How can I automatically redirect my visitors from blogspot to my new site? I find this video especially for the bloggers who want to change the blog address from example.blogspot.com to example.com easily we change it, and first we have to purchase the domain. You can also find free domain or buy them with, depending on the package provided. why I post this article when I have not I buy a domain, but if insyaallah have money falling from the sky I will buy them directly, amin, the blogger prayer...
Tuesday, April 28, 2009
//
Label:
skill
// //
A week ago, i and my friends in order to create the form using JavaScript, a challenge that must be completed, as this day must be completed in the following is an example of making the implementation of the Form using JavaScript.function formValidator(){ var nama = document.getElementById('nama'); var email = document.getElementById('email'); var umur = document.getElementById('umur'); // Mengecek Maukkan dalam Form if(isAlphabet(nama, "Please input your name")){ if(emailValidator(email, "Please...
Monday, April 27, 2009
//
Label:
JavaScript
// //

One day I was bored I continue to face the obvious in facebook or in the virtual world, I would like to continue to create images such as cartoons, but I'm a fool in the use of Adobe heu, I can hold recommendations for the site faceyourmanga. Hmm this is a site that gives our face without wearing the cost,faceyourmanga provide all the usual in pairs on the internet if faceyourmanga lazy show up original images, how to make it simple with a variety...
Sunday, April 26, 2009
//
Label:
sites
// //
by : putro
allhamdulillah I finally get answers to my job on campus. about EIGRP routing protokols,that is, "why EIGRP uses bandwidth the include in EIGRP distance vector protocol that does not require bandwidth?", but see or calculate the nearest hop on down .. This is a task that answers a question I get
Balanced hybrid is a term to describe your protkol routing that is used by EIGRP, this is because EIGRP has some features of distance vector and link state, as we know that EIGRP is a distance...
Saturday, April 25, 2009
//
Label:
EIGRP,
Networking
// //
During this time we always discuss the network protocol IP protocol because this is the most widely used, although there are also other protocols that are important to know the protocol IPX (internetwork packet exchange), especially for networks that use Novell Netware, Novell Netware is the operating system that appears in the mid-1980s, which at that time was over the computer network. Due to its use by a broad and how to use different IP's, so you do not upset the IPX protocol will be discussed...
Tuesday, April 21, 2009
//
Label:
IPX,
Networking
// //
Email service based on SMTP and POP are still difficult to get in for free. although this so efesiento read email offline, usually we have to use a web-based email to send or receive incoming email. when we do not need to do this. if we do not have access to the SMTP server, you can create your own SMTP access. Quite easy to do. local software to install Local SMTP Relay Server Before sending the email, do the first configuration in the application local SMTP Relay Server and Microsoft Outlook...
Monday, April 20, 2009
//
Label:
skill
// //

Wireshark is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. Has all the standard features that will be expected in the analysis protocol, and several features not seen on any other products. Its open source license allows talented experts in the networking community to add enhancements. He runs on all popular computing platforms, including Unix, Linux, and Windo...
Friday, April 17, 2009
//
Label:
Freeware
// //

download Y!M 9.0download Mozilla firefox 3.0...
Friday, April 17, 2009
//
Label:
Freeware
// //

With Trend Micro Internet Security, you no longer need to choose between computer performance and maximum protection. Get smart, proven security that never sleeps, guarding your PC from the latest threats while giving you the freedom to browse and shop online. Safeguard your PC and your personal information without compromi...
Friday, April 17, 2009
//
Label:
Freeware
// //

SSD (Solid State Disk) is a data storage medium of storage and built, this is because the SSD will replace hard drives we are on now. The advantage of SSD is free of the rotating disc so that there is no risk such as hard disk (tahab shocks), as part mekaniknya does not have the fast data transfer, speed dialing tulisnya read. which are now reaching 512GB in to announce that A-Data with a series of XPG, eits not the first small compared to hard...
Tuesday, April 14, 2009
//
Label:
hardware
// //

This is my story on a day that I visited my friend to place the name tejo, the purpose of my goals is to tempatna learn,but sort of the nature pamerna ituloh that disrupt my study (thorn congrats) ... From the view vista can be installed in XP wow cool ... JOYou have interested this view ..?Please download...
Saturday, April 11, 2009
//
Label:
software
// //

By GoogleIhwow Gmail is a shell namespace extension that creates a virtual drives in the windows explorer, allowing to use google mail account as a storage medium, It allows you to do basic file manipulation, such as copy and delete, on files inside the GMail folder. Because it is a Shell Extension, the interface you work in is Windows Explorer itself. GMail files are physically stored as e-mails on your Google Mail account. The files are stored...
Saturday, April 11, 2009
//
Label:
software
// //
I. UNICASTTransmission network is a one to one (point to point), while in use, a single system trying to communicate with only one other system, the network point to point in use on a large network, by connecting the local network to other networks through a single point access point .point to point network using wireless technology (microwave 15 GHz) When a data packet will be sent to the machine (node) in the network at will, makapaket must pass one or more of the other nodes that act as intermediaries....
Friday, April 10, 2009
//
Label:
Networking
// //
Of course this invisible mode is used when we wanted to have privacy, we palage hhehe a player who had a lot cewe, pi cewe I want my monitor, it can be lo ga me invisible?? Now that he's no escape my tuk tuk so you ni hhehehe real player.
invite to http://apps.facebook.com/appearoffline/.
of this application (appearoffline red) you can see your girlfriends or that are online even though you are offline deh.
to facilitate the use of this application,...
Thursday, April 09, 2009
//
Label:
Facebook
// //

Finding hidden files on the network? Hmm interesting pi yes yes easy difficulty, but the windows search facility can find ga in hidden files and search data quickly, if you want to find data quickly and find the data that was hidden in a network with wide coverage, he ni I recommendations have a free tool that favored hhaha kosan children, namely LAN Search Pro click below to download
Not only that this application offers a variety of sophistication...
Thursday, April 09, 2009
//
Label:
software
// //
I'm annoyed, I am among those who like to download photos on facebook for sharing the goal yes, but the process was a lelet unduhnya, yes it was in the cafe in place because of my speed only 512kbps, heu. But it can be overcome with the Add-on Firefox is "Facebook Album Downloader (FacePad)" by using this (facepad red) I can download a little or a lot of photos at once, how to use the Add-on is:
invite http://addons.mozilla.org.en-US/firefox/addon/8442 end then pilih link add to firefox.
“install...
Thursday, April 09, 2009
//
Label:
Facebook
// //
Computer network likened to vehicle traffic lane, there was bad if the pass line filled with vehicles, such as the fast lane highway as well as computer networks.Routing table can be created by static, default and dynamicStatic routing is a way of making the routing table manually. This is useful for sederhanayang network using only a few routers and also to save bandwidth usage.
Excess static routingThere is no bandwidth is used between the routers.
no overhead on the router.
Add security,...
Thursday, April 09, 2009
//
Label:
Networking
// //
Dinamic Routing
Interior Vektor
Eksterior Vektor
Distancce Vektor
Link State
Path Vektor
Classfull
RIP
IGRP
EGP
ClassLess
RIPv2
EIGRP
OSPFv2
ISIS
BGPv4
IPV6
RIPng
EIGRP for IPV6
ISPFv3
ISIS for IPV6
BGP for IPV6
Dynamic router is a router that route path established automatically by the router itself according to the configuration are made, if there are changes or additions topology between the network topology, the router will automatically update the new routing, Dynamic...
Thursday, April 09, 2009
//
Label:
Networking
// //
As an administrative network is of course we must know the network topology by the routing table to see the only form of letters and numbers only, of course this is a problem that exists for a junior admin, will teach here sonny see topology of the routing table, consider the well<br /> Router1#show ip route<br /> Codes: C - connected, S - Static, I - IGRP, R - RIP, M - Mobile, B - BGP, D - EIGRP, EX -EIGRP external, O - OSPF, IA - OSPF area, E1 - OSPF external type 1, E2 - OSPF external...
Thursday, April 09, 2009
//
Label:
Networking
// //
Every time the Cisco router is turned on, this equipment will perform a routine process that is called the boot process, the boot process is working through a specific sequence as follows:
First the router will run the Power On Self Test (POST) to check the CPU, memory and interface equipment to ensure that the router hardware to function properly.
Then bootstrap the system will work for a Cisco IOS image that can be used. Generally this Cisco IOS image can be obtained from flash memory or from...
Tuesday, April 07, 2009
//
Label:
Networking
// //
IP calculator is a tool that facilitates the network administration to determine the decisions made by John Swartz,
we only menginputkan our IP address, and will get a ita Subnetmask, broadcast, Ip range,
addressclassless IP even can be manipulated here,
more info please visit http://www.boson.c...
Saturday, April 04, 2009
// // //
NVU is a web application editor is "what you see is what you get". Someone can make a web designer with no advanced syntax syntax-HTML tags. This application has the advantage of them: You can directly upload web pages Amda built into your web hosting on the Internet, using the facilities manager's ftp site NVU, NVU is a standalone tool, yangtidak tied with other applications, many colors, dilegkapi css editor, can directly open and edit an existing web page on the Internet and then upload them,...
Saturday, April 04, 2009
// // //

Router is a device in a route network packets to another network, you could say also as a means of connecting one network to another network. In this edition I will configure the router to 2 pieces 2 subnets can be connected. using the application packet tracer 5.0View pictures as examples!Keep in mind that the router interface and the same company so we menngunakan cross cable, if the 2 devices to be connected has a different interface using a...
Saturday, April 04, 2009
//
Label:
Networking,
Packet
// //
I. IP Address Classes
IP addresses consist of 32-bit binary numbers, which is written in 4 groups of 8 bytes (octets) separated by a dot as the example below:
11000000.00010000.00001010.00000001
Or can be written in the form of 4 groups of decimal numbers (0-255) is 192.16.10.1
W X Y Z
IP address consists of 2 parts of the network id and host id, network ID to determine the network address, while the host ID to determine the host address or computer.
Classes of IP address:
Kelas Network id...
Saturday, April 04, 2009
//
Label:
Networking
// //
Use cisco as the password. When you are finished, exit from line configuration mode.R1(config)#line vty 0 4 // any 5 admin to access using telnet sesionR1(config-line)#password cisco R1(config-line)#loginR1(config-line)#exitR1(config...
Thursday, April 02, 2009
//
Label:
Telnet
// //
Using password on configuration mode for safe yaour router, thats command is include line console 0 on terminal . 0 = just one line console can access to terminal.R1(config)#line console 0R1(config-line)#password ciscoR1(config-line)#loginR1(config-line)#exitR1(config)#./febti...
Wednesday, April 01, 2009
//
Label:
Console,
Networking
// //
About This Blog
Chat
Blog Archive
-
▼
2009
(48)
-
▼
April
(26)
- Video Redirect Blogspot
- Form with JavaScript
- Faceyourmanga
- use of bandwidth in EIGRP
- Novell IPX
- send email without SMTP server
- wireshark
- YM and Mozilla
- Trend Micro
- Prediction SSD
- XP like VISTA
- GMail Drive
- UNICAST and MULTICAST of Network
- Seeing the invisible visible on facebook
- LAN Search Pro
- Upload foto Album so Quickly on Facebook
- Routing Protokol
- Dinamic Routing
- Routing Table
- BOOT Process CISCO ROUTER
- IP calculator
- NVU
- ROUTER
- IP ADDRESS
- Configure the password for the telnet
- Configure the console password on the router
-
▼
April
(26)
