Archive for 2015

Know the Types of Hacker Attacks
Hackers are those who have expertise in the field of computer programs and networks.
Currently the hack technique has be spread widely on the Internet from various forums and communities and utilized with various functions both White and Black.

In whiteness that use the technique with the best in a particular field without threatening to the security of data, even fix and notify to the weakness of a server (network) etc.
And black stone, which is the use of techniques Hack by a community or a set inconsistently and did not recognize its adverse effects are not even responsible for what they do.
As well as this time there are various types of hacker attacks are done through the network. Whether it's burglary, theft of data, databases and others.

Hacking is illegal acts that harm, it is not I right so for that we not discuss how menghacking, but we will discuss other what types of attacks that can be carried out by the Network are as following:

1. IP Spoofing
IP Spoofing is also known as the Source Address Spoofing, namely counterfeiting attacker's IP address so that the target assumes the attacker's IP address is the IP address of the host on the network instead of the outside network. Suppose the attacker has IP address type One 16.80.xx.xx when the attacker perform these types of attacks that attacked the network will assume IP attacker
is part of networknya
eg IP type C. 192.xx.xx.xx ie IP Spoofing occurs when an attacker outsmart packet routing to change the direction of the data or
to different destinations.

Packet routing is usually transmitted in a transparent and clear so as to make easier for an attacker to modify the data origin or destination of the data.
This technique is not only used by the attacker but also be used by security professionals to mentracing the identity of the attacker.


2. FTP Attack
This is One of the attacks carried out against the File Transfer Protocol is a buffer overflow attacks caused by malformed command. the purpose of attacking the FTP server, the average is to get a command shell or to perform a Denial of Service.
Denial Of Service attacks can eventually cause a user or attacker to retrieve the resource in the network without
authorization, while the command shell can make an attacker to gain access to the server system and data files that ultimately an attacker could make anonymous root-acces that has full rights to the system network even attacked.


3. Finger Unix Exploits
In the early days of the Internet, Unix use for efficient OSDI for mensharing information among users. Due to requests for information on this finger information does not blame the rules, many system
Administrator leave this utility (finger) with the code are minimal, even with no security at all.
For an attacker utility is extremely valuable to have information about footprinting, including login names and contact information.

4. Flooding & Broadcasting
An attacker can reduce the speed of networks and hosts that are in it significantly by continuing to request / demand for the information on servers that can handle attacks classic Denial of Service (Dos), send a request to the port redundantly called flooding, Sometimes it is also called spraying.
The purpose of both these attacks is the same that makes network resour that provide information becomes weak and eventually gave up. Attacks by way Flooding is dependent on two factors: the size and / or volume (size and / or volume).
An attacker could cause a Denial of Service by throwing large capacity files or a large volume of small packets to a system. In such circumstances the network server will deal with congestion: too much information is requested and not enough power to push the data to run. Basically a large package requires a large processing capacity as well, but it is not normal and the same small package in large volumes would spend resources in vain, and the resulting congestion.

5. Fragmented Packet Attacks
Internet data is transmitted via TCP / IP can be subdivided into a package that contains only the first package contents form the main part of the TCP information. Some firewalls will allow to process part of the package
does not contain information on the origin address of the first packet, it will result in some type of system to crash. For example, the NT server will
to crash if the packets are broken up (fragmented packet) enough to rewrite the information first packet of a protocol.

6. E-mail Exploits
Peng-exploitasian e-mail occur in five types: mail floods, manipulation commands. transport level attacks, entering various codes (inserting malicious code) and social engineering (utilizing socialization
physically). Email attacks can cause the system to crash, open and rewrite even execute application files or also make access to command functions (command function)

7. DNS and BIND
Vulnerabilities News recently about the vulnerability of applications Berkeley Internet Name Domain (BIND) in various versions illustrate the fragility of the Domain Name System (DNS), which is a crisis that is directed to the basic operation of the Internet (internet basic operation).

8. Phishing
Phishing is a form of fraud module entrapment of one's data by creating a password login page exactly as the original and keep records of the robbery in their database. Phishing activities is considered as an experimental material that is able to ensnare those who are not careful in managing a site.
How..?

Have started to understand about the various types of hacker attacks through the Network. .?
This attack was done without the knowledge of the general public and many actions they will prevalent.
Whereas a woman of Chinese hackers who dared to hack the biggest search engine is Google, so blasted google berpinda companies ..
Waw. But unfortunately Such Hacking techniques If not utilized in the best possible way will certainly harm themselves and others.

identify the type of attack

Posted by : setiosudi 0 Comments
Types And Ways Of Working RAM
A. Understanding Of RAM.
RAM (Random Access Memory) is a computer hardware that is responsible for storing data. RAM is temporary means that the stored data can be erased. Unlike the case with the ROM, ROM has the same task with the RAM but ROM is permanent in the sense that stored data can not remove. RAM is a type of memory that it can change, change as long as the computer has a life and can remember the nature of data or programs as long an electrical current and can store and retrieve data very quickly.
B. Types of RAM:
1. RAM
Was first discovered by Robert Dennard, in large-scale production in 1968, and this is where the history of ram begins. RAM requires a voltage of 5.0 volts to run at a frequency 4,77MHz, with memory access time (access time) of about 200ns (1ns = 10-9 seconds). This first-generation RAM uses 30 pin slot on the motherboard.

2. DRAM
IBM created a memory in DRAM named in 1970, its own DRAM stands for Dynamic Random Access Memory, DRAM has a working frequency varies, between 4,77MHz up to 40MHz.

3. FPM DRAM
This type of memory works like an index or table of contents. Meaning page itself is part of the memory contained on a row address. When the system requires the contents of a memory address, FPM simply take information about them based on an index that has been owned. FPM allows faster data transfer on the line (row) of the same from the previous memory types. FPM works in the frequency range of 16MHz to 66MHz with an access time of about 50ns. In addition FPM is able to process data transfer (bandwidth) of 188.71 Mega Bytes (MB) per second. FP RAM was discovered around 1987. Memory is used by the system based on the Intel 286, 386 and 486 bit.

4. EDO DRAM EDO
DRAM (Extended Data output dynamic random access memory) Memory was created in 1995. This is an improvement of FPM, EDO can shorten its read cycle so as to improve its performance by about 20 percent. EDO has access time that is quite varied, which is about 70ns to 50ns and works at a frequency of 33MHz to 75MHz. Although EDO is a refinement of the FPM, but both can not be installed simultaneously, because of differences in ability. Intel 486-compatible as well as early-generation Pentium is a database system that uses EDO DRAM. Slots used on the motherboard has 72 pins.

5. SDRAM
Kingston SDRAM created at the turn of the year 1996-1997, the module can work at the speed (frequency) the same bus / sync with the frequency that works on the processor. SDRAM is then known as PC66 because it works at a frequency of 66MHz bus. Unlike the previous memory types that require a fairly high working voltage, SDRAM only requires a voltage of 3.3 volts and has an access time of 10ns.Selang within a year after PC66 mass produced and used, Intel made the new standard type of memory which is the development of PC66 memory. By using the working voltage of 3.3 volts, have PC100 memory access time of 8ns, shorter than PC66. In addition PC100 memory can stream data at 800MB per detiknya.Selain PC800 RDRAM memory developed in 1999, SDRAM memory has not been abandoned, even by Viking, even more enhanced. As the name implies, the PC133 SDRAM memory working at 133MHz frequency bus with an access time of 7,5ns and can stream data at 1,06GB per second. Although it was developed to work on the PC133 bus frequency of 133MHz, and the memory is also capable of running at 100MHz bus frequency, although not as good as the capabilities of the PC100 SDRAM memory at frequencies tersebut.Perkembangan increasingly become - so after Mushkin, in 2000 successfully developed memory chips capable of working at a frequency of 150MHz bus, although in fact there has been no official standards regarding the frequency of the bus system or chipset of this magnitude. Still with a working voltage of 3.3 volts, have PC150 memory access time for 7NS and can stream data at 1,28GB per second. This memory is intentionally created for the purposes of overclockers, but users gaming applications and 3D graphics, desktop publishing, and server computers can take advantage of the presence of PC150 memory. Slots used on the motherboard has 168 pins.

6. DR RAM
In 1999, Rambus memory system to create a new architecture and a revolutionary, totally different from SDRAM.Oleh Rambus memory architecture, this memory is called Direct Rambus Dynamic Random Access Memory. By simply using a voltage of 2.5 volts, RDRAM working on 800MHz system bus via a bus system called Direct Rambus Channel, able to stream data at 1,6GB per second! Still in the same year, Rambus has also developed an other memory types with the same ability to DRDRAM. The difference lies only in the necessary working voltage. If DRDRAM require a voltage of 2.5 volts, the PC800 RDRAM work at a voltage of 3.3 volts.

7. DDR SDRAM
In 2000, successfully developed the ability Crucial SDRAM memory to 2-fold. The technique used is to use fully the wave frequency. If the ordinary SDRAM only perform the instructions on the positive wave, then DDR SDRAM running instruction both on the wave of positive and negative waves. Therefore, the memory of it is called DDR SDRAM stands for Double Data Rate Synchronous Dynamic Random Access Memory. With DDR SDRAM memory, system bus with a frequency of 100-133 MHz will work effectively at a frequency of 200-266 MHz. DDR SDRAM first used in ultra-speed AGP graphics card. While use of the processor, AMD ThunderBird was the first to use it. Slots used on the motherboard has 184 pins.

8. DDR3 SDRAM
The DDR3 RAM has a power requirement is reduced by about 16% compared to DDR2. It is because DDR3 is already using 90 nm technology so that the power required konsusmsi only 1.5v, much less when compared to DDR2 and DDR 2.5V 1.8v. In theory, the speed of which is owned by RAM is indeed quite stunning. He is able to transfer data at an effective clock of 800-1600 MHz. DDR3 has an internal clock 400-800 MHz, much higher than DDR2 and DDR 200- 533 at 100-300 MHz. Prototypes of DDR3 which has 240 pins. This has actually been introduced a long time ago at the beginning of 2005. However, the product itself actually emerged in mid-2007 in conjunction with a motherboard that uses the Intel P35 Bearlake chipset and motherboard that supports DDR3 slot. Slots used on the motherboard has the same number of pins with the slots DDR2 SDRAM, but notchnya different positions so that should not be able to install the module in the slot DDR3 SDRAM DDR2. This was deliberately done because electrical modules with DDR2 DDR2 have different voltages.

9. SO-DIMM
Small Outline Dual In-Line Memory Module (SO-DIMM) is a type of memory used in notebook devices. Physical form approximately half of the large regular DDR so as to further save space which is very valuable on mobile devices such as notebooks. SO-DIMM generation developments are usually in line with the development of RAM for desktop computers. When launched in the market DDR3 SDRAM, DDR3 SO-DIMM also launched. The modules use a slot that has 204 pins. Less than DDR3 SDRAM.

C. How to Work RAM

By the time we turn on the computer, the first device to work is Processor. Processor serves as a data processor and request data from storage, the Hard Disk (HDD). It means that the data is sent from the Hard Disk after a request from the processor.

But in practice it is difficult to do because the technological differences between the Processor and Hard Disk. Processor itself is purely digital components, and will process the data very quickly (the highest bandwidth currently P4 6.4 GB / s with 800MHz FSB). While Hard Disk largely mechanical technology is certainly quite slow compared to digital (Bandwidth or Transfer Rate Serial ATA HDD range from 150 MB / s). Processor data speeds theoretically range from 46x faster than HDD. That is, if Processor awaiting supply data from the HDD will happen "Bottle-Neck" very severe.

To overcome this situation, the necessary device Main Memory (Primary Memory) or so-called RAM. RAM stands for Random Access Memory. RAM Processor serves to assist in providing data "super fast" is needed. RAM functions like such as Digital HDD, RAM because all components are already using digital technology. With RAM, the processor does not have to wait for the shipment data of HDD. DDR2 RAM currently has a bandwidth of 3.2 GB / s (PC400), so as not to disrupt the supply of the current motherboard uses Dual Channel technology which can double the bandwidth becomes 2x to enlarge to 128-bit architecture. That means, two pieces of Dual Channel DDR2 mode can supply the data to the appropriate number of Processor (3.2 GB / sx Dual Channel = 6.4 GB / s).

source by : http://andoxsz.blogspot.com/2013/06/pengertian-jenis-dan-cara-kerja-ram.html

Types And Ways Of Working RAM

Posted by : setiosudi 0 Comments
TECHNOLOGY is now growing influence on human development. As if this technology becomes necessary. Along with the times, the quality of the technology itself is increasing. Until, I wonder, if the technology has now become one of the tools that can facilitate all matters relating to human needs.
Islamic civilization is very different from the Greek, Roman and Byzantine in viewing technology. Muslim scholars in the era of the Caliphate regard technology as a legitimate branch of science. The fact was revealed by the observations of historians of Western science in the modern era of the history of science in the Middle Ages.
Similarly, the teachings of Islam he would not be contrary to the theories of modern thought that a regular, straight and analyzes thoroughly and objectively. In the view of Islam according to the original law that everything is permissible including everything that is presented by various civilizations either the old or new. All that as taught by Islam nothing is haraam unless there are explicit texts or proposition and certainly forbid it.

Modern technological advances are so rapid has been to popularize the products of advanced technologies such as radio, television, internet, communications equipment and other luxury items as well as offering various types of entertainment for every parent, youth, or children. But of course tools were not responsible for what cause. Precisely on the shoulders manusianyalah lies all the responsibility. Because the various media information and sophisticated tools owned by the world today can do anything manusianyalah decisive factor would be the benefit that operasionalnya.Adakalanya humans when used properly and appropriately. But it can also bring sin and doom when humans use to indulgence in lust and pleasure alone.


Islamic views about technology

Posted by : setiosudi 0 Comments
how to root android phones of all types without pc :
before the root of our mobile phones. I will explain first what is the root ...? Understanding Root is a system account that has the absolute power to access and execute all files, command, system, the Linux-based operating systems (including Android). In essence, this root has unlimited access that can change, delete, add, even destroy all that is in our phone system.

how to root android phones of all types without pc.
1. select one of the applications below:
a. kingroot  klik here
b.framroot  klik here.
 download first select one of the above applications.
then installed in the phone.
then the settings in the phone in order to install applications that are not from the source playstore.
disable security settings.
after that enable data connection / wireles to root,
please follow the steps, after restarting the phone. if successful, the application appears super user ..
good luck.
greetings blogger

source jalantikus.com

how to root android phones of all types without pc

Posted by : setiosudi 0 Comments
Assalamualaikum
hallo..
saya sekarang akan membahas tentang bahasa pemrograman c++
1. Pemrograman terstruktur (C++)
J  Pemrograman tingkat menengah (Middle Language)
J  Bersifat Case Sensitive (Penggunaan huruf kecil dan besar berpengaruh)
J  Memulai C++

Start – All program – Borland C++5.02 – Borland C++
jika belum punya aplikasinya monggo downloud dulu disini..
File – New – text edit


J  Struktur Dasar C++
#include <file include>
Main()
{
Pernyataan program;
}
J  File include dasar input output
  1. #include <stdio.h> / #include “stdio.h”
Stdio = Standart Input Output
Untuk menjalankan fungsi input dan cetak
Input   : scanf
Cetak : print
2.  #include <iostream.h> / #include “iostream.h”
Iostream = Input Output Stream
Untuk menjalankan fungsi input dan cetak
Input     : cin
Output  : cout 
3. #include <conio.h> / #include “conio.h”
Conio = Console Input Output
Untuk menjalankan fungsi getch dan clrscr
Getch   : untuk menahan tampilan
Clrscr   : untuk membersihkan layar
Contoh program sederhana
  #include <iostream.h>
  #include <conio.h>
  Main()                                                 
  {
   Cout<< “ Selamat Belajar C++ ”;
   Getch();
  }


J  Compile File
Menterjemahkan program dari bahasa manusia kedalam bahasa yang dimengerti komputer
Klik project – compile atau
Alt + F9
J  Menjalankan File
Klik debug – Run atau
Ctr + F9
Hasil Program  :
Selamat Belajar C++
 
 

     sekian dulu shere dari saya 
salam blogger

belajar c++

Posted by : setiosudi 0 Comments
TUTORIAL SETTING MIKROTIK RB750 DENGAN WINBOX
Mikrotik RB750 adalah salah satu jenis RouterBoard Mikrotik yang paling banyak digunakan karena harganya yang murah meriah. Mikrotik RB 750 memiliki 5 buah port ethernet 10/100, dengan prosesor baru Atheros 400MHz dan sudah termasuk dengan lisensi level 4. Sayangnya RB750 tidak memiliki interface Wireless, sehingga tidak dapat langsung digunakan untuk membuat wireless Hotspot. Agar dapat membuat wireless Hotspot perlu ditambahkan perangkat tambahan sebagai Access Point.

jika belum ada aplikasi winbox monggo dowload dulu di sini
download
Silakan nyalakan Mikrotik RB750 nya, hubungkan port ether 1 ke modem. dan port eth 2 ke pc menggunakan kabel utp straight. jika sudah terhubung reset dulu mikrotiknya dengan cara:
Pada Winbox Pilih Menu System --> Reset Configuration --> Reset Configuration.

selanjutnya login dengan mengklik mac addres


 * kemudian setting ip address eth 1 yaitu 3 digit pertama sesuai dengan ip modem. contoh ip modem : 192.168.1.1. lalu eth 1 diisi 192.168.1.10
*kemudian setting ip eth 2 terserah contoh 192.168.2.10
*selanjutnya setting ip routes. lalu klik +
selanjutnya isi gateway, gateway ini harus sesuai dengan ip modem.. contoh 192.168.1.1
klik apply lalu ok.
selanjutnya setting ip DNS 
server diisi sesuai ip modem yaitu 192.168.1.1 dan cheklist allow remote request. klik apply lalu klik ok
kemudian setting DHCP server lalu DHCP setup lalu eth 2 kemudian next2. finish..
setting ip klik  firewall pilih NAT lalu pilih general, lalu setting chain :"srcnat", dan out interface;"eth1"
lalu menu action pilih masquerade klik apply lalu ok..
kemudian ulangi langkah tadi, lalu setting chain;"dstnat" protocol;"6tcp" dst port;"80" interface;"eth2"
pilih menu action pilih redirect to ports;"3128" klik apply lalu ok..
kemudian setting web proxy pilih menu general chekclist enabled, port;"3128" cache administator diisi sesuai keiinginan. contoh; "latihan@gmail.com, max cache ; "unlimited", dan cheklist cache on disk klik apply lalu ok..
kemudian di lanjutkan ke web proxy > acces > +, lalu src. address ;"192.168.2.0, dst port :"80, dst host diisi apa yang anda inginkan untuk di blog. contoh *detik.com*, dan action;"deny klik  apply lalu ok..
kemudian setting ip komputer kita dengan settingan sbb :
ip address : 192.168.2.60
subnet mask : 255.255.255.0
default gateway : 192.168.1.10

prefend DNS server : 192.168.1.10
klik ok.

sekian dulu sobat nantikan post saya yang terbaru
salam blogger,

mikrotik (winbox)

Posted by : setiosudi 0 Comments
Application of Technology in Islamic history

In the golden era of Islam, Muslim scholars have grouped sciences both technological as follows; science types of buildings, optical sciences, science burning mirror, the science of the center of gravity, the science of measuring and mapping, the science of rivers and canals, the science of the bridge, the science of the windlass, the science of machines military and science of finding water sources are hidden. The authorities and society in the Islamic Caliphate era puts the engineer (engineer) in a high position and dignity.
The Muslim engineer has managed to build a series of major works in the field of civil engineering such as dams, bridges, street lighting, irrigation, to skyscrapers. History proves, in its golden era, Islamic civilization has been able to build the dam bridge (bridge dam). Weir bridge was used to drive water wheels work with the mechanism of the increase in water. Dams built the first bridge in Dezful, Iran.
Weir bridge was capable of pouring 50 cubic feet of water to supply the needs of the Muslim community in the city. After appearing in Dezful, Iran weir bridge also appeared in other cities in the Islamic world. Thus, the Muslim community at that time did not have difficulties to meet the needs of clean water.
Moreover, in the era of the caliphate of the Muslim engineers have also been able to build water control dam diversion dam. The dam is used to regulate or divert the flow of water. Water control dam was first built on the River Uzaym Muslim engineers located in Jabal Hamrin, Iraq. Thereafter, such a dam was built in the city and many other countries in the Islamic world.
Other attainment achieved Muslim engineers in the field of civil engineering is the construction of street lighting. Public street lighting was first built by the Islamic Caliphate, especially in Cordoba. In its heyday, in the evening the streets were smooth in the city of Muslim civilization located on the European continent was studded with light.

Besides known sprinkled with light in the night, the cities of Islamic civilization was known to be very clean. Apparently, at that time the Muslim engineers have been able to create a means of collecting garbage, such as containers. Something that has never existed in human civilization before.

the application of technology in the history of Islam

Posted by : setiosudi 0 Comments
Android is an operating system developed by Google have some time yesterday has launched Android v 4.4 which is named KitKat, we have explored some of the advantages and disadvantages that are on the Android operating system KitKat.Various features are provided by the Android OS KitKat is one of them is the improvement of the storage system while the use of memory, in which the performance of a processor has been minimized to the storage of registry data temporarily in RAM and will directly at capacity by the capacity of internal memory available, so loading The processor will feel lighter.Consider in detail and clearer about the advantages and disadvantages of Android KitKat.
1. Color transparent screen virtual buttons enveloped touch on the screen, so the color display that looks the same as the color of the wallpaper used.Google Now
2.Aplikasi emerged as one part of the Homescreen panel, making it easier to use.
3. In suguhkan features that Google has changed the App drawer background KitKat from previous Varsi black becomes transparent.
4.OS Android KitKat has the latest innovations bateray saver system, with a built-in power saving mode which certainly aims to conserve the battery from the use of the default Android system.
5.Android 4.4 kitkat has the ability to improve memory in smartphones that can improve the responsiveness of the touchscreen display device.
1. KitKat 4.4 is the latest version of software from Google, possibly including product introductions for the majority of Android users, it is still necessary for learning in operasional.
2.Dengan offline on-screen display menu that is frequently shifting features become invisible or transparent sometimes makes the somewhat awkward to touch the screen, because the wallpaper is only just visible.
3. To use this OS should really pay attention to support capacity tri minimal processor core, what if imposing to put the processor under it will be making its performance is not perfect.
From some of the information that we wrote above, may still be a fraction weaknesses and strengths of Android 4.4 KitKat, may be a reference of the user smartphone.




advantages and disadvantages android kitkat

Posted by : setiosudi 0 Comments
Now I will share some of the Processor.
Processor or microprocessor is a hardware device that becomes the brain and a computer processor when the PC without the PC can not run. Processor is often also referred to as the central controller or computer brain that is supported by other components. Processor is an IC that controls the overall operations of a computer system and is used as a center or brain of the computer that functions to perform calculations and run errands.
The layout of a processor is the socket that has been provided in bagianmotherboard, the processor can be replaced with another processor provided that the processor is in accordance with existing socket on the motherboard.
Many brands of processors on the market include Intel, AMD, IBM, Apple, VIA Cyrix, and IDT. However there are 2 company famous in the world as a developer of processors for PCs are AMD and Intel.
Processor also has the task of dividing the data processing job to all components of a computer, and this is done in a very high speed. Therefore, the processor becomes very hot so usually equipped with cooling fans.

The most important part of the processor is divided into three, namely:
1. • Aritcmatics Logical Unit (ALU), is a device that performs basic implementation such as the implementation of arithmetic (addition, subtraction, and the like), the implementation of logical (AND, OR, NOT), and the implementation of the comparison (for example, compare the contents of two slots for equality). On this unit do "real work"
2. Control Unit (CU), is a means of controlling who is in the computer that tells the input unit of the type of data, the time of entry, and a storage area in primary storage. Control unit is also in charge of telling the arithmetic logic unit about the operation to be performed, where the data is obtained, and the location of the results placed devices bersertaperlengkapan process tools.
3. • Memory Unit (MU), is part of the processor that stores the addresses of register data processed by the ALU and CU.
Know Your Computer Processor Function
Function Processor and Parts consists of three main parts:
1. Control Unit (CU)
All the equipment in the computer system is controlled and regulated by this section. Transfer of data from main memory is executed at the CU. And then sent the results back to the main memory. After that the screen will display the results of its output or the hard drive will store data processed products.
2. Arithmatic and Logical Unit (ALU)
Calculation math / arithmetic everything done in this ALU section, without exception. In addition, if the program / software that we are using are having problems then there will be Information Warning Error (Error Warning) that appear on the screen, all of which was done in the ALU. In essence, the ALU section is part LOGIC (decision makers).
3. Registry (the Registry)
Register a queue where the data will be processed, before the data is entered into the main memory. Although this section is a small storage media however have high-speed access.
Addendum: there is a difference in the location of the foot socket processor socket 478 series processor (Pentium 4) and the processor socket LGA 775 Processor socket LGA 775 on the stand there mainboardnya.
How to Work Function Processor in Computer
When the processor works it can not be separated from the components / other ancillary equipment such as Hard Drive and Memory (RAM). The third part will continue are connected to each other in processing the data. Processor likened brain function computer, which will then process the data memerima then the output is sent back to the memory or hard disk.
Actual language / sentences that are recognized by the processor only the digits 0 and 1. The two figures alone. Also called machine language / binary (01,011,001). The number 0 is defined by the absence of electrical signals, and the number 1 is defined by the presence of electrical signals.
In the beginning of the function is only processor to process the arithmetic course, exactly the same as a calculator today. But in this modern era of processors are very advanced functions. As for processing multimedia data (audio, video, images) and images.
Types Processor in the various computer components. So that in recent years have appeared several new processor types. This is caused by the demands of the development itself and the fierce competition between the two manufacturers of processors, the Intel and AMD.
So that I can share, Hopefully Helpful
source by : : http://masiyus.web.id/pengertian-fungsi-dan-cara-kerja-processor/

the workings of the processor

Posted by : setiosudi 0 Comments

DEBIAN  TEKS
Cara blog situs :
1.       If config
2.       Nano  /etc/squid/situs.txt
3.       Tulis website yang ingin di blog
4.       Ctrl x (untuk save)
Cara menghidupkan :
1.       If up eth 0
2.       If up eth 1
3.       Ping  eth 0 dan eth 1
4.       Ping ke internet
5.       Ping ke client
Menambahi nama ketik cache_mgr  <isi nama >
Ctrl x untuk menyimpan

CARA MEMBLOG SITUS

Posted by : setiosudi 0 Comments
TERIMAKASIH TELAH BERKUNJUNG DI WEB SAYA TERUS TUNGGU POS - POS YANG LAINNYA

- Copyright © tecknology and programing - Blogger Templates - Powered by Blogger - Designed by Johanes Djogan -