0

Penetrated new cyber attack Iran, with a worm, dubbed as the Stars. Stars rush quite confusing because Iran is still haunted by the past Stuxnet virus hit the country. Stuxnet is still considered a threat.

"We must know that the fight against Stuxnet not mean that the threat is completely lost, because the virus has a certain life span and they may continue their activities in other ways," said Gholam Reza Jalali, director of Iran's Passive Defense Organization

The Iranian government has confirmed they managed to neutralize Stuxnet, but it could be the offensive would again present. The virus is supposedly designed to sabotage nuclear power plants in Iran.

Initially, Stuxnet thought of as an ordinary worm is quite sophisticated. But, researchers then found a worm that targets specific systems' supervisory control and data acquisition "(SCADA). SCADA systems are used to control the pipeline, nuclear power plants and other manufacturing equipment.

Jalali assess Stuxnet still a potential threat. Even though the government argued, allegedly had damaging Stuxnet Bushehr nuclear reactor in Iran, because until recently had difficulty operating.

Iran accused the United States Stuxnet deliberately orchestrated and Israel, although there is no strong evidence regarding these allegations. And now, a new worm named Stars again hit Iran.
0

Lady Gaga has tearfully confessed on film that she thinks "people are trying to destroy her".

The 25-year-old singer broke down in a documentary extract posted online last night (24.04.11) and spoke of how much she fears criticism, admitting she feels like a "loser kid in high school."

In the black and white YouTube clip, posted before she went on stage in New York's Madison Square Garden for her Monster Ball tour, she sobbed: "I still sometimes feel like a loser. It's crazy, 'cos it's like we're at the Garden, but I still feel like a loser kid in high school.

'Sometimes I still feel like people are trying to destroy me... I cannot be destroyed and I will not be destroyed. And you will never destroy the kingdom that is my fans.'

The outlandish 'Judas' hitmaker - who was recently criticised on micro-blogging website twitter for the bizarre artwork of her new album 'Born This Way' which depicts her morphing into a mutant motorcycle - went on to say she feels like she has to "fight" to remain a "superstar" for the sake of her young fans.

She said: ' just have to pick my s*** up. Pick myself up and tell myself I'm a superstar every morning just so I can get through this day.

' feel like I have to fight. I'm fighting for every kid that's like me, that's felt like I've felt and feels like I still feel."

She added: ' just wanna be a queen but sometimes I just don't feel like one. It's not about being a winner for me anymore, you know. It's about being a winner for them.'

The clip was filmed as part of documentary 'Lady Gaga Presents The Monster Ball Tour: At Madison Square Garden' which will be aired next month.

Source
0

London group The Domino State are the underrated alternative champions to avoid trends and instead offer a chilly yet beautifully composed offering You Are the Winter from album Uneasy Lies the Crown.

Acutely euphoric yet still heavy and moody You Are the Winter combines a clean sound with graceful vocals and lyrics: “a chance to carry on no matter what the strangers say”. Meeting somewhere between White Lies and Joy Division, this is a band that Snow Patrol would die to sound like on this track.

Sounding like a prayer cried out over a precise yet flowing instrumental, The Domino State have deservedly opened for Coldplay at the O2, appeared at Glastonbury and had radio play around the world, however 2011 is set to be the year in which they receive full status and deserved hype.

A year of European touring and launching Uneasy Lies the Crown around the continent will hopefully mean more recognition and a stronger acknowledgement from one of the highest quality indie bands of the year.

Source
0

Jagermeister have announced a ground-breaking exclusive 'Jägermeister Ice Cold Event' taking place on Wednesday 11 May 2011 at Battersea Power Station, starring legendary rock 'n' roll royalty Alice Cooper appearing in 4D.

The 'Jagermeister Ice Cold Event' is set to make history as the UK's first holographic 4D rock gig and will celebrate the release of the new Alice Cooper Box Set OLD SCHOOL: 1964-1974.

Featuring original band members Alice Cooper, Dennis Dunaway, Neal Smith and Michael Bruce, plus Steve Hunter standing-in for the late Glen Buxton, the 'Jägermeister Ice Cold Event' will be the first time the group has 'appeared' together in the UK since 1972.

'We couldn't resist this,' says Alice, 'Working with Jagermeister to appear as holograms on the other side of the Atlantic is the ultimate experience, a cutting-edge conjuring trick that celebrates the future and our history. We can't wait to see the results.'

source
0

1. Belle Sorenson Gunness-Victim: 42

Of the 10 names of women in the world tersadis, Sorens Belle Gunness, was at first warning. This woman is considered super sadist who kills his victims in order to satisfy the pleasure and greed. Belle is estimated to have killed 42 victims. Terrible, she cleared the victims because of their greed to the property. Some historians say, Belle also had killed two children in a way to poison them just to be able to claim the insurance money on behalf of her two children. The death of her children were reported as caused by the attack of colitis, but symptoms of this disorder is very similar to poisoning.

And if you want to be seen, Belle is not the women who live in poverty and berkekuarang. He was born in Norway, he moved to the United States, and married to a businessman in Chicago. Cunning brain, and the madness will make the money he burned his family's business, and insurance claims.

Does not stop there, he was also suspected to be behind the strange death of her husband, with the motivation of the insurance money.

Belle ensnare middle-aged men by pretending to fall in love, but when they are caught, the man would meet 'death'. Usually, through strange accidents. He married again and again, with lonely men, they did not realize he was behind pesonannya cold-blooded killer. He can calmly with a smile on his victim, when the murder plan. No wonder when this case revealed a lot of doubt whether Bella is really 'human' or incarnation of Satan on earth.

Then the world was excited when it found a massive 42 skeleton buried near his home. Of these victims Bella success raising money for more than a quarter million dollars. Once, his body was found in a pathetic condition, his head severed and burned body. Who yng treat it with sadistic? Is this because of revenge. About the gruesome discovery of the corpse is still controversial, is it true that she is Belle or other women. But who certainly since the strange case of the discovery of the corpse, Belle never appear again.

2.Jane Toppan - Victim: 31

This case was horrible because it happened in the hospital. Nurses who 'preys' patients who are sick and weak. It is said that the nurse who was stout-bodied, have a problem of childhood trauma, so he turned into a cruel woman. Jane, as the name of this sadistic nurse, has a crazy father, he grew up in an orphanage in Boston, and turned into a rough personal. Then he picked up the child by a foster parent.
Poor living with her adoptive parents make a mental disorder is getting worse .. Interestingly, he successfully completed the school nurse, and began working as a nurse at the hospital. Apparently he was pleased with his new activity, and he earned the nickname "Jolly Jane". The nice thing for him is, not because she could care for the sick, but rather, performing sexual activities with the sick patients who have been given such a drug to him.

Jane behavior was almost like raping his patients who are not aware of sexual activity because of the influence of drugs. Terrible, after that, he was killing his victims.

Often, he went to the victim who was sleeping and mencabulinya. Patients selected were weak and unable to resist the body kekarnya. Jane in sex and brutality of this killing, finally revealed after he killed 11 patients in 1885. Apparently after being arrested even lust kill Jane did not stop. He claimed to have killed 31 people.

And he was proud of what he had done. His name is recorded in history as one of the most murder of helpless victims in a condition such as pain - men and women than anywhere in the world. In court, she was released because he suffered from mental disorder and he lives in Taunton Insane Asylum.

Elizabeth Bathory 3.Countess - Multiple Victims (blood bath of victims to stay young)

Known as The Blood Countess. This is because the strange behavior of the hobby of killing young women with blood reason they can make them ageless. So after the killing, the blood of his victims he was accommodating in a scene, and then worn for bathing. He believes the blood of young women, to make it younger. Horror! Cold-blooded woman is really experiencing a severe mental disorder. Sometimes, he not only killed one victim in one occasion, but several at once.
Once when her naked body was covered in blood (blood bath) and then he sent another victim who was still licking her whole body covered in blood. That's where it gets strange woman's sexual sensations. Yes, apart from lust to kill, here also there is sexual appetite of women jahanan it. Maybe this is the true story of the most gruesome horror in history. He was so fond of blood, as if the sight of blood arouses passion sexnya. He dubbed the female vampire in real life. Because he practiced in their daily life stories of blood-thirsty vampire. Rumors story of Bram Stoker's Dracula allegedly constituted with these horror stories. Terror is the case in the Kingdom of Hungary (now Slovakia).

How do predators mengaet Elisabeth victim? That said, he sought his prey in the villages, mostly women and young beautiful women. To them she was promised a job in the palace. Those who are enamored with the easy confidence with the promise that royal lady, and followed him to the palace. Apparently there until they were in prison under the ground. They were slaughtered one by one Elisabeth who uses his blood to wash.

That said, her husband, Ferenc Nadasdy, allegedly knowing his wife's crime, even he was reportedly involved. He even gave out awards for his wife Sebuat castle used as a place of torture and murder of young women who poor.

4. Rosemary West -10 (maybe more)

His name is so famous, described as the most evil woman. The victim chosen at random in the streets, they are a young person who is so naive and believe that Rose will give them food, lodging and clothing. Really vain nasih young girls who can dikecohkan by Rose. Because once they take Rose, then the nightmare will be with their lives until the end of life.

Rose is a mother of eight children. She is a depraved slut very sadistic, even in sexual behavior even he really liked sex games combined with persecution. In fact, Rose is not alone in doing the killing, along with her second husband, he killed 10 people, including a daughter named Heather.

Rose is a product of sexual harassment and violence experienced during childhood. Trauma is so in making his life disrupted and eventually behave sadistically. The couple usually raped his victims before killing it first. And it was all done them in his house at 25 Croamwell Street. In those days many girls are reported missing young girl of indeterminate rimbanya.

It was reported that they claim to have killed about 20 people around a young girl, could be more because Rose sometimes murder their own. So far, many cases of murder or disappearance of young girls in Gloucester, England, this could be an act of Rose and her partner.

5. Aileen Wuornos - Victim: 8

Childhood marked by the terrible neglect and incest mislead young people Aileen Wuornos, thus turning them into killing machines. At age 13 he was sexually abused until finally pregnant. The boy was then given to another person for adoption. Age 15 years he was expelled from his grandfather's house. Since then there have appeared signs of mental disorder on the antisocial self Aileen.

He also conducted a series of crimes such as violation of law, a store with armed robbery, and he's desperate to marry 70-year old grandfather that he actually made the object of harassment. After that he met with a female prostitute who was a lesbian. Then be paired with a prostitute she was a lesbian. Her lover named Tyria who worked as prostitutes to earn money for their life together. Originally Aileen also earn money by selling themselves on the road.

But the rough and harsh treatment he got during the first day of practice as a prostitute. The man was in fact raped her brutally. Aileen fight eventually kill him. This is the first victim. Apparently, when he claimed to enjoy killing. There is something that pleases him when killed. But first he confessed that he killed for defending themselves. Since then, he became addicted to killing. At least he had killed eight men, seven of which came from Florida.

The killings were generally performed on victims who digaetnya when he was hawking himself. Aileen case this was filmed in 2003 with the title "Monster" is a movie psychology of how a beautiful woman transformed into a gruesome killer. Before the execution, Aileen became angry, he attacked the media, lawyers are also people, who made his life to be like that.

6. Andrea Yates-Victim: 5

Sometimes, severe mental illness may play a role in serious crime. Personality disorders like narcissism is often present, but, there are many serious illnesses, like schizophrenia, which causes sufferers to hear strange noises and follow the instructions that he heard.

In the case of Andrea Yates who killed her five children by drowning them in the tub, is suffering from a mental illness that one serius.Dari all women in the list, he seems the most likely to be clinically insane.
Andrea Yates was not diagnosed as schizophrenic, but he suffered from serious mental illness. He suffered from severe postpartum disorders. Depression and suicide attempts. Moreover, consecutive then she in turn gave birth, which makes it worse. Her husband, a minister, Rusty, so want to have many children, no matter if his wife's condition. Until finally Andrea became uncontrollable and kill all of her children. Psychiatrist Andrea blamed her husband because he was the trigger of this tragedy happened.

Time of the incident, Rusty, do not know if Andrea was in serious condition. Usually he prepares a person to assist Andrea in care of her children, but this time it did not. He let Andrea alone with her children. In a situation of depression eminence, Andrea decided to end the life of the child and family.

In a short time, Andrea had drowned her five children, after which he reported to 911 said that he had committed a crime. During an interview after the offense, he admitted, deliberately end the life of her children to avoid the sin. And it is best to kill them.

7. Beverly Allitt - Victims: 4

Dubbed the "Angel of Death". This British-born serial killer. Beverly Allitt was a registered nurse who abuse their position to his desire to slaughter the children are innocent. Victims of the victims were injected potassium chloride or insulin, in order to cause a heart attack.

Like many serial killers, this woman committed murder quickly. In a short time, he attacked 13 children in the ward, and killed four of them. These attacks all occurred within a period of two weeks. Children who become victims aged between 5-7 years, the age at which they can not do much to save his life.
When this case came to light, a psychiatrist concluded she suffered from a mental health disorder known as bizarre Munchausen by Proxy Syndrome, which causes him to hurt and kill children in order to get attention from others.

For his actions, he received a life sentence, but placed in the Mental Hospital with maximum Security. At the hospital it is also inhabited by the patients criminal patients who suffer serious mental illness. Families of patients who kill have threatened to kill himself if he is free.

8. Karla Homolka-Victim: 3, from Canada.

This blond woman known as very like massacring fellow women, including younger women. Karla case is described as one of the most gruesome serial murder cases committed by a woman. Terhdap the women victims, he did not immediately killed, but before he drugged them, then raped and massacred.

One of them is her own sister who died after being drugged Karla. When caught, Karla intend to lighten his sentence by way of an offer to the authorities that he will give all the information in the case, but with a requirement to get leniency. Told police she declared, her husband, Paul, was involved in the crime.

But her husband objected, she said, Karla himself was the one who did all the killings. Karla admitted he did it all because it is pressed her husband, who threatened to do it or die. And he had no choice but to take part in the 'game' husband.

Many people who angry and disgusted with himself that defense. This case has been interesting debate around issues of psychology and motivation of the perpetrator was. Then it was revealed that psychiatric disorders because of the depressed perkimpoiannya life, where she felt her husband wasted.

Interestingly, Karla, cold-blooded killer, while in jail following the class lecture away, and managed to graduate as an undergraduate.

9. Susan Smith - Victim: 2

Susan looks severe mental disorders after the death of her two young-old, Michael and Alex. But the trigger was a mental disorder in a controlled manner is his lover, Tom, whom she loved who decide their relationship for granted. Susan is frustrated, then driving a car and took two small children to the edge of the lake in South Carolina.

Then he came out of the car is on top, then set her car without brakes in a position so they can walk on his own. Two of the little boy inside. After releasing the brake, the car is running slowly, he just watched from the outside. Then the car with two children who were sleeping in the back seat, jumped into the lake.
After that, like the scene is set up, he pretended to be hysterically and report to the police about the incident. He told police there are evil people who do that. But all this lies finally revealed by police.

Susan suffered a mental disorder after trauma experienced in childhood Dui where he suffered sexual abuse and incest. Perhaps the trauma is so strong sticking which changed his personality, he became very narcissistic and often claimed to have had illusions and nightmares.

He admitted sexually abused by her stepfather when I was young, but his mother did not defend him. The attitude of her mother made her hurt, and save big anger in him. When he was growing up, he was also concerned with the sex, and desire to get love and life on easy street. These are all classic signs of narcissistic personality disorder.

He was sentenced to 30 years in prison. There ulahnya not stop, he was involved in sex with two prison guards, one of which has been 'rewarded' sexual transmitted diseases.

Downs 10.Diane-Victims: 1

Diane Downs, has memories of a romantic relationship during her children with Lew. But when they grow up, Lew said that the love story of childhood memories, it is not a priority in its future. Diane was devastated Lew will notice a very painful for him. He was desperate and making plans to kill her children.

His children from previous marriage, Christie, Cheryl and Danny, will dibantainya with his own hands. In a creepy night, he drove the car with her three children, then parked his car on a deserted road, and then kill her second child, Cheryl (7) in cold blood. Christie (8) eldest son, and Danny (3) his youngest son, was also slain.
They were rewarded with hot lead by their mother's dark eyes. Luckily, the three children, two survived, only Cheryl who died horribly, while Christie and Danny escape from death, although both had severe injuries. Danny, the youngest, was paralyzed from the legs down because his mother shot him at close range right on vital points, while Christie suffered a serious injury, and paralyzed on one side of his body and suffered from speech difficulties due to severe shock.

But Christie a little incredible. When he was brought to court as witnesses his mother's case, she boldly describes the incident to the judge. The courage of this young girl in seeking justice for him and his sister are dead, really touching. How small Christie in his childhood forced to testify against his mother's sadistic. Everyone was weeping bitterly over this kid miserable experience.

But his mother, Diane Downs with stout instead pleaded not guilty for what happened to their children. Former postman in the State of Oregon, is now long past the day of days in penjaraa. He fills a boring day today with a letter write to each other with a fellow prisoner heavyweights such as rapists, murderers, including serial killer Randall Woodfield. Want to know the contents of his letter, around issues of sexual desire, that it 'dirty' and sinister.
0

Wesley Sneijder and Rafael van der Vaart were interviewed on AT5 Studio Ajax today.

“Do I want to go to United? It’s a beautiful club,” he said. “But I’m fine in Milano and I’m not at the point to think about it.”

Van der Vaart was happy to encourage Sneijder to join, despite getting in a dig about the city of Manchester.

“You see all those players from Manchester United and City are coming to London,” said van der Vaart. “So that says a lot about the city, I think. But it would be fun. Wes can also enjoy stopping by in London. Man United is a better club than Inter.”

Sneijder claimed that he would like to return to Holland at some point thought.

“When I return, whenever it happens, it will be for Ajax.”

Source
0

1. We would have taken any three points today. To get them on the back of a good performance and well worked goal is very nice. Everton were resilient and it was becoming a worry whether we’d be able to break them down, but we kept our nerve, passed the ball around well and were patient.
2. Chicharito, I love you. What a début season. Just when you think it can’t get much better for him, he pops up with a late winner like that. After blocking Nani’s on target shot with his arse in the first half, you wondered whether it was going to be his day. But his movement was great all game, always on the shoulder of the last man and had a good couple of efforts saved by Tim Howard. After picking up a yellow card for wasting so much time, I imagine he wished he just got on with it when Chicharito put us 1-0 up with just over 5 minutes left. Great header, well done lad.
3. Anderson deserves credit for his performance after playing through some brilliant balls for our forward men. He’s been here years so it’s weird not to have a conclusive opinion on him. Injuries have delayed his progress and at times he can be very frustrating. Yesterday he did well, which is all the more worthy of praise when you consider who his midfield partner was. It was a little disconcerting to see Jack Rodwell’s performance though, in light of the likelihood of him becoming a United player. He should have bossed the centre of the park yesterday but he was anonymous. Just back from injury so maybe we’ll let him off. And of course, I won’t complain if an opponent has a bad day against us but it did come as a surprise.
4. Whilst not the biggest fan of football clichés, I’m glad we’re getting to hear “he’s like a new signing” banded about. Antonio Valencia has been great since returning from injury and totally superseded my expectations. To suffer a broken ankle, you had to wonder whether he was going to come back at all this season. You had to wonder when he did come back, whether he would be the same player. So to have him back for the last three months of the season, playing as well as he is doing, is brilliant. I love how strong he is and how that doesn’t compromise his speed. I love how he runs at players and is so often successful at beating them. One of my favourite moments of the games was when he shrugged off Leighton Baines with ease when charging in to the box. In the lead up to the goal, it was him that won the ball back for United, before crossing to Chicharito at the back post. When a looking at a title that could go down to the wire, Valencia is making a big difference for us.
5. Fergie used his substitutions well and they made a big impact. I’m not entirely sure I agree with resting players at this season in the season, particularly against a side as strong as Everton, but he pulled it off. Michael Owen’s movement gave them a head ache at the back, now having to track his runs as well as Hernandez’s. Patrice Evra was on for just half an hour but it was one of his better half hours of the season. We looked far more likely to score with him running in to the box and pulling the ball across the face of goal. Ryan Giggs provided a greater threat too and his substitution allowed for a more central role for Wayne Rooney, who maturely got on with the task in hand for the last ten minutes or so. He came very deep and helped keep possession as we waited for time to run out.

source
0
London - revealing personal secrets from his own carelessness is often the case,

such as this one case. Having previously sealed his case in court, he even made ​​a blunder on Facebook.

This case happened 16 years of British teenager who idly clog drains in the toilets of a public library. Using toilet paper, these teens make bad drains and end up broken.

Vandalism was done by nightfall, so the water continued to trickle through the night and wasted it. Noted, this ignorant action causing losses of more than U.S. $ 200 thousand.

As a result, the action of hoodlums who this unnamed smell also and the case brought to court. But during trial, as quoted from Cnet, on Monday (25/04/2011), this naughty teen did not confess.

Clever-clever squirrel melopat, eventually falling as well. Naughty finally known also by the judge who handled his case. Funnily enough, this fact is disclosed due to his own carelessness on Facebook.

"Yes, I keep it a secret. Some friends know about it," he said on Facebook, answered a question from a friend after the hearing. From there, the investigation continues and he could no longer deny his actions.

Due to this vandalismenya action, public libraries should be closed for five months. The judge also mentioned the possibility of the perpetrators would be jailed.
0

BLORA-Sitimulyo Villagers, District Cepu, Blora, Central Java, a sudden uproar after one of its citizens find legged lizards are similar to the human wrist.

Rare and unusual incident was immediately spread from mouth to mouth until out Blora. Residents continued to arrive to see and capture this strange lizards up close.

At first glance there are no irregularities in the lizard's body found in Sudarno (39), resident RT 05/10, Sitimulyo, Cepu, this. However, if observed, the legged lizard-like human wrists. The size is small like a baby's hand.

Sudarno pleaded not accidentally receive the male iguana from a friend who used to hunt in the Forest Klagen, Kedungtuban. When going to slaughter, the man who daily sell satay iguana just realized that there are strange in the second pair of legs lizards.

Over the years dealing with these reptiles, Sudarno new claim form to find the ankles like that. Finger on foot iguana that long nails.

Peculiarities found in animals that have 120 centimeters long and weighs over 25 pounds, it was nevertheless Sudarno kill it. He said they were afraid something would happen even though he did not get a hunch or a dream before.

Sudarno intend to maintain this strange lizard by feeding frogs. He also will not sell to anyone.
0

After attending the beer Viagra, herb plants erections for impotent men now present again in other forms that are equally unique. Impotence drug that will be used to coat a special condom that can arouse penis lackluster. Special Condoms will be made ​​and marketed by the largest companies in the world of Durex. Process antiimpotensi permission to bring drugs in condoms is now managed and is expected late this year can be sold freely in the market.
Compared Viagra (Sildenafil) to be redeemed by prescription, condoms are more practical. Men who do not want to get caught impotent does not need to come to the doctor tersebih advance to obtain the drug, simply come to the pharmacy and buy condoms.
Layers of drugs on this condom contains a gel which vasodilatator, ie drugs to dilate blood vessels. Widened blood vessels in the penis, increasing blood flow smoothly which will help the process of erection in the male impotence and premature ejaculation sufferers.
Not sure what kind of vasodilatator that will be used, but certainly not the real Viagra. Even so, the efficacy is claimed is not only desired by Viagra blood circulation in the penis by inhibiting PDE-5 enzyme. Laboratories that holds the patent for the design of these unique condom, Futura Medical PLC care center orbit permits in Europe and is expected to finish mid-2011. If there is no impediment, the end of this year's bright green condoms have started to be marketed. "This gives 2 benefits of condoms, which prevent transmission of genital infections and overcoming erection problems in men impotent, Reveals Futura Medical PLC director, James Barder, as quoted by FoxNews, Friday
10

Buat para Penggemar IT nih gw coba jelasin gimana cara membaca binary trus ngerubah binary jadi ASCII, ini gw ambil dari forum, jadi kalo ada kesalahan ya mohon diampuni..

1. Pengenalan
2. Sistem biner
3. membaca biner ke dalam ASCII.[@more@]


1. Pengenalan

Ketika kita melihat sistem biner maka yang kita temukan hanyalah sekumpulan digit yang hanya tersusun dari angka 0 dan 1 dan tampak acak sehingga sangat sulit bagi kita untuk bisa memahami apa sebenarnya yang direprsentasikan oleh digit-digit tersebut, seperti:

010010101010101001101011

Tetapi pada dasarnya sekumpulun 0 dan 1 ini bisa direpresentasikan dengan angka desimal dan pertama-tama tentu kita mencoba membaca desimal yang terwakili di dalam sekumpulan 0 dan 1 tersebut. Dan dari angka desimal kemudian bisa diterjemahkan ke dalam teks. Memang komputer sendiri tidak menggunakan sistem desimal ini ketika teks-teks di dalam komputer terkonversi menjadi sistem biner. Jadi cara baca kita ini bukan proses yang dilalui oleh komputer.

2. Sistem Biner

Pertama-tama dalam membaca biner kita layaknya sedang berhadapan dengan bahasa Arab atau Hebrew di mana kita harus membacanya dari kiri ke kanan. Dan sekumpulan angka 0 dan 1 itu biasanya (biasanya apa pasti begitu ya hehehe bukan orang komputer nih, tapi nampaknya kalau melihat 8 bit sih ya memang dibagi ke dalam per 8 digit?) dibagi ke dalam 8 digit maksimal dan setiap digit secara berurutan merepresentasikan nilai value kali 2 selamanya. Jadi nilai-nilai tersebut dimulai dari kanan adalah sebagai berikut:

- Digit pertama adalah bernilai 1
- Digit kedua adalah bernilai 2 yaitu 1 x 2
- Digit ketiga adalah bernilai 4 yaitu 2 x 2
- Digit keempat adalah bernilai 8 yaitu 4 x 2
- Digit kelima adalah bernilai 16 yaitu 8 x 2
- Digit keenam adalah bernilai 32 yaitu 16 x 2
- Digit ketujuh adalah bernilai 64 yaitu 32 x 2, dan
- Digit kedelapan adalah bernilai 128 yaitu 64 x 2 (dan seterusnya dengan kelipatan kali 2 dari digit sebelumnya)

Kemudian, angka 0 dan dan 1 merupakan perwakilan dari salah dan benar (False or True) atau dengan kata lain adalah (yes or no) sehingga ketika digit pertama dipresentasikan dengan angka 1 maka nilai 1 adalah benar dan begitu seterusnya. Dalam contoh akan menjadi lebih jelas sebagai berikut:

10101 adalah sekumpulan sistem biner yang terdiri dari 5 digit di mana digit pertama adalah benar, digit kedua adalah salah, digit ketiga adalah benar, digit keempat adalah salah, dan digit kelima adalah benar. Maka terjemahan sekumpulan biner ini dalam desimal adalah 21. Atau dengan kata lain, ketika anda menginginkan desimal bernilai satu maka dalam biner anda menuliskannya dengan 0 1 dan kalau anda menginginkan nilai 2 maka dalam biner dituliskan dengan 1 0. Misalkan anda ingin merepresantasikan 8 dalam bentuk biner maka anda menuliskan 0 untuk digit pertama karena anda tidak meninginkan nilai 1, menuliskan 0 untuk digit kedua karena begitu juga, dan seperti itu juga pada digit ketiga karena anda tidak menginginkan nilai 4, tapi anda menuliskan 1 pada digit keempat karena digit empat bernilai 8 sehingga akan menjadi 1 0 0 0.

Hal yang terpenting juga, semua digit 0 dari kiri ke kanan tidak terlalu penting karena 1000 akan bernilai sama dengan 0001000. Akan lebih jelas dalam bentuk sebagai berikut:

Pertanyaan, sekumpulan biner ini merepresentasikan apa dalam desimal?
a) 100
b) 000100
c) 100000
d) 0010

Jawabannya:
a) 4
b) 4
c) 32
d) 2

Apabila kita sudah mengerti jawaban di atas maka pada dasarnya kita sudah mengerti sistem dasar biner. Kemudian apabila kita paham dengan nilai yang selalu kelipatan 2 ini maka bagaimana kita merepresentasikan nilai desimal yang ganjil di mana tidak bisa dikali 2. Untuk mendapatkan nilai tersebut maka dalam biner kita tambahkan dengan nilai yang diwakili oleh digit itu sendiri. Misalnya kita menginginkan nilai 3 maka dalam biner dipresentasikan dengan benar pada digit pertama dan benar pada digit kedua maka tertulis dalam biner dengan 1 1, maka nilai 1 pada digit pertama ditambahkan dengan nilai 2 pada digit kedua = 3. Ini adalah total nilai dalam sekumpulan biner dan begitulah cara merepresantasikanya dalam biner

Dalam contoh lain, kita ingin merepresentasikan nilai 5 dalam binary maka kita membutuhkan untuk menambahkan nilai digit pertama dengan digit ketiga. Nilai 5 tertulis dalam biner dengan 101 dan kita membacanya sebagai berikut:

- 101 kita baca dari kanan adalah 1 (satu) + 0 (dua) + 1 (empat) = 5. Dalam contoh lain:
- 001011 kita baca dari kanan adalah 1 (satu) + 1 (dua) + 0 (empat) + 1 (delapan) + 0 (enambelas) + 0 (tiga puluh dua) = 11. Jadi yang kita jumblah adalah nilai dalam kurung apabila bernilai 1 pada binernya.

Pertanyaan, berapa nilai desimal dari rangkaian biner berikut:
a) 11011
b) 110
c) 010101
d) 10110

Jawabannya:
a) 27

b) 6
c) 21
d) 22

Apabila kita sudah mengerti ini maka pada dasarnya kita sudan mengerti sistem biner. Memahaminya memang susah, tetapi menjadi mudah dengan begini kan? Sekarang bagaimana makna biner tersebut dalam teks.

3. Membaca biner ke dalam teks (ASCII)

ASCII pada dasarnya adalah hurup-hurup, angka-angka, dan simbol-simbol (hurup simbol) yang tampak dalam komputer kita yang sudah terwakilkan dalam bentuk font sehingga sudah kita baca dalam bahasa manusia. Hal itu bisa kita pahami bahwa setiap kali kita mengetikkan suatu hurup dari keyboard maka itu kemudian dikonversi dalam code yang sesuai dan tepat, apa saja tut yang kita tekan baik berupa angka atau hurup.

Sebagai contoh, dalam sebuah binary yang panjang kita tuliskan sebagai berikut:
0100100001100101011011000110110001101111

Dari sekian banyak sekumpulan kode biner ini terwakili beberapa hurup dan angka untuk code ASCII. Dan dengan delapan digit saja sudah lebih dari cukup untuk mempresentasikan sekian hurup dan angka dan sebagaimana pada dasarnya kode-kode biner dipisahkan dalam 8 digit di mana itu merupakan presentasi 8 bits setiap hurup. Maka code di atas kita baca seperti ini:
01001000 - 01100101 - 01101100 - 01101100 - 01101111

Setelah itu kita mencoba membaca nilai desimal dari setiap 8 digit ini dengan mengkalkulasikan setiap nilai dari digit yang mewakilinya, sebagai berikut:

01001000 = 72
01100101 = 101
01101100 = 108
01101100 = 108
01101111 = 111

Kalau dalam membaca nilai setiap digit yang diwakili code biner tersebut dari sebelah kanan, maka membaca nilai ASCII tetap dilakukan dari kiri sehingga code biner dalam contoh di atas adalah 72, 101, 108, 108, 111. Sekarang hurup apa saja yang diwakili oleh angka-angka ini dalam code ASCII, baik hurup, angka atau hurup simbol? Tentu kita harus melihat table code ASCII. Akan tetapi dengan komputer bisa dilakukan dengan mudah, yaitu dengan menekan tombol ALT + [Angka tersebut]. Dari contoh di atas, satu persatu kita tekan ALT + 72 dan seterusnya maka hasil yang kita dapatkan adalah:

72 = H
101 = e
108 = l
108 = l
111 = o
Maka code biner dalam contoh kita tersebut bisa dibaca dengan bahasa manusia yang ternyata adalah Hello.

Pertanyaan, bacalah code ini dalam teks?
01000011011011110110111001100111
01110010011000010111010001110101
01101100011000010111010001101001
01101111011011100111001100100001

Tentu saja langkah pertama adalah dengan membaginya dalam delapan digit yakni 8 bit, seperti sebagai berikut:
01000011 - 01101111 - 01101110 - 01100111 - 01110010 - 01100001 - 01110100 - 01110101 - 01101100 - 01100001 01110100 - 01101001 - 01101111 - 01101110 - 01110011 - 00100001

Silahken dicari sendiri jawabannya, jangan nyontek ya...oiya, tanda - sengaja gw tambahkan untuk mempermudah pembagian aja
0

Desktop Drapes adalah Wallpaper Manager untuk Desktop Gnome. Dengan aplikasi ini, kita dapat merubah wallpaper kita secara otomatis setiap interval waktu tertentu (sesuai settingan kita) misalnya ganti wallpaper setiap 5 menit.

Untuk menginstall Desktop Drapes buka terminal dan ketik:

sudo apt-get install drapes


Setelah ter-install buka Desktop Drapes. System-Preferences-Desktop Drapes. Seandainya tidak "keluar" aplikasinya, bisa dilihat di Gnome panel atas (berupa icon). Untuk mengatur Drapes, cukup klik kanan icon dan pilih preferences.

source
0

kali ini saya bikin informasi buat yang lom tau, jadi kalo bagi teman teman yang udah tau, mohon di koreksi kalo ada yang salah

Mungkin semua yang berkunjung ke sini tau dan sering menggunakan internet, tapi ga semua tau apa dasar dari internet tersebut. Kali ini saya ga bikin postingan mengenai sejarah awal dari kelahiran internet, tapi mencoba menerangkan sedikit dasar dasar yang perlu kita ketahui mengenai internet itu sendiri, khususnya bagi temen temen yang pengen mendalami blog.

yok kita mulai….

a. Blog

menurut yang saya dapat dari wikipedia, blog berasal dari kata “web log” yang artinya adalah bentuk aplikasi web yang menyerupai tulisan-tulisan (yang dimuat sebagai posting) pada sebuah halaman web umum. Tulisan-tulisan ini seringkali dimuat dalam urut terbalik (isi terbaru dahulu baru kemudian diikuti isi yang lebih lama), meskipun tidak selamanya demikian. Situs web seperti ini biasanya dapat diakses oleh semua pengguna Internet sesuai dengan topik dan tujuan dari si pengguna blog tersebut.

Nah, setiap blog itu diakses dengan cara mengetikkan nama domain dari blog yang bersangkutan, seperti: sihendri.com, blablabla.wordpress.com, blablabla.blogspot.com dan lain lain. Nah, apa itu domain?

b. Domain

Domain adalah nama unik yang diberikan untuk mengidentifikasi nama server komputer seperti web server atau email server di internet. Domain memberikan kemudahkan pengguna di internet untuk melakukan akses ke server dan mengingat server yang dikunjungi dibandingkan harus mengenal deretan nomor atau yang dikenal IP.

Gimana cara dapatin domain? Banyak cara, mulai dari yang gratisan sampai yang berbayar (biasanya pembayarannya per tahun). Kalo pengen gratisan, bisa didapat dari co.cc, co.tv dan lain lain. Kalo berbayar, bisa didapat banyak web registrar seperti name.com, namecheap.com, godaddy.com atau penyedia lokal, cukup ketik ajha: “jual domain” di google.com.

Jadi kalo udah punya atau beli domain kita udah punya blog?? eiitsss.. tunggu dulu…kita butuh hosting…

c. Hosting

Hosting?? apa pula itu?

Hosting adalah space dalam server atau lokasi di hard disk server komputer yang di gunakan sebagai penempatan data dan file yang ada. Jadi file index.php atau index.html yang jadi halaman sebuah web diletakkan di hosting.

Nah, muncul sebuah pertanyaan.

“saya register domain di name.com trus beli hosting di bluehost, trus gimana domain ama hosting tadi bisa konek sehingga bisa di akses?”

Jawabannya: pada domain panel atau tempat mengelola domain, ada yang disebut name server. apa itu name server?

d. Name Server

Sederhananya Name Server adalah penerjemah nama domain tadi ke dalam sebuah IP address, jadi domain sihendri.com tadi di terjemahkan ke dalam ip address 66.174.244.181 yang (mungkin) merupakan IP address komputer server yang ada di bluehost (sihendri.com hostingnya di bluehost)

Bingung? simple nya Name Server menghubungkan domain tadi dengan hosting anda. Kurang lebih begitu deh..
0

Ritchie de Laet joined Portsmouth on loan in January, after already playing for Preston and Sheffield United on loan this season.

This week he has claimed that he’s really happy with the progress he’s made over the last few months on the south coast.

“This must be my best-ever season because I am playing that many games,” he said. “I’ve been playing here for 18 games in a row now and I’m enjoying it. I need the experience to get into that first-team squad of Manchester United, that is my plan. Portsmouth is giving that to me. I have a lot of big players around me that help me day in, day out in training sessions and in games and that has really benefited me. Being in the Championship, it’s fast and it’s hard for 90 minutes so it’s about trying to keep calm on the ball and when the pressure is on you. I feel I am more comfortable now. The confidence is there so that’s good for me as well. I just try to do my best every game. I am improving all the time and this season has been the best season for me.”

It’s good to see he is full of confidence but how do Portsmouth fans rate his performances?

Mark Allaway from The Offside Portsmouth:

Ritchie De Laet has been one of our many loanee defenders this season and has near enough made the right back slot his own. He’s played all the 18 games we’ve had him on loan for and he’s blended into the Pompey style well by getting forward from the full-back slot. He has made it very clear in the press that he wants his long-term future to be at United but would be willing to come back on loan next year and we’d love to have him back.

Strengths – De Laet is a good defender, but its the blend of defence and attack that brings out the best in him. Though he may not have scored it’s his general contribution to attacks that have seen him go down well with the Fratton Park faithful.

Weaknesses – I certainly wouldn’t say De Laet has been the best defensively of our players this season – but many people believe that is Ricardo Rocha and look what he’s done for us lately… I think many of De Laet’s defensive lapses are through inexperience and he’ll only get better.

Best moment – Hard to pick an outstanding moment but I would go for Ipswich away back in February. During our winning run, confidence was high and we were getting consecutive cleansheets, and Ritchie was a part of that. He also aided the attack and allowed the likes of David Cotterill and Jonathan Hogg to break forward from midfield and run out 2-0 winners.

Potential – Watching the likes of Rafael and Fabio I think De Laet can be a Manchester United full-back of the future based on what he’s shown at Pompey. For a recent signing he is also showing refreshing loyalty and ambition with United, at times he has said he feels ready to play at Old Trafford right now!

Fratton Faithful:

Ritchie has come into the side and done very well. He offers pace going forward and combines well with players when attacking from the wing. He has also shown that he has a cool head when defending, opting to pass the ball out of play or let it roll out for a goal kick instead of hoofing it out of play or straight back to the opposition.

I’m not sure if he’ll ever be good enough to become a regular for United as his defensive qualities aren’t what is required for a top Premier League team and he’s not as quick as Rafael either. He could probably do a job in the top division, though, and I’d certainly like to see him back at Fratton Park next year if the loan option is available again.
0

1. United – £1.12 billion
2. Real Madrid – £900 million
3. Arsenal – £700 million
4. Bayern Munich
5. Barcelona
6. AC Milan
7. Chelsea – £400 million
8. Juventus
9. Liverpool – £332 million
10. Inter Milan

It is the seventh consecutive year that United have topped the Forbes list as the most valuable football club.

1. David Beckham – £24 million
2. Cristiano Ronaldo – £23 million
3. Lionel Messi – £19 million
0

Harry Redknapp, Tottenham coach, said he was very confident Jose Mourinho would train Manchester United in the future.

"Of all the managers I faced this season, only one of which is above average, that is Jose Mourinho," said Redknapp told The Sun.

"Some people call it Marmite coach of Real Madrid manager. That's right. You can hate and love it.

Marmite is a nutritious food that much favored in England, but also much hated.

According to Redknapp, he dalah people who can not but admire him. Especially, when Mourinho's Chelsea deal.

"I believe in the end it was he who most deserve to replace Sir Alex Ferguson at Old Trafford,"said Redknapp.

Mourinho is no different than Sir Alex When I was young. The Portuguese coach was not showing signs of losing touch of his best, and always able to show his enthusiasm.

Ferguson was appointed to handle Manchester United in 1986, and became the most successful manager in the history of the Red Devils.

Redknapp also said that Mourinho is one of several coaches who have an ego, and self keprcayaan high, able to replace Sir Alex.

"True, Jose Mourinho arrogant. Is it wrong," said Redknapp.
0

Defender Nemanja Vidic wants to spend his career at Manchester United. The Red Devils captain was also denied when he wanted to leave Old Trafford. Stressed that the news is simply not true.

Vidic immediately skyrocketed since joining United in 2006. He was confirmed as one of Europe's best defender. No wonder when Vidic and then targeted by top European clubs. Real Madrid's so-called desire to memboyongnya. In fact, the defender was 29 had just signed a long-term contract with United.

However, Vidic assert will not leave United. He wanted to stay until retirement.

"I wish I could spend my career here at United. I did hear speculation my departure last year. But I know what I want. I also wanted to show commitment to the club," he said.

"From my own mouth never came out to go. I am happy here and want to show my love on the field," he explained.

"Over the years I give the best for this club. Because it is not true when I would go. Of course, I am having a difficult time and also happy here. But, I always give the best 100 percent. Moreover, I now hold the tire captain. There is a huge responsibility as captain, "says Vidic
0

Cheese is usually paired with bread as a delicious breakfast menu. However, what if the cheese is applied to shoes?

Designer was a student majoring in fashion, Lisa Dillon, from Bath Spa University, London. Teenagers are successfully designed a pair of high heels which he named 'Jimmy Cheese. "

In the manufacturing process, using a block of cheddar cheese Dillon who then carved in such a way as to form a heel. Then, a piece of stale cheese sandwich he used to design the shoe soles.


While the front of the footwear is formed of cheddar cheese that amount more. And some more cheese melted to beautify the design.

After going through a complicated process, he finally succeeded in completing the design of special footwear. Footwear 'Jimmy Cheese' plans on display at The Royal Bath & West Show, 1 to 4 June 2011, at Bath & West Showground, Shepton Mallet, Somerset, England.
0

Disini saya akan memberikan cara bagaimana mengubah icon harddisk dan flashdisk anda tanpa menggunakan bantuan software tambahan
Caranya adalah sebagai berikut :

1. - Cari gambar icon yang ingin anda gunakan dan taruh di root drive c:\ ( Jika anda ingin merubah icon di drive c: )
- Cari gambar icon yang ingin anda gunakan dan taruh di root flashdisk kamu (Jika anda ingin merubah icon di flashdisk)

2. Setelah itu buka notepad dan ketikkan kode di bawah ini

[autorun]
OPEN=
ICON=namaicon.ico

3. Ganti nama “namaicon.ico” dengan nama icon yang sudah kamu siapkan.

4. Lalu simpan dengan nama Autorun.inf ( di Save as type pilih All Files )
- Root drive c:\ ( Jika anda ingin merubah icon di drive c: )
- Root flashdisk kamu (Jika anda ingin merubah icon di flashdisk)

5 Setelah itu restart komputer anda dan lihat hasilnya, kalau untuk flashdisk cukup melakukan eject aja.

"MEMBUAT SESUATU YANG TIDAK MUNGKIN MENJADI MUNGKIN" 
"FRUZI ALBAR FRUZTECKER"


source
0

Dasar Dasar TCP/IP ( IP Address )

Dalam konsep komunikasi data suatu jaringan komputer, ada mekanisme pengiriman data dari komputer sumber ke komputer tujuan dimana proses pengiriman paket data tersebut sampai dengan benar ke komputer yang dituju. Tentunya dalam proses pengiriman yang terjadi tidak semudah yang dipikirkan. Alasan pertama, komputer tujuan berada jauh dari komputer sumber sehingga paket data yang dikirimkan bisa saja hilang atau rusak di tengah jalan. Alasan lainnya, mungkin komputer tujuan sedang menunggu/mengirimkan paket data dari/ke komputer yang lain. Tentunya paket data yang akan dikirimkan diharapkan sampai dengan tepat tanpa terjadi kerusakan. Untuk mengatur mekanisme komunikasi data tersebut dibutuhkan pengaturan proses pengiriman data yang dikenal sebagai protocol. Protokol di sini adalah sebuah perangkat lunak yang melekat pada setiap sistem operasi tertentu.

TCP/IP (singkatan dari “Transmission Control Protocol”)

adalah sekumpulan protokol yang didesain untuk melakukan fungsi-fungsi komunikasi data pada jaringan komputer. TCP/IP terdiri atas sekumpulan protokol yang masing-masing bertanggung jawab atas bagian-bagian tertentu dari komunikasi data. Kesimpulannya, TCP/IP inilah yang memungkinkan kumpulan komputer untuk berkomunikasi dan bertukar data didalam suatu jaringan.



TCP/IP dapat diterapkan dengan mudah di setiap jenis komputer dan inteface jaringan, karena sebagian besar isi kumpulan protokol ini tidak spesifik terhadap satu komputer atau peralatan jaringan tertentu. Sekumpulan protokol TCP/IP ini dimodelkan dengan empat layer TCP/IP, sebagaimana terlihat pada gambar dibawah ini.

Konsep TCP/IP

Dalam konsep komunikasi data suatu jaringan komputer, ada mekanisme pengiriman data dari komputer sumber ke komputer tujuan dimana proses pengiriman paket data tersebut sampai dengan benar ke komputer yang dituju. Tentunya dalam proses pengiriman yang terjadi tidak semudah yang dipikirkan. Alasan pertama, komputer tujuan berada jauh dari komputer sumber sehingga paket data yang dikirimkan bisa saja hilang atau rusak di tengah jalan. Alasan lainnya, mungkin komputer tujuan sedang menunggu/mengirimkan paket data dari/ke komputer yang lain. Tentunya paket data yang akan dikirimkan diharapkan sampai dengan tepat tanpa terjadi kerusakan. Untuk mengatur mekanisme komunikasi data tersebut dibutuhkan pengaturan proses pengiriman data yang dikenal sebagai protocol. Protokol di sini adalah sebuah perangkat lunak yang melekat pada setiap sistem operasi tertentu.

Lapisan Network

Lapisan Network bertanggung jawab mengirim dan menerima data ke dan dari media fisik. Media fisiknya dapat berupa kabel, serat optik atau gelombang radio. Karena tugasnya ini, protokol pada layer ini harus mampu menterjemahkan sinyal listrik menjadi data digital yang di mengerti oleh komputer, yang berasal dari peralatan lain yang sejenis.

* Lapisan Internet

Lapisan Internet bertanggung jawab dalam proses pengiriman paket ke alamat yang tepat. Pada layer ini terdapat tiga macam protokol, yaitu IP, ARP, dan ICMP. IP (Internet Protocol) berfungsi untuk menyampaikan paket data ke alamat yang tepat. ARP (Address Resulotion Protocol) ialah protokol yang digunakan untuk menemukan alamat hardaware dari host/komputer yang terletak pada network yang sama. Sedangkan ICMP (Internet Control Massage Protocol) ialah protokol yang digunakan untuk mengirimkan pesan dan melaporkan kegagalan pengiriman data.

* Lapisan Transport

Layer Transport, berisi protokol yang bertanggung jawab untuk mengadakan komunikasi antara dua host/komputer. Pada lapisan Transport menggunakan Acknowledgement positif dan Acknowledgement negative pada aliran datanya. Acknowlegment positif akan memberitahukan pesan apabila data yang di transferkan telah sampai sedangkan Acknowledgement negative jika paket yang ditransfer tidak sampai ke tujuan maka akan terjadi pengiriman ulang. Kedua protokol tersebut ialah TCP (Transmission Control Protokol) dan UDP (User Datagram Protocol).

* Lapisan Aplikasi

Layer teratas adalah Aplication Layer. Pada layer inilah terletak semua aplikasi yang menggunakan protokol TCP/IP misalnya http, ftp, telnet, smpt dan lain sebagainya.

IP Addressing

IP address digunakan untuk mengidentifikasi interface jaringan pada host dari suatu komputer. Dengan adanya IP address masing-masing host dapat terhubung dan saling bertukar informasi melalaui media transmisi kabel seperti UTP, koaksil atau fiber optic. Sebagai contoh sederhana, jika sebuah surat akan dikirimkan/ ditujukan ke orang lain maka surat tersebut harus dilengkapi dengan alamat lengkap si penerima. Tentu juga alamat si pengirim perlu dicantumkan untuk memudahkan penerima dari mana datangnya surat tersebut. Jika alamat si penerima tidak lengkap misalnya tidak ada nomor rumah, tidak di cantumkan nama penerima maka surat tersebut dipastikan tidak akan sampai.

IP address adalah sekelompok bilangan biner 32 bit yang dibagi menjadi 4 bagian yang masing-masing bagian itu terdiri dari 8 bit, angka pada masing-masing bit tersebut adalah angka 1 dan 0. misalnya : 11000111. Nilai paling besar dari biner 8 bit adalah 255, angka 255 ini dihitung dari bilangan biner 2 berpangkat.

Misalnya :

11111111 = 27 + 26 + 25 + 24 + 23 + 22 + 21 + 20

= 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1

= 255

Dengan demikian IP address yang terdiri dari 4 bagian bilangan 8 bit maka nilai terbesar IP address tersebut adalah

11111111.11111111.11111111.11111111 atau 255.255.255.255.255

Untuk memudahkan kita dalam membaca dan mengingat suatu alamat IP maka umumnya penamaan yang digunakan adalah berdasarkan bilangan desimal.

IP address dibagi menjadi kelas-kelas yang masing-masing mempunyai kapasitas jumlah IP yang berbeda-beda. IP address terdiri dari dua bagian yaitu bagian network ID dan host ID. Network ID menunjukkan ID alamat jaringan tempat host-host berada sedangkan host ID adalah bagian yang menunjukkan host itu berada. Sederhananya, Network ID seperti nama jalan sedangkan Host ID adalah nomor rumah di jalan tersebut.

Kelas-kelas IP address adalah sebagai berikut :

Kelas A

IP address kelas A terdiri dari 8 bit untuk network ID dan sisanya 24 bit digunakan untuk host ID, sehingga IP address kelas A digunakan untuk jaringan dengan jumlah host sangat besar. Pada bit pertama berikan angka 0 sampai dengan 127.

Karakteristik IP Kelas A

Format : 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH

Bit Pertama : 0

NetworkID : 8 bit

HostID : 24 bit

Bit Pertama : 0 -127

Jumlah : 126 (untuk 0 dan 127 dicadangkan)

Range IP : 1.x.x.x – 126.x.x.x

Jumlah IP : 16.777.214

Misalnya IP address 120.31.45.18 maka

Network ID = 120

HostID = 31.45.18

Jadi IP di atas mempunyai host dengan nomor 31.45.18 pada jaringan 120

Kelas B

IP address kelas B terdiri dari 16 bit untuk network ID dan sisanya 16 bit digunakan untuk host ID, sehingga IP address kelas B digunakan untuk jaringan dengan jumlah host tidak terlalu besar. Pada 2 bit pertama berikan angka 10 sehingga bit awal IP tersebut mulai dari 128 – 191.

Karakteristik IP Kelas B

Format : 10NNNNNN..NNNNNNNN.HHHHHHHH.HHHHHHHH

Bit Pertama : 10

NetworkID : 16 bit

HostID : 16 bit

Bit Pertama : 128 -191

Jumlah : 16.384

Range IP : 128.1.x.x – 191.155.x.x

Jumlah IP : 65.532

Misalnya IP address 150.70.45.18 maka

Network ID = 150.70

HostID = 60.56

Jadi IP di atas mempunyai host dengan nomor 60.56 pada jaringan 150.70

Kelas C

IP address kelas C terdiri dari 24 bit untuk network ID dan sisanya 8 bit digunakan untuk host ID, sehingga IP address kelas C digunakan untuk jaringan untuk ukuran kecil. Kelas C biasanya digunakan untuk jaringan Local Area Network atau LAN. Pada 3 bit pertama berikan angka 110 sehingga bit awal IP tersebut mulai dari 192 – 223.

Karakteristik IP Kelas C

Format : 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH

Bit Pertama : 110

NetworkID : 24 bit

HostID : 8 bit

Bit Pertama : 192 – 223

Jumlah : 16.384

Range IP : 192.0.0.x.x – 223.255.255.x.x

Jumlah IP : 254 IP

Misalnya IP address 192.168.1.1 maka

Network ID = 192.168.1

HostID = 1

Jadi IP di atas mempunyai host dengan nomor 1 pada jaringan 192.168.1

Kelas IP address lainnya adalah D dan E, namum kelas IP D dan E tersebut tidak digunakan untuk alokasi IP secara normal namum digunakan untuk IP multicasting dan untuk experimental.

Prinsip Kerja TCP

TCP mempunyai prinsip kerja seperti “virtual circuit” pada jaringan telepon. TCP lebih mementingkan tata-cara dan keandalan dalam pengiriman data antara dua komputer dalam jaringan. TCP tidak peduli dengan apa-apa yang dikerjakan oleh IP, yang penting adalah hubungan komunikasi antara dua komputer berjalan dengan baik. Dalam hal ini, TCP mengatur bagaimana cara membuka hubungan komunikasi, jenis aplikasi apa yang akan dilakukan dalam komunikasi tersebut (misalnya mengirim e-mail, transfer file, dsb.) Di samping itu, juga mendeteksi dan mengoreksi jika ada kesalahan data. TCP mengatur seluruh proses koneksi antara satu komputer dengan komputer yang lain dalam sebuah jaringan komputer.

Berbeda dengan IP yang mengandalkan mekanisme connectionless pada TCP mekanisme hubungan adalah connection oriented. Dalam hal ini, hubungan secara logik akan dibangun oleh TCP antara satu komputer dengan komputer yang lain. Dalam waktu yang ditentukan komputer yang sedang berhubungan harus mengirimkan data atau acknowledge agar hubungan tetap berlangsung. Jika hal ini tidak sanggup dilakukan maka dapat diasumsikan bahwa komputer yang sedang berhubungan dengan kita mengalami gangguan dan hubungan secara logik dapat diputus.

Hal yang cukup penting untuk dipahami pada TCP adalah port number. Port number menentukan servis yang dilakukan oleh program aplikasi diatas TCP. Nomor-nomor ini telah ditentukan oleh Network Information Center dalam Request For Comment (RFC) 1010 [10]. Sebagai contoh untuk aplikasi File Transfer Protokol (FTP) diatas transport layer TCP digunakan port number 20 dan masih banyak lagi.

Prinsip kerja dari TCP berdasarkan prinsip client-server. Dimana server adalah program pada komputer yang secara pasif akan mendengarkan (listen) port number yang telah ditentukan pada TCP. Sedang client adalah program yang secara aktif akan membuka hubungan TCP ke komputer server untuk meminta servis yang dibutuhkan.

Awalnya suatu paket dengan SYN-flag dikirim ke IP tujuan, tujuan akan memberikan respon dengan suatu ACK(SYN) flag atau suatu paket dengan RST-flag. SYN singkatan dari SYN-(synchronisation), yang digunakan untuk ‘memberitahukan’ komputer tujuan suatu permintaan melakukan koneksi, kalau diterima, maka permintaan tersebut akan dijawab dengan suatu paket ACK(SYN) flag. ACK singkatan dari ACK-(Acknowledgement). Setelah menerima paket dengan ACK(SYN) flag, komputer mengirim kembali suatu ACK memberitahukan host lain bahwa koneksi telah dibuat. Hal ini kita sebut sebagai “Three-Way-Handshake”. Jika koneksi telah dibuat dan salah satu host ingin melakukan disconnect, akan dikirim suatu paket dengan FIN-flag diaktifkan. (FIN singkatan dari FINish)
0

NAT adalah pengalihan suatu alamat IP ke alamat yang lain. Dan apabila suatu paket dialihkan dengan NAT pada suatu link, maka pada saat ada paket kembali dari tujuan maka link ini akan mengingat darimana asal dari paket itu, sehingga komunikasi akan berjalan seperti biasa.
Kenapa orang-orang menggunakan NAT ?

1. Koneksi Modem ke Internet.
Kebanyakan ISP akan memberikan satu alamat IP pada saat anda melakukan dial up ke internet. Anda dapat mengirim paket ke alamat mana saja yang anda inginkan tetapi balasannya hanya akan diterima oleh satu alamat IP yang anda miliki.Apabila anda ingin menggunakan banyak komputer seperti jaringan dalam rumah anda untuk terhubung dengan internet dengan hanya satu kink ini, maka anda membutuhkan NAT.
Cara ini adalah NAT yang paling umum digunakan sekarang ini, sering disebut sebagai masqurading.
2. Banyak Server
Terkadang anda ingin mengubah arah paket yang datang ke jaringan anda. Hal ini disebabkan anda hanya memiliki satu alamat IP, tapi anda ingin semua orang dapat mengakses komputer yang berada di belakang komputer yang memiliki alamat IP yang asli. Apabila anda dapat mengubah tujuan dari paket yang masuk, anda dapat melakukan ini.
Tipe NAT seperti ini disebut port-forwarding.
3. Transparent Proxy
Terkadang anda ingin seakan-akan setiap paket yang melewati komputer anda hanya ditujukan untuk komputer anda sendiri. Hal ini digunakan untuk membuat transparent proxy : Proxy adalah program yang berada di antara jaringan anda dan dunia luar, dan membuat keduanya dapat saling berkomunikasi. Bagian transparannya dikarenakan jaringan anda tidak akan mengetahui bahwa dia menggunakan proxy kecuali proxynya tidak bekerja.
Program squid dapat dikonfiguraasi untuk bekerja seperti ini, dan hal ini disebut redirection atau transparent proxy.

Dua Tipe NAT

NAT terdiri atas dua macam tipe: Source NAT (SNAT) dan Destination NAT (DNAT) Source NAT adalah ketika anda mengubah alamat asal dari paket pertama dengan kata lain anda merubah dari mana koneksi terjadi. Source NAT selalu dilakukan setelah routing, sebelum paket keluar ke jaringan. Masquerading adalah contoh dari SNAT.

Destination NAT adalah ketika anda mengubah alamat tujuan dari paket pertama dengan kata lain anda merubah ke mana komunikasi terjadi. Destination NAT selalu dilakukan sebelum routing, ketika paket masuk dari jaringan. Port forwarding, load sharing dan transparent proxy semuanya adalah bentuk dari DNAT.
Menggunakan NAT di Linux

Untuk membuat NAt anda harus membuat aturan NAT yang akan memberitahu kernel koneksi apa yang harus diubah. Untuk ini kita menggunakan tool iptables dan membuatnya untuk mengubah tabel NAT dengan memberikan option "-t nat".

Tabel aturan NAT berisi 3 bagian yang disebut "chain", setiap aturan akan diperiksa secara berurutan sampai ada satu yang tepat. Kedua chain disebut PREROUTING (untuk Destination NAT, ketika paket pertama kali masuk), dan POSTROUTING (untuk Source NAT, ketika paket pergi). Yang ketiga, OUTPUT akan diabaikan. Tabel di bawah akan menggambarkannya :

_____ _____
/ \ / \
PREROUTING -->[Routing ]----------------->POSTROUTING----->
\D-NAT/ [Decision] \S-NAT/
| ^
| |
| |
| |
| |
| |
| |
--------> Local Process ------


Pada setiap node di atas, ketika paket melewati kita melihat koneksi apa yang diasosiasikan dengannya. Apabila hal itu adalah koneksi yang baru, kita melihat chain pada tabel nat yang berperan untuk mengetahui apa yang akan kita lakukan dengan paket tersebut.
Source NAT

Untuk melakukan Source NAT anda harus merubah asal dari koneksi. Hal ini dilakukan di chain POSTROUTING, pas sebelum keluar. Hal ini sangat penting, dikarenakan berarti tools lain yang di dalam router itu (routing, packet filtering) akan melihat paket itu tidak berubah. Hal ini juga berarti opsi '-o' (outgoing interface) juga bisa digunakan.

Source dispesifikasikan dengan menggunakan '-j SNAT', dan juga opsi '--to-source' untuk menspesifikasikan sebuah alamat IP, range alamat IP dan port atau range port (hanya untuk protokol UDP dan TCP) yang sifatnya optional.

Mengubah alamat asal ke 1.2.3.4
# iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to 1.2.3.4

Mengubah alamat asal ke 1.2.3.4, 1.2.3.5, or 1.2.3.6
# iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to 1.2.3.4-1.2.3.6

Mengubah alamat asal ke 1.2.3.4, port 1-1023
# iptables -t nat -A POSTROUTING -p tcp -o eth0 -j SNAT --to 1.2.3.4:1-1023

Masquerading

Terdapat kasus yang khusus untuk Source NAT yang disebut masquerading, sebaiknya hanya digunakan untuk alamat IP yang dinamik, seperti menggunakan dialup secara standar (untuk alamat IP yang statis, gunakan SNAT si atas). Anda tidak perlu menempatkan alamat asal apabila anda menggunakan masquerading, dikarenakan alamat asal akan memakai alamat dari interface tempat paket itu keluar. Hal ini akan memudahkan apabila ada penggantian alamat IP dari interface tersebut, sehingga keslaahan da[at dihindari.

Masquerade semua paket yang keluar dari ppp0
# iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE

Destination NAT

Destination NAT dilakukan pada chain PREROUTING, pas ketika paket masuk, hal ini berarti semua tools di dalam router akan melihat paket akn pergi ke tujuan yang sebenarnya . Hal ini juga berarti bahwa opsi '-i' (incoming interface) bisa digunakan.

Destination NAT dispesifikasikan dengan menggunakan '-j DNAT' dan opsi '--to-destination' menspesifikasikan sebuah alamat IP, range alamat IP dan range dari port (hanya untuk protokol UDP dan TCP) yang sifatnya optional.

Merubah alamat tujuan ke 5.6.7.8
# iptables -t nat -A PREROUTING -i eth0 -j DNAT --to 5.6.7.8

Merubah alamat tujuan ke 5.6.7.8, 5.6.7.9, or 5.6.7.10
# iptables -t nat -A PREROUTING -i eth0 -j DNAT --to 5.6.7.8-5.6.7.10

Merubah alamat tujuan dari lalu lintas web ke 5.6.7.8 port 8080
# iptables -t nat -A PREROUTING -p tcp --dport 80 -i eth0 -j DNAT --to 5.6.7.8:8080

Redirection

Terdapat kasus khusus dari Destination NAT yang disebut redirection. Redirection adalah pengarahan dari paket yang masuk dari posrt tertentu diarahkan ke port lain, dimana setiap port menandakan aplikasi jaringan yang berbeda.

Mengirim dari port 80 lalu lintas web ke squid (transparent) proxy
# iptables -t nat -A PREROUTING -i eth1 -p tcp --dport 80 -j REDIRECT --to-port 3128

Dalam hal ini squid harus dikonfigurasi sehingga dia tahu paket yang masuk adalah transparent proxy.

"MEMBUAT SESUATU YANG TIDAK MUNGKIN MENJADI MUNGKIN" 
"FRUZI ALBAR FRUZTECKER"



source
0
This summary is not available. Please click here to view the post.