Pages

Wednesday, 31 December 2008

Wide Area Network (WAN) dan Router

Kontribusi Dari Wasi Tri PrasetyaWednesday, 10 September 2008Pemutakhiran Terakhir Wednesday, 10 September 2008Alamat komputer tidak punya network ID yang sama karena berada pada subnet yang berbeda, sehingga untuk mengirimkan paket data tidak bisa menggunakan koneksi hub atau switch. Router dibutuhkan untuk meneruskan paket dari sub-net ke sub-net yang berbeda.Karakteristik utama WAN- Menghubungkan peralatan pada tempat yang...
Read more ...

Thursday, 25 December 2008

Keamanan Sistem Internet

Untuk melihat keamanan sistem Internet perlu diketahui cara kerja sistem Internet. Antara lain, yang perlu diperhatikan adalah hubungan antara komputer di Internet, dan protokol yang digunakan. Internet merupakan jalan raya yang dapat digunakan oleh semua orang (public). Untuk mencapai server tujuan, paket informasi harus melalui beberapa sistem (router, gateway, hosts, atau perangkat-perangkat komunikasi lainnya) yang kemungkinan...
Read more ...

Tuesday, 23 December 2008

Cryptography

Cryptography comes from the Greek words for "secret writing". It has a long and colorful history going back thousands of years. In this section we will just sketch some of the highlights, as background information for what follows. For a complete history of cryptography, Kahn's (1995) book is recommended reading. For a comprehensive treatment of the current state-of-the-art in security and cryptographic algorithms, protocols,...
Read more ...

Sunday, 21 December 2008

Intrussion Detection System

Jaringan atau dalam bahasa inggrisnya network saat ini merupakan salah satu teknologi yang sanagt penting dalam perkembangan IT. Bill Gates dalam bukunya yang berjudul "Speed of Throught" membahas tentang dunia baru yang disebut dengan dunia web, yang menurutnya akan menjadi hal yang sangat penting dan menjadi saraf dalam perkembangan IT. Jaringan memudahkan user untuk mampu berkomunikasi dalam jarak yang tak terbatas. Antara...
Read more ...

Thursday, 18 December 2008

Network Security part 2

Principles of CiphersEncryption transforms a message in such a way that it becomes unintelligible to any party that does not have the secret of how to reverse the transformation. The sender applies an encryption function to the original plaintext message,...
Read more ...

Network Security

Computer networks are typically a shared resource used by many applications representing different interests. The Internet is particularly widely shared, being used by competing businesses, mutually antagonistic governments, and opportunistic criminals. Unless...
Read more ...

Wednesday, 17 December 2008

Pemrograman Web

Website dapat dibedakan menjadi dua yaitu Web Statis dan Web Dinamis. Web Statis adalah web yang berisi informasi-informasi yang bersifat statis (tetap), sedangkan Web Dinamis adalah web yang menampilkan informasi yang bersifat dinamis (berubah-ubah) dan dapat saling berinteraksi dengan user. Biasanya untuk web statis yang ditonjolkan adalah sisi tampilan yang banyak mengandung grafis sehingga untuk merancang web statis tidak...
Read more ...

FreeBSD Directory Structures

Since FreeBSD uses its file systems to determine many fundamental system operations, the hierarchy of the file system is extremely important. Due to the fact that the hier(7) man page provides a complete description of the directory structure, it will not be duplicated here. Please read hier(7) for more information. Of significant importance is the root of all directories, the / directory. This directory is the first directory...
Read more ...

Tuesday, 16 December 2008

Choosing an Audio CD Player

The GNOME CD player (gnome-cd) is the default CD player for many GNOME desktop systems. It has standard play buttons and lets you get track information automatically from a CD database, such as freedb.org. (If your CD isn’t listed in the database, you can enter your own track information manually.) However, a variety of CD players come with Linux distributions or may be downloaded and installed. Here is a cross-section of your...
Read more ...

Playing Music and Video

One of the most popular and enjoyable activities on a computer is playing audio and video. With improved multimedia players and tools for storing and managing content, Linux has become a great platform for storing, playing, and managing your music and video files. Some Linux distributions are more multimedia-friendly right after the install than others. An example of this is Freespire, which comes pre-loaded and able to support...
Read more ...

Configuring Networking

If you are connecting your computer to an Ethernet LAN that has a DHCP server available, you probably don’t need to do anything to start up automatically on your LAN and even be connected to the Internet. However, if there is no DHCP server on your LAN and you have to configure your TCP/IP connection manually, here is the information you will probably be prompted for during Linux installation: IP address—If you set your own...
Read more ...

Using LILO or GRUB Boot Loaders part 2

Permanently Changing Boot Options You can change the options that take effect each time you boot your computer by changing the GRUB configuration file. In Fedora and other Linux systems, GRUB configuration centers on the /boot/grub/grub.conf file. The /boot/grub/grub.conf file is created when you install Linux. Here’s an example of that file for Fedora: # grub.conf generated by anaconda # # Note that you do not have to rerun grub...
Read more ...

Using LILO or GRUB Boot Loaders

A boot loader lets you choose when and how to boot the bootable operating systems installed on your computer’s hard disks. Most Linux systems give you the opportunity to use GRUB or LILO boot loaders. The following sections describe both GRUB and LILO boot loaders. Booting Your Computer with GRUB With multiple operating systems installed and several partitions set up, how does your computer know which operating system to start?...
Read more ...

Dual Booting with Windows or Just Linux?

It is possible to have multiple, bootable operating systems on the same computer (using multiple partitions on a hard disk and/or multiple hard disks). Setting up to boot more than one operating system, however, requires some thought. It also assumes some risks. While tools for resizing Windows partitions and setting up multi-boot systems have improved in recent years, there is still considerable risk of losing data on Windows/Linux...
Read more ...

Choosing a Linux Distribution

Dozens of popular Linux distributions are available today. Some are generalized distributions that you can use as a desktop, server, or workstation system; others are specialized for business or computer enthusiasts. Linux at Work Because I know a lot of people who use Linux, both informally and at work, I want to share my general impressions of how different Linux distributions are being used in the United States. Most consultants...
Read more ...

Installing Linux

If someone hasn’t already installed and configured a Linux system for you, this chapter is going to help you get started so you can try out the Linux features described in the rest of the book. With recent improvements to Linux live CDs and installers, getting your hands on a working Linux system is quicker and more solid than ever before. If you are a first-time Linux user, I recommend that you:* Try a bootable Linux—This book’s...
Read more ...