Kamis, April 30, 2009

Firefox V3.0.9 Portable

Firefox V3.0.9 Portable


Features :
Mozilla Firefox is a fast, full-featured web browser that's easy to use. It has lots of great features including popup-blocking, tabbed-browsing, integrated search, improved privacy features, automatic updating and more. Plus, the launcher bundled in the Mozilla Firefox, Portable Edition, it leaves no personal information behind on the machine you run it on, so you can take your favorite browser along with all your favorite bookmarks and extensions with you wherever you go.

Installing Firefox Portable :
Just download it, move the .exe to your portable drive (USB) and double-click it, then Select the location you wish to install to and click OK [make sure you choose the exact directory, as it is going to be set to something else, so if installing on USB, choose your USB directory]. A FirefoxPortable directory will be created there and all the necessary files installed. That's all there is to it.

Using Firefox Portable :
To start up Firefox Portable, just double-click FirefoxPortable.exe file where you installed Portable Firefox on your portable drive. Then, use it just like you would a local copy of Firefox.

Google Chrome 2.0.174.0 Beta MultiLang Portable


Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. It has one box for everything: Type in the address bar and get suggestions for both search and web pages. Will give you thumbnails of your top sites; Access your favorite pages instantly with lightning speed from any new tab.

Google Chrome is an open source web browser developed by Google. Its software architecture was engineered from scratch (using components from other open source software including WebKit and Mozilla Firefox) to cater for the changing needs of users and acknowledging that today most web sites aren't web pages but web applications. Design goals include stability, speed, security and a clean, simple and efficient user interface.

Selasa, April 28, 2009

Search Engine

Get to the Top on Google
Tips and Techniques to Get Your Site to the Top of the Search Engine


Written in a clear, non-technical, style by a leading expert in SEO (search engine optimization), GTTTOG explains techniques and strategies proven to return higher search engine rankings and sales.

It addresses all aspects of search engine marketing and includes an assessment of the impact of Web 2.0 on Internet search strategies.


CLICK HERE TO DOWNLOAD


Get to the Top on Google:
Tips and Techniques to Get Your Site to the Top of the Search Engine Rankings


Written in a clear, non-technical, style by a leading expert in SEO (search engine optimization), GTTTOG explains techniques and strategies proven to return higher search engine rankings and sales. It addresses all aspects of search engine marketing and includes an assessment of the impact of Web 2.0 on Internet search strategies.


CLICK HERE TO DOWNLOAD


Search Engine Marketing Inc Driving
Search Traffic to Your Companys Web Site


Step-by-step guide to setting up and managing a search marketing program for your organization

Best practices, tips, and cost-saving measures from two of the world's premier experts

Effective search engine optimization (SEO) and search engine marketing (SEM) is now crucial to the success of your business. But it's never been more challenging especially if you're responsible for a large, complex site. Finally, there's a definitive source for reliable information for implementing an effective search engine optimization and marketing program for your business. In Search Engine Marketing, Inc., ibm.com's site architect and a world-leading enterprise SEO consultant present best practices, step-by-step techniques, and hard-won tips for driving maximum traffic at minimum cost.

The authors begin with an up-to-date introduction to the fundamentals: of how search engines have evolved, how search marketing works, and how searchers and site visitors really think when they're trying to find information. You'll walk step-by-step through every facet of creating an effective program: projecting business value, selling stakeholders and executives, building teams, choosing strategy, implementing metrics, and above all, execution. Drawing on their unsurpassed experience, the authors systematically address every issue you're likely to encounter, from enforcing search-engine friendly content standards through hiring consultants. You'lllearn how to:
  • Handle the unique optimization and marketing challenges associated with large sites
  • Create site standards that codify best SEO/SEM practices
  • Align search marketing with your company's strategic and tactical goals
  • Automate checking and reporting for every page on your site
  • Create monthly scorecards and use them to drive improvement
  • Provide effective guidance to content developers and designers, in language they'll understand
  • Get your site indexed, choose target keywords, optimize content, and attract links
  • Make the most of the leading search engines and specialized and local search
  • Ensure that paid search efforts deliver optimal results, cost-effectively
  • Measure site-wide success rates across multiple systems and technologies
  • Hire the right SEO consultant and avoid the wrong ones
Whether you're a marketing, Web, or IT professional, product manager, or content specialist, this book will help you define your SEO/SEM goals, craft a best-practices program for achieving them, and implement it flawlessly.

CLICK HERE TO DOWNLOAD


Professional Search Engine Optimization with PHP: A Developer’s Guide to SEO



Maybe you're a great programmer or IT professional, but marketing isn't your thing. Or perhaps you're a tech-savvy search engine marketer who wants a peek under the hood of a search engine optimized web site. Search engine marketing is a field where technology and marketing are both critical and interdependent, because small changes in the implementation of a web site can make you or break you in search engine rankings. Furthermore, the fusion of technology and marketing know-how can create web site features that attract more visitors. The mission of this book is to help web developers create web sites that rank well with the major search engines, and to teach search engine marketers how to use technology to their advantage. We assert that neither marketing nor IT can exist in a vacuum, and it is essential that they not see themselves as opposing forces in an organization. They must work together. This book aims to educate both sides in that regard.

CLICK HERE TO DOWNLOAD

Mastering Delphi 7

Mastering-delphi-7

Still the Best Delphi Resource–Now Fully Updated and Expanded Whether you're new to Delphi or just making the move from an earlier version, Mastering Delphi 7 is the one resource you can't do without. Practical, tutorial-based coverage helps you master essential techniques in database, client-server, and Internet programming. And the insights of renowned authority Marco Cantù give you the necessary knowledge to take advantage of what's new to Delphi 7–particularly its support for .NET.

CLICK HERE TO DOWNLOAD



NET 2.0 for Delphi Programmers



Apress publishes migration books for both VB 6 and C++ programmers moving to .NET. Consider this the Delphi installment of Apress migration books! There is ample coverage of C# as well as Delphi for .NET inside this newest addition.

CLICK HERE TO DOWNLOAD


Inside Delphi 2006 - Wordware Publishing



Starting with a detailed description of Delphi and C++ languages, this book covers the essential topics such as conditions, loops, strings and arrays, procedures and functions, file I/O, and pointers and gives an introduction to OOP before venturing into.

CLICK HERE TO DOWNLOAD



Delphi Developer’s Guide to XML

This XML guide explains how to apply the power and flexibility of Delphi to XML, and provides a solid introduction to the technologies that make up XML and its related specifications

CLICK HERE TO DOWNLOAD

Mastering C# Database Programming Download


Mastering-c-database-programming
Enter a New World of Database Programming C# and ADO.NET facilitate the development of a new generation of database applications, including remote applications that run on the Web. Mastering C# Database Programming is the resource you need to thrive in this new world. Assuming no prior experience with database programming, this book teaches you every aspect of the craft, from GUI design to server development to middle-tier implementation. If you’re familiar with earlier versions of ADO, you’ll master the many new features of ADO.NET all the more quickly. You’ll also learn the importance of XML within the new .NET paradigm. Coverage includes:
  • Accessing a database using C# and ADO.NET
  • Using SQL to access a database
  • Using Visual Studio .NET to build applications
  • Creating and modifying database tables
  • Understanding ADO.NET classes
  • Designing, building, and deploying Web applications that access a database
  • Designing, building, and deploying effective Web services
  • Using SQL Server’s built-in XML capabilities
  • Working with a database in a disconnected manner
  • Using advanced transaction controls
  • Using Transact-SQL to create stored procedures and functions in a SQL Server database

Kaspersky Internet Security 2010 Beta

Kaspersky Internet Security 2010 Beta




Kaspersky Internet Security 2010 – the all-in-one security solution that offers a worry-free computing environment for you and your family. Kaspersky Internet Security 2010 has everything you need for a safe and secure Internet experience.

Link Download DISINI

SMS FREE Lewat YM

SMS lewat YM asiikk juga ya ternyata.. tanpa iklan lagi.. Xixixi..
Yang penting GRATISSS.. Xixi.. tapi cuma 146 character.. tapi lumayanlah,, daripada lumanyun?!

No yg bisa dikirimin SMS baru:

() Canada: Rogers — 92466000
() India: Hutchinson, Airtel, Spice, Escotel, Reliance — ALL: 58242
() Indonesia: Excelcom — 9246, Hutch3 — 92466, Indosat — 946, Telkomsel — 4246
() Kuwait: Wataniya — 1411
() Malaysia: Digi — 32235, Maxis — 32235, Celcom — 22235
() Pakistan: Mobilink — 171
() Phillipines: Smart — 2580, Globe — 22580
() Thailand: DTAC — 192466, AIS — 4508040
() United States: ATT, Verizon, Virgin, Sprint, Nextel (including Sprint), T-mobile, Alltel — ALL: 92466
() Vietnam: Mobifone, Vinaphone, Viettel, HT Mobile, Evn Telecom, Sfone — ALL: 8269
(more info: http://help.yahoo.com/l/us/yahoo/mes...arriermob.html)


Caranya:
1. Edit Contact Details salah satu friendlist anda..
2. Pada kolom Phone Number yang Mobile, masukin no HPnya (format internasional, cth: +62856000xxx). Lalu Save & Close.
3. Klik kanan pada friendlist anda => Send SMS Message (Ctrl + T). Isi pesannya lalu => Send.
4. Pada no tujuan (tested to IM3) akan ada SMS dari 946700: Pengguna Y! mencoba mengirimkan pesan teks. Saat pesan datang, pilih "Balas" utk melanjutkan percakapan...
5. Nanti ada SMS yg kedua (pesan yg tadi di ketik), dari 946701: yahoo_id_anda: pesan_yg_di_ketik
6. Kalo mw di bales, tinggal reply kaya biasa aja.. (tapi tarifnya kaya SMS internasional).

Test from YM ver 9

Minggu, April 26, 2009

Windows XP SP3 Dark Edition V.7 Rebirth Refix Version







http://rapidshare.com/files/204552120/WXPDEV7RRV.part1.rar
http://rapidshare.com/files/204549889/WXPDEV7RRV.part2.rar
http://rapidshare.com/files/204550148/WXPDEV7RRV.part3.rar
http://rapidshare.com/files/204552137/WXPDEV7RRV.part4.rar
http://rapidshare.com/files/204550129/WXPDEV7RRV.part5.rar
http://rapidshare.com/files/204549857/WXPDEV7RRV.part6.rar
http://rapidshare.com/files/204552102/WXPDEV7RRV.part7.rar
http://rapidshare.com/files/204549408/WXPDEV7RRV.part8.rar

Microsoft Windows Vista ULTIMATE x64 SP1 Integrated February 2009 OEM DVD-BIE

Microsoft Windows Vista x64 SP1 OEM DVD Integrated February 2009 (C)2008 Microsoft Corp.

Description:
If you’re shopping for a new PC you’re probably going to come across systems that are designated “64-bit.” These are computers running 64-bit editions of Windows Vista, typically with 4GB of memory or more. Compared to 32-bit systems, which top out at around 3GB of memory, 64-bit PCs offer added responsiveness for people who are running a lot of applications at the same time and switching between them frequently.
So you ask, what’s happening… Not long ago, almost all the computers you’d find at your local retailer were 32-bit PCs. People who bought 64-bit PCs were primarily technology enthusiasts or people running specialized software that used the large amounts of memory a 64-bit PC can support. The shift toward 64-bit PC production has speeded up recently, and that’s why you’ll be seeing more of these PCs in stores. One reason is that the cost difference between a 32-bit and 64-bit PC has shrunk. For example, we don’t charge extra for the 64-bit editions of Windows Vista, and the cost of memory, one of the largest factors of a PC’s cost, has dropped dramatically. Now most PC manufacturers offer 64-bit PCs that don’t cost a whole lot more than a 32-bit PC.
*NOTE: Windows Vista Ultimate is a very nice OS, don’t just take my word on it, try it out for yourself, with just your internet browser. See what you think of Vista Ultimate SP1 HERE

If you want to know more about this Vista Ultimate SP1, like features and other info Read more.

Features:
- Aero Interface (GUI)
- DirectX 10
- BitLocker Drive Encryption
- Flip and Flip 3D
- Built-In Diagnostics
- BitLocker Drive Encryption
- Speech Recognition
- Takes full advantage of Multi-Core Processors
- Vista Ultimate Extras More info on Ultimate Exclusive Extras can be found –> HERE


Release Name: Microsoft.Windows.Vista.ULTIMATE.x64.SP1.Integrate d.February.2009.OEM.DVD-BIE
Filename: bievx64sp129
Size: 3.73GB
OS: Windows Vista x64 (64 bit)
NFO: HERE (Be sure to read for proper installation)
Links: Homepage, Wikipedia


http://rapidshare.com/files/222027499/v.ultimate.x64.sp1.feb09.part01.rar
http://rapidshare.com/files/222029546/v.ultimate.x64.sp1.feb09.part02.rar
http://rapidshare.com/files/222037492/v.ultimate.x64.sp1.feb09.part03.rar
http://rapidshare.com/files/222038571/v.ultimate.x64.sp1.feb09.part04.rar
http://rapidshare.com/files/222040772/v.ultimate.x64.sp1.feb09.part05.rar
http://rapidshare.com/files/222043667/v.ultimate.x64.sp1.feb09.part06.rar
http://rapidshare.com/files/222044047/v.ultimate.x64.sp1.feb09.part07.rar
http://rapidshare.com/files/222046441/v.ultimate.x64.sp1.feb09.part08.rar
http://rapidshare.com/files/222046854/v.ultimate.x64.sp1.feb09.part09.rar
http://rapidshare.com/files/222046479/v.ultimate.x64.sp1.feb09.part10.rar
http://rapidshare.com/files/222048752/v.ultimate.x64.sp1.feb09.part11.rar
http://rapidshare.com/files/222048527/v.ultimate.x64.sp1.feb09.part12.rar
http://rapidshare.com/files/222048807/v.ultimate.x64.sp1.feb09.part13.rar
http://rapidshare.com/files/222050920/v.ultimate.x64.sp1.feb09.part14.rar
http://rapidshare.com/files/222050917/v.ultimate.x64.sp1.feb09.part15.rar
http://rapidshare.com/files/222051351/v.ultimate.x64.sp1.feb09.part16.rar
http://rapidshare.com/files/222053159/v.ultimate.x64.sp1.feb09.part17.rar
http://rapidshare.com/files/222053171/v.ultimate.x64.sp1.feb09.part18.rar
http://rapidshare.com/files/222052504/v.ultimate.x64.sp1.feb09.part19.rar
http://rapidshare.com/files/222055423/v.ultimate.x64.sp1.feb09.part20.rar
http://rapidshare.com/files/222055030/v.ultimate.x64.sp1.feb09.part21.rar
http://rapidshare.com/files/222054940/v.ultimate.x64.sp1.feb09.part22.rar
http://rapidshare.com/files/222057589/v.ultimate.x64.sp1.feb09.part23.rar
http://rapidshare.com/files/222057591/v.ultimate.x64.sp1.feb09.part24.rar
http://rapidshare.com/files/222058219/v.ultimate.x64.sp1.feb09.part25.rar
http://rapidshare.com/files/222057113/v.ultimate.x64.sp1.feb09.part26.rar

Disabling Recent Documents History

Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never

use the feature myself. In my opinion, I can keep up with what I want to use without
Windows XP doing it for me.

The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it. Here's how:
  1. Open the Registry Editor (select Start/Run, type regedit, and click OK).
  2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\CurrentVersion\Policies\Explorer.
  3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it onceit is created.
  4. Set the Data Value to 1 to enable the restriction.
  5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.

Disabling the Boot Logo

You can remove the boot logo that appears when you start Windows XP. This little tweak probably shaves only a few seconds off your boot time but seconds count if you are serious about trying to get Windows XP up and running as quickly as possible. The only negative is that if you remove the boot logo, you will also not see any boot messages, such as check disk. (But if you are not having problems with your computer, this isn't such a big deal.)


To remove the boot logo, follow these steps:
  1. Select Start/Run, type msconfig, and click OK.
  2. In the System Configuration Utility, click the BOOT.INI tab.
  3. On the BOOT.INI tab, click the NOGUIBOOT check box option. Click OK.

Removing Unwanted Fonts

One trick that increases your boot time a bit is to lose any fonts in the Fonts folder in
Control Panel that you never use. The more fonts you have, the more processing
Windows XP has to do to prep all of those fonts for use. You must be a bit careful here to
not remove fonts that you might want, but there is a good chance that you can live
without many of them. For instance, you may have foreign language fonts and other
symbol fonts (such as Wingdings) that you never use.

To delete unneeded fonts, follow these steps:
  1. Open the Fonts folder in Control Panel.
  2. Select Edit/Select All and then Edit/Copy.
  3. Create a new folder on your desktop, open it, and select Edit/Paste.
  4. In this new folder, delete any of the fonts you do not want.
  5. Return to the Fonts folder in Control Panel. Right-click the selected fonts and click Delete.
  6. Go back to your new desktop folder and click Edit/Select All.
  7. Return to your Fonts folder and click Edit/Paste. You now have only the desired fonts in the Fonts folder.
Tip:

You can directly delete fonts from the Fonts folder without creating the secondary folder. However, I recommend the preceding steps to help ensure that you do not make a mistake in the deletion process.


Stopping Remote Assistance and Remote Desktop Sharing

In Windows XP Professional, you have two remote networking features called Remote
Assistance and Remote Desktop Sharing. These remote networking features are very
helpful in a variety of situations but if you don't use them, it is good idea to disable them to save boot time. You can always enable them later if you want to use them.
  1. Open the Start menu, right-click My Computer, and choose Properties.
  2. Click the Remote Tab.
  3. Clear both check boxes to disable Remote Assistance and Remote Desktop.

Speeding Up the Dual-Boot Timeout

If you dual-boot your computer with Windows XP and another operating system, you see an operating system selection menu on startup. If you typically boot into Windows XP and not the other operating system, you can speed up the dual-boot timeout value so that you do not wait so long for the boot process to select your default operating system and continue with the boot process. The default timeout value is 30 seconds but you can change this setting to 10. This gives you enough time to select the alternate operating system if you want but also speeds up the boot process. You can skip this section if you do not use a dual-boot configuration.

Follow these steps:
  1. Locate the boot.ini file on your computer. It is a hidden file by default; mine is located in C:\boot.ini.
  2. Open the file with Notepad (which is what opens it by default).
  3. Change the Timeout value to 10 (see Figure 4-11).
  4. Select File/Save and close Notepad.

Speeding Up Your PPPoE Connection

If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay
but you can stop this behavior by manually configuring an IP address for the network
adapter card. If you do not use a PPPoE connection, you can skip this section.
  1. Select Start/Connect to/Show All Connections.
  2. Open the TCP/IP properties for your LAN network interface card.
  3. Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.

Reducing the Wait Time

When you start to shut down Windows XP, it has to quit, or "kill," any live applications
or processes that are currently running. So close all applications first. However, some
applications and processes are always running in the background. You can reduce the
amount of time that Windows XP waits for those applications and processes to close
before Windows XP kills them. Edit three different Registry settings to change this:
  1. Open the Registry Editor.
  2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.
  3. Select the HungAppTimeout value and set it to 1000 as well.
  4. Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.
  5. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l. Select the WaitToKillServiceTimeout value and set it to 1000.
  6. Close the Registry Editor.

Automatically Killing Tasks on Shutdown


You know the drill. You start to shut down the computer, you wait a few moments, and then you see a dialog box asking if you want to kill an application or service that is
running. Instead of prompting you, you can make Windows XP take care of the kill task
automatically. Here's how:

  1. Open the Registry Editor.
  2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop.
  3. Highlight the value AutoEndTasks and change the value to 1.
  4. Close the Registry Editor.
Cridit: Cyberphreaking

Another Version For Making your XP Faster

Making Windows XP Start 60% Faster
Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should
expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly.

In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This chapter explores how to put these techniques to work.


Stopping Unneeded Startup Services


Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.


Caution:

Exercise caution when stopping services. If you do not know what a service does or
are unsure of the ramifications of stopping the service, leave it alone. Some services are critical to Windows XP's operations, so make sure you understand what the service is before you disable it.

To reduce the number of services that start on bootup, you can access two different areas
of Windows XP. The first is the System Configuration Utility. The Services tab shows
you the services that start when the computer boots.

You can stop a service from starting by simply clearing the check box next to the service and clicking OK. However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question.

Open Control Panel/Administrative ToolsServices or else select Start/Run, type
services.msc, and click OK. Either way, you see the Services console.

I prefer to use the Services console instead of the System Configuration Utility because it describes what the service does. Additionally, you can double-click a service and examine its properties.

Notice the Startup Type column in Figure 4-2. This information lists whether the
service is automatic or manual. Manual services are only started in Windows XP when you start a process that requires the service. Some other process may require the service that has a "dependency" relationship with it; in this case, the dependency service will start, as well.

Because these services do not start automatically when you boot Windows XP, you do
not need to do anything with manual services.

However, all services listed as automatic start when Windows XP boots. These are the
services that increase boot time. As I have mentioned, many of them are necessary and important, so you should not stop automatic services from booting unless you are sure of the ramifications. You can get this information by looking at the Description column.
Here's a quick look at common services you may want to live without:

Automatic Updates: This service enables Windows XP to check the Web automatically
for updates. If you don't want to use Automatic Updates, you can disable the service. You can always check for updates manually at the Windows Update Web site.

Computer Browser: If your computer is not on a network, you don't need this service. If you are on a network, leave it alone.

DHCP Client: If you are not on a network, you do not need this service. If you are on a
small workgroup, you can still increase boot time by configuring manual IP addresses
(which I explore later in this chapter).

DNS Client: If you are not on a network, you do not need this service. If you are, leave it alone.

Error Reporting and Event Log: You don't have to use these services but they can be very helpful, so I would leave them configured as automatic.

Fax: If you don't use your computer for fax services, you can disable this one.

Help and Support: If you never use the Windows XP Help and Support Center (found on
the Start menu), you can disable this service.

IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If
you never burn CDs, you can disable the service.

Indexing Service: Your computer keeps an index of files but if you rarely search for files, the service is just a resource hog. You can stop it and turn the service to manual.

Windows Firewall/Internet Connection Sharing: If you do not use these features, you can disable them.

Infrared Monitor: If you do not use infrared devices, you can disable this service.

Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.

Print Spooler: If you do not do any printing from the computer, you can disable this
service. If you print, make sure you leave it as automatic.

Remote Registry: This service allows remote users to modify the Registry on your
computer. If you are not on a network, you can disable this service.

System Restore Service: This service allows you to use System Restore. If you have
turned off System Restore anyway, you do not need to turn off the service. If you do, you turn off System Restore.

Themes: If you do not use themes, you can disable this service.

Windows Image Acquisition: If you do not use scanners or digital cameras, you can
disable this service.

Wireless Zero Configuration: If do not use wireless networking devices, you can disable
this service.

You may have a number of other automatic services, depending on software and other
configurations on your computer. So it's a good idea to look through the services and
learn more about them. If you double-click a service, a Properties dialog box appears

Notice that on the General tab, you see a Startup Type drop-down menu. If you want to change an automatic service to manual, select Manual here and click OK. As a general
rule, don't disable a service unless you are sure you will never use it. However, manual
configuration allows the service to be started when you find it necessary, thus speeding
up your boot time.

However, before you change a service to manual, look at the Dependencies tab (see
Figure 4-4). This tab shows you which other services depend upon the service you are
considering changing.

Keep in mind that services are necessary for the vast functionality you get with Windows XP. Change only those services that you understand and do not use. How you use your Windows XP computer should be the best guide in terms of optional startup services.

Tip:

The Indexing service and the System Restore service take up a lot of disk space and
system resources across the board. You can live without the Indexing service but I
suggest that you keep using System Restore. It works great when you are in a bind and this is one case where the loss of speed may not be worth the ramifications of not using System Restore.

Speed Tips and Tricks for Windows XP Startup

Aside from startup programs, services, and the Prefetch folder, there are a number of
other startup procedures and issues you can modify to help Windows XP start faster. The following sections explore those tips and tricks.

Manual IP Addressing on Small Office/Home Networks


Windows XP is configured to help you take care of networking. It uses the TCP/IP
protocol for networking in workgroups, or what you might call small office or home
networks that do not use a dedicated server.

The problem is that automatic IP addressing can be slow. When your computer boots, it has to query the network to see what IP addresses are already in use and then assign itself one. If you want to speed up the boot time a bit, consider manually assigning IP addresses to all computers on the network. This way, the network computers do not have to worry about locating an automatic IP address. Because one is manually configured, the operating system doesn't have to spend time solving this problem.

This isn't a networking book, however, so I won't delve into the implications of using a
manual IP address, but if you are using a computer that functions as a host computer to the Internet (using Internet Connection Sharing [ICS]), you can get into connectivity problems if you change the configuration of the IP address. However, you can still work around this problem by starting with the ICS host computer.

Select Start/Connect To/Show All Connections. Right-click your network adapter card
and click Properties. On the General tab, select TCP/IP in the list of services and click the Properties button.

In the TCP/IP properties, you can see if you use an automatic or manual IP address. In
the example in Figure 4-5, I have configured a manual IP address of 90.0.0.1 and a
default subnet mask. The other computers on my office network each use a different IP address in the same class, such as 90.0.0.2, 90.0.0.3, 90.0.0.4, and so on. This way, each computer has a permanent IP address, which helps increase boot time. Note that if you change the IP addresses of your computers, they must all use the same subnet mask. A default subject mask of 255.255.255.0 will keep you in good shape.

Make sure you understand the implications of changing IP addresses on your network. If you have no networking experience at all, you may be wiser to leave the automatic IP addressing as is and try to gain some speed using the additional suggestions in this
chapter.

FREE UP MEMORY

I found this useful app via FixMyXP. ClearMem Is an Excellent Tool for speeding up your XP Computer (especially if your system has been on for awhile and you have a lot of applications open). What it does, is it Forces pages out of physical memory and reduces the size of running processes if working sets to a minimum. When you run this tool, the system pauses because of excessive high-priority activity associated with trimming the working sets. To run this tool, your paging file must be at least as large as physical memory. To Check your Paging File:
  1. Go to your control panel, then click on 'System', then go to the 'Advanced' Tab, and Under 'Performance' click 'Settings' then the 'Advanced' Tab
  2. On the Bottom you should see 'Virtual Memory' and a value. This is the value that must be at least as large as how much memory is in your system.
  3. If the Virtual Memory Value is smaller than your system memory, click Change and change the Min Virtual Memory to a number that is greater than your total system memory, then click 'Set' and Reboot.
  4. Once you have rebooted install ClearMem

ENSURE XP IS USING DMA MODE

XP enables DMA for Hard-Drives and CD-Roms by default on most ATA or ATAPI (IDE) devices. However, sometimes computers switch to PIO mode which is slower for data transfer - a typical reason is because of a virus. To ensure that your machine is using DMA:
  1. Open 'Device Manager'
  2. Double-click 'IDE ATA/ATAPI Controllers'
  3. Right-click 'Primary Channel' and select 'Properties' and then 'Advanced Settings'
  4. In the 'Current Transfer Mode' drop-down box, select 'DMA if Available' if the current setting is 'PIO Only'

ADD CORRECT NETWORK CARD SETTINGS

Some machines suffer from jerky graphics or high CPU usage even when a machine is idle. A possible solution for this, which, can also can help network performance is to:
  1. RightClick 'My Computer'
  2. Select 'Manage'
  3. Click on 'Device Manager'
  4. DoubleClick your network adaptor under 'Network Adapters'
  5. In the new window, select the 'Advanced' tab
  6. Select 'Connection Type' and select the correct type for your card and then Reboot

REMOVE ANNOYING DELETE CONFIRMATION MESSAGES


Although not strictly a performance tweak I love this fix as it makes my machine 'feel' faster. I hate the annoying 'are you sure?' messages that XP displays, especially if I have to use a laptop touchpad to close them. To remove these messages:
  1. Right-click on the 'Recycle Bin' on the desktop and then click 'Properties'
  2. Clear the 'Display Delete Confirmation Dialog' check box and click 'Ok' If you do accidently delete a file don't worry as all is not lost. Just go to your Recycle Bin and 'Restore' the file.

DISABLE PREFETCH ON LOW MEMORY SYSTEMS

Prefetch is designed to speed up program launching by preloading programs into memory - not a good idea is memory is in short supply, as it can make programs hang. To disable prefetch:
  1. Click 'Start' then 'Run'
  2. Type in 'Regedit' then click 'Ok'
  3. Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM\Cur rentControlSet\Control\Session Manager\Memory Management\PrefetchParameters\ '
  4. Right-click on "EnablePrefetcher" and set the value to '0'
  5. Reboot.

DISABLE UNNECESSARY SERVICES

Because Windows XP has to be all things to all people it has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:

Alerter
Clipbook
Computer Browser
Distributed Link Tracking Client
Fast User Switching
Help and Support - (If you use Windows Help and Support leave this enabled)
Human Interface Access Devices
Indexing Service
IPSEC Services
Messenger
Netmeeting Remote Desktop Sharing (disabled for extra security)
Portable Media Serial Number
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Remote Registry Service
Secondary Logon
Routing & Remote Access (disabled for extra security)
Server
SSDP Discovery Service - (Unplug n' Pray will disable this)
Telnet
TCP/IP NetBIOS Helper
Upload Manager
Universal Plug and Play Device Host
Windows Time
Wireless Zero Configuration (Do not disable if you use a wireless network)
Workstation
To disable these services:

Go to Start and then Run and type "services.msc"
Doubleclick on the service you want to change
Change the startup type to 'Disable"

TURN OFF SYSTEM RESTORE

System Restore can be a useful if your computer is having problems, however storing all the restore points can literally take up Gigabytes of space on your hard drive. To turn off System Restore:

Open Control Panel
Click on Performance and Maintenance
Click on System
Click on the System Restore tab
Tick 'Turn off System Restore on All Drives'
Click 'Ok'

DEFRAGMENT YOUR PAGEFILE

Keeping your pagefile defragmented can provide a major performance boost. One of the best ways of doing this is to creat a separate partition on your hard drive just for your page file, so that it doesn't get impacted by normal disk usage. Another way of keeping your pagefile defragmented is to run PageDefrag. This cool little app can be used to defrag your pagefile, and can also be set to defrag the pagefile everytime your PC starts. To install:

Download(sysinternals) and Run PageDefrag
Tick "Defrag at next Reboot",
Click "Ok"
Reboot

SPEEDUP FOLDER ACCESS - DISABLE LAST ACCESS UPDATE

If you have a lot of folders and subdirectories on your computer, when you access a directory XP wastes a lot of time updating the time stamp showing the last access time for that directory and for ALL sub directories. To stop XP doing this you need to edit the registry. If you are uncomfortable doing this then please do not attempt.

Go to Start and then Run and type "regedit"
Click through the file system until you get to "HKEY_LOCAL_MACHINE\System\Cur rentControlSet\Control\FileSys tem"
Right-click in a blank area of the window on the right and select 'DWORD Value'
Create a new DWORD Value called 'NtfsDisableLastAccessUpdate'
Then Right click on the new value and select 'Modify'
Change the Value Data to '1'
Click 'OK'

DISABLE SYSTEM SOUNDS

Surprisingly, the beeps that your computer makes for various system sounds can slow it down, particularly at startup and shut-down. To fix this turn off the system sounds:

Open Control Panel
Click Sounds and Audio Devices
Check Place volume icon in taskbar
Click Sounds Tab
Choose "No Sounds" for the Sound Scheme
Click "No"
Click "Apply"
Click "OK"

IMPROVE BOOT TIMES

A great new feature in Microsoft Windows XP is the ability to do a boot defragment. This places all boot files next to each other on the disk to allow for faster booting. By default this option in enables but on some builds it is not so below is how to turn it on.

Go to Start Menu and Click Run
Type in "Regedit" then click ok
Find "HKEY_LOCAL_MACHINE\SOFTWARE\M icrosoft\Dfrg\BootOpt imizeFunction"
Select "Enable" from the list on the right
Right on it and select "Modify"
Change the value to "Y to enable"
Reboot

IMPROVE SWAPFILE PERFORMANCE

If you have more than 256MB of RAM this tweak will considerably improve your performance. It basically makes sure that your PC uses every last drop of memory (faster than swap file) before it starts using the swap file.

Go to Start then Run
Type "msconfig.exe" then ok
Click on the System.ini tab
Expand the 386enh tab by clicking on the plus sign
Click on new then in the blank box type"ConservativeSwapfileUsage =1"
Click OK
Restart PC

MAKE YOUR MENUS LOAD FASTER

This is one of my favourite tweaks as it makes a huge difference to how fast your machine will 'feel'. What this tweak does is remove the slight delay between clicking on a menu and XP displaying the menu.

Go to Start then Run
Type 'Regedit' then click 'Ok'
Find "HKEY_CURRENT_USER\Control Panel\Desktop\"
Select "MenuShowDelay"
Right click and select "Modify'
Reduce the number to around "100"
This is the delay time before a menu is opened. You can set it to "0" but it can make windows really hard to use as menus will open if you just look at them - well move your mouse over them anyway. I tend to go for anywhere between 50-150 depending on my mood

MAKE PROGRAMS LOAD FASTER

This little tweak tends to work for most programs. If your program doesn't load properly just undo the change. For any program:

Right-click on the icon/shortcut you use to launch the program
Select properties
In the 'target' box, add ' /prefetch:1' at the end of the line.
Click "Ok"
Voila - your programs will now load faster.

IMPROVE XP SHUTDOWN SPEED

This tweak reduces the time XP waits before automatically closing any running programs when you give it the command to shutdown.

Go to Start then select Run
Type 'Regedit' and click ok
Find 'HKEY_CURRENT_USER\Control Panel\Desktop\'
Select 'WaitToKillAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'
Now select 'HungAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'
Now find 'HKEY_USERS\.DEFAULT\Control Panel\Desktop'
Select 'WaitToKillAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'
Now find 'HKEY_LOCAL_MACHINE\System\Cur rentControlSet\Control\'
Select 'WaitToKillServiceTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'

Cridit: cyberphreaking

WINDOWS XP RUN FASTER THAN NEVER BEFORE

These Are Some Tricks That Make Use Of Programs Listed In This Guide And Nothing Will Happen Even If You Go

DISABLE INDEXING SERVICES
Indexing Services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy. This system process indexes and updates lists of all the files that are on your computer. It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists. If you don't search your computer often, or even if you do search often, this system service is completely unnecessary. To disable do the following:
  1. Go to Start
  2. Click Settings
  3. Click Control Panel
  4. Double-click Add/Remove Programs
  5. Click the Add/Remove Window Components
  6. Uncheck the Indexing services
  7. Click Next

OPTIMISE DISPLAY SETTINGS

Windows XP can look sexy but displaying all the visual items can waste system resources. To optimise:
  1. Go to Start
  2. Click Settings
  3. Click Control Panel
  4. Click System
  5. Click Advanced tab
  6. In the Performance tab click Settings
  7. Leave only the following ticked:
  • Show shadows under menus
  • Show shadows under mouse pointer
  • Show translucent selection rectangle
  • Use drop shadows for icons labels on the desktop
  • Use visual styles on windows and buttons

DISABLE PERFORMANCE COUNTERS

Windows XP has a performance monitor utility which monitors several areas of your PC's performance. These utilities take up system resources so disabling is a good idea.

To disable:
  1. download and install the Extensible Performance Counter List(www.microsoft.com)
  2. Then select each counter in turn in the 'Extensible performance counters' window and clear the 'performance counters enabled' checkbox at the bottom.button below.

SPEEDUP FOLDER BROWSING

You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:
  1. Open My Computer
  2. Click on Tools menu
  3. Click on Folder Options
  4. Click on the View tab.
  5. Uncheck the Automatically search for network folders and printers check box
  6. Click Apply
  7. Click Ok
  8. Reboot your computer

IMPROVE MEMORY USAGE

Cacheman Improves the performance of your computer by optimizing the disk cache, memory and a number of other settings.

Once Installed:
  1. Go to Show Wizard and select All
  2. Run all the wizards by selecting Next or Finished until you are back to the main menu. Use the defaults unless you know exactly what you are doing.
  3. Exit and Save Cacheman
  4. Restart Windows

OPTIMISE YOUR INTERNET CONNECTION

There are lots of ways to do this but by far the easiest is to run TCP/IP Optimizer.
  1. Download(tcpoptimizer) and install
  2. Click the General Settings tab and select your Connection Speed (Kbps)
  3. Click Network Adapter and choose the interface you use to connect to the Internet
  4. Check Optimal Settings then Apply
  5. Reboot

OPTIMISE YOUR PAGEFILE

If you give your pagefile a fixed size it saves the operating system from needing to resize the page file.
  1. Right click on My Computer and select Properties
  2. Select the Advanced tab
  3. Under Performance choose the Settings button
  4. Select the Advanced tab again and under Virtual Memory select Change
  5. Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.
Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.

RUN BOOTVIS - IMPROVE BOOT TIMES download
from(www.majorgeeks.com)
BootVis will significantly improve boot times
  1. Download and Run
  2. Select Trace
  3. Select Next Boot and Driver Trace
  4. A Trace Repetitions screen will appear, select Ok and Reboot
  5. Upon reboot, BootVis will automatically start, analyze and log your system's boot process. When it's done, in the menu go to Trace and select Optimize System
  6. Reboot.
  7. When your machine has rebooted wait until you see the Optimizing System box appear. Be patient and wait for the process to complete

REMOVE THE DESKTOP PICTURE

Your desktop background consumes a fair amount of memory and can slow the loading time of your system. Removing it will improve performance.
  1. Right click on Desktop and select Properties
  2. Select the Desktop tab
  3. In the Background window select None
  4. Click Ok

REMOVE FONTS FOR SPEED

Fonts, especially TrueType fonts, use quite a bit of system resources. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.
  1. Open Control Panel
  2. Open Fonts folder
  3. Move fonts you don't need to a temporary directory (e.g. C:\FONTBKUP?) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.

Cridit: Cyberphreaking

Cara Membca File yg ada di Partisi Linux Melalui Windos XP

Disini sy cuma mau berbagi pengalaman aja soal "cara membaca file yg ada di pertisi linux melalui win xp"
semenjak kemarin sy dibuat pusing agar file2 yg ada di partisi linux bs sy baca melalui windos
di pc sy ada 3 partisi
1. partisi c:/ buat win xp sp2
2. partisi d:/ bau data
3. partisi linux mandriva 10

udah beberapa sopware yg sy coba diantaranya
1.ext2IFS
2.explore2FS
3.linux_reader
4.dan beberapa sopware yg namanya sy lupa
dari semua itu hasilnya gagal total, file2 yg ada di partisi linux gak bs dibaca, padahal partisi dah terlihat.

tapi ada sopware terakhir yg sy coba namanya Ext2Fsd-0.46.exe (freeware)
hasilnya, file2 yg ada di parisi linux kebaca read/write.
kl ada yg mau coba, bs donlod di http://switch.dl.sourceforge.net/sou...t2Fsd-0.46.exe
ato cari2 di eyang gogle
penggunaanya mudah
donlod >> insall >> jalankan
setelah itu ada list partis2 yg ada, termasuk partisi linux
kemudian klik kanan dan add mount, ikuti langkah2 yg ada (mudah kok)
setelah itu, rebot PC, dan lihat hasilnya memelalui windos explorer
disitu akan terlihat partisi linux dan bs diaksess file2 yg ada didalamnya.

Sejarah Linux

Dunia sistem operasi akhir-akhir ini berkembang dengan begitu pesatnya. Kekuatan open source dibaliknya telah membuat linux berkembang dengan begitu cepat. Siapa yang tidak kenal dengan Open Suse, distribusi linux yang menawan dengan warna hijau khasnya? Siapa yang tidak kenal Fedora, dengan thema solar nya yang begitu mempesona?Siapa yang tidak kenal dengan Slackware distribusi linux paling tua dan terus dilakukan pengembangannya hingga sekarang? Siapa tidak kenal dengan Mandriva, dahulu namanya Mandrake, yang memiliki kompatibilitas hardware (perangkat keras) yang begitu tinggi? Bagi pemerhati security, siapa yang tidak kenal dengan Backtrack, distribusi turunan slackware yang dapat dijadikan sebagai auditor tools security memerika dan melakukan audit terhadap keamanan sistem? Sebagai pemerhati IT Indonesia, siapa yang tidak kenal dengan IGOS, distribusi turunan Fedora yang pengembangannya dilakukan oleh pemerintah Indonesia melalui LIPI ? Siapa yang tidak kenal dengan Ubuntu, distribusi turunan debian yang memiliki begitu banyak paket aplikasi dalam pengembangannya? Pastinya kepupuleran linux hingga seperti yang sekarang ini tidaklah lepas dari sejarah panjang yang menarik untuk diketahui.

UNIX merupakan salah satu sistem operasi yang mengawali lahirnya Linux ke dunia ini. UNIX merupakan salah satu sistem operasi yang ada saat ini. Adapun UNIX merupakan salah satu sistem operasi populer selain keluarga raksasa Microsoft (mulai dari DOS, MS 9x sampai Vista), Novell, OS/2, BeOS, MacOS dan lainnya.

Sejarah kemunculan UNIX dimulai pada tahun 1965 ketika para ahli dari Bell Labs, sebuah laboratorium milik AT&T, bekerja sama dengan MIT dan General Electric membuat sistem operasi bernama Multics(sudah pernah dengar belum?). Nah, sistem operasi Multics ini awalnya didesain dengan harapan akan menciptakan beberapa keunggulan, seperti multiuser, multiprosesor, dan multilevel filesystem. Namun pada tahun 1969, AT&T akhirnya menghentikan proyek pembuatan Multics karena sistem operasi Multics ini sudah tidak memenuhi tujuan semula. Dengan kata lain, proyek ini mengalami hambatan karena dalam kenyataannya Multics banyak terdapat bugs dan sulit sekali dioperasikan.

Beberapa programmer Bell Labs yang terlibat dalam pembuatan dan pengembangan Multics, yaitu Ken Thompson, Dennis Ritchie, Rudd Canaday, dan Doug Mcllroy, secara tidak resmi tetap meneruskan proyek pengembangan Multics. Dan akhirnya sampailah pada sebuah sistem operasi generasi penerus dari Multics bulan Januari 1970 yang diberi nama UNIX.

Adapun generasi baru Multics ini memiliki lebih banyak keuggulan dibandingkan saudara tuanya. Nama UNIX diberikan oleh Brian Kernighan untuk memberi penegasan bahwa UNIX bukanlah Multics (tidak sama). UNIX akhirnya memiliki keunggulan seperti yang diharapkan pada awal penciptaannya. Yaitu:

  • Multilevel Filesystem

  • Multiuser dan Multiprosesor

  • Desain arsitektur yang independen terhadap suatu hardware

  • Berbagai device dapat dianggap sebagai file khusus

  • Memiliki user interface yang sederhana

  • Cocok untuk lingkungan pemrograman

  • Memiliki utilitas yang dapat saling digabungkan

Setahun setelahnya, UNIX dapat dijalankan pada komputer PDP-11 yang memiliki memory 16 KB dan sebuah disk berukuran 512 KB. Pada waktu itu source codenya UNIX masih ditulis dalam bahasa mesin (assembler). Kemudian pada tahun 1973, source code UNIX ditulis ulang dalam bahasa C yang dibuat oleh Dennis Ritchie.

Tujuan Mr. Ritchie mengubah source code UNIX ke dalam bahasa C tak lain dan tak bukan karena bahasa C didesain multiplatform dan bersifat fleksibel. Dengan dirubahnya source code ke dalam bahasa C, maka UNIX dapat dikembangkan dan dikompilasi ulang ke berbagai jenis komputer. Sejak saat itu dibuatlah berbagai macam varian UNIX yang sengaja didesain untuk jenis komputer tertentu.

Setahun kemudian, karena merasa UNIX sudah cukup matang, maka Thompson dan Ritchie mempublikasikan sebuah paper tentang UNIX. Ternyata UNIX mendapat sambutan yang sangat luar biasa dari lingkungan perguruan tinggi. Dan UNIX lah yang menjadi sistem operasi favorit di lingkungan perguruan tinggi.

Awalnya, sistem operasi UNIX ini didistribusikan secara gratis di dunia pendidikan, namun setelah banyak digunakan oleh korporasi industri dan bisnis (karena kehandalannya menangani bidang jaringan (networking), UNIX akhirnya diperdagangkan dan dipatenkan). Dalam perkembangan selanjutnya, UNIX dan varian-variannya yang dikomersialkan menjadi suatu sistem operasi yang cukup mahal pada saat itu(namun ada beberapa yang gratis karena dikembangkan dengan semangat openSource), hal ini disebabkan karena kestabilan, mampu mengerjakan program multitasking dan dapat digunakan oleh beberapa user secara bersamaan.

Adapun varian UNIX yang dikomersialkan dan populer karena kehandalannya seperti BSD 4.1 (1980), SunOS, BSD 4.2, SysV(1983), UnixWare dan Solaris 2(1988), dan lainnya. Dan yang dikembangkan dengan semangat openSource atau free diantaranya: FreeBSD, OpenBSD, NetBSD, Mnix, Hurd

Nama sistem operasi Linux diambil dari nama seorang mahasiswa University of Helsinki, Linus yang kemudian disebut sebagai bapak sistem operasi linux. Linus dilahirkan di Helsinki, Finlandia pada tanggal 28 Desember 1969. Orang yang disebut sebagai Bapak Linux(LINus UniX) ini, sudah mengenal bahasa pemrograman pada umurnya yang ke 10. Saat itu ia sering mengutak-atik komputer kakeknya, Commodore VIC-20. Karena hobinya dalam dunia komputing, 1988 Linus diterima di Univerity of Helsinki dan pada tahun 1990, Linus memulai kelas pemrograman C pertamanya. Pada tahun 1991, Linus tidak puas terhadap sistem operasi yang ada pada PC pertamanya (MS-DOS atau Disk Operation System), OS buatan Microsoft.

Linus lebih cenderung untuk menggunakan sistem operasi UNIX seperti yang dipakai komputer milik universitasnya. Akhirnya ia mengganti sistem operasi openSource Minix yang berbasiskan UNIX. Adapun Minix ini merupakan sistem UNIX kecil yang dikembangkan oleh Andrew S. Tanenbaum, seorang professor yang menggeluti penelitian masalah OS dari Vrije Universiteit, Belanda. Adapun Minix ini digunakan untuk keperluan pengajaran dan pendidikan.

Namun Linus merasa bahwa Minix masih memiliki banyak kelemahan. Dan mulai saat itu, di usianya yang ke-23, Linus mulai mengutak-atik kernel Minix. Dan ia mulai mengembangkan sistem yang kompatibel dengan IBM PC. Pada bulan Agustus 1991, lahirlah Linux 0.01 hasil oprekan Linus, dan pada tanggal 5 Oktober 1991, secara resmi Linus mengumumkan Linux 0.02 yang hanya dapat menjalankan BASH dan gcc compiler. Selain itu, Linus juga mempublikasikan sistem operasi buatannya tersebut lengkap dengan source codenya, yang ternyata disambut dengan sangat antusias oleh para programmer dan developer di seluruh dunia agar dapat di develop bersama-sama.

Sampai saat ini, Linux dibangun oleh berbagai macam komunitas dan jangan heran apabila banyak sekali distro-distro Linux yang beredar. Mulai dari yang berbayar sampai yang gratis, dari untuk pemula sampai tingkat lanjut, dan biasanya dengan banyaknya distro Linux yang beredar akan membuat orang awam bingung untuk memilih distro. Bayangkan, ada beratus-ratus distro yang tercipta atau bahkan beribu-ribu. Namun perlahan tapi pasti, diantara distro-distro Linux ini ada yang menyamai (atau bahkan) melebihi kemampuan dari Sistem Operasi keluarga raksasa (Microsoft) dan dengan semakin mudahnya dan semakin lengkapnya dukungan Linux pada hardware, besar kemungkinan Linux akan menjadi alternatif (atau bahkan sistem operasi utama di dunia).

Sumber: infoos

Backtrack 4 Beta Released

Backtrack merupakan salah satu distribusi linux yang berfokus pada uji penetrasi. Backtrack dapat digunakan sebagai tools untuk keperluan audit suatu sistem. Tanpa instalasi ke hardisk lokal komputer, platform analisis ini dapat langsung digunakan melalui CD-Rom boot Live CD dan sepenuhnya dapat diakses hanya dalam hitungan menit.
Backtrack dikembangkan dari penggabungan dua distribusi yang besar - Whax dan Auditor Security Collection. Kini Backtrack telah menjadi salah satu toolset paling favorit di dunia.
Backtrack merupakan distribusi linux yang berbasis Slackware Linux dengan Live CD scripting oleh Tomas M. (www.slax.org). Setiap paket, konfigurasi kernel, dan script dioptimasi untuk digunakan oleh penguji penetrasi keamanan suatu sistem.
Metasploit yang merupakan salah satu tools kunci bagi sebagian besar analis sistem telah terintegrasi dengan Backtrack.
Saat ini Backtrack terdiri atas lebih dari 300 tools yang selalu update yang mana dapat digunakan dalam analisis sebuah sistem oleh para professional security auditor. Backtrack tersedia untuk didownload melalui website resminya dan dapat digunakan secara cuma-cuma.
Remote-Exploit , Backtrack merupakan salah satu proyeknya, melalui website resminya mengumumkan rilis Beta untuk Backtrack 4. Backtrack 4 Beta sudah bisa didownload dan digunakan untuk keperluan auditor keamanan suatu sistem.

Klik disini untuk download Backtrack 4 Beta.

Repository Linux heaven

ndex of /pub

Icon Name Last modified Size Description[DIR] Parent Directory -
[DIR] 64studio/ 02-Aug-2007 06:19 -
[DIR] DLL/ 07-Jun-2007 16:01 -
[DIR] blankon/ 28-Apr-2008 03:28 -
[DIR] centos/ 02-Jan-2008 05:12 -
[DIR] damnsmall/ 07-Jun-2007 15:13 -
[DIR] de2/ 18-Apr-2008 09:13 -
[DIR] debian/ 29-Feb-2008 23:53 -
[DIR] dewalinux/ 06-Nov-2007 11:29 -
[DIR] dreamlinux/ 10-Jun-2007 21:40 -
[DIR] easys/ 19-Nov-2007 00:45 -
[DIR] fedora/ 01-Mar-2008 14:14 -
[DIR] freespire/ 08-Aug-2007 22:08 -
[DIR] geexbox/ 10-Jun-2007 21:38 -
[DIR] gentoo/ 11-Jun-2007 08:44 -
[DIR] gnewsense/ 14-Aug-2007 21:39 -
[DIR] gnoppix/ 07-Jun-2007 16:00 -
[DIR] gos/ 23-Feb-2008 14:42 -
[DIR] igos/ 06-Jun-2007 22:12 -
[DIR] ilmukomputer/ 06-Jun-2007 22:13 -
[DIR] instant-grid/ 02-Aug-2007 06:19 -
[DIR] kamsifo/ 19-Jul-2007 17:22 -
[DIR] kde/ 10-Nov-2007 05:19 -
[DIR] knoppix/ 06-Jul-2007 14:20 -
[DIR] kuliax/ 06-Jun-2007 22:14 -
[DIR] linuxmint/ 16-Nov-2007 07:33 -
[DIR] live.linux-gamers.net/ 11-Jun-2007 20:55 -
[DIR] mandriva/ 09-Apr-2008 20:40 -
[DIR] mepis/ 09-Sep-2007 01:42 -
[DIR] minix/ 07-Jun-2007 15:48 -
[DIR] morphix/ 07-Jun-2007 15:59 -
[DIR] mythbuntu/ 11-Jun-2007 20:45 -
[DIR] nubuntu/ 07-Jun-2007 15:52 -
[DIR] opensuse/ 19-Apr-2008 13:46 -
[DIR] parallelknoppix/ 02-Aug-2007 06:20 -
[DIR] pclinuxos-me/ 30-Jan-2008 06:11 -
[DIR] pclinuxos-repository/ 31-Mar-2008 09:48 -
[DIR] pclinuxos/ 29-Jan-2008 17:06 -
[DIR] pinux/ 04-Jul-2007 11:29 -
[DIR] puppylinux/ 17-Dec-2007 20:03 -
[DIR] renciety/ 07-Jun-2007 15:54 -
[DIR] rockscluster/ 02-Aug-2007 06:24 -
[DIR] sabayonlinux/ 14-Aug-2007 21:45 -
[DIR] skolelinux/ 22-Jul-2007 23:05 -
[DIR] slackware/ 05-May-2008 14:47 -
[DIR] slax/ 13-Jun-2007 23:51 -
[DIR] target/ 09-Nov-2007 16:56 -
[DIR] theopencd/ 10-Jun-2007 21:37 -
[DIR] ubuntu-repository/ 28-Apr-2008 02:09 -
[DIR] ubuntu-ultimate-gamers/ 10-Mar-2008 13:21 -
[DIR] ubuntu-ultimate/ 13-Nov-2007 11:24 -
[DIR] ubuntu/ 24-Apr-2008 20:26 -
[DIR] ubuntume/ 02-Jan-2008 12:57 -
[DIR] ubuntustudio/ 18-Nov-2007 05:19 -
[DIR] vectorlinux/ 11-Jun-2007 20:45 -
[DIR] vixta/ 09-Nov-2007 17:44 -
[DIR] xnuxer/ 07-Jun-2007 02:55 -
[DIR] zencafe/ 07-Mar-2008 14:34 -
[DIR] zenwalk/ 29-Nov-2007 00:23 -

http://kambing.ui.edu/pub/

Cara Menjalankan OpenVPN Client di Ubuntu/Linux

1. instal dulu openvpn di linux.

2. letakkan/copy file2 konfigurasi openvpn client( *.crt, *.key, *.csr) di /etc/openvpn

3. buat file client.conf dan letakkan di /etc/openvpn/
isi file client.conf sama dengan file *.ovpn yag ada di windos
kalo gak mau susah, rename ajah file *.ovpn yang kamu punyai yang biasanya untuk windos jadi *.conf
dan letakkan di /etc/openvpn/

3. jalankan dial-up (pk wvdial ato pppd ato yag lain terserah..)

4. tambah tabel route dengan perintah
# route add default gw IP_DIAL-UP
5. jalankan openvpn client (masuk dulu ke folder /etc/openvpn)
# openvpn client.conf

6. tunggu sampai openvpn nyantol dengan sempurna kayak di windos

7. silahkan coba browsing...

Kalau kurang jelas silahkan cari disini

Configuration Linux

Configuration - Panjang password minimal
Pada sistem Linux yang telah diinstall secara default (belum ada modifikasi
konfigurasi), telah diset bahwa panjang minimal dari password yang diterima
sistem adalah 5 (lima). Artinya password yang dimiliki oleh user harus
paling sedikit 5 karakter yang terdiiri atas alpabet, numerik dan spesial
karakter. Untuk memaksimalkan keamanan pada sistem atau user sendiri
diperlukan panjang minimal password yang lebih panjang agar makin susah
ditebak oleh penyusup. Administrator bisa mengubah panjang minimal
password ini dengan memodifikasi file /etc/login.defs. Berikut adalah
bagian yang perlu dimodifikasi :

PASS_MIN_LEN 5

Sebagai contoh agar panjang minimal password menjadi 8 cukup dengan
mengubah sebagai berikut :

PASS_MIN_LEN 8

Configuration - Pengaturan nomor UID dan GID
UID merupakan nomor yang diberikan kepada setiap user sebagai identitas
untuk user. Sedangkan GID adalah nomor untuk identitas group. Pada file
/etc/login.defs terdapat pengaturan untuk setting nomor minimal dan
maksimal yang diberikan untuk UID dan GID. Berikut adalah konfigurasi
yang mengatur hal tersebut :

# Min/max values for automatic uid selection in useradd
#
UID_MIN 500
UID_MAX 60000
# Min/max values for automatic gid selection in groupadd
#
GID_MIN 500
GID_MAX 60000

Modifikasi pada bagian di atas akan menentukan UID dan GID pada sistem.
Selain itu juga jumlah user dan group yang diijinkan pada sistem Linux
dapan ditambah dengan melakukan modifikasi bagian ini.

Configuration - Penentuan isi home direktori user
Apabila dilakukan penambahan user pada sistem Linux, biasanya pada home
direktori user tersebut sudah terdapat isi berupa file default yang diperlukan
setiap kali user login. File-file atau direktori yang terdapat pada home
direktori user tersebut diambil dari file-file atau direktori yang terdapat pada
direktori /etc/skel. Seorang administrator bisa melakukan modifikasi file-
file dan direktori apa saja yang akan perlu dimiliki oleh user pada home
direktorinya.

Configuration - Konfigurasi password
Pada Linux password dan informasi tentang user disimpan pada file
/etc/passwd. Password yang disimpan adalah hasil enkripsi sehingga tidak
bisa diketahui password dari user tersebut. Tapi dengan suatu utilitas
tertentu password yang telah terenkripsi tersebut dapat ditebak. Hal ini
dikarena sifat file /etc/passwd yang dapat di dibaca oleh semua user. Tapi
sekarang Linux pada umumnya menggunakan utilitas bernama shadow-util
yang akan memindahkan password pada /etc/passwd ke file /etc/shadow.
Berbeda dengan /etc/passwd, isi file /etc/shadow tidak bisa dibaca bahkan
di-copy oleh user biasa. Hal ini tentu saja akan mempersulit bagi orang
untuk menebak password dari user karena tidak punya acuan berupa
password user yang telah terenkripsi tersebut. Efek dari utilitas shadow-utils
dapat dilihat dengan menggunakan perintah :

pwconv

Perintah ini akan mengaktifkan shadow-utils.

pwunconv

akan mematikan utilitas shadow-utils, artinya password user yang telah
terenkripsi akan disimpan pada file /etc/passwd dan menghilangkan file
/etc/shadow. Akibat yang dihasil oleh kedua perintah tersebut di atas dapat
dilihat dengan melihat perubahan isi file /etc/passwd.
Konfigurasi file /etc/securetty
File /etc/securetty merupakan file konfigurasi yang mengatur device TTY
yang boleh digunakan oleh root untuk login. Berikut adalah isi dari file
/etc/securetty :

tty1
tty2
tty3
tty4
. . . .

Artinya root dapat login pada device tty1, tty2 dan seterusnya. Agar root
hanya dapat login pada device tty1 maka isi file /etc/securetty adalah
sebagai berikut :

tty1
#tty2
#tty3
#tty4
. . . .
Apabila root melakukan login pada device selain tty1 maka login akan
ditolak dengan komentar login incorect.

Secara default pada Linux, root tidak diperkenankan untuk login secara
remote lewat utilitas telnet. Tapi dengan melakukan konfigurasi pada file
/etc/securetty sebagai berikut :

pts/1
pts/2
tty1
#tty2
#tty3
#tty4
. . . .

dengan konfigurasi tersebut root dapat login secara remote pada device
pts/1 dan pts/2.

Sabtu, April 25, 2009

Perintah-perintah Dasar Linux

1.cd(change directory)
digunakan untuk pindah direktori satu tingkat diatasnya(direktori sebelunya).
syntax = $ cd ..
contoh = $ cd /home/user/ (pindah ke direktori /home/user)

2. cat
digunakan untuk menampilkan isi direktori
syntax = $ cat
contoh = $ cat /etc/passwd (menampilkan isi direktori /etc/passwd)

3. ls(LiSt)
digunakan daftar isi
syntax = $ ls
contoh = $ ls /home/ (menampilkan daftar isi /home)
$ ls -a /home/ (menampilkan seluruh isi dalam direktori termasuk yg di hidden)
$ ls -R /home/ (menampilkan isi pada /home termasuk subfolder dari /home)
$ ls -l /home/ (menampilkan isi berikut file/folder)

4. mkdir
digunakan untuk membuat direktori kosong
syntax = $ mkdir [direktori]
contoh = $ mkdir /home/user/dir (membuat direktori dir di /home/user/)

5. rmdir
digunakan untuk menghapus direktori
syntax = $ rmdir [direktori]
contoh = $ rmdir dir (menghapus direktori dir)
$ rmdir -v dir (verbose mode(menampilkan status))
$ rmdir -f dir (menghapus secara paksa(force))
$ rmdir -i dir (menghapus secara interaktif)

6. touch
digunakan untuk membuat file kosong
syntax = $ touch [nama file]
contoh = $ touch /home/penjaganeraka.txt (membuat file kosong penjaganeraka.txt di /home)

7. mv(move)
digunakan untuk memindahkan file antar direktori
syntax = $ mv [lama] [baru]

8. cp(copy)
digunakan untuk mengkopy file dari sumber ke tujuan baru
syntax = $ cp [lama] [baru]

9. comment untuk menginstal..
#apt-get install ....

10. untuk melihat ip ketik perintah :
# ifconfig

11. Melihat DNS
ketik $ sudo su -
kemudian masukkan pass klo di kasuh pass
trus untk liat config dnsnya $ ifconfig
untuk mengganti klik insert kemudian di save carannya pencet esc trus ketik :wq
config jangan lupa di restart configurasinya caranya
ketik
klo yang menggunakan user : $ sudo /etc/init.d/networking restart
klo dah masuk root tinggal hilangin sudonya
tunggu sampe ada tulisan OK di sebelah pojok kanan bawah


Perintah Networking @ Linux

untuk jadi superuser di linux...
* Ubuntu dan turunan nya : $ sudo su
* Other linux : $ su

untuk liat user aktif : $ whoami

nih sekedar perintah dasar di linux untuk networking :
* Untuk melihat settingan ip address :
$ ifconfig

* Untuk pengiriman paket icmp ping
$ ping [ip_address]
misal ping localhost $ ping 127.0.0.1

* Untuk melakukan setting ip di linux :
pertama lihat interface dari etheral PC dengan perintah $ ifconfig
lalu untuk melakukan setting ip address, netmask, dengan perintah :
$ ifconfig [interface] inet [ip_address] netmask [netmask_address] up
contoh nya untuk setting ip : 172.16.1.5 dengan netmask 255.255.255.0 dgn interface eth0 :
jadi superuser dulu bro ($ su)
# ifconfig et0 inet 172.16.1.5 netmask 255.255.255.0 up
lalu cek ip nya lagi dengan # ifconfig

untuk setting gateway :
# route add default gw [ip_address]
misal gateway nya 172.16.1.1
# route add default gw 172.16.1.1

oke bro, dengan setting seperti di atas kita bisa konek ke LAN...

Sumber: cyberphreaking

Windows Vista Tiny 2008 v1 + v2 with SP1 | 2 ISO files | 687 MB Each version

Windows Vista Tiny 2008 v1 + v2 with SP1 | 2 ISO files | 687 MB Each version




Windows Vista Tiny 2008
Information:
Thank you for trying this special eXPerience edition of Windows Vista
Ultimate.

No product key is needed. Windows Vista is activated upon installation. Windows
is fully patched with all “important” Windows Updates to 8th may 2007.

The 512Mb RAM memory requirement is reduced to just 256Mb.

The requirement of almost 8Gb of disk space is reduced to less than 3Gb.

This installation only takes up about 35% of the size of a normal installation
of Windows Vista. Many components have been removed from this edition of Windows,
but you still have Microsoft’s three main programs:

Internet Explorer 7
Windows Mail (Formerly “Outlook Express”)
Windows Media Player 11

You also have the new Aero theme in this edition
of Windows and the ability to use Windows Update.

There are no services taken out of this special edition of Windows.
Only three services have been disabled: Remote Registry, Windows Error
Reporting Service, Windows Search.

You cannot do an upgrade installation from this CD, because the upgrade files
have been removed. You can only install Windows by booting from the CD and
formatting your partition or hard drive.

There are concerns about finding a good firewall and antivirus for Windows Vista.
If you want to use a good antivirus, get hold of NOD32 v2.70.31 (or later) and use
the NSANE fix. For a firewall, you’re stuck with the built in firewall it seems, at
least until software vendors start to make Vista compatible firewalls. On June 7th
2007, Comodo Firewall version 3 is due for release - this will have Vista

Links:

download part1
download part2
download part3
download part4
download part5
download part6
download part7
download part8

To extract file .001 Use Hjsplit Link And to extract .rar files Use WINRAR link . Play them with Vlc Video Player.
Enjoy!!!!

Vista Ultimate cukup ringan
download disini

Jangan Gunakan Adobe Acrobat Reader!

SAN FRANSISCO - Perusahaan keamanan jaringan F-Secure mengingatkan agar pengguna komputer untuk sementara jangan menggunakan program Adobe Acrobat Reader untuk membaca file PDF.

Pasalnya selama beberapa tahun terakhir banyak penjahat dunia maya yang mengeksploitasi lubang pada program tersebut untuk menyebarkan Malware.

"Sekitar 47 persen serangan memanfaatkan kelemahan Acrobat Reader," kata peneliti di firma keamanan F-Secure, Mikko Hypponen seperti dilansir Cnet, Sabtu (24/4/2009).

Sebulan lalu, padahal Adobe menyatakan telah menambal lubang pada Acrobat Reader, tapi tetap saja F-Secure masih menemukan celah pada aplikasi pembaca file PDF itu. Sebab itu, F-Secure mengungkapkan agar pemilik komputer menggunakan program lainnya untuk membaca file-file PDF.

"Adobe seharusnya menjadikan keamanan sebagai prioritas utamanya," katanya.

Pada tahun 2008, penjahat dunia maya lebih banyak membonceng aplikasi Microsoft Word. Menurut Hypponen 34,5 persen serangan pada 2008 berawal dari file-file Microsoft Word.

sumber: http://techno.okezone.com/index.php/ReadStory/2009/04/24/55/213798/jangan-gunakan-adobe-acrobat-reader

Sejarah Hacker dan Cracker

Hacker muncul pada awal tahun 1960-an diantara para anggota organisasi mahasiswa Tech Model Railroad Club di Laboratorium Kecerdasan Artifisial Massachusetts Institute of Technology (MIT). Kelompok mahasiswa tersebut merupakan salah satu perintis perkembangan teknologi komputer dan mereka beroperasi dengan sejumlah komputer mainframe. Kata hacker pertama kali muncul dengan arti positif untuk menyebut seorang anggota yang memiliki keahlian dalam bidang komputer dan mampu membuat program komputer yang lebih baik dari yang telah dirancang bersama. Kemudian pada tahun 1983, analogi hacker semakin berkembang untuk menyebut seseorang yang memiliki obsesi untuk memahami dan menguasai sistem komputer. Pasalnya, pada tahun tersebut untuk pertama kalinya FBI menangkap kelompok kriminal komputer The 414s yang berbasis di Milwaukee AS. 414 merupakan kode area lokal mereka. Kelompok yang kemudian disebut hacker tersebut dinyatakan bersalah atas pembobolan 60 buah komputer, dari komputer milik Pusat Kanker Memorial Sloan-Kettering hingga komputer milik Laboratorium Nasional Los Alamos. Salah seorang dari antara pelaku tersebut mendapatkan kekebalan karena testimonialnya, sedangkan 5 pelaku lainnya mendapatkan hukuman masa percobaan.

Kemudian pada perkembangan selanjutnya muncul kelompok lain yang menyebut-nyebut diri hacker, padahal bukan. Mereka ini (terutama para pria dewasa) yang mendapat kepuasan lewat membobol komputer dan mengakali telepon (phreaking). Hacker sejati menyebut orang-orang ini 'cracker' dan tidak suka bergaul dengan mereka. Hacker sejati memandang cracker sebagai orang malas, tidak
bertanggung jawab, dan tidak terlalu cerdas. Hacker sejati tidak setuju jika dikatakan bahwa dengan menerobos keamanan seseorang telah menjadi hacker.

Para hacker mengadakan pertemuan setiap setahun sekali yaitu diadakan setiap pertengahan bulan Juli di Las Vegas. Ajang pertemuan hacker terbesar di dunia tersebut dinamakan Def Con. Acara Def Con tersebut lebih kepada ajang pertukaran informasi dan teknologi yang berkaitan dengan aktivitas hacking.


Pengertian Hacker dan Cracker

1. Hacker

Hacker adalah sebutan untuk mereka yang memberikan sumbangan yang bermanfaat kepada jaringan komputer, membuat program kecil dan membagikannya dengan orang-orang di Internet. Sebagai contoh : digigumi (Grup Digital) adalah sebuah kelompok yang mengkhususkan diri bergerak dalam bidang game dan komputer. Digigumi ini menggunakan teknik teknik hexadecimal untuk mengubah teks yang terdapat di dalam game. Contohnya, game Chrono Trigger berbahasa Inggris dapat diubah menjadi bahasa Indonesia. Oleh karena itu, status Digigumi adalah hacker, namun bukan sebagai perusak. Hacker disini artinya, mencari, mempelajari dan mengubah sesuatu untuk keperluan hobi dan pengembangan dengan mengikuti legalitas yang telah ditentukan oleh developer game. Para hacker biasanya melakukan penyusupan-penyusupan dengan maksud memuaskan pengetahuan dan teknik. Rata - rata perusahaan yang bergerak di dunia jaringan global (internet) juga memiliki hacker. Tugasnya yaitu untuk menjaga jaringan dari kemungkinan perusakan pihak luar "cracker", menguji jaringan dari kemungkinan lobang yang menjadi peluang para cracker mengobrak - abrik jaringannya, sebagai contoh : perusahaan asuransi dan auditing "Price Waterhouse". Ia memiliki team hacker yang disebut dengan Tiger Team. Mereka bekerja untuk menguji sistem sekuriti client mereka.


2. Cracker

Cracker adalah sebutan untuk mereka yang masuk ke sistem orang lain dan cracker lebih bersifat destruktif, biasanya di jaringan komputer, mem-bypass password atau lisensi program komputer, secara sengaja melawan keamanan komputer, men-deface (merubah halaman muka web) milik orang lain bahkan hingga men-delete data orang lain, mencuri data dan umumnya melakukan cracking untuk keuntungan sendiri, maksud jahat, atau karena sebab lainnya karena ada tantangan. Beberapa proses pembobolan dilakukan untuk menunjukan kelemahan keamanan sistem.


Hirarki / Tingkatan Hacker

1. Elite

Ciri-ciri : mengerti sistem operasi luar dalam, sanggup mengkonfigurasi & menyambungkan jaringan secara global, melakukan pemrogramman setiap harinya, effisien & trampil, menggunakan pengetahuannya dengan tepat, tidak menghancurkan data-data, dan selalu mengikuti peraturan yang ada. Tingkat Elite ini sering disebut sebagai ‘suhu’.

2. Semi Elite

Ciri-ciri : lebih muda dari golongan elite, mempunyai kemampuan & pengetahuan luas tentang komputer, mengerti tentang sistem operasi (termasuk lubangnya), kemampuan programnya cukup untuk mengubah program eksploit.

3. Developed Kiddie

Ciri-ciri : umurnya masih muda (ABG) & masih sekolah, mereka membaca tentang metoda hacking & caranya di berbagai kesempatan, mencoba berbagai sistem sampai akhirnya berhasil & memproklamirkan kemenangan ke lainnya, umumnya masih menggunakan Grafik User Interface (GUI) & baru belajar basic dari UNIX tanpa mampu menemukan lubang kelemahan baru di sistem operasi.

4. Script Kiddie

Ciri-ciri : seperti developed kiddie dan juga seperti Lamers, mereka hanya mempunyai pengetahuan teknis networking yang sangat minimal, tidak lepas dari GUI, hacking dilakukan menggunakan trojan untuk menakuti & menyusahkan hidup sebagian pengguna Internet.

5. Lamer

Ciri-ciri : tidak mempunyai pengalaman & pengetahuan tapi ingin menjadi hacker sehingga lamer sering disebut sebagai ‘wanna-be’ hacker, penggunaan komputer mereka terutama untuk main game, IRC, tukar menukar software prirate, mencuri kartu kredit, melakukan hacking dengan menggunakan software trojan, nuke & DoS, suka menyombongkan diri melalui IRC channel, dan sebagainya. Karena banyak kekurangannya untuk mencapai elite, dalam perkembangannya mereka hanya akan sampai level developed kiddie atau script kiddie saja.

Cracker tidak mempunyai hirarki khusus karena sifatnya hanya membongkar dan merusak.


Kode Etik Hacker

1. Mampu mengakses komputer tak terbatas dan totalitas.

2. Semua informasi haruslah FREE.

3. Tidak percaya pada otoritas, artinya memperluas desentralisasi.

4. Tidak memakai identitas palsu, seperti nama samaran yang konyol, umur, posisi, dll.

5. Mampu membuat seni keindahan dalam komputer.

6. Komputer dapat mengubah hidup menjadi lebih baik.

7. Pekerjaan yang di lakukan semata-mata demi kebenaran informasi yang harus disebar luaskan.

8. Memegang teguh komitmen tidak membela dominasi ekonomi industri software tertentu.

9. Hacking adalah senjata mayoritas dalam perang melawan pelanggaran batas teknologi komputer.

10. Baik Hacking maupun Phreaking adalah satu-satunya jalan lain untuk menyebarkan informasi pada massa agar tak gagap dalam komputer.
Cracker tidak memiliki kode etik apapun.


Aturan Main Hacker

Gambaran umum aturan main yang perlu di ikuti seorang hacker seperti di jelaskan oleh Scorpio, yaitu:

· Di atas segalanya, hormati pengetahuan & kebebasan informasi.

· Memberitahukan sistem administrator akan adanya pelanggaran keamanan / lubang di keamanan yang anda lihat.

· Jangan mengambil keuntungan yang tidak fair dari hack.

· Tidak mendistribusikan & mengumpulkan software bajakan.

· Tidak pernah mengambil resiko yang bodoh – selalu mengetahui kemampuan sendiri.

· Selalu bersedia untuk secara terbuka / bebas / gratis memberitahukan & mengajarkan berbagai informasi & metoda yang diperoleh.

· Tidak pernah meng-hack sebuah sistem untuk mencuri uang.

· Tidak pernah memberikan akses ke seseorang yang akan membuat kerusakan.

· Tidak pernah secara sengaja menghapus & merusak file di komputer yang dihack.

· Hormati mesin yang di hack, dan memperlakukan dia seperti mesin sendiri.

Hacker sejati akan selalu bertindak berlandaskan kode etik dan aturan main sedang cracker tidak mempunyai kode etik ataupun aturan main karena cracker sifatnya merusak.


Perbedaan Hacker dan Cracker

a. Hacker

1.Mempunyai kemampuan menganalisa kelemahan suatu sistem atau situs. Sebagai contoh : jika seorang hacker mencoba menguji situs Yahoo! dipastikan isi situs tersebut tak akan berantakan dan mengganggu yang lain. Biasanya hacker melaporkan kejadian ini untuk diperbaiki menjadi sempurna.

2.Hacker mempunyai etika serta kreatif dalam merancang suatu program yang berguna bagi siapa saja.

3. Seorang Hacker tidak pelit membagi ilmunya kepada orang-orang yang serius atas nama ilmu pengetahuan dan kebaikan.

b. Cracker

1. Mampu membuat suatu program bagi kepentingan dirinya sendiri dan bersifat destruktif atau merusak dan menjadikannya suatu keuntungan. Sebagia contoh : Virus, Pencurian Kartu Kredit, Kode Warez, Pembobolan Rekening Bank, Pencurian Password E-mail/Web Server.

2. Bisa berdiri sendiri atau berkelompok dalam bertindak.

3. Mempunyai situs atau cenel dalam IRC yang tersembunyi, hanya orang-orang tertentu yang bisa mengaksesnya.

4. Mempunyai IP yang tidak bisa dilacak.

5. Kasus yang paling sering ialah Carding yaitu Pencurian Kartu Kredit, kemudian pembobolan situs dan mengubah segala isinya menjadi berantakan. Sebagai contoh : Yahoo! pernah mengalami kejadian seperti ini sehingga tidak bisa diakses dalam waktu yang lama, kasus clickBCA.com yang paling hangat dibicarakan tahun 2001 lalu.


Dua Jenis Kegiatan Hacking

1. Social Hacking, yang perlu diketahui : informasi tentang system apa yang dipergunakan oleh server, siapa pemilik server, siapa Admin yang mengelola server, koneksi yang dipergunakan jenis apa lalu bagaimana server itu tersambung internet, mempergunakan koneksi siapa lalu informasi apa saja yang disediakan oleh server tersebut, apakah server tersebut juga tersambung dengan LAN di sebuah organisasi dan informasi lainnya

2. Technical Hacking, merupakan tindakan teknis untuk melakukan penyusupan ke dalam system, baik dengan alat bantu (tool) atau dengan mempergunakan fasilitas system itu sendiri yang dipergunakan untuk menyerang kelemahan (lubang keamanan) yang terdapat dalam system atau service. Inti dari kegiatan ini adalah mendapatkan akses penuh kedalam system dengan cara apapun dan bagaimana pun.


Contoh Kasus Hacker

1. Pada tahun 1983, pertama kalinya FBI menangkap kelompok kriminal komputer The 414s(414 merupakan kode area lokal mereka) yang berbasis di Milwaukee AS. Kelompok yang kemudian disebut hacker tersebut melakukan pembobolan 60 buah komputer, dari komputer milik Pusat Kanker Memorial Sloan-Kettering hingga komputer milik Laboratorium Nasional Los Alamos. Salah seorang dari antara pelaku tersebut mendapatkan kekebalan karena testimonialnya, sedangkan 5 pelaku lainnya mendapatkan hukuman masa percobaan.

2. Digigumi (Grup Digital) adalah sebuah kelompok yang mengkhususkan diri bergerak dalam bidang game dan komputer dengan menggunakan teknik teknik hexadecimal untuk mengubah teks yang terdapat di dalam game. Contohnya : game Chrono Trigger berbahasa Inggris dapat diubah menjadi bahasa Indonesia. Oleh karena itu, status Digigumi adalah hacker, namun bukan sebagai perusak.

3. Pada hari Sabtu, 17 April 2004, Dani Firmansyah, konsultan Teknologi Informasi (TI) PT Danareksa di Jakarta berhasil membobol situs milik Komisi Pemilihan Umum (KPU) di http://tnp.kpu.go.id dan mengubah nama-nama partai di dalamnya menjadi nama-nama "unik", seperti Partai Kolor Ijo, Partai Mbah Jambon, Partai Jambu, dan lain sebagainya. Dani menggunakan teknik SQL Injection(pada dasarnya teknik tersebut adalah dengan cara mengetikkan string atau perintah tertentu di address bar browser) untuk menjebol situs KPU. Kemudian Dani tertangkap pada hari Kamis, 22 April 2004.


Akibat yang Ditimbulakan oleh Hacker dan Cracker

Hacker : membuat teknologi internet semakin maju karena hacker menggunakan keahliannya dalam hal komputer untuk melihat, menemukan dan memperbaiki kelemahan sistem keamanan dalam sebuah sistem komputer ataupun dalam sebuah software, membuat gairah bekerja seorang administrator kembali hidup karena hacker membantu administrator untuk memperkuat jaringan mereka.

Cracker : merusak dan melumpuhkan keseluruhan sistem komputer, sehingga data-data pengguna jaringan rusak, hilang, ataupun berubah.


Kesimpulan

Para hacker menggunakan keahliannya dalam hal komputer untuk melihat, menemukan dan memperbaiki kelemahan sistem keamanan dalam sebuah sistem komputer ataupun dalam sebuah software. Oleh karena itu, berkat para hacker-lah Internet ada dan dapat kita nikmati seperti sekarang ini, bahkan terus di perbaiki untuk menjadi sistem yang lebih baik lagi. Maka hacker dapat disebut sebagai pahlawan jaringan sedang cracker dapat disebut sebagai penjahat jaringan karena melakukan melakukan penyusupan dengan maksud menguntungkan dirinya secara personallity dengan maksud merugikan orang lain. Hacker sering disebut hacker putih (yang merupakan hacker sejati yang sifatnya membangun) dan hacker hitam (cracker yang sifatnya membongkar dan merusak)

Sumber : http://www.e-samarinda.com/forum/lofiversion/index.php?t5105.html