Friday, March 23, 2012

Google's new offices soon be inaugurated in Indonesia

0 comment

Google plans to expand its business in Indonesia closer to reality, as the inauguration of the global internet giant office in Jakarta, in the near future.

In the invitation received detikINET, Thursday (03/22/2012), Google will inaugurate its representative office in Friday, March 30, 2012, at the Cyber ​​2 Tower building, Jakarta.

A number of important guests also mentioned would be present in the ceremony were, among others, Minister of Tourism and the Creative Economy Minister Mari Elka Pangestu and Trade Gita Wirjawan.

In addition to inaugurate its new headquarters, Managing Director, Google Southeast Asia Julian Persaud, also will introduce Google's Indonesia Country Head, who is still anonymous.

Although not mentioned his name, but who's going to be lined up Google boss for Indonesia, there is not a secret anymore. He is Ramawy Rudi, former officials at the RCTI.

This information is disclosed solely by Rudy LinkedIn account. In profile, he wrote has served as Country Head, Google Indonesia since early 2012.

"With the launch of Google's representative office in Indonesia, is expected to enhance the experience for users, advertisers, and also a partner of Google," writes Google distributed invitations.

source
Read More..

Ice Cream Sandwich Android market yet spread "sweetness"

0 comment

Jakarta - Since its launch in October 2011, the distribution of the Android 4.0 operating system is fairly old. Still a little gadget that can taste the 'sweet' Android nicknamed Ice Cream Sandwich (ICS) is.

Indeed, in a recent report, the percentage of the Android 4.0 has reached more than doubled in recent months, but the number was not yet even reached 2%.

According to latest data released by Google, only 1.6% of all Android devices running the latest version. Furthermore, as much as 0.4% handsets are adopting versions 4.0-4.0.2 Ice Cream Sandwich, and 1.2% running version 4.0.3.

While the most popular version of Android is 2.3.3-2.3.7, which is the latest version of Gingerbread. Because 'Ginger Bread' accounted for 61.5% of devices running the Android platform.

Right behind is the Android "Froyo" or 2.2, which accounted for 25.3% of all active devices.

Android Honeycomb, version 3.0 to 3.2 which is only used for tablets, has reached 3.3% adoption rate. Meanwhile, Android 2.1 (Eclair) there are those who use up to 6.6%,

While most versions of 'old', ie Android 1.6 (Donut) and Android 1.5 (Cupcake) began to disappear because it only accounts for less than 1%. Thus quoted from TG Daily, Thursday (03/22/2012).

In January, it was revealed that only 0.6% of Android devices that sample Ice Cream Sandwich, indeed increased, but the increase is very slow.

Ice Cream Sandwich is one of the biggest update to Android, including features such as scan your face to unlock the phone and technology Near Field Communication (NFC).

The ball is now in the hands of Google. Until when they still had to delay spread of sweet delicious presented Android Ice Cream Sandwich to the gadget that is ready to adopt?

source
Read More..

Thursday, March 22, 2012

The Unique Asus Padfone Tablet Ready to captivate Indonesia

0 comment

Jakarta - Asus will soon bring a tablet computer that is quite innovative, Padfone, in Indonesia. Asus Padfone is a unique gadget blend of smartphones and tablets.

"Yes, we will soon bring Padfone to Indonesia. Around the second quarter of this year," said Juliana Chen, Product & Marketing Manager at Asus Indonesia Hotel Sari Pan Pacific, Thursday (22/03/2012).

Padfone is Android device consisting of two types of gadgets. Ie smartphones and tablets that can be incorporated.

Yes, the uniqueness of this device is the tablet has a special slot in the back of the body to accommodate the smartphone. In this way, the new tablet can be enabled.

"For the price range Padfone we still can not mention right now," said Juliana.

Besides Padfone, Asus Indonesia was also considering to enter the tablet PC to another series. For example Transformer series which has a quad core processor.

Read More..

Tuesday, March 20, 2012

Dasar dasar Jaringan Komputer

0 comment
Dasar Jaringan Komputer

Jaringan komputer adalah sebuah sistem yang terdiri atas komputer dan perangkat jaringan lainnya yang bekerja bersama-sama untuk mencapai suatu tujuan yang sama. Tujuan dari jaringan computer adalah:

* Membagi sumber daya: contohnya berbagi pemakaian printer, CPU, memori, harddisk.

* Komunikasi: contohnya surat elektronik, instant messaging, chatting

* Akses informasi: contohnya web browsing

Agar dapat mencapai tujuan yang sama, setiap bagian dari jaringan komputer meminta dan memberikan layanan (service). Pihak yang meminta layanan disebut klien (client) dan yang memberikan layanan disebut pelayan (server). Arsitektur ini disebut dengan sistem client-server, dan digunakan pada hamper seluruh aplikasi jaringan komputer.

Sejak memasyarakatnya Internet dan dipasarkannya sistem operasi Windows95 oleh Microsoft, menghubungkan beberapa komputer baik komputer pribadi (PC) maupun server dengan sebuah jaringan dari jenis LAN (Local Area Network) sampai WAN (Wide Area Network) menjadi sebuah hal yang biasa. Demikian pula dengan konsep "downsizing" maupun "lightsizing" yang bertujuan menekan anggaran belanja khususnya peralatan komputer, maka sebuah jaringan merupakan satu hal yang sangat diperlukan. Dalam makalah ini akan dibahas sebagian komponen yang diperlukan untuk membuat sebuah jaringan komputer.

Sejarah Jaringan

Konsep jaringan komputer lahir pada tahun 1940-an di Amerika dari sebuah proyek pengembangan komputer MODEL I di laboratorium Bell dan group riset Harvard University yang dipimpin profesor H. Aiken. Pada mulanya proyek tersebut hanyalah ingin memanfaatkan sebuah perangkat komputer yang harus dipakai bersama. Untuk mengerjakan beberapa proses tanpa banyak membuang waktu kosong dibuatlah proses beruntun (Batch Processing), sehingga beberapa program bisa dijalankan dalam sebuah komputer dengan dengan kaidah antrian.

Ditahun 1950-an ketika jenis komputer mulai membesar sampai terciptanya super komputer, maka sebuah komputer mesti melayani beberapa terminal. (Lihat Gambar 1.) Untuk itu ditemukan konsep distribusi proses berdasarkan waktu yang dikenal dengan nama TSS (Time Sharing System), maka untuk pertama kali bentuk jaringan (network) komputer diaplikasikan. Pada sistem TSS beberapa terminal terhubung secara seri ke sebuah host komputer. Dalam proses TSS mulai nampak perpaduan teknologi komputer dan teknologi telekomunikasi yang pada awalnya berkembang sendiri-sendiri.

Jaringan komputer model TSS.

Memasuki tahun 1970-an, setelah beban pekerjaan bertambah banyak dan harga perangkat komputer besar mulai terasa sangat mahal, maka mulailah digunakan konsep proses distribusi (Distributed Processing). Seperti pada Gambar 2., dalam proses ini beberapa host komputer mengerjakan sebuah pekerjaan besar secara paralel untuk melayani beberapa terminal yang tersambung secara seri disetiap host komputer. Dala proses distribusi sudah mutlak diperlukan perpaduan yang mendalam antara teknologi komputer dan telekomunikasi, karena selain proses yang harus didistribusikan, semua host komputer wajib melayani terminal-terminalnya dalam satu perintah dari komputer pusat.

Jaringan komputer model distributed processing.

Selanjutnya ketika harga-harga komputer kecil sudah mulai menurun dan konsep proses distribusi sudah matang, maka penggunaan komputer dan jaringannya sudah mulai beragam dari mulai menangani proses bersama maupun komunikasi antar komputer (Peer to Peer System) saja tanpa melalui komputer pusat. Untuk itu mulailah berkembang teknologi jaringan lokal yang dikenal dengan sebutan LAN. Demikian pula ketika Internet mulai diperkenalkan, maka sebagian besar LAN yang berdiri sendiri mulai berhubungan dan terbentuklah jaringan raksasa WAN.

Evolusi Jaringan

a. Mainframe pada era 1960-1970 an

Pada tahun 1940-1n komputer adalah suatu alat dengan ukuran besar yang sangat rentan terhadap kesalahan. Pada tahun 1947, ditemukannya transistor semikonduktor membukan banyak kemungkingan untuk membuat komputer dengan ukuran lebih kecil; dan tentunya lebih handal. Pada tahun 1950-an institusi-institusi besar muladi menggunakan komputer-komputer mainframe, dimana dijalankan dengan program-program punched card. Pada akhir tahun 1950-an, Integrated circuit (IC) yang mengembangkan beberapa, dan sekarang jutaan, transistor pada satu semikonduktor yang kecil telah ditemukan. pada tahun 1960-an, mainframe dengan terminal dan IC telah banyak digunakan.

b. LAN (Local Area Network) pada era 1970-1980 an

Pada akhir 1960-1n dan 1970-an komputer-komputer yang lebih kecil dengan sebutan minicomputer telah diciptakan. Walau bagaimana-pun, minikomputer-minikomputer masih dalam ukuran yang sangat besar dibanding dengan standar modern saat ini. Pada tahun 1977, Apple Computer Company memperkenalkan mikrokomputer, dimana dikenal dengan sebutan MAC. Pada tahun 1981 IBM memperkenalkan PC pertamanya. Mac yang user-friendly, IBM PC yang open-archetecture, dan langkah lebih jauh dari proses "micro-minisasi" dari IC membawah penyebaran luas dari PC baik di rumah maupun di kantor-kantor.

Pada masa ini jaringan-jaringan local mulai dibuat dikembangkan dengan berbagai macam teknologi.

c. WAN (Wide Area Network) pada era 1980-1990 an

Pada pertengahan 1980 pengguna PC mulai menggunakan modem untuk berbagi file dengan komputer lain. Hal ini dikenal sebagiai point-to-point, atau komunikasi dial-up. Konsep ini disebar oleh penggunaan komputer yang merupakan pusat dari komunikasi dalam koneksi dial-up. Komputer-komputer ini disebut bulletin boards. Para pengguna akan konek ke bulletin boards, meninggalkan dan mengambil pesan, sebagaimana upload dan download file. Kekurangan dari tipe ini adalah sangat sedikitany komunikasi langgung dan selanjutnya hanya orang-orang tertentu yang tahu mengenai bulletin board. Pembatasan lain dari bulleting board adalah satu modem per satu koneksi. Jika lima orang terhubung secara simultan, hal ini akan memerlukan lima modem terkoneksi ke lima jalur telepon terpisah.

Jumlah orang yang ingin menggunakan sistem ini berkembang, sistem ini selanjutnya tidak dapat meng-handle kebutuhan yang terus meningkat. Sebagai contoh, bayangkan jika 500 orang ingin terhubung dalam waktu yang bersamaan.

d. Internet pada era 1990 an

Dari tahun 1960-an ke tahun 1990-an Departemen Pertahanan Amerika Serikat (DoD) mengembangkan Wide-Area Networks (WANs) yang besar, dapat dihandalkan untuk militer dan alasan-alasan sains. Teknologi ini berbeda dari komunikasi point-to-point yang digunakan dalam bulletin boards. Hal ini memungkinakan beberapa komputer untuk terhubung secara bersamaan melalui beberapa jalur berbeda. Jaringan itu sendiri akan bisa membedakan bagaimana memindahkan data dari komputer satu ke komputer lain. Satu koneksi dapat digunakan untuk berhubungan dengan banyak komputer pada saat yang bersamaan. Jaringan yang diterapka DoD nantinya akan menjadi jaringan yang mendunia pada saat ini yang disebut Internet.

Read More..

Tips pencucian Cartidge PRINTER

0 comment
Tips pencucian Cartidge/PrintHead
Pernah mengalami salah mengisi tinta warna? terbalik maksudnya.. merah di isi kuning/sebaliknya. Atau hasil printer garis-garis meski sudah di cleanhead. berikut ini tips untuk mengatasinya,..

1. JANGAN pernah mencuci PRINTHEAD/CARTRIDGE dengan ALKOHOL!!!
2. JANGAN menutup lobang pengisian dengan solatip/lem tembak
3. JANGAN melakukan refill sampe meluber di printhead ato keluar dari lobang pengisian. Isi secukupnya saja
4. GUNAKAN AQUABIDES/AQUA DESTILATION yaitu larutan murni yang biasanya dipakai sebagai pencampur obat suntik, untuk melarutkan tinta dalam cartidge
5. Untuk printer canon, lepas cartridge dan teteskan aquabides sampai keluar di lobang udara/sampai busa berwarna putih
6. Untuk printer HP, lepas cartridge, suntikkan aquabides sampe penuh kemudian sedot lewat printheadnya, alat penyedot bisa beli di refill centre.
7. Untuk Epson, tekan lobang keluar tinta/klep/katup keluar kemudian suntikkan aquabidesnya....
8. Aquabides juga bisa digunakan untuk membersihkan prinhead epson, caranya : sambung suntukan dengan selang kecil seukuran klep printhead, kira2 diameter 1,5mm, isi suntukan dengan aquabides dan tancapkan ujung selang ke pin tempat tinta masuk ke printhead, suntuk perlahan sampe larutan keluar dari printhead dibawah....

Larutan Aquabides bisa diperoleh di apotik, harga 1 liternya ga sampe 10 ribu... selamat bereksperimen
Read More..

ERROR KODE CANON MP145/MP160 :

0 comment
ERROR KODE CANON MP145/MP160 :
E2-2 = tidak ada kertas (ASF)
E3-3 = Paper jam
E4 = tidak ada tinta/cartridge
E5-5 = ink cartridges tidak terpasang atau cartirdge yang terpasang salah (tidak compatibel)
E8 = absorber full, atau platen waste ink absorber full mita direset
E9 = hubungan ke digital camera / video camera tidak support
E14 = Ink cartridges whose destination are wrong
E15 = Ink cartridge tidak terpasang E16 - Ink remaining is unknown
E16 -E19 = masalah pada scan head alignment sheet
E22 = Carriage error
E23 = Paper feed error
E24 = Purge unit error (bagian cleaning head)
E25 = ASF(cam) sensor error
E26 = Internal temperature rise error
E27 = ink absorber full or platen waste ink absorber full > reset dengan toolsnya
E28 = Ink cartridge temperature rise error -
E29 = EEPROM error
E33 = Paper feed position error
E35 15 = USB Host VBUD overcurrent error - USB
E37 17 = motor driver tidak normal
E40 20 = hardware lain error
E42 22 = Scanner error

CARA MERESET WASTE INK COUNTER CANON MP160/MP145
Sebelum mereset lihat dulu pesan error yang terdapat pada lcd printer anda :
cara dibawah ini digunakan untuk memperbaiki printer yang mempunyai pesan ERROR E27 dan ERROR E8



1. Matikan printer(kabel power masih terpasang), tekan dan tahan tombol STOP/RESET kemudian tekan dan tahan tombol ON/OFF dan lepas STOP/RESET,
kemudian tekan tombol STOP/RESET 2x
2. Lepaskan kedua tombol, sekarang printer dalam posisi SERVICE MODE (pada LCD printer muncul angka"0")
3. Setelah lampu on/off berwarna hijau, silahkan tekan tombol STOP/RESET sesuai dengan petunjuk berikut:
di tekan 1x = lampu Orange nyala >untuk Service pattern print
di tekan 2x = lampu Hijau nyala >untuk EEPROM print
di tekan 3x = lampu Orange nyala >untuk EEPROM reset
di tekan 4x = Lampu Hijau Nyala >untuk Waste ink counter reset
4. Matikan printer dan cabut kabel POWER.
5. Hidupkan kembali printer anda

Read More..

Friday, December 30, 2011

Google Chrome Web Browser Security

0 comment

Since its launch three years ago, google chrome as one of the web browser service has shown a very rapid progress. Comfort, stability and security has become an important factor that makes this browser to be one competitor who won seats on the three highest order for the most widely used browser instead of Internet Explorer and Mozilla Firefox.

Although quite young, but Google chrome seems to be very serious in maintaining and improving the security of the system. Chrome also always give credit to the researchers who discovered the weaknesses in the browser to fix it and then continue on in perfected.

Recently a security researcher Christian Holler system found defects / weaknesses Out-of-bounds Writing in Chrome v8 JavaScript Engine, which means that the system can perform the writing process in place where it should be used to write. This can be exploited by attackers to execute code / program illegally.

This discovery by Christian Holler get from Google's award of $ 1000. Even this weakness in the follow up directly with improvements later in the launch in v8 JavaScript Engine version 3.5.10.24.

If at that 15.0.874.120 stable version of Chrome was released on 10 November, google fix seven flaws in the system, so now Google has released Chrome as well 15.0.874.121 Stable version for the Windows platform, Mac and Linux. This update is an improvement over previous versions of weakness identified as CVE-2011-3900 and includes high-impact defects against unauthorized activity. It is not common in the browser service that directly release the latest version with just a single fix vulnerabilities in JavaScript, but google proved to be very active attention and gave a positive response to weaknesses in browsers.

Since its launch three years ago, google chrome as one of the web browser service has shown a very rapid progress. Comfort, stability and security has become an important factor that makes this browser to be one competitor who won seats on the three highest order for the most widely used browser instead of Internet Explorer and Mozilla Firefox.

Although quite young, but Google chrome seems to be very serious in maintaining and improving the security of the system. Chrome also always give credit to the researchers who discovered the weaknesses in the browser to fix it and then continue on in perfected.

Recently a security researcher Christian Holler system found defects / weaknesses Out-of-bounds Writing in Chrome v8 JavaScript Engine, which means that the system can perform the writing process in place where it should be used to write. This can be exploited by attackers to execute code / program illegally.

This discovery by Christian Holler get from Google's award of $ 1000. Even this weakness in the follow up directly with improvements later in the launch in v8 JavaScript Engine version 3.5.10.24.

If at that 15.0.874.120 stable version of Chrome was released on 10 November, google fix seven flaws in the system, so now Google has released Chrome as well 15.0.874.121 Stable version for the Windows platform, Mac and Linux. This update is an improvement over previous versions of weakness identified as CVE-2011-3900 and includes high-impact defects against unauthorized activity. It is not common in the browser service that directly release the latest version with just a single fix vulnerabilities in JavaScript, but google proved to be very active attention and gave a positive response to weaknesses in browsers.
Read More..

Hitachi Deskstar launches 4TB Hard Drive

0 comment

To meet the increasing demands on storage capacity of desktop computers, Hitachi Global Storage Technologies has launched a new hard drive that is internal 4TB Deskstar 5K4000. Deskstar 5K4000 is a 3.5-inch drive (5400 RPM) with a 32MB cache buffer and CoolSpin technology to be able to reach the level of 2.5 bels idle acoustics. Hard drive is also supported with software that allows large storage on one disc and be able to significantly increase the size of the sector take advantage of features Advanced Format, ie, from 512 bytes to 4096 (4K) bytes.

With CoolSpin Technology ™, Deskstar 5K4000 4TB provides a remarkable blend of power efficiency and performance, making it the ideal solution for power usage about 33 percent lower compared with 3TB drives currently on the market. Besides these new products also meet the standards of the Hitachi EcoTrac ™ classification of halogen-free design and more efficient power both in the field of product design, manufacturing, operation and disposal to minimize environmental impact.

In addition to the internal disk drive, Hitachi is also launching an external version, the Deskstar 5K4000 External 4TB Touro. External version was wrapped with black textured chasing so it looks nice and sturdy, as well as using the interface plug and play USB 3.0 compatible with PC or Mac. In addition to the purchase of each unit of Touro 4TB External Deskstar 5K4000 will get a bonus of free storage in the Cloud platform for 3GB of HitachiBackup.com where users can access their data anytime and anywhere via smartphone or computer web browser. Hitachi external hard drive will be available with a capacity of 4TB, 3TB, 2TB and 1TB.

For those of you who are interested, do not rush first. Due to Both versions of the new Deskstar 5K4000 will be available early next year with each priced at $ 399.99 to $ 419.99 an internal drive and external versions for the capacity of 4TB.
Read More..

Thursday, December 29, 2011

REMnux-3 Linux distribution for Malware analysis

0 comment
A new version is distributed REMnux specifically on Linux has been released. This new tool serves to make reverse-engineering malware, including tools to perform forensic analysis on memory as well as analysis of potentially malicious PDF files.

REMnux first released last year and is the work of Lenny Zeltser, a SANS instructor and malware. Remnux designed to create an independent environment that analyzes and perform reverse-engineering malware and other malicious applications and Web sites. This file can be downloaded separately and on the run via a CD or virtual drive.

There are two new features on the new REMnux in this release of Origami Framework, which can be used to analyze PDF files are dangerous. And the second is a Volatility Framework is to perform forensic analysis on memory. In addition to these features, REMnux version 3 is also equipped with other features.

Some of them are:
- For network analysis: NetworkMiner, ngrep, pdnstool
- Analysis PDF: PDF X-Ray Lite (pdfxray_lite and swf_mastah), peepdf
- Analysis of JavaScript: Chrome JavaScript engine (D8), js-Beautify, and to
- Examining file: Hachoir (hachoir-subfile, hachoir-metadata, hachoir-urwid), pyew, densityscout, findaes.

In the latest version of this REMnux also include a user manual that gives some pointers on how to get started and supporting commands to run the operation.
Read More..

HP Releases Firmware Update to Prevent Unauthorized Access

0 comment

After the Columbia University researchers Ang Cui and Salvatore Stolfo found a vulnerability in HP LaserJet printers that can allow a hacker to remotely control to launch cyber attacks, steal information and within a few possibilities can even destroy the device, HP finally released a firmware update as a precautionary measure which is expected to reduce the problem.

In a statement issued by the company, HP said that: "HP has built a firmware update to reduce this problem and establish proactive communication with customers and partners. So far there are no customers who reported unauthorized access to the HP device that is used. "

"HP reaffirms recommendation to perform actions according to the recommended procedure for securing the device by placing printers behind a firewall and, if possible, disable the remote firmware uploads on the printer."

While this all may go well, the problem is demonstrated again by investigators in November has caused much controversy. Some even sued the company for not warning their customers that there is vulnerability, especially since previous reports indicate that the level of security with a high risk exists in the printer.

At a moment of weakness it found a lot of debate that emerged about the circumstances in which attacks can be successfully launched and HP had to face much criticism, even from trusted security experts such as Mikko Hypponen. "First of all, how does HP do not have a signature or a certificate showing that the new firmware is the original firmware from HP?" Hypponen said.

Meanwhile, customers who depend on the model of LaserJet printers that have the vulnerability to attack immediately advised to upgrade the firmware on the device to prevent possible adverse incident.

Although HP does not report attacks that use vulnerabilities, but we never know what might have been designed or prepared by the criminals in cyberspace during this period. Also recommended to follow the instructions given by the company in Secure Printing and Imaging section to ensure you are protected in case of other bugs have also been found as a zero-day.
Read More..

 
Copyright 2011 @ MORE ADVANCED!