Perkembangan Technical Computer diDalam Zaman Globalisasi ni Sangat Berkembang dengan Pesat. Oleh karena itu Technical Computer Banyak Menguntungkan didalam Bidang Apapun. maka Technical Computer sangat Penting
Sambutan
Sponsor Iklan
Kamis, 13 Januari 2011
Youtube Bisa Menampilkan Kualitas Video 4 Kali Lipat Resolusi Full HD
Kualitas 4K ini merupakan kualitas video terbaik yang tersedia. Dengan 4K ini ada batasan yang harus dilewati, yaitu kamera video yang mampu memproduksinya tidaklah murah, proyektor yang mampu menampilkan dalam 4K juga biasanya berukuran besar, dan terakhir, untuk menikmati video 4K di Youtube memerlukan koneksi internet super cepat!
Selasa, 11 Januari 2011
Mozilla Firefox Ungguli Microsoft Internet Explorer
Mozilla Firefox telah menggantikan Microsoft Internet Explorer sebagai web browser paling populer di Eropa. Seperti dilaporkan Daily Mail, browser open source itu mengambil 38.1 persen pangsa pasar di seluruh benua itu pada bulan Desember 2009 lalu, sementara Internet Explorer tergelincir menjadi 37.5 persen.
Google Chrome di posisi ketiga dengan 14.6 persen, setahun lalu Chrome hanya meraih 5.1 persen pasar. Aodhan Cullen, pimpinan eksekutif dari StatCounter, perusahaan web yang menyusun daftar itu mengatakan bahwa Google Chrome mencuri pangsa pasar internet Explorer sementara Firefox tetap menjaga sharenya.
Pada bulan Desember 2009, pembuat kebijakan Uni eropa menerima tawaran Microsoft untuk memberi pelanggan akses yang lebih baik kepada browser pesaingnya. Sejak permulaan bulan Maret 2010, Microsoft menawari warga Eropa pilihan untuk memilih dari sekitar 12 browser dilebih dari 100 juta PC lawas dan baru yang menggunakan piranti lunak Windowsnya. Secara global, Internet Explorer masih memimpin atas pesaing-pesaingnya.
Pangsa pasarnya turun menjadi 46.9 persen di bulan Desember, sementara itu Firefox berada pada 30.8 persen dan Google berada pada 14.9 persen, ungkap StatCounter.
Kamis, 06 Januari 2011
Software Download Site
How do you generate revenue with this type of business? Since these sites receive such high volumes of traffic, you provide businesses with an excellent online advertising opportunity. You can sell banner advertisements on pages throughout your site. If you decide to launch a mailing list, you can also sell advertisements in the body of the mailing list message. Since your site will receive so many visitors, you will be able to generate maximum exposure for your advertisers' products and services; thus you will be able to generate a tremendous amount of revenue for your business.
There are several things that you have to remember when launching a software download site. It is very important that you ensure that the server that you're hosting your site on has high-speed access. If it takes a long time to download software from your site, visitors will be dissatisfied. This will also turn away potential advertisers from your Web site. This can be avoided if your host has a state-of-the-art server with lots of capacity and a high-speed connection. To keep your software download site fresh, you should try to update your site on a regular basis. Consider having a ‘What's New' page on your site. You could ask visitors if they would like to be notified via e-mail when you have made updates to your site. This would be a great way to generate repeat traffic to your site.
Advertisers are going to want to purchase ads on your site for one reason - exposure. This can't happen unless your site receives high volumes of traffic. To ensure that this happens, you are going to have to do whatever you can to promote your business online and offline.
Online marketing techniques
• Launch a strategic banner advertising campaign on Web sites frequented by your target market. These sites should relate to software, programming, or technology in general.
• You could hold a weekly or monthly contest on your Web site for a free full version of a product offered by one of your regular program providers. The programmer or business donating the product could be your Featured Designer. You could ask people if they would like to be notified of the winner via e-mail. This e-mail will encourage them to return to your site to re-enter your contest, thus re-exposing them to your site. • Develop as many links as possible from Web sites, directories, and metaindexes related to your target market. These sites should relate to software design, development, programming, or technology in general. There are also thousands of "free stuff" sites online. It would be very appropriate for your site to be listed on all of these sites.
• You should develop a ‘What's New' page for your site. Here you could feature the newest software uploaded to your site. You could ask people if they would like to be notified via e-mail when you update your ‘What's New' page. This will encourage them to return to your site.
How to make money for reading and sending SMS
How does the affiliate program for your mobile?
When the market for mobile phones spread rapidly around the world, including in many countries, mobile operators seeking to recover their popular products, such as supplies, bid prices for ringtones, wallpapers and much more. In addition, cell phone companies, there are other companies who also want to advertise their products and services for mobile marketing. They need people to act as affiliates to promote their products. When a company or a mobile service provider to launch a new product, they need marketing to ensure that the product gains popularity due to their people. These companies usually send SMS marketing campaigns and e-mails. By joining an affiliate of these companies, you can earn money by advertising products to other
Mobile Affiliate Marketing is like any other program that has paid the premium partner. This program is similar to the CPC (cost per click), such as Google Adsense, which the subsidiaries are the percentage of revenue from the advertiser, for example, 10% or 20%. In affiliate marketing mobile, you can usually get a 10% to 40% of the revenues earned by Corporation responsible for the promotion of products. Payments will be made via PayPal, AlertPay or Check when you reach the minimum payment threshold.
How to Become a Mobile affiliate programs?
Anyone can become a subsidiary of Mobile and is free to join in almost all sites. When you join the programs, you get advertising links that are promoted through a mobile phone or email. You can advertise your products to anyone, friends, relatives, colleagues, or literally anyone in the world.
Affiliate marketing can make your mobile SMS or mobile campaign by displaying ads on your website. You can advertise blogs, online forums or social networking sites like Facebook, Twitter, etc.
onlinemoney.jpg&h=180&w=400&zc=1
Some popular programs Mobile Affiliation:
www.t-mobile.com
www.mginger.com
www.virginmobile.com
www.mobileaffiliateprograms.com
www.handango.com
www.celltradeusa.com
For more information about Mobile functioning or need Mobile stuffs visit our site:http://mobilezstuff.blogspot.com
No More Boring Music Background!
Here with us Wait on Hold, you will surely get to have the right service your company needs when it comes to unique on hold messaging. If you will let us handle your on hold messaging then we assure you that we will keep your customers and callers entertained and informed through our unique on hold messaging prompt voices and music background. You can even cross sell your products through this service! Now isn't that a great way to make your business flourish?
With Wait on Hold you can surely boost your company's image with this simple but unique on hold messaging! Just imagine you can actually personalized the messages you want your callers to hear while they are put on hold, get to choose the voice you want to use on your directive voice prompts (men or women's voice) and you can even get to choose your own music background! We are the only on hold messaging service around the net that would help you make and keep your callers entertained and informed at the same time while they are put on hold.
All you have to do is to get a quote from us and voila! You will get your personalized on hold messaging service that will surely boost your company's image! This will surely increase the numbers of your customers and clients in no time at all! So what are you waiting for? Call us and avail our free quote service and we will give you 100% guarantee on our amazing services!
Finding the Right Company to Set Up your Network
Do not brush aside this chore lightly. A good dependable network will carry your company and it will allow you to continue your day-to-day operations without any problems. Your network will become the heart of your operation and if that stops beating, then the whole system falls apart. First, you want to choose a data cabling company that is near your office. This way, they can send technicians over if anything does happen to malfunction. If you choose a company that doesn't have any branches near you, then you may have to wait a lot longer to get your network fixed and that just isn't an option for small businesses. Safety and quality are also things to worry about. A safe track record is a great sign of a competent company that will deliver on their promises.
Also, finding a company that has a 24-hour support service is also very important. You could have problems at night and having them fixed before the next business day is a luxury that your business must have in order to function smoothly. A great customer service record doesn't hurt either. Next, finding a satisfactory warrantee is also a must-have. They must be willing to guarantee their cabling for at least 5 years or else the company is not worth hiring. If you can find a company that has all these things, and you will, then the only other point is how much it costs. This depends on the job, of course, but finding a competitive rate is just as important as anything else. When the right network gets installed, get ready to jump for joy because your business is about to take off.
Laptop Repair Videos Collections
The laptop repair is a book, which teaches you any accumulation. And laptop repair makes me transmute proficient at repairing laptops through reading the collection. Laptop repairs are not equalise to the another computer repairs. It changes from possibility to help. If you are involved in the accumulation, you may promote to pattern. You can savor galore specified as radical learning, video learning.
In video learning, you can take at institution. Patch you locomote the o.k. guarantee and line in your way, you gift feel them get fit all the clip. Recording acquisition is the newest learning way at verbalize through the internet. At the comparable term, it is the unexcelled way to repair laptop. Of pedagogy, it attracts everyone. Regularize it spends younger money. Let us click and aspiration mouse, you can screw roughly repair of laptop.
In forgather acquisition, you can drill and go to the estimate. You can thoughtfulness by yourself and mortal a greater essay of connexion. Untouched of motive and possibilities are a superb bushel of laptop repair. But it can't consider everyone and it is dear.
Laptop repair videos are most stingy and fastest way to repair your laptop. You can expend dimension to study it. It can accomplish laptop repair system get unhurried and increase your canvass. You instrument comprehend the change if you can try
Laptop repair Video
http://www.laptoprepairvideos.com/index.php?hop=zss990
Speed Up Internet Explorer 8
1. Internet Explorer can be enhanced using extensions, but these can also slow down the program. Click Tools, Manage Add-ons and browse through the list of ‘Toolbars and Extensions'. From the list, select any extensions you no longer need and click the Disable button.
2. Before closing the Manage Add-ons window, click the Search Providers link. Select any search engines you don't want from the list on the right and click Remove. Hit the Accelerators link and click any accelerators you don't use. Click the Remove button, and then click Close.
3. Disabling Internet Explorer 8's ‘Feeds and Web Slices' features can also help to speed things up. Click Tools and then Internet Options. Go to the Content tab and click the Settings button. In the window that appears, untick all the boxes.
4. Internet Explorer stores elements of visited websites on the hard disk and checks for updates. To disable this, click Tools, then Internet Options. Go to the General tab and click Settings in the ‘Browsing history' section. In the next window that opens, select Never and click OK.
5. Some IE8 users have reported that the following works: in XP, press the Windows key, then the letter R. Type 'cmd' and Enter. In Vista or Windows 7, go to Start, type 'cmd', right-click 'cmd' in the menu, select "Run as administrator". Type regsvr32 actxprxy.dll', press Enter and restart Windows.
6. Set IE to always save the latest version of a web page, so you can get there quicker next time. Select Tools, Internet Options and the General tab. Click Settings in ‘Browsing history'. Select 'Every time I visit the webpage'. You can increase the reserved storage space up to 250MB.
Bluetooth Techology
Bluetooth technology is designed in a way that it operates at 2.4GHz(i.e.) within a short range of wireless communication. The range of Bluetooth is about 10metres, which is approximately 30 feet. It is designed such that it’s light and portable. It contains standards and protocols that makes it mobile, robust, reliable. It is not limited to one manufacturer. The Bluetooth has replaced cables which when compared is very cost effective. The Bluetooth has to be resilient to the interference caused. When Bluetooth is made use for mobile devices it designed to be compact, lightweight, lower power and easy to use. It has a built in mechanism to inquire for devices, connect to them and once connected discover the services they possess in their database.
A Simple procedure that makes you understand how Bluetooth connection is established:
The master inquires to discover devices available to connect.
The slave listens for an inquiry from the master by entering into the inquiry scan mode.
When an inquiry is received, the slave responds to the master with a Frequency Hop Synchronization packet (FHS). The FHS contains information that helps to create a connection to the device; the information includes Bluetooth address and class of device.
The master collects the FHS information from each device that is being discovered. To connect to one of these devices the master makes use of the Bluetooth address and goes into page mode and pages the device.
The slave being paged has to be in page scan mode to enable a connection to the master.
For majority of the countries the Industrial, Scientific and Medical (ISM) band used by Bluetooth is available from 2.40-2.4835 GHz. Frequency Hopping Spread Spectrum (FHSS) techniques are made use by Bluetooth in order to improve its immunity from interference. Bluetooth enables adequate frequency coverage with test sequence.
Bluetooth Special Interest Group (SIG) works to promote, shape and define the specification and position Bluetooth in the market place. SIG enables protocol definitions for ensuring interoperability. For higher layers protocols it ensures bearer services and host control interface.
Communication using Bluetooth technology is encrypted for security. When two Bluetooth devices try to establish a link, the foremost thing they do is to confirm their identities by exchanging their keys. The two devices will not be able to communicate if the keys don’t match.
The Bluetooth core specification describes the protocol; the profile document helps applications development. It describes implementation schemes and highlights the core Bluetooth protocol supporting the profile. The example of profiles is a wireless headset for mobile phones. The headset profile is made use as the core specification. The headset profile is built from SPP (Serial Port Profile) and GPP (Generic Access Profile). The GAP defines the procedures that deal with the device discovery and link management.
Blue tooth is applied as access points allowing mobile device connection services e.g. PSTN or LAN services. It allows Mobile phone link to Laptop PCs. It is used by PDA, palmtop and desktop PCs. It ensures communication compatibility worldwide by being made use by cell phones, cordless phones, microwaves, and Wi-Fi technology.
Watch Past TV Shows With Pc Satellite TV
Maybe you have already heard about this new technology or have seen it in action. With the new PC satellite TV this software enables anyone to turn their computer into a television broadcasting system. You can watch television from anywhere you choose to.
So whether you like to watch past TV shows or are anxiously waiting for the new fall premiers you can access them with the new software. This software was developed by IBM, Microsoft and other companies that have developed a lot of the things that we use today.
Many people are choosing to watch all their favorite shows from the comfort of their computer. Whether or not you are a computer genius; this technology enables anyone to turn their PC into a television set.
So if you like old re-run episodes of Friends, Will and Grace or any other show that you currently watch; then you can be sure that you will receive it with the PC satellite TV techology. Once you download the software onto your computer this technology will enable you to access 3000 channels; so you can see that you will receive all the channels that you currently receive plus thousands more.
Chances are if you are like most people; then you watch the same shows over and over because you can hardly ever find anything that you want to watch. Well most people have become frustrated and tired of paying the high cable costs of cable just to watch past TV shows and have decided to switch to this new method of watching television. They understand that just like the mobile phone; this new technology is here to stay.
You can expect to receive channels from all over the world; plus you will also have the option to watch the television shows in over 20 different languages. It truly is amazing at how much technology is changing and how most of the things that we enjoy are becomong convenient and mobile; which allows us to take our entertainment with us where ever we go.
If you found this article on "watch past TV shows with PC satellite TV" helpful; visit our site below. In just five minutes you can turn your computer into a television broadcasting unit and begin receiving 3000 channels today. So if you are unhappy with your current television provider; there is absolutely no reason why you should not give this new technology a try. You will be amazed at how easy and inexpensive it can be to watch television again; without ever having to worry about paying for another monthly bill.
for more information on PC Satellite TV please visit: http://pc-satellite-tv.hi-tech-reviews.com
Rabu, 05 Januari 2011
Kelebihan Windows XP, Vista, LinuX dan Windows Seven
Trouble Shooting Jaringan
1. Identifikasi masalah jaringan/user.
2. Kumpulkan data tentang masalah jaringan/user.
3. Analisis data untuk mencari solusi masalah.
4. Impementasi solusi untuk memperbaiki sistem.
5. Jika masalah tidak terselesaikan, batalkan perubahan dan modifikasi data yang dilakukan sebelumnya.
6. Kembali ke langkah 3
Salah satu bentuk paling mendasar dari monitoring koneksi berlangsung tiap hari pada jaringan. Proses user login ke jaringan akan memastikan bahwa koneksi itu sedang bekerja dengan baik atau jika tidak bagian jaringan akan segera dihubungi. Namun, ini bukanlah cara yang paling baik atau efisien dalam memonitoring jaringan yang ada. Tersedia program-program sederhana yang bisa digunakan oleh administrator untuk membuat daftar alamat IP host dan secara periodik mem-ping alamat tersebut. Jika ada masalah koneksi, program akan memperingati administrator melalui output ping. Ini merupakan cara yang paling kuno dan tidak efisien, tetapi masih lebih baik dibanding tidak melakukan apa-apa sama sekali. Aspek lain dari cara monitoring seperti ini adalah ia hanya memberitahu bahwa di suatu tempat antara stasiun monitoring dan perangkat target ada gangguan komunikasi. Gangguan bisa jadi router, switch, bagian jaringan yang tidak baik, atau memang host-nya yang sedang down. Tes ping hanya mengatakan bahwa
koneksi down, tidak di mana itu down.
Monitoring traffic merupakan cara monitoring jaringan yang jauh lebih canggih. Ia melihat traffic paket yang sebenarnya dan membuat laporan berdasarkan traffic jaringan tersebut. Program seperti Flukes Network Analyzer merupakan contoh software jenis ini. Program tersebut tidak hanya mendeteksi perangkat yang gagal, tetapi juga mendeteksi jika ada komponen yang muatannya berlebihan atau konfigurasinya kurang baik.
Simple Network Management Protocol (SNMP) adalah standar manajemen jaringan pada TCP/IP. Gagasan di balik SNMP adalah bagaimana supaya informasi yang dibutuhkan untuk manajemen jaringan bisa dikirim menggunakan TCP/IP. Protokol tersebut memungkinkan administrator jaringan untuk menggunakan perangkat jaringan khusus yang berhubungan dengan perangkat jaringan yang lain untuk mengumpulkan informasi dari mereka, dan mengatur bagaimana mereka beroperasi.
mereka terhubung ke jaringan TCP/IP: printer, scanner, dan lain-lain.
Model umum yang digunakan SNMP adalah adanya network management station (NMS) yang mengirim request kepada SNMP agent. SNMP Agent juga bisa melakukan komunikasi dengan mengirim pesan trap untuk memberitahu management station ketika terjadi suatu event tertentu. Model ini bekerja dengan baik, yang mana inilah mengapa SNMP menjadi sangat populer. Namun, satu masalah mendasar dari protokol dan model yang digunakan adalah bahwa ia diorientasikan pada komunikasi dari SNMP agent yang biasanya perangkat TCP/IP seperti host dan router. Jumlah informasi yang dikumpulkan oleh perangkat ini biasanya terbatas, karena sudah pasti host dan router mempunyai “tugas sebenarnya yang harus dilakukan”—yaitu melakukan tugas sebagai host dan router. Mereka tidak bisa mendedikasikan diri mereka untuk melakukan tugas manajemen jaringan.
Troubleshooting jaringan merupakan proses sistematis yang diaplikasikan untuk memecahkan masalah pada jaringan. Teknik Eliminasi dan Divide and Conquer merupakan metode paling berhasil untuk troubleshooting jaringan.
User pada jaringan Anda menelepon help desk untuk memberitahukan bahwa komputer mereka tidak bisa lagi ke Internet. Help desk mengisi form error report dan memberikannya kepada Anda, bagian network support. Anda menelepon dan berbicara kepada user dan mereka mengatakan bahwa mereka tidak melakukan apapun yang berbeda selain yang selalu mereka lakukan untuk ke Internet. Anda mengecek log dan menemukan bahwa komputer user telah di-upgrade semalam. Solusi Anda yang pertama adalah bahwa driver jaringan komputer tersebut pasti konfigurasinya salah. Anda pergi ke komputer tersebut dan mengecek konfigurasi jaringannya. Tampaknya sudah benar, sehingga Anda mem-ping server. Tidak terhubung. Solusi berikutnya adalah mengecek apakah kabel komputer tersambung. Anda periksa kedua ujung kabel dan kemudian mencoba mem-ping server kembali.
workstation. Anda kembali ke IDF, mengembalikan kabel ke port asal, mencari patch kabel worksation baru dan kembali ke worksation. Ganti kabel workstation, dan mencoba mem-ping server lagi. Kali ini berhasil, maka Anda sudah memperbaiki masalah itu. Langkah terakhir adalah mendokumentasikan solusi masalah.
Misalkan Anda mempunyai dua jaringan yang bekerja dengan baik, tetapi ketika keduanya dihubungkan jaringan gagal. Langkah pertama adalah membagi jaringan kembali menjadi dua jarigan terpisah dan memverifikasi bahwa keduanya masih beroperasi dengan benar ketika dipisahkan. Jika ya, pindahkan semua segmen ke jaringan yang lain. Periksa apakah masih bekerja dengan benar.
Bersama dengan proses yang diuraikan sebelumnya, ada tool software bagi administrator jaringan yang dapat digunakan untuk mengatasi masalah konektivitas jaringan. Tool ini dapat membantu dalam troubleshooting Local Area Network, tetapi terutama pada Wide Area Network. Kita akan lihat perintah yang tersedia pada sebagian besar software client. Perintah ini meliputi Ping, Tracert (traceroute), Telnet, Netstat, ARP, dan Ipconfig (WinIPcfg)
Memverifikasi koneksi ke komputer lain dengan mengirim pesan Internet Control Message Protocol (ICMP) Echo Request. Tanda terima berupa pesan Echo Reply akan ditampilkan, bersama dengan waktu pulang-pergi. Ping merupakan perintah utama TCP/IP yang digunakan untuk men-troubleshoot konektivitas, jangkauan, dan resolusi nama. Syntax ping adalah: ping [-t] [-a] [-n Count] [-l Size] [-f] [-i TTL] [-v TOS] [-r Count] [-s Count] [{-j HostList | -k HostList}] [-wTimeout] [TargetName].
Menunjukkan rute yang dilewati paket untuk mencapai tujuannya. Ini dilakukan dengan mengirim pesan Internet Control Message Protocol (ICMP) Echo Request ke tujuan dengan nilai Time to Live yang semakin meningkat. Rute yang ditampilkan adalah daftar interface router (yang paling dekat dengan host) yang terdapat pada jalur antara host dan
tujuan. Syntax tracert adalah: tracert [-d] [-h MaximumHops] [-j HostList] [-wTimeout] [TargetName].
Telnet Client dan Telnet Server bekerja sama supaya user dapat berkomunikasi dengan komputer remote. Telnet Client memungkinkan user untuk menghubungi komputer remote dan berinteraksi dengan komputer tersebut melalui jendela terminal. Telnet Server memungkinkan user Telnet Client untuk masuk ke dalam komputer yang menjalankan Telnet Server dan menjalankan aplikasi pada komputer tersebut. Telnet Server berfungsi sebagai gateway yang digunakan Telnet client untuk berkomunikasi. Telnet cocok untuk testing login ke remote host. Syntax telnet adalah: telnet [\\RemoteServer].
Menampilkan koneksi TCP yang aktif, port yang didengarkan komputer, statistik Ethernet, tabel routing IP, statistik IPv4 (protokol IP, ICMP, TCP, dan UDP), dan statistik IPv6 (protokol IPv6, ICMPv6, TCP over IPv6, dan UDP over IPv6). Syntax netstat adalah: netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval].
Menampilkan dan mengubah entri pada cache Address Resolution Protocol (ARP), yang berisi satu atau beberapa tabel yang digunakan untuk menyimpan alamat IP dan alamat fisik Ethernet dan Token Ring dari alamat IP yang bersangkutan. Masing-masing kartu jaringan Ethernet atau Token Ring yang terinstalasi pada komputer Anda mempunyai tabel terpisah. Syntax arp adalah: arp [-a [InetAddr] [-NIfaceAddr]] [-g [InetAddr] [-N
IfaceAddr]] [-d InetAddr [IfaceAddr]] [-s InetAddr EtherAddr [IfaceAddr]].
Menampilkan semua konfigurasi jaringan TCP/IP dan memperbarui setting Dynamic Host Configuration Protocol (DHCP) dan Domain Name System (DNS). Digunakan tanpa parameter, ipconfig menampilkan alamat IP, subnet mask, dan gateway default untuk semua kartu jaringan. Ipconfig merupakan commandline yang ekivalen dengan winipcfg yang terdapat pada Windows MilleniumEdition, Windows 98, dan Windows 95. Meskipun Windows XP tidak menyertakan utiliti grafis yang ekivalen dengan winipcfg, Anda bisa menggunakan Network Connections untuk melihat dan memperbarui alamat IP. Syntax ipconfig adalah: ipconfig [/all] [/renew[Adapter]] [/release [Adapter]] [/flushdns] [/displaydns] [/registerdns] [/showclassid Adapter] [/setclassid Adapter [ClassID]].
Banyak tool manajemen jaringan yang menggunakan SNMP untuk mengumpulkan informasi dan statistik jaringan. Beberapa di antaranya adalah:
database.
Selasa, 04 Januari 2011
MematikanKomputerJarak Jauh
Konsep untuk mematikan komputer ini sangatlah sederhana hal-hal yang diperlukan hanyalah dua buah komputer yang terkoneksi melalui jaringan LAN maupun internet dan mempunya IP addressnya masing-masing. Selanjutnya masing-masing komputer diberikan service telnet ataupun ssh sebagai server yang aktif.
Setelah terkoneksi untuk mematikan komputer pun tidak sulit karena hanya dibutuhkan beberapa baris command yang mudah. Oleh karena itu marilah kita lihat lebih jauh lagi bagaimana cara untuk mematikan komputer melalui service ssh maupun telnet.
A. System Requirements
1. Operating System yang mendukung networking. Dalam project ini kami menggunakan Windows XP.
2. 2 network interface card.
3. Kabel LAN dengan jack RJ-45.
4. Menggunakan Peer to Peer connection.
B. Langkah-langkah mengaktifkan telnet server:
Pada dasarnya setiap windows XP sudah terdapat services telnet namun services ini tidak diaktifkan.
1. Buka Control Panel, pilih Administration Tools, pilih Services.
2. Cari telnet services buka dengan klik dua kali.
3. Aktifkan telnet service pada modus automatic sehingga saat komputer direstart service ini pun tetap aktif.
4. Karena kita tidak ingin melakukan restart lakukan pengaktifan telnet service dengan mengetik start.
C. Langkah-langkah mengaktifkan ssh server:
Linux yang kita gunakan adalah versi debian ubuntu pada linux versi ini ssh-server tidak terdapat dalam sistem, oleh karena itu dibutuhkan penginstallan aplikasi ini.
1. Pastikan komputer terkoneksi dengan internet.
2. sudo apt-get update (untuk mengupdate repisotory)
3. sudo apt-get install openssh-server.
D. Langkah-langkah mempersiapkan telnet client.
1. Untuk windows cukup mengaktifkan command prompt di dalam windows.
2. Untuk linux cukup mengaktikan terminal melalui start menu program.
E. Langkah-langkah mempersiapkan ssh client.
1. Untuk linux buka terminal melalui start menu program.
2. Untuk windows dapat menggunakan program tambahan misal: putty
F. Mekanisme kerja:
Konsep yang perlu diperhatikan adalah:
1. SSH terdiri dari dua jenis yaitu ssh-server dan ssh-client.
2. Telnet terdiri dari dua jenis yaitu telnet-server dan telnet-client.
3. Ssh-server hanya dapat berjalan di pc berbasis linux.
4. Telnet-server hanya dapat berjalan di pc berbasis windows.
5. Basic command dari ssh mirip dengan basic comand di terminal linux.
6. Basic command dari telnet mirip dengan basic command di command prompt windows.
7. Ssh-client dapat berjalan di linux cukup dengan menggunakan terminal dari linux itu sendiri.
8. Ssh-client dapat berjalan di windows dengan menggunakan program tambahan putty.
Download Putyy: http://portableapps.com/apps/internet/putty_portable
9. Telnet-client dapat berjalan di linux cukup dengan menggunakan terminal dari linux itu sendiri.
10. Telnet-client dapat berjalan di windows dengan menggunakan command prompt dari windows itu sendiri.
G. Mematikan komputer melalui service ssh.
Pada konsepnya adalah sebagai berikut
Komputer 1 > Komputer 2
Ssh-client Ssh-server
Komputer 1 akan mencoba untuk mematikan komputer 2 oleh karena itu berikut beberapa prinsip:
1. Ssh-client dapat berupa windows ataupun linux.
2. Ssh-server hanya dapat dijalankan di linux.
Step melalui terminal linux:
1. Buka terminal linux.
2. Ketikan ssh user_name@ip_address
3. Masukkan password
4. Ketikkan sudo shutdown –h now
Penjelasan:
1. user_name adalah user name yang dipakai di komputer linux yang akan dimatikan
2. ip_address adalah alamat ip yang dipakai di komputer linux yang akan dimatikan.
3. sudo menyatakan diri kita sebagai root atau administrator yang berhak.
4. –h menyatakan untuk mematikan keseluruhan sitem.
5. now menyatakan untuk mematikan pada saat command itu diexecute.
H. Mematikan komputer melalui service telnet.
Pada konsepnya adalah sebagai berikut.
Komputer 1 > Komputer 2
Telnet-client Telnet-server.
Komputer 1 akan mencoba untuk mematikan komputer oleh karena itu berikut beberapa prinsip:
1. Telnet-client dapat berupa windows ataupun linux.
2. Telnet-server hanya dapat dijalankan di windows.
3. Step melalui command prompt windows.
4. Buka terminal windows.
5. Ketikan telnet ip_address;
6. Masukkan password.
7. Ketikkan shutdown –s
Penjelasan:
1. user_name adalah user name yang di pakai di komputer 2 atau komputer windows yang akan dimatikan.
2. Ip_address adalah alamat ip komputer yang akan dimatikan.
3. –s menyatakan untuk mematikan komputer sekarang juga.
BAB III - Penutup
Kesimpulan
1. Mematikan komputer melalui jarak jauh bukanlah hal yang sulit. Komputer yang akan dimatikan dalam konsep ini haruslah berbasiskan Ipaddress karena telnet dan ssh hanya akan bekerja melalui Ipaddress yang harus di set dimasing-masing komputer.
2. telnet melalui ssh melalui port masing-masing 23 dan 22.
3. Firewall dapat mematikan setiap destinasi port 23 dan 22 sehingga disarankan agar anda mematikan semua firewall yang aktif.
4. Setiap komputer yang terkoneksikan kedalam jaringan internet dapat dimatikan melalui jarak jauh dengan mengarahkan ssh dan telnet ke ip address yang di konfigurasikan dalam hal ini ip address tersebut haruslah merupakan ip address public bukan ip address internal.
5. Koneksi melalui internet dapat membahayakan jaringan anda maka disarankan jangan melalukan remote melalui jarak jauh apalagi melakukannya dengan telnet usahakanlah melakukannya jarang mungkin dan bukan di komputer public. Jika anda akan sering melakukannya anda dapat menggunakan jaringan yang bersifat private seperti VPN.
6. Tidak semua komputer yang memiliki ip_address public dapat dikoneksikan melalui telnet dan ssh karena banyaknya router yang bersifat secure dengan tidak memperbolehkan koneksi dengan port tertentu.
Saran
1. untuk menginstall aplikasi melalui apt-get yang terdapat dalam linux anda dapat menggunakan repisotory local seperti vlsm.org lakukan customisasi melalui /etc/apt/sources.list
2. Linux ubuntu tidak dapat mendeteksi setiap hardware modem telephone oleh karena itu disarankan untuk mengecek kompatibilitas melalui live cd terlebih dahulu.
3. Installasi linux dapat membuat windows anda hilang perhatikan baik-baik pilihan untuk mencustomize partisi anda hindari pemformatan yang tidak perlu.
Kompetensi Program Studi D3 - Teknik Komputer
Kompetensi Program Studi D3 - Teknik Komputer
Menguasai perangkat keras dan lunak komputer dan aplikasinya dalam bidang kontrol serta mampu merancang dan membangun jaringan komputer lokal maupun global
Kurikulum Program Studi D3 - Teknik Komputer
| SEMESTER I | ||
| No | NAMA MATA KULIAH | JAM |
| 1 | Bahasa Inggris 1 | 2 |
| 2 | Pendidikan Agama | 2 |
| 3 | Aljabar Linier | 2 |
| 4 | Kalkulus I | 2 |
| 5 | Fisika Dasar I | 2 |
| 6 | Elektronika Dasar | 2 |
| 7 | Peralatan Elektronika | 2 |
| 8 | Rangkaian Listrik | 3 |
| 9 | Teknik Pemrograman | 3 |
| 10 | Sistem Operasi I | 2 |
| 11 | Pengetahuan Dasar Komputer | 2 |
| SEMESTER II | ||
| No | NAMA MATA KULIAH | JAM |
| 1 | Bahasa Inggris 2 | 2 |
| 2 | Pancasila | 2 |
| 3 | Kalkulus II | 2 |
| 4 | Fisika Dasar II | 2 |
| 5 | Praktikum Elektronika Dasar | 2 |
| 6 | Rangkaian Digital I | 2 |
| 7 | Motor Listrik | 2 |
| 8 | Pemrograman Terstruktur | 3 |
| 9 | Sistem Operasi II | 2 |
| 10 | Komunikasi Data | |
| SEMESTER III | ||
| No | NAMA MATA KULIAH | JAM |
| 1 | Bahasa Inggris 3 | 2 |
| 2 | Statistika Elementer | 2 |
| 3 | Rangkaian Digital II | 2 |
| 4 | Praktikum Rangkaian Digital | 2 |
| 5 | Mikroelektronika | 2 |
| 6 | Pemrograman Visual Delphi | 2 |
| 7 | Jaringan Komputer | 2 |
| 8 | Dasar Pengendalian | 3 |
| 9 | Teknik Sensor dan Tranduser | 3 |
| SEMESTER IV | ||
| No | NAMA MATA KULIAH | JAM |
| 1 | Bahasa Inggris 4 | 2 |
| 2 | Probabilitas | 2 |
| 3 | Mikroprosesor I | 2 |
| 4 | Interfacing | 2 |
| 5 | Arsitektur Komputer I | 2 |
| 6 | Pemrograman Web | 2 |
| 7 | Bahasa Rakitan | 2 |
| 8 | Perancangan Instalasi Internet | 3 |
| 9 | Program Logic Controller | 2 |
| 10 | Metodologi Penelitian | 2 |
| SEMESTER V | ||
| No | NAMA MATA KULIAH | JAM |
| 1 | Bahasa Inggris 5 | 2 |
| 2 | Kewarganegaraan | 2 |
| 3 | Mikroprosesor II | 2 |
| 4 | Arsitek Komputer | 2 |
| 5 | Troubleshooting | 2 |
| 6 | Pengendalian Berbasis PC | 2 |
| 7 | Kerja Praktik | 1 |
| 9 | Tugas Pendahuluan Proyek Akhir | 1 |
| 10 | Kapita Selekta | 2 |
| SEMESTER VI | ||
| No | NAMA MATA KULIAH | JAM |
| 1 | Bahasa Inggris 6 | 2 |
| 2 | Kewirausahaan | 2 |
| 3 | Expert System | 2 |
| 4 | Simulasi | 2 |
| 5 | Pengantar Robotika | 2 |
| 6 | Proyek Akhir | 4 |

