tag:blogger.com,1999:blog-4416886183027513472024-03-05T07:32:57.024-08:00401notfoundIT center for learning, sharing and many more in here401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comBlogger50125tag:blogger.com,1999:blog-441688618302751347.post-58585877907920919692010-02-13T08:01:00.001-08:002010-02-13T08:01:40.630-08:00Skreeky - audio-based chatSkreeky is based chat application supporting audio chat that allows users to keep in touch with friends.with an excess of which could accommodate had talked to all his friends ririskiky simultaneously. to operate, users simply install to the phone. then the user will be connected to the server application providers. After that. users will be able to hear the voice users and other applications can401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-54066544705814076872009-12-19T08:32:00.000-08:002009-12-19T17:48:00.189-08:00VLAN Configuration on Switch 2950T-24
In my post this time I'll share my knowledge about VLAN, VLAN (Virtual LAN) is a network switch that is logically segmented by function or department without actually touching the user based on location, this is done for network security and reduce operational costs.
Okay so we can understand in detail the performance of the VLAN. First we create a topology like the picture above using Packet 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-60994930298385786722009-12-16T06:39:00.000-08:002009-12-16T06:39:53.370-08:00Administratif Distance of CISCO's Router
401notfound not have long to give an article about Cisco, on occasion this time I will explain about the Administrative Distance, Administrative Distance is a numeric value that specifies the preference of a particular route, It's a calculated value used to determine the best path to a destination, each routing protocol has an administrative distance separately. In the example above picture 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-62659927742713209052009-12-10T01:14:00.000-08:002009-12-10T18:55:36.744-08:00Include Share Engine and Ads in Your Posting
This my story interested with my blog friends, blogs have a different and makes me wonder about it, because when the first page advertisements placed in his posting not visible, but when the link is clicked read more the ad and Share Engine appears, of course you have know the function of this ad is as income for bloggers and share engine in need to improve your SEO, as an example 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-65290230749470315622009-12-07T07:21:00.000-08:002009-12-07T17:25:11.600-08:00How to Instalasition OpenVPN on Linux
The cooperation want the transmisi data or using internet with safety for be accessing it branch who in city else, well any application who support this problem, this is OpenVPN Access Server, OpenVPN Access Server is a set of installation and configuration tools that simplify the rapid deployment of a VPN remote access solution. This OpenVPN-AS have a features include : simple, web- based admin401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-59889600103454058212009-12-03T19:37:00.000-08:002009-12-06T15:15:35.370-08:00Installation Wordpress on localhost
Post, edit html and each others done by the blogger or an online admin computer that is connected to the Internet, WordPress users now can do it offline (localhost) is running wordpress with no connection to the Internet. This allows the administrator to do the settings on the dashboard of wordpress if they have a slow connection. Just imagine we apply the settings, posting, uploading,
and the401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-14004939921197038692009-12-03T06:37:00.000-08:002009-12-03T06:55:11.245-08:00Instalasi Editor WYSIWYG
Hey readers .. This time I will raise the issue of WYSIWYG (what you see is what you get), maybe you will ask what is WYSIWYG. WYSIWYG editor that is installed in a php script that can facilitate a user to specify the format, size, type font, add hyperlinks and table, and can also upload files, images, animation and video that can describe this as we edit in Microsoft word. Before the existence401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-34635714229285377942009-11-12T05:07:00.000-08:002009-11-26T07:45:53.710-08:00Attrib - Hidden File for Data Secure
The function of a variety of hidden files, some say for data security or hide files #x$x?X depends on what he wills, will give 401notfound here tricks to use attrib to hide files on the command line to avoid criminal attack computer! Because they usually use the command line to enter the victim's computer, for more details see the stage below. First we go to the folder where the file will be 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-469277342891498822009-11-06T23:06:00.000-08:002009-11-06T23:13:52.890-08:00Download Packet Tracer 5.2Cisco corporation has launched a new series of packet tracer it is packet tracer 5.2, the latest version of this excess is the addition of a laptop that can feature in the system configure VPN, VPN (Virtual Private Network) is a private network to connect remote-site between safely. VPN is divided in two parts ie part of the system is protected by certain passwords and the outside of the 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-26788143507535665752009-06-27T02:04:00.000-07:002009-11-11T05:40:26.423-08:00Configure Outlook for Receive mail from LocalhostHi 401notfound visitors, in the previous session on how to send an email on localhost (the computer as a server in the URLs) using Argosoft Mail Sever, but I found a complain from my friends after reading my article, one comment, "Nas, email delivery is not so real, try the email go to inbox yahoo or Microsoft Outlook ". That's about a comment from my friend. And I accept that comment, so I make 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-45222243384388831442009-06-27T00:53:00.000-07:002009-11-11T05:30:52.414-08:00Konfigurasi Argosoft Mail Server
Argosoft Mail Server is an application running on localhost, maybe this application is the search by the manufacturers web where we can simulate the sending and receiving emails on the localhost (the computer as a server's settings) the computer must be installed pal apache first, whether the web at create can run well without the need to conduct online tests are often done by the manufacturer 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-5763696253347294822009-06-14T13:20:00.001-07:002009-11-11T05:50:35.587-08:00Wordpress to Blogger Conversion
One day I was doing my daily, that is browsing the Internet and on the day I discover new things very interesting. The new thing is how to change wordpress to blogspot. With the way that I find quite easy, but that made me confused. Why should berindah from wordpress to blogspot.
In my own hell wordpress feature complete easy, for example in making readmore blogspot done manually edit the HTML401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-44795863574136364172009-06-04T08:21:00.000-07:002009-12-04T22:59:27.432-08:00How to Syncronation Connection EIGRP to Static Routing
In this article I will discuss, how EIGRP can be connected to the static routing. Preparation of the exam networking in my campus. First I make a three-router that is located in one Autonomous systems and give me the name from left to right R1, R2, and R3. At R1 and R2 we configure EIGRP use R3 while we use Static routing, we simply set up one by one
Configuration on PC Client
PC1
PC2
PC3
401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-59486427091943572742009-05-31T00:18:00.000-07:002009-11-17T06:45:09.111-08:00Zamzar
This is a very interesting site, we can convert text into mp3 format with free (only up to 100MB), I was reminded of the custom of first school term time I listen to my voice recordings, this probably made goals Zamzar site, maybe also as we will preparing a presentation, but when we were little we can listen to the files that we have to convert. mp3 on his way to goal.
How it works, you 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-67766964723229755702009-05-30T19:50:00.000-07:002009-05-31T06:02:26.020-07:00FoxtabMozilla Firefox is solid, other than the speed of this application, the firefox to see the other side to sell their products, the design, add ons Foxtab is that I will study here, with similar foxtab own alt + tab on windows and linux but function to open tab in the tab itself mozila, foxtab provide various types of display that allows us to not bosen, the view that there are 5 slides, slide2, 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-2679433436290949742009-05-28T12:15:00.000-07:002009-11-19T20:15:44.846-08:00Calculate Wildcard-maskUse the wildcard-mask option with the network command to advertise only the subnet and not the
entire 192.168.20.0 classful network.
Note: Think of a wildcard mask as the inverse of a subnet mask. The inverse of the subnet mask
255.255.255.240 is 0.0.0.15. To calculate the inverse of the subnet mask, subtract the subnet mask from
255.255.255.255:
255.255.255.255
– 255.255.255.240 Subtract 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-79473080724847836002009-05-27T11:16:00.000-07:002009-06-09T03:28:48.419-07:00Static vs DynamicI ever try to make Autonomous small-scale in which there is a Static Routing and Routing Dimanic which I want to combine, in fact can not be connected between Dynamic Routing and Static Routing, week ago in the lab networking I get the answer, it appeared that the Router Dinamic (RIP) Default Routing give in and be the default-information originate.Step normally do first configuration ethernet, 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-38123696488652648232009-05-27T09:43:00.001-07:002009-06-09T03:29:10.472-07:00Configure RIPRIP is one of the more precisely dinamic routing entry in the distance vector. To enable a dynamic routing protocol, enter global configuration mode and use the router command. Enter router ? at the global configuration prompt to a see a list of available routing protocols on your router.To enable RIP, enter the command router rip in global configuration mode.R1(config)#router ripR1(config-router401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-76823884580042705772009-05-09T19:50:00.000-07:002009-11-17T06:54:22.909-08:00Handling Hidden File because VirusThis story's been a while, and now remembered lage. When my friend was confused his files in the hidden deliberately ng 'to the show hidden when already using a variety of outcome antivirus not detected the virus, how confused she was and I asked what file did you hide, it pictures, well I imagine mulei that the various ni (bus hhe's dirty face).
how to hide his own files is easy by right 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-60623483567761576292009-05-07T05:40:00.000-07:002009-11-19T20:13:20.247-08:00Secure the RegistryRegistry is a central activity in Windows to do and notes on the registry, otherwise the registry is a database of windows operating system, in this registry setting we can change our operating system wills, so can imagine, what if the destruction of the contents of the registry can be broken down people who have a childlike nature that nosy really ^ ^,
There ku ni registry tips to secure this 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-71886439750044030262009-05-02T08:37:00.000-07:002009-11-19T20:08:50.308-08:00Bluetooth 3.0 has been LaunchedBluetooth is a wireless data transfer media typically used by mobile phones, are now out of 3rd generation of Bluetooth, which was launched on 21 April last, Bluetooth 3.0 is also known as Bluetooth UWB is expected to transfer data as well as short distance ang speed quickly, comparison bluetooth 3.0 with the previous version of the 18x Bluetooth 2.0 + EDR.
The new standard supports a speed of 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-31453813635015714842009-04-28T00:13:00.001-07:002009-05-30T09:12:53.150-07:00Video Redirect BlogspotHow can I automatically redirect my visitors from blogspot to my new site? I find this video especially for the bloggers who want to change the blog address from example.blogspot.com to example.com easily we change it, and first we have to purchase the domain. You can also find free domain or buy them with, depending on the package provided. why I post this article when I have not I buy a domain,401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-39743593521735660442009-04-27T23:24:00.000-07:002009-04-28T08:08:57.869-07:00Form with JavaScriptA week ago, i and my friends in order to create the form using JavaScript, a challenge that must be completed, as this day must be completed in the following is an example of making the implementation of the Form using JavaScript.function formValidator(){ var nama = document.getElementById('nama'); var email = document.getElementById('email'); var umur = document.getElementById('umur'); // 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-56507981176668799292009-04-26T12:21:00.000-07:002009-04-26T22:50:15.734-07:00FaceyourmangaOne day I was bored I continue to face the obvious in facebook or in the virtual world, I would like to continue to create images such as cartoons, but I'm a fool in the use of Adobe heu, I can hold recommendations for the site faceyourmanga. Hmm this is a site that gives our face without wearing the cost,faceyourmanga provide all the usual in pairs on the internet if faceyourmanga lazy show up 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.comtag:blogger.com,1999:blog-441688618302751347.post-51452259017604842302009-04-25T21:15:00.000-07:002009-11-19T19:28:46.879-08:00use of bandwidth in EIGRP by : putro
allhamdulillah I finally get answers to my job on campus. about EIGRP routing protokols,that is, "why EIGRP uses bandwidth the include in EIGRP distance vector protocol that does not require bandwidth?", but see or calculate the nearest hop on down .. This is a task that answers a question I get
Balanced hybrid is a term to describe your protkol routing that is used by EIGRP, this 401notfoundhttp://www.blogger.com/profile/01121695448215692879noreply@blogger.com