Tutorial Installing Dual Boot Linux Windows for Beginners
If you want to Dual Boot Linux and Windows, make sure Windows is first installed in the computer. PCLINUX 3D OS allows you to install Linux in point n 'click from the beginning until the end of the installation, so that the installation process is easier to do.
Next step-by-step process of installing Linux Windows Dual Boot using the 3D OS:
1. Boot the computer with the Live CD / DVD 3D OS.
2. After entering your desktop, click the Install icon 3D OS to start the installation process. If you log in as a guest, a dialog box will appear asking root password for the user. Password for root is root.
3. The screen appears. Click the Next button to start the installation process.
4. Select the type of hard disk and then click Next.
5. If the computer has Windows installed, use one of the following options:
* Remove Windows: to remove the Windows partition and replace it with Linux
* Use free space on Windows: to create a Linux partition of the remaining space on the Windows partition. Use this option if you want to Dual Boot Windows and Linux.
* Custom disk particionisanje: to determine its own hard disk partition option
6. Specify the size of the partition that will be used for Linux.
7. Warning screen appears on the screen that you will create a Linux partition. Click the Next button to continue.
Here until you have successfully create a Linux partition of the remaining space on the Windows partition. To continue to the next, follow the instructions for Linux Installation Tutorial beginner.
Minggu, 22 Maret 2009
Dual Boot Linux Windows
Kamis, 19 Maret 2009
Install Mikrotik Router OS and configuration
Mikrotik can be used in 2 types, namely in the form of hardware and software. In the form of hardware, Mikrotik usually already installed on a particular board, while in the form of software, Mikrotik is a Linux distribution that is devoted to the router.
Mikrotik routerOS is the operating system and software that can be used to make the ordinary into the router computer network reliability, includes many features that are built to the network ip and wireless networks.
These features are: Firewall & Nat, Routing, Hotspot, Point to Point Tunneling Protocol, DNS server, DHCP Server, Hotspot, and many more other features.
Computers will be used as a network router with the specification is quite moderate, in the place where I work, Mikrotik used on cpu Pentium III 800 Mhz, 512 mb RAM and 10 GB hdd and hotspot as a firewall server to serve approximately 150 users.
Here is a step-step installation Mikrotik routerOS
Previous prepare first installation cd miktorik, if ya do not have a loan please search or download the ISO file first Mikrotik here. After the cd is ready to enter the cdrom and boot from cd do.
make sure the computer that will be have at least one ethernet card.
After the booting process is finished it will show the view below (click for a clearer picture):
Display options above is the packages that will be installed, press' a 'to install everything and forward by pressing the' I 'to continue the installation process.
Proceed with the installation process of making a partition and format hard disk, please note that Mikrotik will take all the space on the hard disk. therefore not recommended for installing Mikrotik on disk that contains the operational data-important data such as mp3 or avi file may pity you. (lho kok important operational data mp3 and avi .. do not do:-D)
After creating the partition and then format the hard drive is the last stage of installing the packages selected in the beginning before the hard disk. after press enter to reboot.
Mikrotik just download and install the shareware version is that can only be temporary and will be able to do more when registration first, but do not worry, this version is enough to be used to learn how.
Mikrotik has finished in the install, and can be used with the user login as admin and no password.
Next is a network settings, for example Mikrotik will be given the ip address 192.168.202.1 with netmask 255.255.255.0.
For that type the following command on the console
/ ip address add address = 192.168.202.1 broadcast network = 192168202255 = 192.168.202.0 netmask = 255.255.255.0 interface = ether1
Well now it is Mikrotik diremote with both telnet and with Winbox. Winbox is a utility to perform a remote server to Mikrotik us in GUI mode.
To get winbox, open a browser and navigate to http://192.168.202.1/winbox/winbox.exe
Here is a screenshot of winbox
Therefore step-step installation Mikrotik can I submit, we go to the next stage configurasinya.
Because it is too long and I made the downloaded files, please download configurasi you with a variety of basic commands that apply in the Mikrotik RouterOS.
Jumat, 13 Maret 2009
The development of the TECHNOLOGY OF COMMUNICATION AND COMPUTER INDUSTRY TREND
In 1980 there were still many among us in Indonesia, which has not be a computer, so that at the time we have been very proud if using electronic typewriter. 1987, we began to recognize the computer pro-processor 286, which for menghidupkannya still using DOS diskette. In addition, the operating system at the time msih not open system, so the PC system can not communicate with other systems, namely Mac.Untuk send files to a different city, we still need a postal or courier services. 1990, the Indonesians with bangganya menenteng electronic organizer bermemori 2 MB to be able to be called technology.
Currently, computer technology has developed so rapidly. In the computer market has been up to the computer technology berprosesor Pentium IV with 2 gz up to speed and 1.5 GB memory. People can also easily communicate and exchange information in spite of any computer operating system is different, because now the operating system is open system. To send files, as easy as clicking a program. Function of the post office to send a letter starting reduced role. Now where is replaced by electronic organizer PDA (Personnel Digital Assistenat), or Pocket PC with 64 MB of memory to the operating system and PalmOS or Windows Pockect PC 2002, which was launched October 2001 ago. With the mobility of the presence of PDA is now no longer a hindrance to communicate and access information on the internet, would also perform activities such as typing or creating the spread sheet calculation.
The same happens with the technology of communication (telephone). Year 1977, the mobile phone is still jinjing bag. Now the size and capabilities of the mobile phone has jumped far. The size of the mobile phone is now very small and equipped with new technology such as Blue Tooth and GPRS. Phone calls like this combined with a PDA, is able to bring their owners to the virtual world easily, without having to plug-plug cable. Plans also call more and more, in 1975 we only know for Telkom phone home and AMPS technology for mobile phone. Now we have more options such as Telkom, Ratelindo, C4, AMPS, GMS 900, CDMA, GMS 1800, and PSN (satellite phone). For international connections also available alternatives that are far cheaper on the internet through VOIP.
Above trend would not be berimbas on the development of the retail industry in the country. Retailers need to look in this trend, so that at a later time can maximize the opportunity to take advantage of most of the trend going. Let's see what the trend will accompany the development of this technology.
e-Retailing
"The internet is like a weapon sitting on the table, ready to be picked by either you or your competitors" the advice given by Michael Dell, founder of Dell Computer .. Currently the number of internet users in Indonesia, a new, approximately 1% of the population, or approximately two million people. Despite any way in the future this number will continue to increase. So it does not say if any trend in the blue chip of the future is non-store Retailing over the Internet, known as e-Retailing, e-tailing or e-Commerce B2C.
See the experience in the United States, a survey of Boston Consulting Group (BCG), shows that in 2000, e-Retailing grow with the rate 120% and reached sales of 33 billion USD. In the year 2001 is estimated to grow 85% with sales reaching 61 billion USD (Retailernews.com, Feb 2001).
What is the appropriate product sold through the internet? Products penjualanya supported by impulse buying no brand or product characteristics are determined by the evaluation organoleptik (faculty evaluation of shape, texture, color, taste, and smell), will not be successful if sold via e-Retailing. Product that is suitable for marketed products over the Internet is rational. This means that the product should be sold a product that is easily described, has a high brand loyalty or brand has been so recognized by the target buyers, such as books, computer, camera, appliances, office equipment, beauty products, clothing and health products. BCG's research shows that categories such as computers, books, cars, beauty products and health category is the most rapid growth in internet sales. For food products and toiletries, only brands that are most commonly consumed that may be successfully sold on e-tailing. While for fresh products such as meat, fish and fruit is still difficult to be marketed through e-tailing as a consumer purchase behavior is very typical for these products. To buy the product the buyer needs a fresh look, touch and smell around first before you make a purchase.
Supported by the development of PDA technology, barcoding and mobile phone calls, e-tailing of the future will be very much different from the practice of going this sat. On the future of shopping will be a short, simple, and practical. We can order the product through a PDA / mobile phone equipped with a barcode scanner, pay with an ATM or credit card on-line. I-Home technology which was developed by Cisco Systems, and even able to make our refrigerator order goods directly to the supermarket, if the stock of goods in stock below the minimum we set. Then we can take orders or direct transfer via delivery service.
Barcoding Shopping
In addition to shopping on the internet, of course in the future we can still shop directly to supermarkets. However, the supermarket of the future will be far different from the supermarkets that have at this time. If we now choose the goods and ask cashier scan its barcode, and in the future we scan your own items that we want with the handheld terminal or a PDA that stores we have. Then put in the special Trolley equipped with barcode reading technology, such as blue tooth. If the goods have not been in-scan, the alarm will ring at the Trolley, a reminder to menscannya first. Total price of goods that have been scanned can be paid via ATM or credit card on line through a PDA or hand phone. Then we go directly to the exit and take the receipt incase shopping.
Stores may no longer require cashier or cash register. The cashier should start thinking to find new jobs! With technology like this store will operate more effisien, and able to better control the shrinkage. Now, as this technology is being developed by Wal-Mart along with Symbol Technologies.
Possible with the technology over the wireless LAN technology and barcoding technology developed by Barpoint.com cooperation with the Palm Pilot, Technology and the CueCat's CueCat.com deBarcode.com. At this time as this technology is being developed by the Radio Shack in the U.S. and the CueCat. For example, if we went to Radio Shack outlets, we will be given a free CueCat unit for connection to a PC unit in the house. With this tool we can scan the barcode from the product listed in the catalog or magazine ad Radio Shack, for the next Internet browser will load profile data products via a PC. If interested, we can directly memesannya on line. And goods will be immediately sent to our house.
In the future the seller (store clerk) can be replaced by the animated figure, with a sprightly and no tired all the questions potential buyers through a computer station that is installed in the shop area. So do not surprised if in the future we are served by Lara Crox, when shopping in supermarkets.
e-Price Comparation
The development of e-technology and e-Retailing barcoding, will encourage the development of cyber price survey. Through services such as this, if you want to know or compare prices in the market, consumers can easily access a particular site and obtain information. The information provided can be Barang Name, Barcode Number, Manufacturer Name, Barang Specifications, Prices and retailers in the A, B or retailers at other retailers that are required.
With technology like this will be more market mechanisms effisien. Consumers will be more easy to determine, where retailers are cheaper and are more expensive. If you do not have a significant added value, do not hope that retailers can attract the hearts of potential customers. The future is clear that retailers need the extra hard mengeffisiensikan operating system and system of supply chainsnya if you want to succeed. Eliminate in-effisiensi in the supply chain, reduce the number of suppliers for one of the same product 25% each year, provide to the Empowerment three best non-family members to manage the business, Keep the cousin of our efforts, rekruit people who have the integration, and give them a salary and benefit satisfaction. Without it ... goodbye! And safely join in the world under dog!
Quick and efficient Customer Response (QECR)
Trend is going to happen next with diserapnya IT development to India is in the process of implementation of QECR logistics and distribution of goods by retailers. QECR main principle is the use of technology to improve effisiensi and speed of response from retailers to the market demand, thus the development of computer technology and communication would be great to QECR. When this system Manufacture, distributors and retailers is a system of three separate and closed. In the future this system to be three to one, because demand is higher effisiensi.
While this practice QECR growing rapidly in Europe, especially in the UK. Tesco QECR through the implementation of, for example, is able to reduce stock levels in their chain of 46 days in 1978 to only around 17 days in 1997. If interested to apply QECR, the implementation of the two base QECR following must be met first, namely:
Trust between the component supply chain demand (demand chains).
Win-win relationship between retailers with suppliers.
Without dipenuhinya both the above please do not QECR implementation will be successful. Then to ensure the success of the implementation of QRCR the focus should be directed to the management of the following:
Application of micro merchandising.
Implementation of interface in multi-supplier relations retailers.
There are monitoring systems PLC (Product Life cycles).
The implementation of category management.
Product replenishment of effisien.
Maximize the application of the technology.
Implemantasi QECR by retail will become a competitive advantage in the future, sepandan with the large investment that must be ditanamkan by the company. Wal-Mart for example, embed investment worth 2.4 million USD in 1983 only to buy the technology via satellite communications to improve effisiensi distribution and logistiknya. At the beginning, Sam Walton, the founder, was reluctant to remove the funds only for the computerization. But he finally succumb to the pressure of the top managernya like David Glass, Jack Shewmaker and Ron Mayer. Investasai first two years this show has not been results. But eventually the investment is recognized as one of the factors determines the success of Wal-Mart at this time. So Wal-Mart is able to merge their system with the system suppliernya. Thus they are able to buy the cheaper price, plus the cost of logistics & distribution of a more effisien No wonder if they can prove that if shopping at the Wal-Mart ... Every Day Low Price! Now Wal-Mart is the biggest retailers in the omzet in the world. All of achievement that is not free, the total investment Wal-Mart at the time to buy computer technology and satellite communications to reach nearly 700 million USD.
This is a brisk awareness of Manufacture (suppliers) to participate in improving the technology and computerization komunikasinya. With the efforts so that two parties,. retailers, suppliers; To share technology to improve their investment costs expected to be cheaper. Example collaboration retailers Manufacture-in program supply chain integration, for example, between Wal-Mart and P & G. Manufacture for example, Nestle, the system supply chains based internet. Nestle infuse USD 1.8 billion to develop the system. Previous Nestle have 5 e-mail system and 20 versions of accounting software, with this new system, Nestle began to move toward the use of one software package. Nestle database using a single product code, so that buyers Nestle products in one country can buy the same product Nestle's division in other countries. Nestle disentarlisasikan entire database in 6 data centers, and can be accessed via the Internet. Nestle also can know how many purchases made by one account, the process of negotiation conducted tersentalisasi, thereby providing a greater volume per one purchase order, so more effisien. Purchase a cross-country to be more easily coordinated.
Non-store Retailing QECR and through the internet is a trend in the blue chip of the future in Indonesia. The progress of computer and communication technology will accelerate the growth of e-Retailing and the implementation of practices QECR. Many opportunities for savings that can be taken. The implication, if you want to join in the system, so retailers need to evaluate whether the systems and infrastructure to support the dimiliknya that, if not, it's time now to prepare for this, or too late at all.
Sharing Learning Computer PC to PC
I am a beginner to networking, now I have 2 computers. to share between computers (pc to pc) can be blutooth, wireless, or cable lan. I try to link pc to pc with lan cable. nah I started from setting lan cable:
Step cable lan settings:
1. Prepare a long kabeln lan to share secukupnya pc to pc, Tang Crimping, RJ45
2. Cut the cable to the skin color of all the plasticity
3. Then set the color model with the Cross: (PutihOrange Orange PutihHijau Blue PutihBiru Green PutihCokelat Cokelat) - (PutihHijau Green PutihOrange Blue PuihBiru Orange PutihCokelat Cokelat)
4. Justify ago after all the organized, catch the cable with RJ45
Once the cable is ready, set the Operating System (the author pirated Windows SP2). Steps for setting windowsnya:
1. Select Control Panel -> Network Connections -> Set up home or small office network
2. Open the windows, select Trus Next2 aja, your live set Workgoup (workgroup name must be the same in the pc that will be interconnected). Settingan such as the computer name (free), the printer will be shared or not.
3. Set IP second computer, Select Control Panel -> Network Connections -> Local Area Network (terkonkesi a) Right-click on Local Area Network select Status -> Properties -> Internet Protocol (TCP / IP) -> Properties. you arranged to use IP in the same class. Eg: PC 1 IP: 192.168.0.1 Subnetmask: 255.255.255.0 - IP PC 2: 192.168.0.2 Subnetmask: 255.255.255.0
4. So that Windows XP can melakasanakan changes before, then you must restart Windows XP
good luck!
Adding RAM to the Flashdisk
Random Access Memory (RAM) is used to hold data temporarily in the computer. The more applications that we open, the more RAM is also used. There are ways to add RAM to take advantage of the flash (data storage), with additional software (application) eBooster.exe, we can increase our RAM without having to buy new RAM.
We often use the computer, because asyiknya, we open Microsoft Word and Excel, PowerPoint, Access, plus AdobePhotoShop, CorelDraw. Then we want to Winamp to listen to the music. But suddenly we hang the computer, Alias dead. Why is this happening?
Because the capacity of RAM is exhausted, RAM (Random Access Memory) commonly used to store data in computers. This means the data can only be viewed on screen, but we have not saved to storage media, such as Hardisk, flash, CD Room, and so forth.
The more applications that we open in our computer, the more likely that we use the RAM. As an illustration of RAM as follows. Eg in the computer we installed RAM with a capacity of 512 Mb. Each application will be open that we need RAM, or easily open each individual application we then have a supply of RAM will be reduced.
For instance, for example, if we open a Microsoft Word, Microsoft Word will then need temporary memory (RAM) of 300 Mb (not the actual data, because I had not need Microsoft Word to measure how much memory to be able to walk), the supply of RAM that is live ( 512-300 = 212 Mb). If we reopen the application can not be more than 212 Mb, if the application dibukan exceeds 212 Mb, eg Microsoft Excel memory required is 300 MB, the computer will Hang (OVER CLOCK), because the memory requirement for running the program is not enough.
To increase the capacity of RAM is usually we need to purchase additional RAM, to be larger.
However, the material in this time we will increase the capacity of RAM with FLASHDISK, with the argument, that can work double-flash can be used for RAM can also save data. The greater capacity of flash, then the larger the RAM, which you can add.
We need software eBooster.exe,
Disassemble's Invisible on Yahoo Messenger
Message is a cheap means for us berkomunisi with other people. We can write us at will without limit. We only get charged for internet connection only. Yahoo Messenger (YM) is one of the message of the most widely used user. Almost every person who interacts with the internet, it will recognize YM.
Sometimes, with the various arguments, there are some people (user YM) the OL, continue to change their status to become Invisible (not visible). Reasoned that even though there does not appear by the A, so that not many asked. Or also look cool though, so that we can greet people in the state in the YM is not our friend Online.Materi this time, try to discuss how to check the status of friend we are Offline or-kah are hiding alias Invisible
Stattus Yahoo! Messenger
Many states used in the YM. As shown by the image below:
Little description YM status is as follows:
- Available, indicates that the user is in the OL, and be able to
invited communication
If the user status below the user is online but is rather difficult to
invited communication (message)
- Busy, show online user is busy and can not be disturbed
- Stepped Out, menujukkan online user but that are out
- Be Right Back, shows that the user online and back in a minute
- Not at My Desk, shows that the user does not have in front of the computer
- On the phone, show the user online Phonesell
Sometimes even though we are using the status of the above but there is also a friend
disrupt the mem-buzz, and others. Because of the use status
last, namely:
- Invisible to Everyone, shows that the user is online, but invisible
like not online (offline)
Invisible's nearly the same as the status of Offline. Only difference is invisible user online
but not visible, are not being Online is Online
Chek user Offfflliine attau IInviisiiblle
There is a website which can be used to check the status of Yahoo Messenger.
The steps are as follows:
Http://vizgin.com/ open website, and will show the view website
Pictures such as below:
Then enter the Id of YM that we want to know their status, for example, we want to
know id YM: imong_revol is offline or invisible,
After entering Id YM; such as the image above and press Enter on
keyboard, wait a few seconds then will we know the status of the Id: imong_revol
Kamis, 12 Maret 2009
Setting Mikrotik Wireless Bridge
Often, we want to use Mikrotik Wireless solution for point to point mode with the network bridge (not routing). However, Mikrotik RouterOS is designed to work with its own very well in routing mode. We need to do some things so that the wireless link we can work to bridge mode.
Bridge mode allows the network to the one incorporated in the network side only in a transparent, without routing through, so the engine is in the network that one can have the IP Address 1 in the same subnet with the other.
However, if the wireless network we have is big enough, this mode will create a bridge wireless traffic increased, considering that there will be many broadcast traffic from one network to another network. For a network that is large enough, I recommend using routing mode.
Here is a diagram of the network will be set.
Configuring the Access Point
1. Create a bridge interface the new name bridge1
2. Enter the ethernet interface to the bridge
3. Enter the IP Address on the interface bridge1
4. Next is a wireless interface settings. Click on the Wireless (1), choose the tab interface (2) and double click on the wireless interface name that will be used (3). Choose AP-bridge mode (4), tentukanlah SSID (5), the band 2.4GHz-B / G (6), and frequency that will be used (7). Do not forget to activate the default authenticated (8) and the default forward (9). Then aktifkankanlah wireless interface (10) and click OK (11).
5. Next is a WDS configuration on the wireless interface is used. Re-open the wireless configuration steps as above, choose the tab WDS (1). Tentukanlah dynamic WDS Mode (2) and choose the bridge for WDS interface is (3). Then press the OK button.
6. The next step is to add a virtual interface WDS. Add new WDS interface as in the picture, then choose the wireless interface that we use for this WDS. Then press OK.
7. If the WDS was added, then the WDS interface will look like new in the picture below.
Configuring the Wireless Station
Configuring the wireless station is almost the same as the steps above, except on the steps and enter the IP Address configuration wirelessnya. In the station configuration, the mode is station-wds, frequency need not be specified, but must determine the scan-list in which the frequency of the access point entry in the scan list. For example, the access point we determine the frequency of 2412, the write scan-list 2400-2500
Check link
If the wireless link that we created is working well, then on the wireless menu, will show the status of R (see picture below).
In addition, mac-address of the connected wireless also can be seen on the registration window (see picture below).
Configuring wireless network security
On Mikrotik, most easy way to maintain network security is to register the mac-address pair in the wireless access list. This must be done on the access point and on the client side. If penginputan access-list has been made, the default features matikanlah authenticated on the wireless, then the other wireless mac addressnya not registered will not be able to connect to our network.
If we want security features better, we can also use the WEP encryption and WPA.