Minggu, 28 Februari 2016

Network security

Network Security (English: Network Security) in computer networks is essential to monitor network access and prevent misuse of network resources that are not authorized. The task of network security is controlled by the network administrator.

The concept of Network Security

The security aspect is defined fifth this point:
Confidentiality (Confidentiality) Require that information (data) can only be accessed by those in authority.
Integrity (Integrity) Requires bahwaa information can only be changed by a party who has the authority.
Availability (Availability) Requires that the availability of information available to those who have authority when needed.
Authentication (Authentication) Requires that the sender information can be correctly identified and there is no guarantee that a false identity is not obtained.
Nonrepudiation Requires that both the sender and recipient information can not deny sending and receiving messages.
Attack (Attack) for security can be categorized into four main categories:
Disorders (Interruption) Assets of the system under attack so that it becomes unavailable or can not be used by the authorities. An example is the destruction / modification of the hardware or network channel.
Interception (Interception) People who are not authorized to gain access to assets. Referred to the concerned parties, programs, or other systems. An example is the tapping of data in the network.
Modification (Modification) A person who is not authorized to make changes to the asset. An example is the change in the value of the data file, modify the program so wrong, and modification of the message being transmitted in the network.
Fabrication (Fabrication) An unauthorized party inserts a fake object into the system. An example is to send false messages to others.
There are several principles that need to be avoided in dealing with security issues:
Silence and all will be fine
Hiding and they will not be able to find you
The technology used is complex / Unix, which means secure.
Computer Network Administrator
Computer Network Administrator is the kind of work that is needed at this time, especially in companies / institutions that have implemented computer technology and the Internet to support the work.



The use of computer network systems in small and large scale will require the setting from the level of physical and non-physical. This arrangement involves the control process. There are several definitions of network administration, among others:

Controlling the strategic (assets) (Strategic Controlling (assets))
Controlling complekxity (complekxity controllers)
Improving service (good service)
Balancing various needs (balancing the various needs)
Reducing downtime (reduced downtime)
Controlling costs (cost control)
www.dosenpendidikan.com/ Basically, a network administrator in charge of managing and maintaining all the resources on the network performance of the network system more effective and efficient views from the functions, structure and security of the network itself.

Before the duties and responsibilities of the following are some common things that must be controlled by a network administrator;



Knowledge of basic theory and practice of computer, are very important because they form a computer network administrator familiar with how the computer system itself can be well understood.
Knowledge of computer networking hardware such as; repeaters, hubs, switches, routers, antennas, cables and various other supporting devices, which includes understanding how things work, installation and configuration.
Understanding routing understanding of the theory and the routing configuration must excel at to be able to build a good network it is necessary, especially if the computer or a sub-organization of the company very much.
Knowledge of computer security systems, particularly the network (network security) would be very helpful and provide more value.
In addition to the ability of theory and practice which should excel in other things is to have professional ethics, professional ethics and there is no attitude is not good then all the ability to master the theory and practice do not mean much.

Functions and Duties Network Administrator
There are some functions and administrators, but in general can be expressed from a wedge between the network, hardware, and applications. The task of the network administrator:

Security Management (Security management) work focuses on issues of network security Network administrators are as follows:

A firewall is a system or device that allows network traffic that is considered safe to go through it and prevent network traffic that is considered safe for through and prevent traffic that are considered unsafe.
Username: The user name will be used as information for login Password Control: password control is owned by the user system.
Resource access: network admin can do the restrictions on the use of resources according to the permissions granted.


Similarly Discussion About 10 Basic Concepts of Computer Network Security Hopefully helpful

how to install ubuntu on virtualbox

As for the actual installation, we actually go straight into the tutorial No. 10.

Setting OS in Virtual Box.

1. Creat New on the "New Icon" in Virtual Box we use.
2. Name the OS that will be installed on Virtual Box, there we named "ubuntu14.04" then Next.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Naming In accordance with the OS that we will use.


3. Determine Memory RAM that we will use. "Here I choose 1024MB". Then Next.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Memory RAM determines that we will use.


4. Select the optional hard drive that will be used. "Set optional course in the second," and click Next.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Hard drives are going to use


5. Hard Drive Option type we will use, here I choose "VDI", because we are here is a simulation such as inserting the installation CD.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Hard Drive type options that we will use


6. Select only "Dinamic Allocated" on the first optional, then click Next.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Type of Physical Storage Hard Drive


7. Determine the amount of disk space that will be used. Here we provide 8GB. Then click "Create".
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Determining the Total Disk Space




8. Equally important after creating space OS that have been made earlier, for setting the "ISO file that we will use." Click the "Settings> Storage> Empty> Choose click on the DVD icon" And find the Ubuntu ISO file that will be installed.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Setting Storage OS Simulation


9. Well sure its iso file already exists after the above step is done.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Check ISO File Detection


As I said earlier, we did not do the above process if directly to "the sebanarnya Installation Process".

10. Then click "Start" to begin the OS installation Ubuntu14.04
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Started Installation


11. "Click Install Ubuntu"
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Ubuntu instalation Choice


12. Immediately "Click Continue", if you want to directly download the package in ubuntu, then please check the bagain required.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Preparing to install Ubuntu


13. Select "Something elese" for setting up the partition section.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14.04 with Virtual Box Complete
instalation Type


14. There is still no partition, click the "New Partition Table" to create the partition table.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Get New Partition


15. Create a "swap area" as apprentice Memory. And his position is "Logical and Beginning of this space."
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Create Swap Area


16. And then the rest here I've created "Ext4 journaling file system".
Select slace sign "/", and its position as the "Primary and Beginning of this space" Then click install on any part of which is checked, that is "Ext4".
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Create Ext4 journaling file system


17. Click "Install" partition "ext4" (which is checked).
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Installing Ubuntu on Ext4


18. The installation went, and this is election time use, select the "Map Jakarta".
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Select Time Zone


19. And this is the selection of the "keyboard" that we use. Jump "Click Next only".
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Type of Keyboard


20. On the user form, "filled with what name and password" what we will use.
And will "error" if there is no password.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Adding Username and Password


21. Pending the installation process is running, wait until finished.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap
How to Install Ubuntu 14:04 with Virtual Box Complete
Welcome to Ubuntu 14:04


22. After the installation process is complete, it's time we install applications that will be used.
Click on the "Ubuntu Software Center", then we are looking for the software, and can directly Click on the Install button to install available. Other methods can also be done by using the manual method, namely the Terminal.
Cara Install Ubuntu 14.04 dengan Virtual Box Lengkap

Inventors History of Windows and Windows Until 2015


Inventor of Windows for the first time are two people who are friends since childhood, namely Bill Gates and Paul Allen. Since the inventor of Windows, Windows now has developed from one version to another version with an increasingly improved quality.





1. Windows 1.0 - Year 1985


Windows is the first version of the inventors of Windows called Windows 1.0, released on 20 November 1985. This version has many shortcomings in some functionality, making it less popular in the market. Windows 1.0 is not a complete operating system, but will expand the capabilities of MSDOS with additional graphical interface. In addition, Windows 1.0 also has the same problems and weaknesses that are owned by MS-DOS.

2. Windows 2.0 - Tahun 1987 


Windows 2.0 mulai diperkenalkan untuk menggantikan versi 1.0 . Pada versi ini, penggunaan kartu grafis VGA mulai diperkenalkan sehingga Windows 2.0 mampu menampilkan resolusi yang lebih baik dari versi sebelumnya. Program aplikasi tambahan yang disertakan adalah Microsoft Excel dan Microsoft Word. Selain itu, program aplikasi yang mulai dapat diinstal pada sistem operasi ini adalah corel draw dan pagemarker.

3. Windows 3.X (3.0 AND 3.1 in 1990 and 1992)


1990 and Windows 3.0: Exodus third of the Windows platform offers increased performance, advanced graphics with support for 16-colors, and fully support the more powerful processor than Intel 386. Various PC has an Intel 386 processor that offers comprehensive features and capabilities of 1992 - Windows 3.1: version of Windows with TrueType fonts are preinstalled. This effectively for the first time Windows creates a functional desktop publishing platform.

4. Windows for Workgroups - 1992


Actually the idea to issue wokrsgroup based operating system already appear in Windows 3.1. However, further development there padaversi 3.1.1. This version is the forerunner of the Windows operating system bebasis network (network).

5. Windows NT


During that time, the inventor of Windows and Founder of Microsoft Corporation's continuing development of its new operating system, called Windows NT. The main architect of Windows NT is Dave Cutler, who was one of the leaders of the VMS operating system architect at the company Digital Equipment Corporation (DEC), which was later purchased by Compaq is now part of Hewlett-Packard. Microsoft recruiting Cutler in 1988 to create a version of OS / 2 that is portable, but eventually Cutler instead create a new operating system.

6. Windows 95 - 1995


Windows 95 is now integrated with the 32-bit TCP / IP (Transmission Control Protocol / Internet Protocol) and supports Internet network, dial-up networking, and support Plug and Play, where we can install the device by just plug in the hardware. 32 bit versions of Windows 95 there is an increased capability multiedia, richer features for mobile computing, and networking are already integrated.


7. Windows 98 - 1998


Windows 98 go on sale on June 25, 1998. In this version of Windows started to support the USB port like crazy. USB hubs, USB scanners, USB mouse, USB keyboard, USB joystick, and a variety of other USB devices.

8. Windows Millennium Edition (ME) - Year 2000


Windows ME is specially designed for home computer users. However, it seems that this version is less favored by the people because of the many outstanding issues that Windows ME Windows 98SE 
sekompatibel not in running some additional applications.

9. Windows Experience (XP) - Year 2001


Windows XP brings fresh air to the world of computers. Enhancement of Windows 2000, Windows XP brings high reliability, security, and performance. With a fresh look, Windows XP has a feature for business and home computing. Including remote desktop connection, a file system that can be encrypted, and System Restore and advanced networking. For mobile users, there is support for 802.1x wireless network, Windows Messenger, and Remote Assistance.

10. Windows Vista – Year 2007

 Windows Vista [is] newest system operation [of] output Microsoft from all developer or inventor Windows. Fitur-Fitur [of] [at] its Windows Vista change [is] radical we can say, especially [at] shares userinterface. ability Sekuritas [is] also enhanced by Microsoft, so that its[his] newest Microsoft megklaim version [is] more stabil,aman, and pamper the consumer computer ( although according to many people the things have [is] on Windows XP 


11. Windows 7 – Year 2010

 Microsoft make the Windows 7 more reliable than windows vista. Others, mount the responsifitas windows 7 improved, and also make the process of quicker booting and shutdown again. consumer Computer expected easier in finishing everyday duty, making koeksi and easier sikronisasi antarperngkat, and explore the world internet more gratifying .

12. Windows 8

Development of Windows 8 started before Windows 7 was launched in 2009. On September 13, 2011, build 8102 (Windows 8 Developer Preview) released to the public. This build is fully open for the first time and include the new Start Screen, the Metro user interface and a number of sample applications made by employees internship at Microsoft. On February 29, 2012, Microsoft released Windows 8 Consumer Preview, the beta version of Windows 8 build 8250. For the first time since Windows 95, the Start button will no longer appear on the taskbar, even though their Start screen should still be opened by clicking on the bottom left corner screen and the Start button in the box Charm. On August 1, 2012, Windows 8 (build 9200) released by the build number 6.2.9200.16384. Microsoft held a launch event on October 25, 2012 and the launch of Windows 8 to the public the next day.

13. Windows 10

Windows 10 is the release of the developer or inventor to be released next Windows operating system Microsoft Windows. Introduced on September 30, 2014, will be released in late 2015.

Thus the explanation of the Discoverer Windows and Windows History to 2015, may be useful.


History and Development of Linux




In 1969, Ken Thompson and Dennis Ritchie (also developer of the C language), researchers at AT & T Bell Laboratories America, making the UNIX operating system, the forerunner of Linux. UNIX great attention because it is the first operating system that is made not by the hardware maker. In addition, because the entire source code created with the C language, making it easier to transfer to different platforms.

Within a short period of UNIX developed in two lines: UNIX developed by the University of Berkeley and developed by AT & T. After that start many companies are involved, and there was a competition involving many companies to take control in the field of operating systems. This competition has led to the need for standardization. From this was born the POSIX project led by the IEEE (The Institute of Electrical and Electronics Engineers), which aims to set the standard specification UNIX. Since then, appear various types of UNIX.

One of them is the MINIX made by A. S. Tanenbaum for educational purposes. MINIX source code this is by Linus Torvalds, a student at the University of Helsinki at the time, later used as a reference to create a new operating system that is free and the source code can be accessed by the public. The operating system is then given the name Linux. In building Linux, Linus using tools from the Free Software Foundation's GNU licensed. Then to make Linux a complete operating system, he enter programs that are also licensed under GNU



Starting from the Unix operating system developed and implemented in the 1960s and first released in 1970. Factors that high availability and compatibility causes may be used, copied and modified extensively by academic institutions and the business.

Linux is an operating system that is multiuser and multitasking, which can run on multiple platforms, including INTEL processor 386 and higher. The operating system implements the standard POSIX. Linux can interoperate well with other operating systems, including Apple, Microsoft and Novell. Linux itself is derived from the name of the creator of the beginning, Linus Torvalds, at the University of Helsinki, Finland which actually refers to the kernel of an operating system. Linux used to be a hobby project done by Linus Torvalds who gain inspiration dariMinix. Minix is ​​a small UNIX system developed by Andy Tanenbaum in 1987.
Now Linux is a complete UNIX system, could be used for the network (networking), software development, and even for everyday. Linux has been used in a variety of domains, from embedded systems to supercomputers, and has had a secure position in the web server installation with application LAMP her popular. Linux is now an alternative OS that is much cheaper when compared to the commercial OS, with the ability of Linux to match even more environment operating systems include: Hundreds of programs including, compilers, interpreters, editors and utilities Devices auxiliary supports connectivity, Ethernet, SLIP and PPP and interoperability. Reliable software products, including the latest development version. A development team spread across the world who have worked and made
Linux is portable to a new platform, as well as support the diverse needs of the user community, and location and also act as its own developer team.
History deals with GNU Linux. The GNU Project, started in 1984 has the aim to create an operating system compatible with Unix and complete and in total made up of free software. In 1985, Richard Stallman founded the Free Software Foundation and developed the GNU General Public License (GNU General Public License, or GNU GPL). Most programs required by an operating system (such as libraries, compilers, text editors, a Unix shell and a windowing system) were completed in the early 1990s, though elements such low levels of device drivers Linux does not have a logo that looks interesting, just a bird Penguin showing a relaxed attitude when walking. This logo has a unique origin, initially no logo depicting a trademark of Linux until when Linus (the inventor) on vacation to the south and across a small linux and short inadvertently biting her finger. This makes the fever for days. This incident later inspired him to wear a Tux the penguin as the logo, the name of a penguin who became the mascot of the Linux logo. TUX works of artist Larry Ewing in time Linux developers feel the need to have the trademark logo (1996), and at the suggestion of James Hughes was chosen the name TUX which means Torvalds UNIX. Complete own logo of Linux, in the form of a penguin named Tux. This trademark is registered immediately in order to avoid counterfeiting. Linux is registered as Program operating system (OS).

Kamis, 25 Februari 2016

EXPLANATIONS OFFICE DISHUB


*explanation of network infrastucture DISHUB KOMINFO INHU




In DISHUB using WLAN network
The devices used are:
1. Microtik Rb



 

2. switch / hub


3. The access point

 



4. pc




5.ISP 







DEFINITION:
ISP (Internet Service Provider) is a corporation or business entity that sells Internet connection or the like to the customer. ISP initially very identical to the telephone network, because the first ISP sells Internet connection or access via the telephone network. As one of them is telkomnet instant of Telkom.
Now, with the development of ISP technology that evolved not only by using the telephone network but also using technology such as
fiber optic and wireless. In Bali, Denpasar in particular ISP with wireless technology the most widely grown.
FUNCTION & ROLE:

=>ROLE OF ISPs
The role of ISPs in internet access among others:
-As The media that provide services to connect with the internet.
-Menghubungkan Customers to the nearest Internet gateway.
-Provide A modem for dial-up.
-Menghubungkan An information service to users of the World Wide Web (www).
Allows a user to use the services of electronic mail (e-mail).
Allows a user voice conversations via the internet.
-Gives place to the homepage.
-ISP Doing protection from the spread of the virus by applying antivirus systems for its customers.
The role of the Internet Service Provider (ISP)
ISP has advantages and disadvantages. ISP charge to connect to the Internet's computer. and how to surf the Internet through a computer daoat us is that we have to contact the ISP with telephone facilities, quite a fine turn on the modem, press the connect button, then your computer is connected to the ISP. and we can explore the world of the Internet.


=>ROLE OF ISPs
The role of the Internet Service Provider (ISP)
Internet Service Provider (ISP) is a government-owned enterprises and private facilities that provide services (service) network connection to the Internet. ISPs that are closed and there is a facility that serves only ISP internet network to the local network of the institution. For example, an ISP that exist in several departments of the government-owned large enterprises, research institutions, and educational institutions. General ISP is an ISP that provides Internet services to the community facilities extensive network, both for personal and for the group, as an institution that wants to connect to the Internet network. Generally, this type of non-commercial ISP, meaning that it sells services ISP connection to the Internet network. Examples of this type is WasantaraNet ISP, LinkNet, D-net, TelkomNet, CROI, and INDOSATnet. Note, not all ISPs can deal directly with overseas Internet network (world) because the funds for such purposes is very expensive. Therefore, only large ISPs are able to build the networks with foreign parties. To save money, some ISPs that are closed and do not make direct contact with the Internet network abroad, but through ISP general. So, to connect themselves to the Internet, you need to subscribe to an Internet service provider (Internet Service Provider-ISP). ISP is considered as a gateway to connect to the Internet. You simply look for ISP located in the city where you live.

=>ISP FUNCTION
as a company that offers services for Internet-related services. To access, we simply call the ISP through a computer and modem. Then, the ISP will take care of all that is needed to connect to the inter

HOW TO CREATE BLOG



following way makes blog :
1. go to the blogger , diblogger should also possessed a gmail email first. If there is no make gmail beforehand . If so, please fill in your name and password gmail email after that click sign in


2. after that friends will see a display like this , then friends click create new blog




3. there will be a floating menu on the image below , then pal fill as desired title and address of friend . then click create blog.




4. after it finishes. your blog has been so stay started expose to create news articles, or click the pencil drawing .





5.  later will appear as below , just follow the appropriate instructions for writing the same as in after finished just click publish .





That's a step by step how to create a blog that is easy and free diblogspot .
 thank you already want to read this article :) 

HOW TO INSTALL KALILINUX IN A VIRTUALBOX

Kali linux is a continuation of BackTrack Linux, an operating system that is used for penetration testing.Kali Linux based on Debian GNU / Linux Distribution and equipped with a variety of tools for penetration testing purposes. While Virtual Box is a virtual machine or computer developed by Oracle. By using VirtualBox, meaning you can use the Linux operating system including time without having to install it on the hard disk. How to install Linux in VirtualBox time are as follows:

1. just open your virtualbox. then you click on new and will appear name andoperating system.


 2. then you fill like you drew it.


3. if the type is not linux, you can replace it in column under the name that you created earlier , 
then click next .


4. after you click next then will appear as shown in the picture, then you click next again



5. then clik next . then you click on the image folder to save your kalilinux. thenclick save and klik create .


6. if it is already. before kalilinux begins before you set beforehand. by clicking on the setting .


7. then a window will appear as shown in the picture 


=>  then click and select the image storage cd inscribed empty

=> then click drawn cd without writing, then will appear as shown in the pictureand select "chose a virtual ..." and then locate the SO kalilinux on your computer.
  
 => if it clicks open and you're done setting

8.  if you are finished setting up and then you can start kalilinux. by clicking Start

 9. it will appear as shown in the picture


Diberdayakan oleh Blogger.

you tube channel

Subscribe

Rekomendasi Kami

Popular Posts

Kamu Pasti Tertarik

MoreBaru diupdate