Tuesday, February 6, 2007

Sony Vaio Fx Laptop Disassembly

Laptop Disassembly and Processor replacement steps. All this operation require all your attention and your knowledge If you are a little queasy about tearing apart your laptop and replacing the processor maybe this will help. You have to keep in mind that replacing the processor is a risky thing to do. You need:

  • 1 Small Flat Bladed standard screw driver
  • 1 Very Small Phillips head screw driver
  • Some Thermal compound to put on the new processor.
  • A mobile Duron processor or a mobile Athlon processor of the "25W Balanced" variety. The processor used in this example is a Mobile Athlon 4 1.2Ghz processor. The processor is probably of the 35W variety. However, the 35W processors do not work correctly in all laptops.

Step 1 Backup all your important things.

Step 2 Take out the batteries and unplug the laptop from the AC adapter.

Step 3 Chose a free area like an empty desktop place the laptop on it then open the laptop and tilt the display all the way back. Place a newspaper or something over the top of the display so you don't scratch or scuff it.

Step 4 You have first to remove the panel that has the speakers and power button on it. It is secured by 1 little screw on the left hand side of the panel. Remove the screw and then slide the panel to the right. With the panel slid to the right you can then carefully lay it on the display.

Step 5 Now you need to remove the keyboard. There is 1 little screw securing the keyboard. This screw is located above the F6 key. Remove the screw. Lift the keyboard by the top, where the Function keys are, and slide it out towards the top of the laptop. Lay the keyboard on top of the panel that is all ready on top of the display.

The Heat Sink/Fan combination is now accessible as well as the harddrive and DVD drive.

Step 6 You need to carefully remove some copper ground straps attached to the Heat Sink/Fan combo . These copper straps have adhesive on them and can be carefully peeled back out of the way. There is one copper strap at the top of the assembly, under the display panel support that is very difficult to remove. Left this strap in place until you actually began the removal of the Heat Sink/Fan combo.

Step 7 There is one small bracket on the Heat Sink/Fan combo by the screw on the upper left corner that is secured to the Heat Sink/Fan combo by another little screw. There is an arrow with the number 3 pointing to this bracket. Remove the screw for that bracket and rotate the bracket out of the way.

Step 8 There are 3 screws securing the Heat Sink/Fan combo to the motherboard. 1 screw (Labeled with an arrow and the Number 1) is at the upper right, the second screw (Labeled with an arrow and the Number 2) is at the lower left, and the third screw (Labeled with an arrow and the Number 3) is at the upper left. These screw are identified on the Heat Sink with the arrow and the numbers 1, 2, 3. Unscrew all 3 screws. The screws will not come out of the Heat Sink/Fan combo. Just unscrew them until the heat sink is free of the motherboard.

Step 9 This is not necessary, but you can unplug the fan power leads from the motherboard. The fan power connector unplugs, from the motherboard, by lifting straight up.

Step 10 You are now ready to remove the Heat Sink/Fan Combo. Remember there is still a copper ground strap stuck to it at the top under the display panel brackets. Carefully work the Heat Sink/Fan combo back and forth to unstick it from the processor and to begin unsticking the copper strap. You will be able to slip the Heat Sink/Fan combo toward the bottom of the laptop and rotate it too the left to get the copper strap off of Heat Sink/Fan combo.

With the Heat Sink/Fan combo out of the way you now have access to the processor and the special ZIF socket that the processor is in.

OK take a deep breath now because this is maybe the scariest part.

Step 11 It's time to remove the processor. You need a small flat bladed screw driver for this part.

The processor is going to slide to the right in the ZIF socket. Put the screw driver in the notch on the left side and begin to apply pressure to the right. The processor will slide about 1/8th of an inch to the right.

Step 12 Before removing the old processor note how it is oriented in the slot. The new processor will need to be oriented the same way. Peel off the plastic cover from the old processor and place it on the new processor. Remove the old processor and place the new processor in its place.

Step 13 With the new processor in place you now need to close the ZIF socket. Place the screw driver in the notch on the right and begin to apply pressure to the left. The processor will slide about 1/8th of an inch to the left. Now you just have to put everything back and you are done. Do not forget to put some Thermal Grease on the processor before you put the Heat Sink/Fan combo back on.

Step 14 Carefully position the Heat Sink/Fan combo back over the top of the processor. Tighten the 3 Heat Sink/Fan combo screws.

Step 15 Plug the cooling fan power leads back into the motherboard.

Step 16 Place the little bracket you removed in Step 7 back onto the Heat Sink/Fan combo

Step 17 Place all of the copper ground straps into their correct locations.

Step 18 Carefully check all of the Heat Sink/Fan Screws. Carefully check that you plugged in the cooling fan Power Connectors.

Step 18 Place the keyboard back into place and tighten down its screw.

Step 19 Place the Speaker Panel back into place and tighten down its screw.

Step 20 Start the Laptop and enter the bios setup screen by Pressing F2 as it begins booting you are successful.

New Laptop Technology You Need To Know (Before Buying Your Next Laptop)

Laptop or notebook computer technology is advancing at a blistering speed. Ferrari fast. So fast that by the time you purchase your new laptop, it's probably already obsolete or out of date. A sobering thought considering the hefty prices you have to pay for a high-end laptop.

But laptop technology is changing so fast new innovations are coming on stream as you read this article. There is a whole new generation of notebook technology every two years or less. Therefore, unless you buy or upgrade your laptop each year you're falling behind what these sleek little powerhouses can now deliver.

And unless you're already in Geek Heaven, keeping track of all these new technologies and innovations can be quite a chore. Figuring out the right Graphics chipset that works best with the right CPU and the best Data buses is a major feat. And now that everything is being Doubled -- dual core, dual graphics -- it's entering the realm where Einstein would be amused, even on a bad hair day!

What's the ordinary laptop buyer to do?

What you really have to keep in mind are the outcomes of all this new technology. Basically, these new technologies have made laptops smaller, faster and more powerful. With every new improvement the laptop is closing the gap between its main rival -- the desktop computer.

Notebook computers are now out-selling desktops for the first time in history. Laptops are replacing the old desktop computer, whose days may just be numbered. It won't be long before laptops are also out-performing them as well.

Some major computer makers are taking note of this trend towards more powerful, smaller computers. Even the desktop computer is morphing! Just look at the sleek design of the new Apple iMac G5, gone is the bulky tower, in its place is a well designed desktop computer that's almost a laptop!

For the ordinary computer user keeping abreast of all these new technologies and inventions can be a major chore if you're considering buying a laptop in the next little while. As you approach the smiling salesperson in your favorite tech store, here's a few bits of new notebook technology you might want to have in your possession so you won't look like a complete neophyte. Hey, where technology is concerned, we have all been there, done that.

In order for you to tech-proof your next laptop purchase, here's a quick run down of some recent Notebook Developments:

Sonoma Chipset

The new Sonoma Platform, Intel's next-generation Centrino Chipset is already on the market. Members of the Sonoma club are growing daily - Sony, IBM/Lenovo, BenQ, Dell, Samsung, Acer, and Toshiba... another 80 or 90 'Sonoma-endowed' products will be released very shortly.

No doubt, it will become the Platform standard for many high-end notebooks. Actually, it won't make or mean that much difference to the ordinary Joe/Jane who just want a notebook or laptop for web surfing, word processing and e-mail. Notebooks with the Sonoma Platform will be just a little bit faster and have a little better battery life.

But for Mobile Professionals and Notebook Fanatics (they do exist)... there's a lot of good things delivered or capable of being delivered with this new Centrino Chipset. First, wireless connections will be easier with the integrated tri-mode 802.11a/b/g, already dubbed by some as the 'wireless trinity'! This will make it easier to stay connected no matter where you are.

Improved performance will be experienced because the new Pentium M's have a 533MHz frontside bus, supported with up to 2GB of DDR2 DRAM, Serial ATA Hard Drive, and PCI Express, plus improved integrated graphics, including Intel's Hi-Def Audio. All are possible with the Sonoma Platform.

PCI Express

PCI(Peripheral Component Interconnect) Express is a new standard for expansion cards that comes in different versions. Presently, we have the x16 and x1 lanes, which will be followed by x4 and x8 versions. It offers increased bandwidth for example, x1 lane offers 500MB/sec instead of just 133MB/sec for PCI.

All computers, including laptops have different buses, (collection of wires) that transmit data from one component to another.

Of course, in an ideal world, all the data in your computer should move thru just one BUS - however, most experts agree it's not likely to happen unless we start over and build a computer system from scratch. For now we have to rely on different internal buses to move the data around, the PCI Express is a great improvement and will make your laptop faster.

Graphics Card

These are always improving. A Graphics Card handles the graphics or visuals on your notebook. If 3D graphics and games is a pastime, you will want to buy the highest quality system. Some of the higher end products are: ATi Mobility Radeon 9800, X800, and FireGL V3200 or Intel's Graphics Media Accelerator 900.

If you can, go with a NVIDIA GeForce Go 6800 graphics card or for the real game diehards - wait for the debut of NVIDIA GeForce Go 7300 that features NVIDIA's TurboCache technology.

Gamers will be aware of NVIDIA SLI technology, ATI's CrossFire and Hyperthreading. All new stuff that's bringing the gaming experience up to a higher level of perfection that would even be worthy of a Spielberg or a Lucas Production. Not really, but it's getting there.

64 Bit Laptops

Most systems today run on the 32 Bit System. Keep in mind, the major difference between a 32-bit and a 64-bit system is the amount of memory that they support. Around 4 GB for 32-bit and 8 GB and up for the 64-bit. Right now -- Intel, Apple, and AMD all offer 64-bit systems.

Do you need all this memory? No, for the average laptop user it amounts to overkill. However, if you're interested in gaming, desktop publishing, or the graphic arts you will benefit from 64-bit technology.

Dual Core Notebooks

Two is better than one!

Dual core laptops are now on the market. The gaming industry is the starting point for many of these advanced systems. For example, the British Laptop maker Rockdirect now produces Xtreme 64, a gaming laptop with AMD’s new dual core Athlon 64 X2 processor. This same laptop also sports the ATI Mobility Radeon X800 XT graphics card that features 16 pixel pipelines, an industry first for notebooks.

The major producers of dual-core chips are Intel and AMD. The Intel dual-core processor has hyperthreading (HT), the two cores are divided into four virtual CPU units. Is all this needed? Again, if you're into heavy graphics or gaming, it's something you should consider and explore further.

Built-in Cellular Modem

Most high-end laptops now come with an integrated tri-mode 802.11a/b/g for wireless WI-FI connections.

Some recent models, like the Sony's New Ultra-Portable VAIO VGN-T350P, are raising the bar; it has the world's first 'Built-in Cellular Modem'. You can use your cell phone to connect to the Internet. This may be a great advantage since finding a 'Hot Spot' in some parts of the world can still be difficult.

The Avant-Garde: LumiLED Display

Be on the look-out for LED monitors in the near future. The brightness, colors and backlighting technology in LED monitors will be quite different from LCD displays.

The Forerunner in this field is NEC's SpectraView LumiLED, and will offer a much better image and color. Keep your eyes peeled.

On the Horizon:

19 or 20 Inch Laptop Screens

There is a rumor, only a rumor, that Dell is coming out with a 19-inch laptop in early 2006. There is also buzz that LG-Philips has a 20-inch LCD panel which could easily be used by laptop makers if they want to explore this market area. Andre the giant will be pleased!

Conclusion

Of course, there are many more laptop innovations in the pipeline but they're beyond the scope of this article. Just keep all these new technological notebook changes in mind when you're checking out your next laptop. Maybe, just maybe, most of these won't already have been replaced by something new by the time you buy your next laptop. But don't bet your Google Stocks on it!

Game Software Development Online

It is possible to obtain an online degree in Game Software Development without setting foot in a traditional classroom. Through a distance learning course, students can learn to create exciting video games to satisfy the demands of our evolving, technological society.

The field of Game Software Development is a fast-paced, challenging environment. An online course teaches aspiring software developers to evaluate gaming products and how to program and plan character options and game environments. The Game Software Development curriculum helps to hone the students' artistic abilities as well as their technical skills. Areas of study include applied knowledge of video and computer gaming, basic art and design, computer programming, character and environment creation, game play, and background design.

There are several online schools offering college degrees in Game Software Development. Students can study via the Internet, at their own pace, to obtain degrees such as an Associate of Arts (AA), Associate of Science (AS), Bachelor of Arts (BA), or Bachelor of Science (BS) in Game Software Development.

Careers in Game Software Development include programmers, interactivity designers, 3D object modelers, 3D character builders, 2D conceptual artists, game-play testers, and many others. Graduates of online Game Software Development School are in demand in many fields of entertainment, such as film, television, video and video gaming. Learned skills can also be applied in military, architectural, and educational fields.

To learn more about an online education in Game Software Development, feel free to search the many options found on our website.

Download Free Game PSP -Music - Movies - Software

PSP games are all the madness nowadays. The reasons for this are quite simple: the PSP is a very versatile piece of equipment and it allows portability for playing games in the form of a small UMD disc that you can easily carry around. However apart from the UMD disc, there are other ways of storing your PSP games i.e. onto your memory sticks. This is a simple guide on how to download PSP games from your computer to your PSP. So, Download Free Game PSP!

First of all, you need to have a memory stick. I'd recommend using a 1GB memory stick but if you do not have the resources to purchase one (i.e. money), a 256MB one should be fine. The higher the capacity of the memory stick the more you can download onto your PSP. Also, make sure your PSP version is 1.5 . Not only will you be able to download games, you can also download music,movies, tv shows, and more!

In simple terms: you will download your games off the internet and onto your PC and then transfer your game (or music/video/image) files to your PSP via a USB cable. If you do not have a USB cable then you cannot download the PSP games (a USB cable is cheap to buy anyways). When your computer is connected to your PSP, your computer will recognize your PSP as a detachable memory source (similar to a USB drive). It will assign a drive letter (usually f: ) and you will be able to drag and drop your PSP games,music,movies and so on onto your memory stick or card. These are some of the step to download PSP games:

Step 1
You must copy your PSP game or video files to the correct path or else the games simply do not work. The correct path is PSP>GAME (all the folder names are in caps)

Step 2
After the PSP games are fully transferred onto your memory stick, disconnect the PSP from your computer. In your PSP main menu, scroll to GAME and then select Memory Stick option. Press the X button, and a list of available games/videos (and more!) in your memory stick will be displayed. If you find any errors on your PSP, you might want to check your firmware version (make sure it is version 1.5!)

PS3 Games Patent

Speculations about alleged prohibition of second-hand sales of PS3 games and PS3 consoles have circulated in the past months. These rumors were fueled by market reviews about Xbox 360 consoles beating the Blu-ray-optimized Sony consoles in sales come November. Naturally, the company would employ all measures to maximize individual sales of PS3 games and their new consoles. No confirmation nor denial was heard from the Sony camp, but now, the speculations seem true with the technology patent Sony had procured.

Sony patented a technology - probably, a software - that could prevent use of borrowed PS3 games, rented consoles, and resale of game software and digital hardware. This undisclosed technology was patented five years ago in Japan but Sony had remained quiet about it. Queries about proprietorship are now prevalent, reminiscent of the hullabaloo about Digital Rights Management. Whether the electronics giant attempts to change the concept of ownership in the digital arena or not is not yet clear.

Presently, no information has been released about the software and its uses. But there have been scattered rumors that Sony may incorporate the software in the upcoming PS3 games and consoles. There would be time enough for Sony to address this before the games and consoles' release in November. Market analysts have agreed that it is rare for an electronics and technology company to patent new technology without the intention of using it in their new products. If this is true, then the $1 billion- worth industry of used consoles and games is endangered. Social gaming is also at risk because the new technology might prevent game-sharing. This means that gamers can't come over to their friends' houses to share a new game or simply to play together.

Documents filed by Sony describe a process of game system copy protection. According to the papers, game systems would verify the legitimacy of PS3 games and register the codes to a particular console. Other than this, the verification codes would be deleted after registration, making the discs unreadable in other PS3s. The process will effectively prevent resale of the game discs and console exchanges. Sony had kept other plans and details about the technology but Wedbush Morgan industry analyst, Michael Pachter, suspects that the company is toying with the idea of patented games. Pachter also pointed out that the competition from Microsoft might discourage Sony from tightening software security for game discs. The most likely targets of this new technology are internet-based and downloadable PS3 content like music and movies.

Whatever the electronic giant's plans are, the new technology manifests changing ownership trends when it comes to digital content. Even if gamers buy their consoles at $600 or their PS3 games for $100, they do not own it. They cannot reproduce or share it with their friends because Sony is still the ultimate owner of the software. No matter how much they shell out, they are just buying the license to use the software. Sure, the copy protection patent will make it difficult for pirates to manufacture counterfeit software but it does so at the expense of the gamers. Analysts are right not to put patenting software above Sony because the company was once involved in trouble because of this. It can be recalled that downloaded music from Sony has an accompanying software that installs itself automatically in computers to prevent copying and reproducing files. Though Sony later apologized, the software had already inconvenienced thousands of users. Copy protecting PS3 games would put Sony, the PS3, and the gamers at a disadvantage.

Search Engine Submission and Optimization Services

Search engine submission and optimization services – can you do it yourself or do you need a service to do it for you?

What if you knew that the bulk of the search engine submission and optimization services out there simply take your web site information and your web address, make 5 simple changes to your web pages, and submit your web site address to 100 web directories, write 1 article and submit it to 100 article directories, and link your web site to 10 other specially picked web pages with whom they have a relationship?

What if you knew that the entire process takes about 5 hours to do, all together, but they space it out over 2 months, so that your newly found rankings come slowly, and it looks like they are working very hard on your web site, and of course you are getting results?

What are they charging for this service? $500? $1000? What if you just decided to do it your self? Now, it will take you longer than 5 hours to do it the first time, because you have to figure out how to do it, and the most efficient ways to submit web pages, and you even have to figure out exactly where to submit the articles and the web page addresses.

What if I told you I have the list of top article directories – all 100 of them? What if I told you I have the list of top web directories – all 100 of them?

What if you could learn how to do search search engine submission and optimization services yourself and you could start doing it for other web sites at a discount – perhaps $400 for 5 hours work?

Does it scare you to think you could make $80 per hour?

Do you want to learn more about how I do it? I have just completed my brand new guide to article marketing success, ‘Your Article Writing and Promotion Guide‘

Download it free here: Secrets of Article Promotion

Do you want to learn how to build a massive list fast? Click here: Email List Building

SEO Elite - Search Engine Optimization Marvel or Software Scam?

In the early days of the Internet, you could often generate traffic just by being there. The billions of sites that exist now didn’t exist then, and those who built sites early on got tons of traffic and profits just by having a presence. Those “build it and they will come” days are gone; the Web is not astonishingly competitive, especially in business and marketing niches. Savvy Website operators know that it’s much harder to make the public know that their site exists and they devote a lot of time to a process known as Search Engine Optimization.

Search engine optimization, also known as SEO, is about designing you site in such a way that the major search engines, such as Google, will see your site as relevant to a particular topic. There’s a science to that, and numerous consultants charge a fortune to share their “secrets” of how to build your site so that the search engines will rank it highly for search results. The high price of these consultants and the amount of work required for effective SEO has led to the creation of software packages designed to make search engine optimization easier. Perhaps the most heavily promoted of these Web position tools is SEO Elite.

SEO Elite, like most Web-related software, makes bold claims about what it can do for you. They emphasize the value of having hundreds (or even thousands) of quality sites linking to yours as an important component of search engine optimization and claim that SEO Elite can find suitable linking partners for you in mere minutes. They also claim that you can use this program to determine how the high ranking sites for a particular topic managed to achieve that ranking so that you can copy their technique. And finally, they claim the tool can keep you notified on a daily basis as to how well your site ranks in the major search engines. If your site moves up a few notches in Google, SEO Elite will tell you.

Can it do all of that, or are the creators of this product just engaging in the usual hyperbole? Actually SEO Elite does exactly what the creators say it will do, provided that you are willing to make the effort to use it correctly. Building a network of links to your site is a time consuming process, and SEO Elite can, indeed, find hundreds of potential link partners in mere minutes. You simply need to contact them through an easy-to-use interface that will save you countless hours over doing it manually. Each time you tweak your site, you can use SEO Elite to see how well your changes are working. This tool can genuinely save you time and ease the process of search engine optimization.

All of this isn’t magic, of course. Tweaking your site to optimize it for the various search engines and your particular topic takes time and effort. There is no “instant” solution that will bring thousands of people to your site. Having quality content on your site is still a big part of the process. But SEO Elite is a powerful tool that, used correctly, can help you build a site that ranks highly for the topic of your choice. If understand the importance of search engine optimization, SEO Elite represents money well spent .

Thursday, January 4, 2007

Tips memperkenalkan website yg anda buat

Setelah Anda selesai mendesain dan meng-upload file bukan berarti tugas kita sudah selesai. Apa artinya kita punya website tapi nggak ada orang yang tahu ? Nah, supaya website kita dikenal orang ada beberapa cara yang bisa kita lakukan, yaitu :

  1. Daftarkan ke search engine
    Search engine banyak digunakan orang untuk mendapatkan alamat suatu situs berdasarkan keyword yang mereka masukkan. Di internet sekarang ini terdapat ratusan bahkan ribuan seach engine mulai dari yang ecek-ecek sampai yang besar, yang dikelola secara profesional. Anda tidak harus mendaftar web Anda ke semua search engine tersebut, tapi daftarkan saja ke beberapa searach engine yang terkenal yang ada di Indonesia maupun di luar negeri. Untuk pendaftarannya terdapat perbedaan antara satu search engine dengan search engine lainnya. Yang pertama, pada saat Anda mendaftar pada suatu search engine Anda harus memasukkan keyword dan deskripsi singkat tentang web site Anda. Contohnya Search Indonesia, Catcha, dll. Yang kedua, pada saat mendaftar Anda cukup menunjukkan URL website Anda. Setelah itu search engine tersebut akan "menjelajah" ke web Anda dan mencari keyword dan deskripsi yang terletak pada meta tag halaman web Anda. Untuk itu sebelum upload, pastikan bahwa Anda telah menuliskan meta tag tersebut dengan benar. (Jika Anda belum tahu tentang meta tag, lihat pada source code HTML pada halaman utama web site ini, filenya bernama index.shtml)

  2. Ikut Banner Exchange
    Ini cara lain untuk mengenalkan web kita. Dengan mengikuti pertukaran banner maka Anda diwajibkan untuk menampilkan banner orang lain (yang menjadi anggota) pada situs Anda. Dan sebaliknya banner Anda pun akan ditampilkan pada situs lain. Ukuran banner yang digunakan biasanya 468 x 60 pixel. Untuk membuat banner Anda dapat menggunakan Adobe PhotoShop, dan untuk membuat animasinya Anda dapat menggunakan Ulead Gif Animator.

Cara meng Upload ke web server

Setelah Anda mendaftar pada salah satu free server, maka langkah terakhir supaya halaman web Anda dapat dilihat semua orang adalah upload atau mengirim file ke web server.

Ada dua macam cara yang digunakan untuk mengirim file ke web server, yaitu langsung melalui browser atau melalui FTP (File Transfer Protocol). Untuk itu Anda harus mengetahui cara mana yang didukung oleh web server Anda. Sekedar contoh, www.homepage.com menggunakan browser untuk upload, www.virtualave.net menggunakan FTP sedangkan untuk www.tripod.com bisa menggunakan browser atau FTP. Yang akan dibahas di sini adalah mengirim file dengan menggunakan FTP.

Software yang dapat digunakan adalah WS FTP atau CuteFTP. (jangan bingung dengan kata FTP dengan WS FTP atau CuteFTP. FTP adalah protocol yang digunakan untuk berhubungan dengan web server, sedangkan WS FTP atau CuteFTP adalah software yang digunakan untuk berhubungan dengan web server. Singkatnya WS_FTP dan CuteFTP adalah software yang mendukung protocol FTP untuk berhubungan dengan web server).

Untuk langkah-langkah yang kami berikan di bawah ini menggunakan software CuteFTP dan web server www.virtualave.net. Anda dapat menerapkan langkah ini pada WS_FTP atau software FTP lainnya dan web server lainnya, karena pada prinsipnya adalah sama.

  1. Dari menu FTP pilih Quick Connect.
  2. Isi pada kolom host address, user ID dan password dengan yang diberikan web server kepada Anda. Kalau di virtualave.net misalnya host address = s36.virtualave.net, user id = winfolder, password = sda45sddf.
  3. Klik OK.
  4. Tunggu beberapa saat sampai CuteFTP sampai berhasil connect dengan web server.
  5. Jika koneksi berhasil akan muncul kotak dialog berisi keterangan-keterangan. Klik OK saja.
  6. Sekarang Anda lihat pada kolom sebelah kanan. Itu merupakan folder yang terletak pada web server Anda. Nampak folder bernama public_html. Klik dua kali folder tersebut. Nah, di folder itulah Anda harus meletakkan file-file Anda.
  7. Kolom sebelah kiri merupakan letak dari file di komputer Anda. Untuk itu pindah ke folder tempat Anda menyimpan file yang akan di-upload.
  8. Blok-lah file yang akan di-upload, lalu klik kanan dan pilih upload.
  9. Selesai sudah proses upload tersebut.
  10. Sebagai tambahan, Anda dapat membuat folder/directory baru pada web server Anda. Caranya klik kanan pada kolom sebelah kanan, pilih Make Directory, klik OK.
  11. Untuk perintah-perintah lainnya dapat Anda pelajari sendiri

Wednesday, January 3, 2007

Langkah-langkah Dalam Pembuatan Web Site

Setelah Anda membuat desain-nya maka yang harus segera Anda lakukan adalah mendaftarkan pada salah satu free web server untuk menempatkan desain kita. Untuk itu Anda bisa memilih pada salah satu free web server yang ada yang alamatnya terletak di bawah ini.

Terdapat dua macam free web server yaitu yang mengijinkan untuk akses ke direktori cgi-bin dan free web server yang tidak mengijinkan akses ke direktori tersebut. Dengan akses ke cgi-bin maka kita bisa menempatkan script kita sendiri. Misalnya script untuk buku tamu, mailing list, counter, dll. Dengan script yang dibuat sendiri maka Anda bisa membuat buku tamu tanpa perlu dijejali dengan iklan.

Tapi sebelum melakukan upload (mengirim file ke server) Anda bisa melengkapi web site Anda dengan :
Buku Tamu
Sehingga para netter yang mampir ke situs Anda dapat meninggalkan pesan, kritik atau sekedar komentar mengenai web Anda.

Counter
Dengan counter Anda bisa mengetahui berapa orang yang telah berkunjung ke situs Anda.

Mailing List
Kalau situs Anda dirasa berbobot Anda bisa melengkapi dengan mailing list. Sehingga orang yang terdaftar pada mailing list situs Anda akan mengetahui (misalnya) kapan situs tersebut di update.

FREE SERVER NON CGI
Angelfire Fortune City Free Servers
FSN Geocities Gurl Page
HomePage Homestead Internet Club
Nettaxi Webjump Xoom

FREE SERVER DENGAN AKSES CGI
Hypermart Virtual Avenue

beberapa servis e-mail gratis

Provider
Email
Kapasitas
Fasilitas +
4Anything ada 1000 domain
Another ada 6500 domain
Anti Social nama@anti-social.com
Anti Online nama@antionline.com
Bigfoot nama@bigfoot.com
BimaMail nama@bimamail.com
5 Mb
POP3
Email nama@mail.com, nama@email.com, dll
forwarding
Easy To nama@easy.to, nama@hello.to, nama@i.am, nama@hey.to, dll
forwarding
Flair Mail 700 nama
Flash Mail nama@flashmail.com
POP3, forwarding
FNMail nama@fnmail.com, nama@mailroom.com
POP3
Hotmail nama@hotmail.com
HotPop nama@hotpop.com
POP3
Join Me nama@joinme.com
forwarding
MailPlanet nam@mailplanet.com
40 Mb
POP3, autoresponders
Muslim Mail nama@muslimmail.com, nama@muslimonline.com
MyRealBox nama@myrealbox.com
5 Mb
POP3, IMAP
N2 Mail 150 nama
POP3 Free nama@pop3free.com
2 Mb
POP3
Race Mail @allracing.com, @dirtracers.com, @latemodels.com, @bikeracer.com, @dragracer.com, @racedriver.com, @boatracers.com, @indyracers.com, @stockracer.com, @truckracers.com
RunBox nama@runbox.com
100 Mb
POP3
UMailMe nama@umailme.com
2 Mb
POP3, SMTP
Yahoo! nama@yahoo.com
6 Mb
POP3, SMTP

beberapa servis e-mail gratis

Provider
Email
Kapasitas
Fasilitas +
4Anything ada 1000 domain
Another ada 6500 domain
Anti Social nama@anti-social.com
Anti Online nama@antionline.com
Bigfoot nama@bigfoot.com
BimaMail nama@bimamail.com
5 Mb
POP3
Email nama@mail.com, nama@email.com, dll
forwarding
Easy To nama@easy.to, nama@hello.to, nama@i.am, nama@hey.to, dll
forwarding
Flair Mail 700 nama
Flash Mail nama@flashmail.com
POP3, forwarding
FNMail nama@fnmail.com, nama@mailroom.com
POP3
Hotmail nama@hotmail.com
HotPop nama@hotpop.com
POP3
Join Me nama@joinme.com
forwarding
MailPlanet nam@mailplanet.com
40 Mb
POP3, autoresponders
Muslim Mail nama@muslimmail.com, nama@muslimonline.com
MyRealBox nama@myrealbox.com
5 Mb
POP3, IMAP
N2 Mail 150 nama
POP3 Free nama@pop3free.com
2 Mb
POP3
Race Mail @allracing.com, @dirtracers.com, @latemodels.com, @bikeracer.com, @dragracer.com, @racedriver.com, @boatracers.com, @indyracers.com, @stockracer.com, @truckracers.com
RunBox nama@runbox.com
100 Mb
POP3
UMailMe nama@umailme.com
2 Mb
POP3, SMTP
Yahoo! nama@yahoo.com
6 Mb
POP3, SMTP

Daftar situs pemberi beasiswa gratis

Di bawah ini adalah situs yang menyediakan informasi tentang lembaga, organisasi atau yayasan yang menyediakan beasiswa pendidikan dalam dan luar negri. Lengkap dengan penjelasan tentang syarat dan cara mengajukan lamaran beasiswa.

Belajar jadi Hecker pemula itu mudah (bag.2)

Setelah cracker berhasil mengidentifikasi komponen jaringan yang lemah dan bisa di taklukan, maka cracker akan menjalan program untuk menaklukan program daemon yang lemah di server. Program daemon adalah program di server yang biasanya berjalan di belakang layar (sebagai daemon / setan). Keberhasilan menaklukan program daemon ini akan memungkinkan seorang Cracker untuk memperoleh akses sebagai 'root' (administrator tertinggi di server).

Untuk menghilangkan jejak, seorang cracker biasanya melakukan operasi pembersihan 'clean-up' operation dengan cara membersihkan berbagai log file. Dan menambahkan program untuk masuk dari pintu belakang 'backdooring'. Mengganti file .rhosts di /usr/bin untuk memudahkan akses ke mesin yang di taklukan melalui rsh & csh.

Selanjutnya seorang cracker dapat menggunakan mesin yang sudah ditaklukan untuk kepentingannya sendiri, misalnya mengambil informasi sensitif yang seharusnya tidak dibacanya; mengcracking mesin lain dengan melompat dari mesin yang di taklukan; memasang sniffer untuk melihat / mencatat berbagai trafik / komunikasi yang lewat; bahkan bisa mematikan sistem / jaringan dengan cara menjalankan perintah 'rm -rf / &'. Yang terakhir akan sangat fatal akibatnya karena sistem akan hancur sama sekali, terutama jika semua software di letakan di harddisk. Proses re-install seluruh sistem harus di lakukan, akan memusingkan jika hal ini dilakukan di mesin-mesin yang menjalankan misi kritis.

Oleh karena itu semua mesin & router yang menjalankan misi kritis sebaiknya selalu di periksa keamanannya & di patch oleh software yang lebih baru. Backup menjadi penting sekali terutama pada mesin-mesin yang menjalankan misi kritis supaya terselamatkan dari ulah cracker yang men-disable sistem dengan 'rm -rf / &'.

Bagi kita yang sehari-hari bergelut di Internet biasanya justru akan sangat menghargai keberadaan para hacker (bukan Cracker). Karena berkat para hacker-lah Internet ada dan dapat kita nikmati seperti sekarang ini, bahkan terus di perbaiki untuk menjadi sistem yang lebih baik lagi. Berbagai kelemahan sistem di perbaiki karena kepandaian rekan-rekan hacker yang sering kali mengerjakan perbaikan tsb. secara sukarela karena hobby-nya. Apalagi seringkali hasil hacking-nya di sebarkan secara cuma-cuma di Internet untuk keperluan masyarakat Internet. Sebuah nilai & budaya gotong royong yang mulia justru tumbuh di dunia maya Internet yang biasanya terkesan futuristik dan jauh dari rasa sosial.

Pengembangan para hobbiest hacker ini menjadi penting sekali untuk keberlangsungan / survival dotcommers di wahana Internet Indonesia. Sebagai salah satu bentuk nyatanya, dalam waktu dekat Insya Allah sekitar pertengahan April 2001 akan di adakan hacking competition di Internet untuk membobol sebuah server yang telah di tentukan terlebih dahulu. Hacking competition tersebut di motori oleh anak-anak muda di Kelompok Pengguna Linux Indonesia (KPLI) Semarang yang digerakan oleh anak muda seperti Kresno Aji (masaji@telkom.net), Agus Hartanto (hartx@writeme.com) & Lekso Budi Handoko (handoko@riset.dinus.ac.id). Seperti umumnya anak-anak muda lainnya, mereka umumnya bermodal cekak - bantuan & sponsor tentunya akan sangat bermanfaat dan dinantikan oleh rekan-rekan muda ini.

Mudah-mudahan semua ini akan menambah semangat pembaca, khususnya pembaca muda, untuk bergerak di dunia hacker yang mengasyikan dan menantang. Kalau kata Captain Jean Luc Picard di Film Startrek Next Generation, "To boldly go where no one has gone before".

Belajar jadi Hecker pemula itu mudah (bag.1)

Nah, para cracker muda ini umumnya melakukan cracking untuk meningkatkan kemampuan / menggunakan sumber daya di jaringan untuk kepentingan sendiri. Umumnya para cracker adalah opportunis. Melihat kelemahan sistem dengan mejalankan program scanner. Setelah memperoleh akses root, cracker akan menginstall pintu belakang (backdoor) dan menutup semua kelemahan umum yang ada.

Seperti kita tahu, umumnya berbagai perusahaan / dotcommers akan menggunakan Internet untuk (1) hosting web server mereka, (2) komunikasi e-mail dan (3) memberikan akses web / internet kepada karyawan-nya. Pemisahan jaringan Internet dan IntraNet umumnya dilakukan dengan menggunakan teknik / software Firewall dan Proxy server. Melihat kondisi penggunaan di atas, kelemahan sistem umumnya dapat di tembus misalnya dengan menembus mailserver external / luar yang digunakan untuk memudahkan akses ke mail keluar dari perusahaan. Selain itu, dengan menggunakan agressive-SNMP scanner & program yang memaksa SNMP community string dapat mengubah sebuah router menjadi bridge (jembatan) yang kemudian dapat digunakan untuk batu loncatan untuk masuk ke dalam jaringan internal perusahaan (IntraNet).

Agar cracker terlindungi pada saat melakukan serangan, teknik cloacking (penyamaran) dilakukan dengan cara melompat dari mesin yang sebelumnya telah di compromised (ditaklukan) melalui program telnet atau rsh. Pada mesin perantara yang menggunakan Windows serangan dapat dilakukan dengan melompat dari program Wingate. Selain itu, melompat dapat dilakukan melalui perangkat proxy yang konfigurasinya kurang baik.

Setelah berhasil melompat dan memasuki sistem lain, cracker biasanya melakukan probing terhadap jaringan dan mengumpulkan informasi yang dibutuhkan. Hal ini dilakukan dengan beberapa cara, misalnya (1) menggunakan nslookup untuk menjalankan perintah 'ls ' , (2) melihat file HTML di webserver anda untuk mengidentifikasi mesin lainnya, (3) melihat berbagai dokumen di FTP server, (4) menghubungkan diri ke mail server dan menggunakan perintah 'expn ', dan (5) mem-finger user di mesin-mesin eksternal lainnya.

Langkah selanjutnya, cracker akan mengidentifikasi komponen jaringan yang dipercaya oleh system apa saja. Komponen jaringan tersebut biasanya mesin administrator dan server yang biasanya di anggap paling aman di jaringan. Start dengan check akses & eksport NFS ke berbagai direktori yang kritis seperti /usr/bin, /etc dan /home. Eksploitasi mesin melalui kelemahan Common Gateway Interface (CGI), dengan akses ke file /etc/hosts.allow.

Selanjutnya cracker harus mengidentifikasi komponen jaringan yang lemah dan bisa di taklukan. Cracker bisa mengunakan program di Linux seperti ADMhack, mscan, nmap dan banyak scanner kecil lainnya. Program seperti 'ps' & 'netstat' di buat trojan (ingat cerita kuda troya? dalam cerita klasik yunani kuno) untuk menyembunyikan proses scanning. Bagi cracker yang cukup advanced dapat mengunakan aggressive-SNMP scanning untuk men-scan peralatan dengan SNMP.