Friday, December 31, 2010

Go figure educated


Learning is a process toward something better. In this case each individual has the patience of a different self. Learning knows no age. Both young and old, semuany amemiliki great opportunity to learn. Talk about learning must also mrmbahas about education. New-bari have a statement that the national education department succeeded in reducing the number of illiterate population. From last year gjumlah yan, reaching 15.4 million people, this year fell to 9.76 people, quite sad indeed our country independence 65 years ago but still impressed pemberabtasan illiterate slow. Could there be education sisitem wrong here?

Wednesday, December 29, 2010

Definition of Beauty

Who among us who do not like beauty or aesthetic values? Every human being has the tendency to present the beauty in life.
It can be observed in our daily lives. Clothes that we found, interior and exterior of our homes, our workplaces, the book covers the scientific literature, as well as readings of pop, all kinds of magazines, colleges, places of worship, places of recreation, all arranged with a touch of beauty. Teta city, lighting, culinary, fashion, haircuts, wajahpun, displayed with a certain aesthetic taste. It feels less prestigious price ourselves out of life when we just mengandalakan function, but completely ignored taste and beauty.
Keindahah for humans, is an important sangnat, ayng shows that humans had a feeling smooth, soft, and appreciate quality. The high artistic taste soak someone in beautiful works, in turn, will provide a positive influence on emotional behavior and moral attitudes.

Monday, December 27, 2010

Creating Productive PowerPoint Presentations With Powerpoint Projector

Projectors are acclimated by alignment bodies and academy acceptance additionally as agents for presentation purposes. Accept you anytime abounding any academy or symposium? If so, you'll

be acquainted about the purpose and use of presentation projectors. It's the actual best adjustment to advise or adviser abounding bodies in advanced of you. Additionally, it's broadly activated by

human advantageous ability departments to alternation their workers. So you can say that a abundant top affection presentation projector plays an analytical role in accretion acquirement of your

Sunday, December 26, 2010

How do I start blogging and making money?

You should really need three things to successfully create a blog and start making money.
First: you must already have a blog,
Second: some traffic
Third: you have to blog Google PageRank.
After this you are ready inruk earn money! So, how do you start it?

Friday, December 24, 2010

Young Children Need It What's New

Young people always want to try new things, to satisfy curiosity and curiosity when they begin to taste freedom.

In the growth period from childhood to adolescence, a person will receive and store information about various things, whether the source of the parents, the social environment, as well as the media, whether that is a positive, or negative.

The media itself has developed very rapidly, especially when the technology of global networks like the Internet increasingly visible penetration, and the easier access it in Indonesia. All this of course also the stuff of children through adolescence with a massive amount of information.

Believe You Can

Remember when you were a child, and trying to learn to walk. I'm sure you have something like this:
First you must learn to stand up: a process involving the entire body, then fell back on his feet. You sometimes laugh and smile, but the next time you cried and grimaced as pain. Whether, as there is determination and belief in yourself that you will succeed, whatever and however. You have your inner motivations
After much practice you finally understand how to balance yourself, a requirement for the next kejenjang. You enjoy it and as if a new power, a new motivation. You will stand where you like - at your place, on the couch, in the lap of your mother, your father, or even a person. It is an exciting time - you do it! You can control yourself. You smile and laugh funny, satisfied with your success. Now - the next step - running. You see others do it - it keliatannya not too difficult - just move your feet when you stand up, right?

Tuesday, December 21, 2010

Make My Own Website...I Can Do It & So Can You!

"Make My Own Website" series of articles will discuss the steps, software and services necessary for you, the individual internet user, to quickly establish an online presence. This series is intended to tear down the mythical barriers and misconceptions that creating a website can be exceedingly complicated, time consuming or even expensive. By the time you complete this series, you will have all the knowledge you need to make your own site and publish it.And with the foundation laid down in this series,

TIS-FWTK Kerberos and Authentication Server

Kerberos is one of the works of Athena project, a collaboration between MIT, IBM and DEC. Kerberos was designed for supporting autentisasi and encryption of data in a distributed environment through modification of standards of client or server. Some operating system vendors have included Kerberos into their products. MIT itself provides for free many versions of Unix that has been in-Kerberizing. Even for the interests ported to the operating system or client-server software that does not support Kerberos, MIT provides its source-code, also is free. Project Athena Kerberos itself implement in many applications such as NFS, rlogin, email, and system passwords. Secure RPC (Sun Microsystems) also implements the same thing.

ENCRYPTION AND Cryptography

Cryptography has evolved a long time, when people want information that he sent not to 'read' by parties not interested. Traditionally known as the two mechanisms cryptography, private key or public key. DES (data encryption standard) used by Kerberos to use private-key system. RSA (Rivest Shamir Addleman) implement public-key system. One of the contributors RSA, Ron Rivest and then make MD4 (message digest function # 4) which is used by S / Key his TIS-FWTK. Optimization and crossbreed between the two traditional methods are giving birth PGP (Pretty Good Privacy). Discussion of the DES, RSA, or PGP is a separate book and not in place is disclosed here. But clearly,

MECHANISM AUTENTISASI

Subject autentisasi is proof. Evidenced includes three categories: something about us (something you are lignin), something we know (something you know SYK), and something that we have (something you have SYH). Lignin is closely related to the field of biometrics, such as examination-finger prints, retinal eye examination, voice analysis, etc.. SYK is identical with the password. As for SYH commonly used identity cards such as smartcard.
Perhaps, that is still widely used is air-password system. To avoid password theft and illegal use of the system, it is sensible to our network system equipped with a disposable passwords. How can the application of this method?

RISK-SECURITY SERVICE INBOUND

Why should autentisasi ... ..? The Internet is a public network, and is open to everyone all over the world to join. Once the size of this network, have caused profits and losses. Often we hear and read about bobolnya bank financial computer systems, the Pentagon classified information or data bases students' academic transcripts. The sentence is adequate to represent the statement that we should be 'vigilant' against those 'evil' and always try to minimize the possibility for them to be able to perform his evil intentions. It's easy to exclude the possibility of infiltration (illegal access) from the outside by closing all inbound traffic channel service to the internal network. But this means has reduced the main advantages of the network: communication and the use of shared resources (sharing resources). Thus, a natural consequence with a large enough network, is to accept and try to minimize this risk, not destroy.

Trusting Password: Network Authentication

Aspects of network security is closely related to the services provided: inbound or outbound. Security on outbound service can be best pursued with firewall configuration. Similarly, with anonymous access inbound servicing, such as anonymous FTP, HTTP, Gopher, etc.. In this case, intentionally provided information for everyone. Another case when we want to provide a non-anonymous access (or authenticated services), where other than through a firewall, someone who is requesting access must also get a 'permission' server after first proving his identity. This is the authentication. Henceforth, the author uses the term autentisasi as synonyms of the word.

Monday, December 20, 2010

how to repair a damaged hard drive

In layman may be difficult to fix, but technically the damaged hard drive can be repaired, depending on the level of damage. Little story about the hard drive I divide the disk into 4 levels, is based on research and my own experience over the handling damage to the hard disk. Level 1 Damage that occurred at this level usually caused Bad sectors. To handle this there are several ways and variations of the experiment, adjusted to the hard drive brand and the number of bad sectors.* For the initial handler can use the command FORMAT C: / C (adjust the drive which will be formatted). / C is used to cluster mebersihkan who damaged. * The second step, if not managed can use the Disk Manager program from each hard drive manufacturer. * If not successful you also can use the software HDDREG,

Wednesday, December 15, 2010

Network Types


LAN (Local Area Network)
Is a privately owned network within a building or campus-sized to several kilometers.
MAN (Metropolitan Area Network)
Is a LAN version of the larger size using the same technology with a LAN. MAN can support voice, data and even may be associated with cable TV network. MAN includes companies which were located close together in one city.