

sudo apt-get update
sudo apt-get install xampp


Once done, you can run XAMPP with this command:


sudo /opt/lampp/lampp start


You can access the XAMPP web interface at this link : 


http://localhost/xampp/











What Is RAM ?


RAM is a data storage medium and a computer program. This device also functions to process data and instructions. The larger the memory is provided, the more data and instructions can be processed.

Memory is usually referred to as RAM, short for Random Access Memory. Memory serves as a temporary data storage. Memory works by storing and supplying the necessary data required by the processor quickly to be processed into information. Therefore, the capacity function is paramount in the memory. Where the greater the capacity, the more data that can be stored and supplied, which ultimately makes work faster Processor. Supply data to the RAM from the Hard Disk, a device that can store data permanently.



Illustration How Memory Works

If the processor takes the data, first it will look on the cache. If data is found, the processor will directly read with a very small delay. But if the data sought is not found, the processor will look at a lower speed RAM. In general, a cache may provide the data needed by the processor so that the effect of the slower RAM work can be reduced. In this way the memory bandwidth will increase and become more efficient processors work. In addition the capacity of the cache memory will also increase the overall speed of the computer work.


Two types of caching are commonly used in the computer world is the memory caching and disk caching. Implementation can be a special part of the computer's main memory or a storage media that high-speed dedicated data.

Memory caching implementations are often referred to as a cache memory and computer memory types are composed of high-speed SDRAM. While the implementation of disk caching using part of computer memory.

The main memory consists of up to 2n addressable word, with each word having n-bit unique address. For mapping purposes, this memory is deemed to consist of a number of blocks that have the K word length of each tract. Thus, there are M = 2n / K blocks. Cache consists of C rows, each containing K word, and the number of rows is much less compared to the number of main memory blocks (C << M). At any time, some subset of memory blocks in the cache is on the line. If a word in the memory block is read, the block was transferred to one line of cache. because there are more blocks when compared with the lines, then each line can not be unique and permanent to dipersempahkan to certain blocks which are stored. Tags are usually a part of the main memory address.

What Is VPN And How It Works


VPN stands for virtual private network, the private network (not for public access) that uses a non-personal medium (eg, the Internet) to connect between remote-site safely. The application of certain technologies in order to even use a common medium, but traffic (traffic) between the remote site can not be intercepted easily, nor allow others to smuggle undue traffic to the remote site.


According to the IETF, the Internet Engineering Task Force, a VPN is an emulation of [a] private Wide Area Network (WAN) IP using shared or public facilities, such as the Internet or private IP backbones.VPN is a form of public private network via the internet ( internet), with emphasis on data security and global access via the internet. This relationship is built through a tunnel (tunnel) between 2 virtual nodes.

is a private network (usually for a particular agency or group) in the Internet network (public), which is a private network as if they were accessing its local network but using public networks

VPN is a virtual connection that is private why are so called because in essence this network does not exist physically only a virtual network and why it is called private because this network is a network of private nature that not everyone can access it. VPN Connecting the PC to the public network or internet but its nature private, because it is private so not everyone can be connected to the network and access it. It is therefore necessary data security
VPN working concept basically requires a VPN server that berfungsing as a liaison between PCs. If pictured something like this
Internet <-> VPN Server <-> VPN Client <-> Client
when used to connect 2 computers with a private network such as the internet then this: A Computer <-> VPN clinet <-> Internet <-> VPN Server <-> VPN Client <-> Computer B
So all connections are set by the VPN Server VPN Server so it needs adequate skills so connections can be smoothly.

then what the hell do this VPN?? first of all VPN Server must be configured first and then in the VPN client program must be installed only after that can be connected. VPN on the client side will be making some sort of virtual connections so it will appear sort of VPN network adapter adater network (Lan card) but virtual. The task of VPN Client is doing authentication and encryption / decryption.
Well once connected then later when the client accessing the data tell a client wants to open the site http://www.google.com. This request before it is sent to the VPN server is encrypted by the first instance encrypted VPN Client with a formula that will contain the data request codes. After arriving to the VPN server by the server to decrypt this data in the formula A, having previously been configured between the server and the client, the server will have the same algorith to read an encryption. Vice versa, from server to client

Thus, the concept of security with VPN network offers security and untraceable, can not be detected so that our IP is not used is known as Public IP belongs to VPN servers. With no encryption and decryption of the data through the internet network is not accessible by others even by another client connected to the same VPN server though. Because the key to unlock the encryption is only known by the VPN server and client are connected. Encryption and decryption can cause data to be modified and read so keamananya guaranteed. To break down the data pirate decryption process data must pass the course to find the right formula takes a very long time so it is common to use super computing to break down and of course not everyone has a PC with this super abilities and the process is complicated and takes a long time, the agents FBI or CIA usually have this kind of computer to read confidential data that is sent through the VPN.

Is using a VPN connection is faster????? It depends on the connection between the client and the VPN server for the data processing is done on the VPN automatically all the data is entered into our computer from the Internet will go first to the VPN server so that when a client connection to a VPN server connection is good then it will also be much faster. Usually what happens is a slight decrease in speed is slower because it must first pass through 2 pathways including the encryption process. The VPN connection can be used to accelerate external (international) how???
for example, we have a local connection (IIX) equal 384kbps 1mbps and external connections use VPN so that we could be the same as the international connection local connection 1mbps. Ways to use VPN to VPN routed Local Affairs

Internet <-> VPN Affairs <-> VPN local <-> Client

why this network model can be faster because access to the outside network by external VPN and then forwarded by the local VPN nah we access to the local network, which means the access speed of 1mbps. Certainly needed a VPN with a large bandwidth so that connections can be smoothly.

Well why the HSDPA connection macem Telkomsel and Indosat get faster??? Operators to limit the bandwidth of the internet we say IM2 with 256kbps package if we use 3G and HSDPA networks sebenarny then we have a bandwidth of 384 kbps and 3.6 Mbps for HSDPA but only use 256kbps because the operator is restricted to the VPN server limitation can be broken ways will be discussed further.

Is able to make the Internet free and non-quota??? answer can be used as long as the gap is unknown operator. How to do this is to use a VPN to access a particular port server. Operators typically use a specific port for billing calculations and total unused data which can be exploited this loophole. For example there are certain ports that can be used to connect to the VPN server can be used free internet and free qouta. Why is that??? Port is not used for the calculation of billing so we did not pass well to the billing server port, then we can connect to the VPN server over the network internet.kita connect to the internet but do not pass through our automatic billing server not be charged and count calculated if the data does not count for very little pinging the server. By connecting to the VPN server then all access will be performed by the VPN server and transmitted through an open port earlier so that we could freely access the intenet. Such technique less there may be other techniques due to VPN has many advantages

Another advantage of a VPN is access anywhere. We have access to a computer at home through a VPN network for Internet-connected computer at home and we have Internet access required only for  VPN Client software configuration and authentication process. That way we can access the internet safely and undetected



Then How VPN works.?


Let's use an example to explain how the VPN works. Virtual Entity Networks Inc.. (VEN Inc.) Has two branches, London and Sydney. If the Australian branch in Sydney decided to contract the dealer, then the London office had to know right away. The main part of the IT infrastructure is provided in London. In Sydney there are twenty people whose jobs depend on the availability of data hosted on Server London.



Both locations are equipped with a permanent internet lines. Internet is a gateway router is set up to provide Internet access to staff it. Successor is set to protect the local network location from unauthorized access from the side, which is the "evil" internet. Successor as it provides for blocking specific traffic can be called a firewall and must be found within the individual branches are thought to take part in the VPN.

VPN software must be installed on the firewall or a server or appliance that is protected by it. Many firewalls modern equipment from manufacturers such as Cisco or Bintec include these features, and no VPN software for all hardware and software platforms.

In the next step, the VPN software must be set up to establish a connection to the VPN server instance lainnyasebagai London must accept connections from Sydney server, and the server must connect Sydney to London or vice versa. If this step is successfully completed, the company has a Virtual Network. Both branches are connected to the internet and can work together as in a real network. Here, we have a VPN without any privacy, because many internet roter between London and Sydney can read data exchange. A competitor who gained control of the internet on a roter can read all relevant business data network that actually was. So how do we create a Virtual Private Network? The solution is encryption. VPN path between two branches locked with a special key, and only the person or computer that has the key that can open and look at the data sender.



All data sent from Sydney to London or from London to Sydney should be encrypted before transmission and decrypted after. Encryption protects data in such connection from the walls of a train tunnel to protect the mountain around it. This explains why it is often known as a VPN tunnel (tunnel) or VPN tunneling, and tunneling technology is often referred to-even if no other Kwantum mechanics involved.

Proper encryption methods and provide the key to all partitions involving one of the main differentiating factor between different VPN solutions. A VPN connection is normally established between two routers internet access that comes with a firewall and VPN software. The software must be set up to connect to the VPN partner, the firewall must be set up to be able to access and exchange data between the VPN partner with encryption. Encryption keys must be presented for all VPN partner, so that exchanged data can only be read by authorized VPN partner.

How To Use .Htaccess


Htaccess is a configuration file provided by the Apache web server, which is usually used to change the default settings of Apache. We know that the majority of web hosting on the internet using Apache as the server so that the web administrators / webmasters have to learn a little more about. Htaccess so that we can change the default settings of the server. Files. Htaccess is a simple ASCII text file which is usually located in the root directory. Is required to file in ASCII format instead of binary and to file permissions (file attributes) on the hosting server should be set to 644 (rw-rr). It is intended that the server can access the file. Htaccess, but prevents the user to access the file. Htaccess from their browser. Files. Htaccess is placed in the root directory can be used to change the configuration of the subdirectories in it, so in one website we usually sufficient to have 1 file. Htaccess are placed in the root directory.

Command code in the .Htaccess should be placed in a row, so when we create .Htaccess by using a text editor like notepad then we have to disable word wrap function (line cut) first.


.Htaccess can be used to :

1. Custom Http Error 
Error message on a website is very important because it can help the visitors to find out what was going on. With htaccess we can turn the page on a server error, by defining our own liking. An example is the transfer of messages according to their function as follows:

ErrorDocument 400 /errors/400.html 
ErrorDocument 401 /errors/401.html 
ErrorDocument 403 /errors/403.html 
ErrorDocument 404 /errors/404.html 
ErrorDocument 500 /errors/500.html


2. Override Ssl Setting


By default, only the web pages that have the extension. Shtml that can run server-side includes SSI on the server. By using the. Htaccess we can change the default setting so that SSI can work with HTML format.
To change these settings, we can add the following code in the file. Htaccess

AddType text/html .html 
AddHandler server-parsed .html

If we want a page with extension. Html and. Htm to be able to run SSI, then the file. Htaccess you can add the following code

AddType text/html .html 
AddHandler server-parsed .html
AddHandler server-parsed .htm

3. Change Default HomePage

It means that . htaccess can be used to change the default name of the web page. So that users can access our website only with domain name only (http://www.Your-web.com) without having to write clearly filename (http:Your-web.com/file.html), we must have index file in the root directories. Acceptable file names such as index.html, index.htm, index.cgi, index.php etc.. Make sure that the file named index. *

There are levels in the naming. If we had index.cgi index.html in the root directory and the server will display index.cgi since. Cgi has a higher level than. Html
With. Htaccess, we can define an additional index file or can also change the order of precedence. To define mainpage.html as index pages, we can add the following code to the file. Htaccess

DirectoryIndex mainpage.html


4. Block User From IP Address

order deny,allow
deny from 123.456.789.000 
deny from 456.78.90.
deny from .facebook.com
allow from all 


5. Rewriting Urls

RewriteEngine On 
RewriteBase / RewriteCond %{REQUEST_FILENAME} !-f 
RewriteCond %{REQUEST_FILENAME} !-d 
RewriteRule . /index.php [L] 

6. Cache Control

# 480 weeks Header set Cache-Control "max-age=290304000, public" 
# 2 DAYS Header set Cache-Control "max-age=172800, public, must-revalidate"
# 2 HOURS Header set Cache-Control "max-age=7200, must-revalidate"



Kind of Hackers



Lamer
They are people with no experience and knowledge who wants to be a Hacker. They usually read or heard about Hacker & want to like it. Use their computers mainly to play games, IRC, exchange prirate software, steal credit card. Usually done using software hacking trojan, nuke & DoS. Usually brag via IRC channels etc.. Because many shortcomings to achieve elite, in their development will only be up to the level of developed or script kiddie kiddie.

Script Kiddie
Such developed kiddie, Script Kiddie usually perform these activities. As well Lamers, they only have the technical knowledge networking is very minimal. Usually can not be separated from the GUI. Hacking is done using horses to frighten and distress of life most Internet users.

Developed Kiddie
The term is mainly due to the young age group  & still in school. They read about the methods of hacking and how on various occasions. They tried a variety of systems to ultimately succeed and proclaiming victory to another. Generally they are still using the Graph UserInterface (GUI) and just learn the basic of UNIX, without being able to find new weaknesses hole in the operating system.

Semi Elite 
Hackers are usually younger than the Elite. They also have the ability and extensive knowledge of computers. They understand the operating system (including holes). Usually equipped with a small number of programs sufficient to alter the program exploits. Many of the attacks carried out by hackers who published this caliber, unfortunately by the Elite they are often categorized Lamer.

Elite
Also known as 3l33t, 3l337, 31337 or a combination of it is the spearhead of the network security industry. They get out in the operating system, able to configure and connect a global network. Capable of programming each day. A very natural grace, they are usually efficient and skilled, using knowledge to the right. They like stealth to enter the system without in the know, although they will not destroy the data. Because they always follow the rules.

Gmail "Undo Send" feature



Have you ever sent an email, but when it turns out you forgot something less like attachment or words, or recipient of the email in the email that you send? And it turns out the email was sent. Gmail already has a very useful feature in Gmail Labs called "Undo Send" that can allow you to cancel sending email after you click "Send" button. So when accidentally sending emails and there are missing you can click "Undo" to cancel it and continue to edit the email. When this feature was first launched, you have about 5 seconds to cancel sending (Undo) in 5 seconds if you do not cancel it, then the email will be immediately sent to this penerimanya.Saat by default Google has added time for you to be around 10 seconds . To activate it, go to Gmail Labs in Gmail settings and select Undo Send click Enable and click the Save Changes button at the bottom. However, if case you need more than 10 seconds to think, you can add a longer interval yaknisekitar 20 seconds or 30 seconds. Quite set in your Gmail settings, on the General tab view menu Undo Send, and select the time being 20 OR 30 seconds, and do not forget to click the Save Changes button.

How To Check Your Website Value


if you have a blog, then you can calculate the price of your blog by using a web that provides services to calculate the price of your blog / website. To see prices blog, simply visit the website and enter your blog URL will then be calculated automatically. Here's the trick to finding out if the sale price of your blog:
1. Through the web site value calculator
     http://www.sitevaluecalculator.com/

2. Through your website value website
     http://www.yourwebsitevalue.com/

3. Information via the website biz
     http://bizinformation.org/

Of the three sites above assessment on the same blog, might make you confused because there is no clarity about the formula used to calculate the price of a blog. While the variables used to calculate the price of a blog is page rank (Google pagerank), Alexa (traffic), link popularity.

How Hacker Hack/Attack Your Website


The hackers used his expertise in computers to view, find and correct flaws in the security system of a computer system or in a software. However, how does a hacker to penetrate the system a website? IP Spoofing IP Spoofing is also known as the Source Address Spoofing, namely forgery attacker's IP address so that the target considers the attacker's IP address is the IP address of the host in the network instead of from the outside network. Suppose the attacker has type A 66.25.xx.xx IP address when this type of attacks attackers then assaulted Network which will assume the attacker IP is part of the IP networknya 192.xx.xx.xx eg type C.

IP Spoofing 

occurs when an attacker 'outsmart' packet routing to change the direction of the data or transmissions to different destinations. Packet routing is usually transmitted to a transparent and clear so it makes easy for an attacker to modify the data source or destination of the data. This technique is not only used by the attacker, but also be used by security professionals to download tracing the identity of the attacker.

 FTP Attack

 One of the attacks carried out against the File Transfer Protocol is a buffer overflow attack caused by malformed command. destination FTP server to attack this average is to get a command shell or to perform a Denial of Service. Denial Of Service attacks may eventually lead to a user or attacker to retrieve the resource in the network without authorization, while the command shell can make an attacker gain access to the server system and data files that an attacker could eventually make anonymous root-acces having the right full to the system even diserang.Sebagai example network is a popular FTP server UNIX family that WU-FTPD is always in upgrade two times a day to improve the conditions that permit the FTP exploit bufferoverflow also useful to know the password contained in the system, FTP Bounce attack (using the ftp servers of others to carry out attacks), and knowing or mensniff information is in the system.

Unix Finger Exploits

In the early days of the Internet, Unix OS finger efficient utility used to download the information sharing among users. Because the demand for information on this finger information do not blame the rules, many system administrators leave this utility (finger) with minimal security, even without any security at all. For an attacker this utility is very valuable to have information on footprinting, including login names and contact information. The utility also provides an excellent description of user activity within the system, how long the user is in the system and how much users care system. The information generated from this finger can minimize Kracker effort to penetrate a system. Personal information about the user that is raised by the finger daemon is already enough for a atacker to perform social engineering using the social skill to utilize the user to 'tell' passwords and access codes to the system.

Flooding and Broadcasting 

An attacker could reduce the speed of the network and the hosts within it is significant in a way continue to request / demand for the information of servers that can handle classic attack Denial of Service (Dos), send a request to a port in excess called flooding, sometimes it is also called spraying. When a request is sent to flood all stations that are in this attack named broadcasting network. The second goal of this attack is the same that make network resource that provides information to become weak and eventually gave up. Flooding attack in a way that is dependent on two factors: the size and / or volume (size and / or volume). An attacker can cause a Denial of Service by throwing a large-capacity files or a large volume of small packet to a system. In such circumstances the network server will deal with congestion: too much information being requested and not enough power to push the data to run. Basically a big package that requires greater processing capacity, but abnormally small package and at a high volume resource will be spent in vain, and the resulting congestion.

Fragmented Packets Attacks

Internet data is transmitted via TCP / IP can be further divided into packages that contain only the first packet of information that the contents of the main part (head) of TCP. Some firewalls will allow to process part of the packages do not contain information on the source address on the packet first, this will result in some type of system to crash. For example, the NT server will be crashed if the packages were broken up (fragmented packet) enough information to rewrite the first packet of a protocol.

Email Exploits 

e-mail  exploit occurs in five forms, namely: mail floods, manipulation command (command manipulation), the attack rate of transport (transport level attack), include a variety of code (inserting malicious code) and social engineering (utilizing physical socialization ). Email attack could cause the system to crash, open and execute even rewriting the application files or also make access to command functions (command function).

DNS and BIND Vulnerabilities 

News recently about vulnerabilities (vulnerabilities) on apps Berkeley Internet Name Domain (BIND) in various versions illustrate the fragility of the Domain Name System (DNS), which is a crisis that is directed at the basic operation of the Internet (internet basic operation) .

Password Attack

Password is a common thing when we talk about security. Sometimes a user does not care about the number of pins they have, such as online transaction in the cafe, even transact online at home is very dangerous if it is not equipped with security software such as SSL and PGP. Password is one procedure that is very difficult to attack, an attacker might have many tools (technically and in social life) just to unlock something password.Ketika protected by an attacker managed to get a password that is owned by a user, then it will have the same power to the user. Train employees / users to remain vigilant in protecting the password of social engineering can at least minimize the risk, except in case of social engineering practices organizations must be aware of this technical way. Most attacks are carried out against password guessing (guessing), brute-force, cracking and sniffing. One Attack Proxy Server Proxy server function is to speed up the response time by bringing together processes from multiple hosts in a trusted network. In most cases, each host has the power to read and write (read / write) which means that what can I do in my system I can also do on your system and vice versa.

Remote  Command Processing Attack 

Trusted Relationship between two or more host facilities the exchange of information and resource sharing. Similar to a proxy server, trusted relationships give all members equal access to the power network in one and the other system (the network). Attacker will attack the servers that are members of a trusted system. Just as the latency to the proxy server, when access is received, an attacker would have the ability to execute commands and access a user data available to others. Attack File System Remote Protocol-the protocol for data transport backbone of the internet-is TCP level (TCPLevel) with a mechanism that has the ability to read / write (read / write) between network and host. Attacker can easily obtain trace information of this mechanism to gain access to the file directory. Selective Program Program Selective insertions insertions are performed when the attacker attacks put destroyer programs, such as viruses, worms and trojans (you probably already know this term well?) On the target system. Destruction programs is often also called malware. These programs have the ability to damage the system, destruction of files, stealing the password to open the backdoor.

Port Scanning

Through port scanning an attacker can see the function and how to survive a system from a variety of ports. Atacker can gain access to the system through an unprotected port. Sebaia example, scanning can be used to determine where the default SNMP string in the open for the public, which means that the information can be extracted for use in remote attack command.

TCP / IP Sequence Stealing 

Passive Listening and PacketInterception Port TCP / IP Sequence Stealing, Passive Listening Port and Packet Interception runs to gather sensitive information to access a network. Unlike active attacks and brute-force, attack using this method have more stealth-like quality.

HTTPD Attacks

Vulnerabilities found in HTTPD or that there are five types webserver: buffer overflows, bypasses httpd, cross scripting, web code vulnerabilities, and floods.HTTPD URL Buffer Overflow can occur because of errors on the attacker adds the port used for web traffic by entering the lot carackter and overflow string to find a suitable place. When a place for overflow discovered, an attacker will insert a string that would be command can be executed. Buffer-overflow can give the attacker access to the command prompt.

Tips To Make Your Password Stronger


A secure password can be the first defense to ward off hacker attacks
However, somehow making a secure password, not the young. Many hackers are more savvy to find their victims password.

Tips to make the password more secure:
 - Do not reuse passwords
- Avoid terms dictionary
- Replaced numbers or symbols is not always safe
- the longer, the better Not sure if your password is secure? You can use some tools password generator    that you can try, as reported by Mashable.

- Random.org
service that helps you create up to 100 passwords consisting of a combination of 6 to 24 characters. All combinations of passwords that will be transmitted to the browser made ​​securely through SSL. Random.org will not store your data in any form so that security can be trusted.

http://www.pctools.com/guides/password/
application created by Symantec has a high level of security so it is difficult for hijackers infiltrated. This is due to a combination of the use of uppercase or lowercase letters, numbers and punctuation marks.

StrongPasswordGenerator.com
Applications Strong Password Generator will create a password using a combination or without punctuation, with a length of up to 100 characters.

Norton Identify Safe https://identitysafe.norton.com/password-generator
For extra security, Norton antivirus software companies provide free tools to create a password using a combination of letters, numbers and punctuation marks with different characters.

FreePasswordGenerator.com
In this service you can specify exactly the type of character that will be used in the password. Before creating a password, this application will confirm whether you will use a capital letter, letter strings, numbers and punctuation marks. After that a new password can be made.

4 Tips To Speed Up Your PC



Performance of PC sometimes does not fit with what we want. Mac or Windows users would get annoyed when waiting for loading even though only a few seconds. When the performance of your PC starts continue to decline, you might start thinking of buying a new machine, but there is still a ways to go. Reported by Mashable, you can do some easy ways to increase the speed of PC ..

1. Clean up unnecessary Run disk cleanup.
It will be a little empty your hard drive and improve the performance of your computer. Think of your PC as a pedestrian with a heavy backpack - you can help him move faster by removing all unnecessary trash, you can delete temporary files, duplicate files, download - and crapware and trialware installed on your machine.

2. PC against viruses you may be attacked by spyware, adware, malware and computer viruses.
You should find that the antivirus software tepat.Jika you like surfing the website, you will not escape from virus attacks. However, you can find many free antivirus programs on the Internet. Look for one that you think is right, do not forget to scan periodically.

3. Defrag
When you use a PC, files can be spread throughout the system fragments into pieces. Defragmentation bring them back together. Maybe this does not have a noticeable effect on the speed of your system, but it's good to make sure you file all still be one in the right places. Unless you are using a solid-state drive (SSD), you may need to defrag once a month just to be on the safe side.

4. Re-install or upgrade may come a time when your best hope is to store all data on the hard drive and delete all, then reinstall Windows. But do not forget to backup all your data beforehand, so you do not miss anything important. You may jug you must turn to upgrade to a newer operating system, like Windows 8. You should also check that you are running the latest version of your software. If you do not want to constantly update Windows, you can set up your PC to do it automatically

Cheap Unlimited Webhosting

Fast Net Host

====================
*Account Features*
====================
- RVSkin
- Softaculous Premium
- Attracta (SEO/SEM)
- PHP 5.3.X
- MySQL 5
- Free Transfer
- 99.9% Uptime guarantee
- Nginx
- CloudFlare
- FFmpeg
- WHMXtra

Klik Here




»»»»»»
Starter
»»»»»»

»1 Addon Domains
»Unlimited Disk Space
»Unlimited Bandwidth
»5 Databases
»Unlimited Email
»Unlimited Sub-domain
»Attracta
»WHMXtra
»Softaculous
»99.99% Uptime Guarantee
»PHP, CGI, Perl, JavaScript, SSI & MySQL Support
1 month payment - $ 3.95
Order Now


»»»»»»
Proffesional
»»»»»»

»10 Addon Domains
»UNlimited Gb Disk Space
»Unlimited Bandwidth
»20 Databases
»Unlimited Email
»Unlimited Sub-domain
»Attracta
»WHMXtra
»Softaculous
»99.99% Uptime Guarantee
»PHP, CGI, Perl, JavaScript, SSI & MySQL Support
1 month payment - $ 6.95
Order Now




»»»»»»
CORPORATE
»»»»»»

»Unlimited Addon Domains
»UNlimited Gb Disk Space
»Unlimited Bandwidth
»Unlimited Databases
»Unlimited Email
»Unlimited Sub-domain
»Attracta
»WHMXtra
»Softaculous
»99.99% Uptime Guarantee
»PHP, CGI, Perl, JavaScript, SSI & MySQL Support
1 month payment - $ 9.95
Order Now

What is Cache Memory on a Computer ?




Cache memory is a secondary data storage medium high speed, where to store temporary data or information are often used or accessed by a computer.


Cache Memory Function
-> Accelerate Access data on a computer
-> Lighten working processor
-> Bridging the speed difference between the CPU and main memory.
-> Accelerate memory performance


Location of Cache Memory
       1. Contained in the Processor (on chip)
       Internal cache is placed in the processor so that it does not require an external bus, then the time
        access will be very fast at all
       2. There are outside Processor (off chip)
          located on the motherboard, this type of memory access speed is very fast,
           as soon as the first type of cache memory

Cache Memory Type

1.  L1 cache L1 cache is a small amount of SRAM is used as cache memory integrated on the processor      blend.
- Useful for temporarily storing instructions and data, and ensure that the processor has yangstabil supply of data to be processed while the memory fetch and store new data.
- L1 cache (Level 1 cache) also referred to as primary cache, the cache first, or level one cache.
- Transfer of data from the L1 cache to the processor occurs fastest speed is near the speed of registers

2.  The meaning of the term L2 cache L2 SRAM cache is a small amount of memory on the motherboard         that are close to the processor holder position.
   - Useful for temporarily storing instructions and data, and ensure that the processor has yangstabil supply    of data to be processed while the memory fetch and store new data
     - (Level 2 cache) secondary cache, second-level cache, or level two cache.
    - L2 cache has a size larger than L1 lbih transfer speed but a little longer than L1cache.
3. L3 cache rarely exist, exist only in a particular computer.
         - Useful when there is a missing cache "missing" in the L1 and L2 cache
         - L3 cache has lbih size larger than L1 and L2 but the speed

           transfer longer than L1cache and L2 Cache.

Elements of Cache Memory
- Function Mapping (Mapping)
              mapping main memory blocks into cache lines.
· Direct Mapping (Direct Mapping)
· Associative Mapping (Associative Mapping)
· Associative Mapping Set (Set Associative Mapping)

- Replacement Algorithm
to choose which data blocks in the cache that can be replaced with a new data block
· Least Recently Used (LRU)
· First in, first out (FIFO)
· Least frequently used (LFU)
· Random

Functions of the devices on the motherboard


Processor or CPU (central processing unit) has functions to read and interpret instructions, melakukak execution, and store the results in memory. CPU data bus used to have 16,32 or 64 bit.

MOTHERBOARD

Motherboard or collectively, the Parent Board Motherboard
is a major component of a PC, because the motherboard was the one
all components of your PC will be united. Motherboard form as
an electronic circuit board. Motherboard is the place passed
lalangnya data. Motherboard connects all the computer equipment and
making it work together so that the computer running smoothly.


Motherboard components
1. Power Connector
Power connector is a pin that connects the motherboard to the power
supply in a computer casing. At AT motherboard type, casing
all it takes is the type of AT as well. AT type power connector consists
of two parts, where the two wires from the power supply will be stuck in
situ. In type ATX, power supply cords together in a single header
intact, so you stay drove it on the motherboard. The cable
consists of two columns correspond to the pin on the motherboard which consists
top two pin arrays as well. There are a few motherboards that provide two
type power connector, AT and ATX. Most recent motherboards already
ATX type.

2. Processor Socket or Slot

There are several types of plugs to plug your processor. Model
the longest is a ZIF (Zero Insertion Force) Socket 7 or opular
with terms Socket 7. This socket compatible processors fib
Intel, AMD, or Cyrix. Processor models are usually used for long
(Up to generation 233 MHz). There is another socket called
Socket 370. Socket to Socket 7 is similar but the pin number
as the name suggests, 370 seeds. This socket compatible processors
Intel fib. While the name itself AMD socket with the term
Socket A, where the pin number is also different with socket 370.
A term used to designate the brand AMD Athlon processor. To
Intel Pentium II processor family and III, slot used
called Slot 1, while motherboard that supports the processor
Slot A AMD uses for such a kind of slots.

3. North bridge controller

VIA VT8751A which provide interfaces prsessor with frequency
533/400MHz, which supports intel Hypertheading tecnologi, interfaces
memory system to be operating at 266MHz, and a 1.5V AGP interface
supports AGP 2.0 specification including protocol with write speeds
4X.

4. Memory Socket

Also there are two types of memory socket that is now circulating in the community
computer. Indeed, there is also the latest socket for Rambus-DRAM but
until now there has been a lot of users who use it. Socket old
SIMM is still quite popular. Socket is comprised of 72 pin modules.
The second socket has 168 pin modules, which are designed in one direction.
You may not install it upside down, because the strain on the motherboard
been adapted to the type of memory DIMM sockets.

5. Floppy and IDE connectors

This connector connects the motherboard to save computer devices
such as a floppy disk or hard drive. IDE connectors in a
motherboards usually consists of two, one is the primary IDE and
the other is the secondary IDE. Primary IDE connector connects
motherboard with the primary master drive and the secondary master device.
Meanwhile, the secondary IDE connector is usually connected with
pirantipiranti to slave and slave drive as CDROM. How
connecting pin with cable? Easy. IDE ribbon cable have
dash of red on one side. The red strip
mark, red striped side of the cable is plugged into the pin numbered 1 in
connectors. When stuck upside down, attached the device will not
recognized by the omputer. The same thing applies to connect
floppy cable with the pin on the motherboard.

6. AGP 4X slot
This image penyelerasi port slot graphics card supports 3.3V/1.5V mode
AGP 4X for 3D graphics applications.

7. South bridge controller
VIA VT8235 integrated peripheral controller which supports various
I / O functions including 2-channel ATA/133 bus master IDE controller,
asmpai 6 USB 2.0 ports, LCP nterface super I / O, and PCI AC'97 interface
2.2.

8. Standby Power LED
This LED is lit when there is standby power on the motherboard. This LED
acts as a reminder (reminder) to turn off the system power
before turning on or off the machine.

9. PCI slots
Pegembangan slot PCI 2.2 32-bit PCI bus master in9i mensopport cart
eperti cart SCSI or LAN with a maximum output of 133MB / s.

10. PS / 2 Mouse Port
This green 6-pin connector is for the mouse.


11. Parallel and Serial ports
In type AT, serial and parallel ports are not united in one
motherboard but connected via cable. So, on the motherboard
available pin for plugging in a cable. Parallel port functions
bermacammacam, ranging from connecting a computer to the printer,
scanner, to connect computers with peripherals
Certain designed using a parallel port connection. Serial port
typically used to connect with a cable modem or a mouse.
There are also other devices that can be plugged into the serial port. In
ATX motherboard type, parallel and serial ports are integrated in
motherboard, so you do not need to plug cables
troublesome.

12. RJ-45 Port
This 25-pin port connects the LAN via a central connector
the network.

13. line-in jack
line-in jack (light blue) menghuungkan to tape player or audio source
other. At 6-channel mode, this jack funsi menjadai bass / middle.

14. line out jack
jack line out (lime) connects to headphones or speakers. On
6-channel mode, this function is a speaker out jack front.

15. microphone jack
mic jack (pink) to synchronize the microphone. At 6-channel mode
This function is a rear speaker out jack behind.


16. USB 2.0 port 1 and port 2
kedu port USB (universal serial bus) 4-pin is provided for
connect with USB 2.0 devices.


17. USB 2.0 port 3 and port 4
kedu port USB (universal serial bus) 4-pin is provided for
connect with USB 2.0 devices.


18. Video Graphics Adapter Port
This 15-pin port is for a VGA monitor or other VGA devices
compatible


19. Keyboard connector
There are two types of connectors that connect the motherboard to the keyboard.
One is a serial connector, while the other one is a PS / 2 connector.
AT type serial connector or a round, larger than the
Model PS / 2 has, with as many as 5 pieces of pin holes. Meanwhile, the
PS / 2 connector has 6 pieces and pin hole diameter is smaller
than half of the AT models.

20. CMOS battery
This battery is used to provide power to the motherboard
recognize the installed configuration, when he does not / has not
get the power from the power supply.

IPv4 vs IPv6


Differences in Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)
 
I. Internet Protocol Version 4 (IPv4)
IPv4 is a type of network used in the protocol
TCP / IP network using the IP protocol version 4. IP version has limitations
which is only able to address a host computer as much as 4 billion worldwide.
Examples of IPv4 address is 192.168.0.3
In IPv4 there are 3 types of classes, depending on the size of the host, ie class A (section
throughout the 24-bit host, the IP address can be assigned to host 16.7 million), class B (host part
16-bit host = 65534) and class C (section hosts all 8 bits = 254 hosts).
Network administrators to apply for the class type network based on scale
management. The concept of this class has the advantage of: the management of the information is not
require all 32 bits, but quite simply part of the network only, so
of the information stored in the router, be small. Once the network address is obtained,
then the organization can freely give the address section on each host
host.
Comparison of IPv4 and IPv6
Provision of internet addresses in the following format IP address (RFC 1166). This address
expressed with 32 bits (numbers 1 and 0) were divided into 4 groups (each group
consists of 8 bits or octets) and each group is separated by a dot. To
facilitate reading, writing addresses is done with decimal numbers, for example
100.3.1.100 which if expressed in a binary
01100100.00000011.00000001.01100100. 32 bits of this means the number of maximum number
addresses that can be written is 2 to the power 32, or 4,294,967,296 addresses. The address format
consists of 2 parts, netid and hostid. NetID own states while the network address
hostid declare a local address (host / router). 32 bits of this, should not all of the digits 0 or
1 (0.0.0.0 is used for networks that are not known and are used to 255.255.255.255
broadcast). In its application, the internet address is classified into classes (AE) ..
Reason for this classification include:
· Facilitate the management system and setting addresses.
· Utilize existing address number is optimum (no address
missed).
· Allows organizing a worldwide network with a network distinguishes
The category includes large, medium, or small.
· Distinguish between the address and the address for the network to host / router.
Described in the table below based on the availability of data from the APNIC IPv4
until the end of 1999 ago and total IP that has been allocated to each - each country in
Asia Pacific.


II.5 Internet Protocol Version 6 (IPv6)
IPv4 to IPv6 transition is a phenomenon which is inevitable by all
circles. Although still able to use IPv4, IPv6 has a different design versions and
has more uses than IPv4. Accompanied by the growth of the innovations
tech, then the nations of the world are required to compete or at least
gradually began to implement IPv6. According to the Internet Protocol,
not expected until 2011, IP address allocation which is still used today will
exhausted. Then came a new peangalamatan method known as IPv6. In
Indonesia, one of the Internet service provider, Indosat Mega Media (Indosat M2), since 2004 has been
IPv6 network is ready to rent out.
IPv6 is an IP addressing method which slowly began to replace IPv4.
IPv6 is used as due to the limited number of IP addresses owned by IPv4,
considering the increasing number of IP-based devices at this time. IPv6 or Internet Protocol
Internet Protocol version 6 is the latest which is a further development of the
protocol that is used today, IPv4 (Internet Protocol version 4). IPv6 addressing
uses 128-bit addresses far more than the 32-bit addressing
belongs to IPv4. With a capacity of very large IP address in IPv6, every device that
can connect to the Internet (desktop computers, laptops, personal digital assistants, or phone
GPRS/3G mobile) can have a fixed IP address. So, sooner or later every
No electronic devices that can be connected to the Internet via a unique IP address.
The IPv6 protocol has several new features that are an improvement over IPv4, including
:
• Have a new header format
The IPv6 header has a new format that is designed to keep header overhead
minimum, to eliminate the fields that are not required and some optional fields
Comparison of IPv4 and IPv6
are placed after the IPv6 header. IPv6 header alone is twice the size of a large
of the IPv4 header.
• Range address a very large
IPv6 has 128-bit or 16-byte for each source and destination IP addresses.
So logically IPv6 can accommodate about 3.4 x 1038 possible combinations
address.
• efficient and hierarchical addressing and routing infrastructure
Global address of IPv6 are used in the IPv6 portion of the Internet, is designed to
creating an efficient routing infrastructure, hierarchical, and easily understood by
developers.
• Configuration is stateless and statefull addressing
IPv6 support is statefull addressing configuration, such as address configuration
using a DHCP server, or a stateless without using the DHCP server. On
The second configuration, the host automatically configure themselves with IPv6 addresses
to link the so-called link-local address and address prefix derived from the
transmitted by the local router.
• Built-in security
Support for IPsec provides support for network security and offers
interoperability between different IPv6 implementations.
• Better support in terms of QoS
In the IPv6 header contained in the identification of traffic using the Flow Label field, so
QoS support can still be implemented even though the packet payload is encrypted through
IPsec.
• The new protocol for interaction nodes
Contained in IPv6 Neighbor Discovery Protocol which replaces Address Resolution
Protocol.
• EkstensibilitasIPv6 can be easily added by adding new features
extension headers after the IPv6 header. The size of IPv6 extension headers is only constrained by the
the size of the IPv6 packet itself.

Man Of Steal


Movie Man of Steel (Superman) which premiered today, Thursday (13/6) to make the whole cinemas full of movie lovers. Not least three theaters in Semarang, the XXI Paragon, E-Plaza, and image 21, which is filled with a snaking queue ticket.
As in XXI Paragon, although the new ticket counter opened at 11.00 am, but hundreds pengantre've come since at 09.30 pm. One of them, Anto (26) an entrepreneur, who was willing to come early to buy six tickets, for the screening of the film at 21:00 am.
"I am willing to come early, for fear guns may be the ticket, but when I came, already rather long queue," he said.
He said, before he bought a ticket for the 18:15 screening, but as she reached the front of the booth, to watch the film is full. "Because it's full, it's gone the next hour, it wrote also already almost full," he said.
In this there are four XXI Paragon theater, and three of them play the movie Man of Steel. Queue ticket is divided into two rows, the first row for playback at 12.00 to 13.00, and the second row for playback after day to night.
Pengantre is limited when buying a ticket, ie, every one pengantre only allowed to buy up to six tickets. Each theater was showing films four times.
Similar scenes also occurred at E-Plaza. Anteran was too long to snaking. Public Relations E-Plaza, Andhini Pangestuwati said, over the next few days, as many as three theater is in E-Plasa play the movie Man of Steel.
"Before the counters opened at 12.00 earlier, hundreds pengantre've come since morning," he said.
Andhini added, for at E-Plaza, visitors can queue up tickets in person, or through a reservation in advance by phone. "We do not limit the number of tickets to be purchased pengantre. Allow pengantre We also bought a ticket for the next day," he concluded.

Smartphone Battery Saving Tips


Smartphone devices on the market today the average is equipped with a large capacity battery. Still, the risk of running out of battery while on the road remains high.

Running out of battery in the key moments sometimes it sucks. However, there are actually many ways you can do to save battery.

Here are some easy ways to conserve battery power KompasTekno quoted from various sources.

1. Turn off the radio signal.

Often, in certain areas, the smartphone can lose signal. This can happen because the signal transmitter tower is located far away from the location of the smartphone or the traffic is being filled.

If the signal is lost or weakened, the system will continue to look for a smartphone usually best connections. Search consistent signals can make the battery runs out quickly.

Therefore, you should turn off radio signals, if the user is absolutely sure will not mendapatknya signal in some time. Usually, the option to turn off radio signals contained in the "Settings" menu.

Turn off WiFi and Bluetooth feature when not in use. The devices are also able to make a quick smartphone battery runs out.

2. Turn on Airplane Mode.

Do not want too much bother to set the signal settings? Users can easily turn off all radio signals in the smartphone only with a fashion course, the Airplane Mode.

By turning on Airplane Mode, all radio signals, either GSM, WiFi, Bluetooth up, will immediately shut down.

3. Turn off the vibration (vibrate)

Vibration (vibrate) can sometimes be helpful if there was a phone call or message comes in when the user is driving, meeting, or other places that need a cell phone in a state of "silent".

However, the vibration feature actually requires more battery power than normal ringtone. Based on these facts, if the user is not in need of this feature, we recommend that the vibration feature on your smartphone.

4. Close unneeded applications.

Several applications opened simultaneously is one cause of battery run out quickly. Therefore, close the application that is no longer needed.

5. Do not "streaming"

Want to listen to music or watch videos? If yes, you should keep two types of data on storage media available.

Reduce activity if the streaming does not want to wear out the battery faster. Watch videos or listen to music via YouTube is fun, but this activity will "force" the phone system continues to work and eventually make the battery run out quickly.

6. Dim the screen.

The brighter the screen, the faster the battery runs out. Therefore, dim or turn off the screen when not in use.

Got tips on keeping more battery life? Let's share through the comments feature below.

Tips on Saving Mobile is Submerged Water


Here are the steps.

1. Immediately take the phone out of the water

While virtually sealed, water can easily seep into the phone in a very short time. Difference a few seconds can determine the life or death of your gadget.

Therefore, remove the phone from the water as soon as possible, then turn off to prevent short circuiting indirectly (short circuit). Do not turn it on before drying.

2. Do not try to take a cell phone submerged in water that is being in-charge and connect to the power jack

The reason, perhaps still burning and electricity can flow into the water in the vicinity of the phone. His intention to save the phone, rather than the soul itself may be threatened. Turn off the power first, then ask for professional help.

If the phone fell into the water while not being connected to a power outlet, please read the next step.

3. Phone immediately dry with a towel or cloth, then remove all the cover and the battery

This is one of the most important steps. Most of the electronic components inside the phone can survive even if exposed to water, as long as there is no power from the battery.
wikihow.com

To check the water damage, check around the corners of the battery in the area that there is a circle or a small white box, with or without the red line.

If the color is not white but changed to pink or red, meaning no damage from water seepage.

Read the manual quickly if it does not know how to remove the battery.

4. Remove the SIM card and memory card

The data and information stored in the SIM or memory card sometimes more important than the phone itself. Therefore, although the two components is relatively waterproof, you should immediately remove it to prevent things that are not desirable, such as corrosion of the contact parts are made of metal.

Then, immediately drain the SIM and memory card, do not put the phone before it is completely dry.

5. Disconnect all accessories like headphones and casings

Accessories can trap water so that complicates the process of drying. Immediately release all of them after the phone out of water.

6. Repeat business mobile dry with a towel

This time, try to be more thorough than the first attempt. Drain as much water from the outside and inside the phone (battery compartment) by wiping gently using a towel.

Do not move their phone to move the water in it was not thither. Strive to position the phone does not change while drying. Note the towel in order not to get caught in between the surface of the phone.

Clean the inside of the phone with alcohol can help remove water.

7. Use a vacuum cleaner (a vacuum cleaner)

To drain the water out of the phone, use a vacuum cleaner when there. Turn on and navigate to each section are wet for about 20 minutes. In order not to stiff, Take turns holding it with others. wikihow.com

This method can quickly drain the phone so it can be turned in the shortest possible time, just half an hour when the phone briefly dipped into the water.

Do not drive too close cleaner funnel to the phone because it produce static electricity, which is even more dangerous for phones than water though.

Do not use a hair dryer (hair dryer) or any objects that are winds to dry the phone, even though set to "cool". Such tools can push more water and moisture deep into the phone so that potentially exacerbate the damage.

8. Use water-absorbent material to dry the phone

Examples are widely available is rice. Enter the phone into the rice and leave overnight or more lama.wikihow.com

More effective material is silica gel or other moisture absorbent. Enter the phone with silica gel in a sealed container.

To be effective, turn the phone's position every few hours so that the water trapped inside can flow out through the bottom.

9. Remove the phone, then put it on a towel, handkerchief, or other cloth.

If it turns out there is still moisture in the towel or handkerchief, repeat the drying with a vacuum cleaner and next steps.

10. Try to turn on the phone

Once the maximum effort and wait for at least 24 hours, it is time try turning on the phone.

Check first to make sure every part of the phone that the device in question is completely dry. Then, plug the battery into the posnel, turn on, and see if the phone is functioning normally.

If the phone is completely dry but will not turn on, try to connect to the charger. If the phone can be lit this way, the battery is probably defective and should be replaced.

11. If you still can not turn on, bring it to a location service professionals

Do not attempt to disassemble the phone itself without the help of professionals. You are potentially exposed to hazardous chemicals from your phone or electric shock.

If the phone turns on but does not function normally, there may have been a result of corrosion of water that remains. Disconnect all batteries and accessories, then try again and wipe dry-contact metal box.

How to Track BlackBerry 10 When is Missing?


Nowadays, many people prefer to lose wallet than mobile phones. Why? Mobile phones that are now widely used to store various important data, such as data stored in e-mails or other documents, which may not be replaced by money.

Well, for the owners of devices based on BlackBerry 10 operating system, device loss might not be a scary thing anymore. All of this can happen due to the presence of features of BlackBerry Protect.

By using this feature, users have the ability to lock (lock), delete the data, giving a warning, to track the device remotely.

Users can also perform back-up data to the cloud so they can get back important information in case of device loss.

Interestingly, BlackBerry Protect is available as a standard feature on every BlackBerry device 10. That is, these features are directly available in the BlackBerry 10 devices.

How to use

When users turn on the BlackBerry 10 products for the first time, they will be prompted to create or log-in to your BlackBerry ID account. Once completed, by using this account, users can directly activate the BlackBerry Protect features.

After activate it, the user can perform all functions through the BlackBerry Protect website protect.blackberry.com.

In these sites, users can see the location of the last of their 10 BlackBerry devices. By using the services of Bing Maps, the existence of a lost smartphone can be detected.

However, one feature that takes advantage of the GPS of the BlackBerry device 10 so that, when the device loses signal, it is possible that the system will be a little difficult to track the phone.

In addition, users can also create smartphone "shout" Play Sound using the feature.

Features that can also be run through the BlackBerry Protect website will make the device emits a fairly loud for a few seconds.

This is very useful when the smartphone is lost still be near the owner.

If there is no hope, then the last step you can do is lock or lock all smartphone data.

The only drawback of this feature is BlackBerry Protect impossibility of back-up data wirelessly. The process can only be done through a special software BlackBerry 10.

7 Things Not Owned iPhone 5


Present as an Apple's most advanced smartphone, the iPhone 5 does seem to have it all. He has specifications, performance, and also the best features.

However, no product is absolutely perfect in this world, as well as the iPhone 5. There are still some things that can not be done by a device that reportedly will soon get the next generation.

Here are 7 important functions that are not owned by the iPhone 5, as quoted by Business Insider.

1. Yet equipped with NFC

Smartphones that are circulating these days, be it a middle class to upper class, most are equipped with NFC. Unfortunately, up to the 6th generation, Apple still has not embed these components.

NFC is actually the development of card technology Radio Frequency Identification (RFID). By using NFC, the user can perform payment activities simply by attaching the phone to a reader.

Apple itself is already "replace" NFC with Passbook system which became available in iOS 6. Through these features, users can store tickets, gift cards (gift cards), boarding passes, and much more.

This feature can also run some (not all) of the NFC. For example, users can not use the NFC to wirelessly send money to other people's PayPal account.

With the proliferation of stores that support NFC, Apple has had to apply these components to the new device.

2. Typing is more comfortable

Typing on the touchscreen is never as comfortable as typing on a physical keyboard. Developers are trying hard to develop applications that make typing typing comfort level has increased.

One application that has managed to accommodate the matter is Swype. Unfortunately, this app is only available in Android only.

Instead of having to type in letter by letter, the application user can drag (move finger without lifting your finger from the screen) to make the word.

In fact, Apple gave auto-text/autocorrect function that is able to predict what word typed by the user wants. However, often resulting word is not right. Of course it makes users more sluggish and reduce the level of comfort in typing.

3. Support for SD cards

Almost all Android based phones on the market these days are backed by a microSD port. Given these ports, users can expand the storage capacity of their devices.

On average, the device supports microSD cards up to 64GB.

4. Capacity seems inadequate

By the way the problem of storage media, the capacity provided by Apple for its iPhone devices is between 8, 16, 32, and 64GB.

Currently, the most widely circulated in 16 and 32GB capacities.

Users themselves many have complained that the lack of storage capacity.

Perhaps, for the future, Apple can deliver a device with a larger internal capacity, as they once present in the iPod Classic. At that time, it has the largest capacity is 160GB.

5. Standard USB cable

Whether intentional or not, Apple is trying to be different for the affairs of the USB cable. Apple does not use a standard USB cable for charging and also the problem of data transfer.

In fact, smartphones on the market today use an average of the same micro USB cable.

6. Watching videos on the other display

Most smartphones on the current class already has a micro-HDMI port. Through these ports, users can move the phone screen to other screens, such as TV.

Unfortunately, Apple does not provide the port to the iPhone. Users have to pay an extra few hundred thousand dollars to buy a special adapter, if you want to do that.

7. The battery can be removed

IPhone 5 battery life is increased compared to the iPhone 4S. Users can call for 8 hours on 3G networks, 8 hours of surfing the internet, watching 10 hours of video, and 40 hours of music listening.

However, what if the battery is damaged? Users should go to the after-sales service to replace the battery. Unibody design that is owned by the iPhone does not allow the user to replace the battery yourself.