<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearch/1.1/' xmlns:georss='http://www.georss.org/georss' xmlns:gd='http://schemas.google.com/g/2005' gd:etag='W/&quot;DUMMRH44fSp7ImA9WxVUFk0.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114</id><updated>2009-03-20T20:51:25.035-07:00</updated><title>try from zero to grow up</title><subtitle type='html'>IT Center | Computer art | Basic Script |Technical Support | Web design</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>13</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry gd:etag='W/&quot;C0EFQ309cSp7ImA9WxVUFEk.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-7933526030870981326</id><published>2009-03-18T19:55:00.000-07:00</published><updated>2009-03-18T22:46:52.369-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-03-18T22:46:52.369-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='MORE HOTEL IN BALI'/><title>Bali Hotel Resort INDONESIAAN REGIONAL</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_h4mZ6L4BvI0/ScHcCYCfpMI/AAAAAAAAADA/dGL8ovznt3A/s1600-h/images.jpeg"&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 128px; height: 128px;" src="http://4.bp.blogspot.com/_h4mZ6L4BvI0/ScHcCYCfpMI/AAAAAAAAADA/dGL8ovznt3A/s320/images.jpeg" alt="" id="BLOGGER_PHOTO_ID_5314770968644658370" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align="justify"&gt;Hisyam wahid lutfi ....... just remember abaut new hotel&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;After mid smester many people and student &lt;a href="http://www.indo.com/"&gt;will go to holyday &lt;/a&gt;in more place ,in this moment . many places to holyday presented in 2009 IS Bali ., although the distance of bali is long,many people always visit to thre, cause bali is very nice , beautiful, and enerjik abaut ART ..,, &lt;/div&gt;&lt;div align="justify"&gt;no one of people dislike abaut ART, BEAUTIFUL AND Etc from Bali.&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;NOT only one day the peole in Bali , must need more &lt;a href="http://balihotels.com/"&gt;Hotel to enjoying Bali &lt;/a&gt;SITUATION&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;Accomodation Overview&lt;br /&gt;&lt;a href="http://www.balibintangtours.com/hotel_Hotel_Jayakarta_Bali_324_Kuta_4.html"&gt;Hotel Jayakarta&lt;/a&gt; Bali is situated on the legendary Legian Beach and rests quietly in 11 acres of beautifully landscaped gardens and offers an impressive range of services and activities suitable for all tastes and ages.Jayakarta Bali Hotel &amp;amp; Residence is also within walking distance to shopping and entertainment areas. Since its opening in 1983, Hotel &amp;amp; Residence Jayakarta, Bali, has become the choice of many visitors, who enjoy the casual resort atmosphere with International class facilities.Jayakarta &lt;a href="http://www.bali.com/"&gt;Bali&lt;/a&gt; Hotel &amp;amp; Residence consists of 278 rooms and the Residence 166 one and two bedroom apartments. All rooms are featured with individually controlled air-conditioning and feature a private balcony, tub and shower bathroom, mini bar, international direct dial telephone, satellite television with in-house movie, radio. The &lt;a href="http://www.hotel.info/tr.hotels/Kuta_127383/Bali_Ayu_Hotel_204386/hotel.aspx"&gt;apartments &lt;/a&gt;all feature a kitchenette with microwave, china, glassware, cutlery and sofa bed in the living room.The Hotel and Residence Jayakarta Bali offer an exciting range of service and activities, suitable for all tastes and ages. Bali Banjar, seafood, serves the best of the fisherman's catch. For pastas and pizza try the &lt;a href="http://dececcoitalianrestaurant.com/"&gt;Griya Pizza&lt;/a&gt;. Watch an idyllic sun setting over Kuta Beach from our Beach Beer Garden. Sports facilities include two large swimming pools, tennis court, table tennis, fitness centre, and children's playground.GUEST SERVICES &amp;amp; FACILITIES * Three swimming pools* Floodlit tennis court* Fitness center with sauna and massage* Daily sports and recreation programs* Children's Corner Nursery* Taxi, Tour and Travel Desk* Car Rental* Doctor on call* Currency exchange counter* Safety deposit boxes&lt;/div&gt;&lt;div align="justify"&gt;DONT FORGET TO GO TO &lt;a href="http://dececcoitalianrestaurant.com/"&gt;Italian resttaurant&lt;/a&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-7933526030870981326?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/7933526030870981326/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/bali-hotel-indonesiaan-regional.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/7933526030870981326?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/7933526030870981326'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/bali-hotel-indonesiaan-regional.html' title='Bali Hotel Resort INDONESIAAN REGIONAL'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/_h4mZ6L4BvI0/ScHcCYCfpMI/AAAAAAAAADA/dGL8ovznt3A/s72-c/images.jpeg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;CEIMQX86fSp7ImA9WxVUFEk.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-6072340918673773903</id><published>2009-03-06T00:19:00.000-08:00</published><updated>2009-03-18T23:03:00.115-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-03-18T23:03:00.115-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='TIPS'/><title>Scure Your CD</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SbDdL4JTB-I/AAAAAAAAACg/FBK1vkMsS8g/s1600-h/komputer+and+IT"&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 130px; height: 98px;" src="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SbDdL4JTB-I/AAAAAAAAACg/FBK1vkMsS8g/s320/komputer+and+IT" alt="" id="BLOGGER_PHOTO_ID_5309987156789495778" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="color: rgb(255, 204, 102);"&gt;just for reminder&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 204, 102);"&gt;Sensitive personal information, valuable R&amp;amp;D material, government and corporate secrets and other confidential data is often the subject of abuse by unauthorized persons due to its sensitivity. Data backup of such sensitive information to hard disk is vulnerable to electronic tampering, hacking or hijacking.&lt;/span&gt; &lt;span style="color: rgb(51, 102, 255);"&gt;CDR is the best choice for offline digital backup as one can physically keep CDRs in a safe place. CDEncryption comes with security program modules embedded into the CD-R which encryption,and write data back onto Security CDs. The&lt;/span&gt; &lt;strong&gt;&lt;em&gt;&lt;span style="color: rgb(255, 0, 0);font-size:130%;" &gt;SecureCD&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;span style="color: rgb(255, 204, 153);"&gt; Creator use AES 256 and SHA256 bit algorithm, running at high security level.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 204, 153);"&gt;Create, Archive, and Distribute Digital data files in a CD protected by encryption. A CDR encryption product, has a digital encryption drivers embedded in it. The user can create unlimited photos or other data files so long as storage capacity remains on the CDR. The user can save data files in a CDR protected by SecureCD Creator, and can generate a auto-running executable file for distribution&lt;/span&gt;. &lt;span style="color: rgb(0, 204, 204);"&gt;This product is developed for a gift or give-away item. Ideal uses could be for hotels, amusement parks or digital camera manufacturers.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 204, 204);"&gt;Generally, SecureCD Creator can use for the following four ways:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 204, 204);"&gt;Create and archive sensitive data files into a encrypted iso file, mount to a CD-ROM by SecureCD Creator CD-ROM emulator for using.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 255, 204);"&gt;Burn sensitive data files in to CDR/DVDR for keeping, giving-away or distributing.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 255, 204);"&gt;Using SecureCD Creator as a normal iso file editor for creating, editing an iso file.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 255, 204);"&gt;using SecureCD Creator as a normal virtual CD-ROM emulator in computer.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 255, 204);"&gt;Operation System:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 255, 204);"&gt;32BIT: Windows 2000 /XP/2003/VISTA.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 255, 204);"&gt;64BIT: Windows XP x64 Edition, Windows Server 2003 x64 Edition.&lt;/span&gt;&lt;br /&gt;&lt;a href="http://www.mediafire.com/?ndme8dzj4dm"&gt;&lt;span style="color: rgb(51, 204, 0);font-size:130%;" &gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://download-at-now.blogspot.com&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-6072340918673773903?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/6072340918673773903/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/scure-your-cd.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/6072340918673773903?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/6072340918673773903'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/scure-your-cd.html' title='Scure Your CD'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/_h4mZ6L4BvI0/SbDdL4JTB-I/AAAAAAAAACg/FBK1vkMsS8g/s72-c/komputer+and+IT' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;CEEHSXg5cSp7ImA9WxVUFEk.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-8723887409541390406</id><published>2009-03-05T01:38:00.000-08:00</published><updated>2009-03-18T23:03:58.629-07:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-03-18T23:03:58.629-07:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='TIPS'/><title>Windows XP System Tools: Microsoft Management Console (MMC)</title><content type='html'>&lt;p&gt;Preface : it's just for remind me abaut IT answer,thank you&lt;br /&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;b&gt;Windows comes with many applications           for administering and managing the system. In older versions, these           programs had to be used separately. In Windows XP, there is an interface           that can be customized to contain in one package all the system tools           that a particular user employs on a frequent basis. For networks or           multi-user systems there are also a variety of security settings that           can be made within the interface. Microsoft calls this interface a “management           console” and           generally refers to it as MMC. A computer user can choose which of           the many available tools to include. The individual tools are referred           to as “snap-ins”.            A console has a hierarchical structure with folders and in fact resembles           a Windows Explorer tree. &lt;/b&gt;   &lt;/p&gt;&lt;div&gt;        &lt;/div&gt;&lt;hr style="margin-left: 0px; margin-right: 0px;"&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Preconfigured consoles&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;     &lt;/div&gt;&lt;p style="text-align: justify;"&gt;Many of the system tools that come with Windows XP are already in a console     form. They can be used alone or as snap-ins to a console that contains a       collection of applications. The sidebar on the right lists the preconfigured       consoles most commonly used. These are found  in the folder &lt;em&gt;\Windows\System32\&lt;/em&gt;.       Depending on your setup, there may be some in other locations as well.       (Some of these come only with        the XP Professional version.) Note that the consoles have the extension &lt;em&gt;msc&lt;/em&gt; (not       to be confused with MMC). Most of these consoles can be opened by entering       their names (including the extension) in the &lt;strong&gt;Start-Run&lt;/strong&gt; line.       Some, but not all, are also accessible from Control Panel. Depending on       how your computer is set up, some may also be listed in &lt;strong&gt;Start-All       Programs-Administrative Tools&lt;/strong&gt;. As     is common in Windows there are also several other ways to open some of the     tools. However, using the Run line is probably the easiest way. (A few consoles       intended mainly for systems administrators may be in folders not included       in the standard path environment and will need the Run line browse function) &lt;/p&gt;&lt;div style="text-align: justify;"&gt;     &lt;/div&gt;&lt;p style="text-align: justify;"&gt;Some of the consoles that have specialized purposes for use by systems       administrators  may not normally be of interest to the average PC user.       However,  routine system maintenance and management involves       many and these are discussed below. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;h4 style="text-align: justify;"&gt;Computer Management Console&lt;/h4&gt;&lt;div style="text-align: justify;"&gt;      &lt;/div&gt;&lt;p style="text-align: justify;"&gt;This  preconfigured console has most of the system tools that an       average PC user may need. It can be opened by entering "compmgmt.msc" into       the &lt;strong&gt;Start-Run&lt;/strong&gt; line. An alternate way is to right-click       on &lt;strong&gt;Start-My Computer&lt;/strong&gt; and choose "Manage" from       the context menu. Yet another way is through &lt;strong&gt;Control Panel-Performance       and Maintenance-Administrative Tools&lt;/strong&gt;. The figure below shows one       view of this console. The interface is very much like a Windows Explorer       window.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;     &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;img src="http://vlaurie.com/computers2/graphics/mmccompmgt.gif" width="364" height="366" /&gt;  &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;There are a number of views and configurations for a console but the defaults    are probably sufficient for most average PC users. Those who wish to go    into more details of the various console settings and capabilities can    consult &lt;a href="http://www.theeldergeek.com/microsoft_management_console.htm" target="_blank"&gt;The    Elder Geek&lt;/a&gt;.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;Note that this version of the Computer Management Console contains 11 other    consoles as snap-ins. These are grouped into three folders or categories.    Among the most commonly used of the tools are     &lt;a href="http://vlaurie.com/computers2/Articles/xpdefrag.htm"&gt;Disk Defragmenter&lt;/a&gt; and &lt;a href="http://vlaurie.com/computers2/Articles/harddrive2.htm"&gt;Disk    Management&lt;/a&gt; (in the folder Storage),    and &lt;a href="http://vlaurie.com/computers2/Articles/services.htm"&gt;Services&lt;/a&gt; (in the folder Services and Applications)    which are discussed in more detail on other pages. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Customized Consoles&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;"&gt;If you wish to have a console containing only the snap-ins that you commonly      use, it is very easy to create your own version. Go to &lt;strong&gt;Start-Run&lt;/strong&gt; and      enter "mmc" (without quotes). A blank console will open as shown below.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;img src="http://vlaurie.com/computers2/graphics/mmcblank.gif" width="400" height="301" /&gt; &lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;"&gt;To add snap-ins, open the "File" menu and choose "Add/Remove Snap-in".      The next figure will open. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;img src="http://vlaurie.com/computers2/graphics/mmcblank2r.gif" width="349" height="387" /&gt; &lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;"&gt;Choose the tab "Standalone" and click "Add". The next      figure giving a list of possible snap-ins will open. Not all of these      will be msc consoles but some ActiveX controls will also be shown.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;img src="http://vlaurie.com/computers2/graphics/mmcblank3r.gif" width="323" height="328" /&gt; &lt;/p&gt;&lt;div style="text-align: justify;"&gt;    &lt;/div&gt;&lt;p style="text-align: justify;"&gt;In the figure we have chosen the Computer Management Console as a snap-in.      Click "Add" and continue to select and add components as desired. Note      that the tree structure means that you can add folders and organize the      snap-ins according to personal preference.   I Think Enough http://vlaurie.com/computers2/Articles/mmc.htm&lt;br /&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;                    &lt;/div&gt;&lt;table width="100%" border="0" cellpadding="4" cellspacing="2"&gt;&lt;tbody&gt;&lt;tr bg="" style="color: rgb(51, 51, 51);" align="justify"&gt;            &lt;td&gt; &lt;table style="text-align: left; margin-left: 0px; margin-right: 0px;" width="100%" border="0" cellpadding="4" cellspacing="0"&gt;               &lt;tbody&gt;&lt;tr&gt;                                   &lt;td bg="" style="color: rgb(51, 51, 51);" width="100%"&gt;&lt;span style="color: rgb(204, 204, 204);font-size:78%;" &gt;&lt;b&gt;Common Consoles&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;               &lt;/tr&gt;             &lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;         &lt;/tr&gt;         &lt;tr bgcolor="#dcdcdc"&gt;            &lt;td&gt;&lt;div style="text-align: justify;"&gt;       &lt;b&gt;The files listed below are preconfigured consoles found in the folder        \Windows\System32\&lt;/b&gt;&lt;br /&gt;&lt;b&gt;       (Some are found only in Windows XP Professional,)&lt;/b&gt;&lt;br /&gt;    &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;certmgr.msc&lt;/em&gt;- manages certificates involved in security&lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;ciadv.msc&lt;/em&gt;- manages the Indexing Service &lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;compmgmt.msc&lt;/em&gt;- the Computer Management Console. It contains a number of the     other consoles as snap-ins &lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;devmgmt.msc&lt;/em&gt;- the Device Manager &lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;dfrg.msc&lt;/em&gt;- Disk Defragmenter. More discussion &lt;a href="http://vlaurie.com/computers2/Articles/xpdefrag.htm"&gt;here&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;diskmgmt.msc&lt;/em&gt;- Disk Management. More discussion &lt;a href="http://vlaurie.com/computers2/Articles/harddrive2.htm"&gt;here&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;   &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;eventvwr.msc&lt;/em&gt;- Event Viewer for managing system logs &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;fsmgmt.msc&lt;/em&gt;- Shared Folder Management &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;gpedit.msc&lt;/em&gt;- Group Policy Editor. More discussion &lt;a href="http://vlaurie.com/computers2/Articles/group_policy_editor.htm"&gt;here&lt;/a&gt;. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;lusrmgr.msc&lt;/em&gt;- Local Users and Groups Manager&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;ntmsmgr.msc&lt;/em&gt;- Removable Storage Manager &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;ntmsoprq.msc&lt;/em&gt;- Removable Storage Operator Requests &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;perfmon.msc&lt;/em&gt;- System Performance Monitor &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;rsop.msc&lt;/em&gt;- Resultant Set of Policy. For system administrators &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;secpol.msc&lt;/em&gt;- Security Policy. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;services.msc&lt;/em&gt;- Manages the      many services involved in Windows and also installed software. More discussion &lt;a href="http://vlaurie.com/computers2/Articles/services.htm"&gt;here&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;em&gt;wmimgmt.msc&lt;/em&gt;- Windows Management Instrumentation Service&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;b&gt;The console below is in  \Windows\System32\com\&lt;/b&gt;  &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;em&gt;comexp.msc&lt;/em&gt;- Component Services. Its folder is not in the standard    path so it is normally opened in &lt;strong&gt;All Programs-Administrative Tools&lt;/strong&gt; or    &lt;strong&gt;Control Panel-Performance and Maintenance-Administrative Tools&lt;/strong&gt;&lt;/div&gt;&lt;p&gt; &lt;/p&gt;  &lt;p&gt; &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-8723887409541390406?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/8723887409541390406/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/windows-xp-system-tools-microsoft.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/8723887409541390406?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/8723887409541390406'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/windows-xp-system-tools-microsoft.html' title='Windows XP System Tools: Microsoft Management Console (MMC)'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;DkQGQXo6fip7ImA9WxVVEk4.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-4800124658109236302</id><published>2009-03-04T22:22:00.000-08:00</published><updated>2009-03-04T22:25:20.416-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-03-04T22:25:20.416-08:00</app:edited><title>Anti firus and Conficker</title><content type='html'>&lt;p&gt;&lt;span class="fullpost"&gt;kaynere said about virus conficker&lt;/span&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_MP3MFuhrDHQ/SZgY8BuGtHI/AAAAAAAAAKM/9zfTuOGXoJo/s1600-h/240px-Conficker.svg.png"&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 240px; height: 170px;" src="http://1.bp.blogspot.com/_MP3MFuhrDHQ/SZgY8BuGtHI/AAAAAAAAAKM/9zfTuOGXoJo/s320/240px-Conficker.svg.png" alt="" id="BLOGGER_PHOTO_ID_5303015980761789554" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:trackmoves/&gt;   &lt;w:trackformatting/&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:donotpromoteqf/&gt;   &lt;w:lidthemeother&gt;EN-US&lt;/w:LidThemeOther&gt;   &lt;w:lidthemeasian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:lidthemecomplexscript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;    &lt;w:splitpgbreakandparamark/&gt;    &lt;w:dontvertaligncellwithsp/&gt;    &lt;w:dontbreakconstrainedforcedtables/&gt;    &lt;w:dontvertalignintxbx/&gt;    &lt;w:word11kerningpairs/&gt;    &lt;w:cachedcolbalance/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;   &lt;m:mathpr&gt;    &lt;m:mathfont val="Cambria Math"&gt;    &lt;m:brkbin val="before"&gt;    &lt;m:brkbinsub val=""&gt;    &lt;m:smallfrac val="off"&gt;    &lt;m:dispdef&gt;    &lt;m:lmargin val="0"&gt;    &lt;m:rmargin val="0"&gt;    &lt;m:defjc val="centerGroup"&gt;    &lt;m:wrapindent val="1440"&gt;    &lt;m:intlim val="subSup"&gt;    &lt;m:narylim val="undOvr"&gt;   &lt;/m:narylim&gt;&lt;/m:intlim&gt; &lt;/m:wrapindent&gt;&lt;!--[endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"&gt;   &lt;w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"&gt;   &lt;w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"&gt;   &lt;w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 1"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 2"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 3"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 4"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 5"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 6"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 7"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 8"&gt;   &lt;w:lsdexception locked="false" priority="39" name="toc 9"&gt;   &lt;w:lsdexception locked="false" priority="35" qformat="true" name="caption"&gt;   &lt;w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"&gt;   &lt;w:lsdexception locked="false" priority="1" name="Default Paragraph Font"&gt;   &lt;w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"&gt;   &lt;w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"&gt;   &lt;w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"&gt;   &lt;w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"&gt;   &lt;w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"&gt;   &lt;w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"&gt;   &lt;w:lsdexception locked="false" unhidewhenused="false" name="Revision"&gt;   &lt;w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"&gt;   &lt;w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"&gt;   &lt;w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"&gt;   &lt;w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"&gt;   &lt;w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"&gt;   &lt;w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"&gt;   &lt;w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"&gt;   &lt;w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"&gt;   &lt;w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"&gt;   &lt;w:lsdexception locked="false" priority="37" name="Bibliography"&gt;   &lt;w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;style&gt; &lt;!--  /* Font Definitions */  @font-face  {font-family:"Cambria Math";  panose-1:2 4 5 3 5 4 6 3 2 4;  mso-font-charset:0;  mso-generic-font-family:roman;  mso-font-pitch:variable;  mso-font-signature:-1610611985 1107304683 0 0 159 0;} @font-face  {font-family:Calibri;  panose-1:2 15 5 2 2 2 4 3 2 4;  mso-font-charset:0;  mso-generic-font-family:swiss;  mso-font-pitch:variable;  mso-font-signature:-1610611985 1073750139 0 0 159 0;}  /* Style Definitions */  p.MsoNormal, li.MsoNormal, div.MsoNormal  {mso-style-unhide:no;  mso-style-qformat:yes;  mso-style-parent:"";  margin-top:0cm;  margin-right:0cm;  margin-bottom:10.0pt;  margin-left:0cm;  line-height:115%;  mso-pagination:widow-orphan;  font-size:11.0pt;  font-family:"Calibri","sans-serif";  mso-ascii-font-family:Calibri;  mso-ascii-theme-font:minor-latin;  mso-fareast-font-family:Calibri;  mso-fareast-theme-font:minor-latin;  mso-hansi-font-family:Calibri;  mso-hansi-theme-font:minor-latin;  mso-bidi-font-family:"Times New Roman";  mso-bidi-theme-font:minor-bidi;} a:link, span.MsoHyperlink  {mso-style-priority:99;  color:blue;  mso-themecolor:hyperlink;  text-decoration:underline;  text-underline:single;} a:visited, span.MsoHyperlinkFollowed  {mso-style-noshow:yes;  mso-style-priority:99;  color:purple;  mso-themecolor:followedhyperlink;  text-decoration:underline;  text-underline:single;} p  {mso-style-noshow:yes;  mso-style-priority:99;  mso-margin-top-alt:auto;  margin-right:0cm;  mso-margin-bottom-alt:auto;  margin-left:0cm;  mso-pagination:widow-orphan;  font-size:12.0pt;  font-family:"Times New Roman","serif";  mso-fareast-font-family:"Times New Roman";} .MsoChpDefault  {mso-style-type:export-only;  mso-default-props:yes;  mso-ascii-font-family:Calibri;  mso-ascii-theme-font:minor-latin;  mso-fareast-font-family:Calibri;  mso-fareast-theme-font:minor-latin;  mso-hansi-font-family:Calibri;  mso-hansi-theme-font:minor-latin;  mso-bidi-font-family:"Times New Roman";  mso-bidi-theme-font:minor-bidi;} .MsoPapDefault  {mso-style-type:export-only;  margin-bottom:10.0pt;  line-height:115%;} @page Section1  {size:612.0pt 792.0pt;  margin:72.0pt 72.0pt 72.0pt 72.0pt;  mso-header-margin:36.0pt;  mso-footer-margin:36.0pt;  mso-paper-source:0;} div.Section1  {page:Section1;} --&gt; &lt;/style&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable  {mso-style-name:"Table Normal";  mso-tstyle-rowband-size:0;  mso-tstyle-colband-size:0;  mso-style-noshow:yes;  mso-style-priority:99;  mso-style-qformat:yes;  mso-style-parent:"";  mso-padding-alt:0cm 5.4pt 0cm 5.4pt;  mso-para-margin-top:0cm;  mso-para-margin-right:0cm;  mso-para-margin-bottom:10.0pt;  mso-para-margin-left:0cm;  line-height:115%;  mso-pagination:widow-orphan;  font-size:11.0pt;  font-family:"Calibri","sans-serif";  mso-ascii-font-family:Calibri;  mso-ascii-theme-font:minor-latin;  mso-fareast-font-family:"Times New Roman";  mso-fareast-theme-font:minor-fareast;  mso-hansi-font-family:Calibri;  mso-hansi-theme-font:minor-latin;} &lt;/style&gt; &lt;![endif]--&gt;  &lt;/m:defjc&gt;&lt;/m:rmargin&gt;&lt;/m:lmargin&gt;&lt;/m:dispdef&gt;&lt;/m:smallfrac&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: arial;"&gt;Virus conficker is  worm Mc Afee discovery date at &lt;/span&gt;&lt;a style="font-family: arial;" href="http://vil.nai.com/vil/content/v_153464.htm"&gt;24/11/2008&lt;/a&gt;&lt;span style="font-family: arial;"&gt; . in Wikipedia found like this : &lt;/span&gt;&lt;b style="font-family: arial;"&gt;Conficker&lt;/b&gt;&lt;span style="font-family: arial;"&gt;, also known as &lt;/span&gt;&lt;b style="font-family: arial;"&gt;Downup&lt;/b&gt;&lt;span style="font-family: arial;"&gt;, &lt;/span&gt;&lt;b style="font-family: arial;"&gt;Downandup&lt;/b&gt;&lt;span style="font-family: arial;"&gt; and &lt;/span&gt;&lt;b style="font-family: arial;"&gt;Kido&lt;/b&gt;&lt;span style="font-family: arial;"&gt;, is a &lt;/span&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Computer_worm" title="Computer worm"&gt;computer worm&lt;/a&gt;&lt;span style="font-family: arial;"&gt; that surfaced in October 2008 and targets the &lt;/span&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Microsoft_Windows" title="Microsoft Windows"&gt;Microsoft Windows&lt;/a&gt;&lt;span style="font-family: arial;"&gt; &lt;/span&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Operating_system" title="Operating system"&gt;operating system&lt;/a&gt;&lt;span style="font-family: arial;"&gt;.&lt;/span&gt;&lt;sup style="font-family: arial;" id="cite_ref-0"&gt;&lt;a href="http://en.wikipedia.org/wiki/Conficker#cite_note-0" title=""&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;span style="font-family: arial;"&gt; The worm exploits a known vulnerability in the Windows Server service used by &lt;/span&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Windows_2000" title="Windows 2000"&gt;Windows 2000&lt;/a&gt;&lt;span style="font-family: arial;"&gt;, &lt;/span&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Windows_XP" title="Windows XP"&gt;Windows XP&lt;/a&gt;&lt;span style="font-family: arial;"&gt;, &lt;/span&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Windows_Vista" title="Windows Vista"&gt;Windows Vista&lt;/a&gt;&lt;span style="font-family: arial;"&gt;, &lt;/span&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Windows_Server_2003" title="Windows Server 2003"&gt;Windows Server 2003&lt;/a&gt;&lt;span style="font-family: arial;"&gt;, &lt;/span&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Windows_Server_2008" title="Windows Server 2008"&gt;Windows Server 2008&lt;/a&gt;&lt;span style="font-family: arial;"&gt;, and the &lt;/span&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Windows_7" title="Windows 7"&gt;Windows 7&lt;/a&gt;&lt;span style="font-family: arial;"&gt; Beta.&lt;/span&gt;&lt;sup id="cite_ref-1"&gt;&lt;a style="font-family: arial;" href="http://en.wikipedia.org/wiki/Conficker#cite_note-1" title=""&gt;[2]&lt;/a&gt;&lt;a href="http://en.wikipedia.org/wiki/Conficker#cite_note-2" title=""&gt;&lt;span style="font-family: arial;"&gt;[3&lt;/span&gt;]&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt; This Worm very breakneck because of has infected millions of computer in the world, till Navy and air Prancis till America air force even also follow attacked virus Conficker. Experts internet security has been tried to handle this virus, although they actually know this virus is linked direct with nucleus/core server that give direct commands to virus that computer infection for downloading newest varians.&lt;br /&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;Newest Variant of conficker at this time ready to crack and brute force password computermachine that infected, afterwards softwares even also tries access 250th different domain name every its day, and downloading a new program to take over computer that has been infected .&lt;br /&gt;&lt;br /&gt;This Virus can make access at website security and update antivirus becomes closed, make scheduled task by it self and come easy expand and make network becomes tardy. Even this virus also attacks Windows Vista and Windows 2008.&lt;br /&gt;&lt;br /&gt;Virus 'Conficker.DV' use different spreading method from its predecessor. With its sophisticated, thats virus try to access network uses gap windows 'Default Share' (ADMIN$\system32) by guess password administrator.&lt;br /&gt;&lt;br /&gt;In other hand 'Conficker.DV' also make file at media removable like flashdisk, harddisk and reader card by keep file hidden at root drive.&lt;br /&gt;Meanwhile action in common like its predecessor, that is try to exploitating MS08-067 or security gap Windows, Windows Server Service or SVCHOST.exe. Many users that infected because of not activate feature Automatic Updates and guilty of no patch windows MS08-067.&lt;br /&gt;&lt;br /&gt;Last news that I get this virus has attacked computer of German's defence department and Microsoft gives reward $250.000 for this head of virus maker.&lt;br /&gt;(collected from many source)&lt;br /&gt;&lt;br /&gt;for me there are some easy step to avoid this virus.&lt;br /&gt;first     : don't use windows system operation&lt;br /&gt;second : if forced use windows, use antivirus that can be updated in offline like ESET NOD32, AVG, or other. because conficker closed antivirus automatically update&lt;br /&gt;third    : search in  google. there is many way to eradicate conficker. this is one of them:&lt;br /&gt;1.Decide computer that will be cleared of network/internet.&lt;br /&gt;2. Kill system restore (Windows XP/Vista).&lt;br /&gt;3. Kill active virus process at services. Use removal tool from Norman to clean active virus. If has not yet had, can be downloaded in norman sites.&lt;br /&gt;4. Fake Delete service svchost.exe that inculcated virus at registry. You can look for manually at registry.&lt;br /&gt;5. Vanish Schedule Task that made by virus. (C:\WINDOWS\Tasks)&lt;br /&gt;6. Vanish strings registry [that] made by virus. for easy way, you can use this script registry (write in notepad)&lt;br /&gt;-------------------&lt;br /&gt;[Version]&lt;br /&gt;Signature="$Chicago$"&lt;br /&gt;Provider=Vaksincom Oyee&lt;br /&gt;&lt;br /&gt;[DefaultInstall]&lt;br /&gt;AddReg=UnhookRegKey&lt;br /&gt;DelReg=del&lt;br /&gt;&lt;br /&gt;[UnhookRegKey]&lt;br /&gt;HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced,&lt;br /&gt;Hidden, 0x00000001,1&lt;br /&gt;HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced,&lt;br /&gt;SuperHidden, 0x00000001,1&lt;br /&gt;HKLM,&lt;br /&gt;SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL,&lt;br /&gt;CheckedValue, 0x00000001,1&lt;br /&gt;HKLM, SYSTEM\CurrentControlSet\Services\BITS, Start, 0x00000002,2&lt;br /&gt;HKLM, SYSTEM\CurrentControlSet\Services\ERSvc, Start, 0x00000002,2&lt;br /&gt;HKLM, SYSTEM\CurrentControlSet\Services\wscsvc, Start, 0x00000002,2&lt;br /&gt;HKLM, SYSTEM\CurrentControlSet\Services\wuauserv, Start, 0x00000002,2&lt;br /&gt;&lt;br /&gt;[del]&lt;br /&gt;HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, dl&lt;br /&gt;HKCU, Software\Microsoft\Windows\CurrentVersion\Applets, ds&lt;br /&gt;HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Applets, dl&lt;br /&gt;HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Applets, ds&lt;br /&gt;HKLM, SYSTEM\CurrentControlSet\Services\Tcpip\Parameters, TcpNumConnections&lt;br /&gt;----------------&lt;br /&gt;then save in conficker repairs.inf don't forget change save as type in all files. then open this conficker repairs.inf or right click and install.&lt;br /&gt;if your computer infected again these is my suggest : use linux ubuntu or GOS or many open source Operating system. You can found in &lt;a href="http://www.google.com/"&gt;google search&lt;/a&gt;&lt;br /&gt;http://kaynere.blogspot.com/search/label/IT%20and%20Computer&lt;br /&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-4800124658109236302?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/4800124658109236302/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/anti-firus-and-conficker.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/4800124658109236302?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/4800124658109236302'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/anti-firus-and-conficker.html' title='Anti firus and Conficker'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/_MP3MFuhrDHQ/SZgY8BuGtHI/AAAAAAAAAKM/9zfTuOGXoJo/s72-c/240px-Conficker.svg.png' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;DkYFSHg7eCp7ImA9WxVVEk4.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-4267978899838609187</id><published>2009-03-02T01:48:00.000-08:00</published><updated>2009-03-04T22:21:59.600-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-03-04T22:21:59.600-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='komputer'/><title>Practice Mikrotik's Setting</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_h4mZ6L4BvI0/Sa9vZpPLBEI/AAAAAAAAAB4/3xi5kKS8Bd0/s1600-h/IT+and+komputer.jpg"&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 130px; height: 73px;" src="http://3.bp.blogspot.com/_h4mZ6L4BvI0/Sa9vZpPLBEI/AAAAAAAAAB4/3xi5kKS8Bd0/s320/IT+and+komputer.jpg" alt="" id="BLOGGER_PHOTO_ID_5309584972050007106" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;kaynere said...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;At this moment, I just want to share experience, make router with Mikrotik with two IP ADDRES. Both of them connecting each other. As the description, this IP address that we used.&lt;br /&gt;&lt;br /&gt;IP for  public (ordinary used for internet)&lt;br /&gt;IP Address : 200.200.200.99&lt;br /&gt;Subnet Mask : 255.255.255.0&lt;br /&gt;GateWay : 200.200.200.254&lt;br /&gt;DNS : 200.200.200.254&lt;br /&gt;&lt;br /&gt;Local IP (for local networking)&lt;br /&gt;IP Address : 192.168.200.254&lt;br /&gt;Subnet Mask : 255.255.255.0&lt;br /&gt;Gateway : 200.200.200.254&lt;br /&gt;DNS : 200.200.200.254&lt;br /&gt;&lt;br /&gt;From that description, so we had two different IP ADDRESS but same gateway and DNS.&lt;br /&gt;&lt;br /&gt;Prepare Mikrotik CD (with the crack  )&lt;br /&gt;1. Prepare your PC minimum spec Pentium II Hard Disk 10 GB, 2 LAN Card&lt;br /&gt;2. Make boot from CD in BIOS&lt;br /&gt;3. Boot with MIkrotik CD, press a for installing all of Mikrotik component&lt;br /&gt;4. Press I for Install&lt;br /&gt;5. Press N for not to keep old configuration&lt;br /&gt;6. Press Y to continue&lt;br /&gt;7. Waiting until end process&lt;br /&gt;8. Press Enter to reboot (be sure that your CD installation was remove)&lt;br /&gt;9. Login with username :admin and don’t fill password&lt;br /&gt;10. Change default Mikrotik with your name or something you like it, type edit in system identity than enter&lt;br /&gt;Type value name : name&lt;br /&gt;Delete Mikrotik and change with name you Like example kaynere then press CTRL+O&lt;br /&gt;11. Then change password with type Yor New Password and Retype your new password that you had change&lt;br /&gt;12. Please take a look your interface ( to investigate how many LAN Card at your PC&lt;br /&gt;Type interface print  than press enter&lt;br /&gt;13.  Change ether1 and ether (so you have 2 LAN Card) with Public IP and Local IP&lt;br /&gt;Type interface edit0 than press enter (with purpose change ether1 name’s)&lt;br /&gt;Value-name : name&lt;br /&gt;Than delete ether1 and change with public than press CTRL+O&lt;br /&gt;Type interface edit than press enter (for changing ether1 name)&lt;br /&gt;Value-name : name&lt;br /&gt;Delete ether2 and change with local than press CTRL+O&lt;br /&gt;check interface view, type interface print than enter. So ether1 and ether2 changed with public and local&lt;br /&gt;14. Now Set IP Address just like on the top page.&lt;br /&gt;type ip address add&lt;br /&gt;Address : 200.200.200.99/24 ( /24  for represent  255.255.255.0)&lt;br /&gt;Interface : public&lt;br /&gt;Now set  local&lt;br /&gt;type ip address add&lt;br /&gt;Address : 192.168.200.254/24 ( /24  for represent  255.255.255.0)&lt;br /&gt;Interface : local&lt;br /&gt;Now check your IP address set that you have change, type  ip address print&lt;br /&gt;15. Make gateway for IP router&lt;br /&gt;From that description on top page, so gateway that we used are 200.200.200.254&lt;br /&gt;Type ip route add gateway=200.200.200.254&lt;br /&gt;Than check your change with type ip route print&lt;br /&gt;16. Configuring IP DNS&lt;br /&gt;type : ip dns edit primary-dns&lt;br /&gt;Delete 0.0.0.0 and change with 200.200.200.254 and than press CTRL+O&lt;br /&gt;If your DNS we used are 192.168.100.254 so we have to set  or configuring like this :&lt;br /&gt;type : ip dns edit allow-remote-requests&lt;br /&gt;delete no and change with yes than press  CTRL + O&lt;br /&gt;17. Last step was configuring NAT&lt;br /&gt;type: ip firewall nat add chain=srcnat action=masquerade out-interface=public&lt;br /&gt;&lt;br /&gt;for client IP address set 192.168.100.1 to 192.168.100.253 with subnetmask : 255.255.255.0, gateway dan DNS : 192.168.100.254&lt;br /&gt;&lt;br /&gt;here we are our routing. This page presented by &lt;a href="http://s0dikin.blogspot.com/"&gt;chungchin&lt;/a&gt; and translated by kaynere. Just for document reminder.&lt;br /&gt;Danke, Gracias…http://kaynere.blogspot.com/search/label/IT%20and%20Computer&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-4267978899838609187?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/4267978899838609187/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/police-of-ads.html#comment-form' title='1 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/4267978899838609187?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/4267978899838609187'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/03/police-of-ads.html' title='Practice Mikrotik&apos;s Setting'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/_h4mZ6L4BvI0/Sa9vZpPLBEI/AAAAAAAAAB4/3xi5kKS8Bd0/s72-c/IT+and+komputer.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></entry><entry gd:etag='W/&quot;DUcNRXo9fip7ImA9WxVWEkQ.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-3595940503097500161</id><published>2009-02-22T02:03:00.000-08:00</published><updated>2009-02-22T02:04:54.466-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-02-22T02:04:54.466-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='ART'/><title>BATIK BAKARAN PATI</title><content type='html'>BATIK&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-3595940503097500161?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/3595940503097500161/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/batik-bakaran-pati.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/3595940503097500161?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/3595940503097500161'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/batik-bakaran-pati.html' title='BATIK BAKARAN PATI'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;DEcFRn07cSp7ImA9WxVWEkU.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-4789878073043393009</id><published>2009-02-21T22:44:00.000-08:00</published><updated>2009-02-21T23:00:17.309-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-02-21T23:00:17.309-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='I AM'/><title>Let's write to me</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_h4mZ6L4BvI0/SaD3-e7WoeI/AAAAAAAAABQ/izCyerI9KJ4/s1600-h/laura1.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 150px; height: 113px;" src="http://2.bp.blogspot.com/_h4mZ6L4BvI0/SaD3-e7WoeI/AAAAAAAAABQ/izCyerI9KJ4/s320/laura1.jpg" alt="" id="BLOGGER_PHOTO_ID_5305513013868405218" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Dear Students, This post is afailable for you to write down your toughts,argumen or just fun writing ,don't hesitate to write.it is no problem at all if you make any mistake , yeach. I will try to fix it up. let's write ,,, and keep and touch yaaaaa&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-4789878073043393009?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/4789878073043393009/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/lets-write-to-me.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/4789878073043393009?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/4789878073043393009'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/lets-write-to-me.html' title='Let&apos;s write to me'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/_h4mZ6L4BvI0/SaD3-e7WoeI/AAAAAAAAABQ/izCyerI9KJ4/s72-c/laura1.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;DEUARHY6eCp7ImA9WxVWGUg.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-1478048861829708343</id><published>2009-02-21T20:58:00.000-08:00</published><updated>2009-03-01T17:10:45.810-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-03-01T17:10:45.810-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='komputer'/><title>Switching Technology</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SaDdHuOEi5I/AAAAAAAAABA/53NfEvmIehw/s1600-h/images"&gt;&lt;img id="BLOGGER_PHOTO_ID_5305483485778316178" style="FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 143px; CURSOR: pointer; HEIGHT: 135px" alt="" src="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SaDdHuOEi5I/AAAAAAAAABA/53NfEvmIehw/s320/images" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style="TEXT-ALIGN: justify"&gt;Another approach to pushing beyond the limits of &lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=Ethernet+technology&amp;amp;go=Go"&gt;&lt;span style="FONT-WEIGHT: bold; COLOR: rgb(255,102,102); FONT-STYLE: italic"&gt;Ethernet technology&lt;/span&gt;&lt;/a&gt; is the development of switching technology.A &lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=switching+bridges+Ethernet&amp;amp;go=Go"&gt;&lt;span style="FONT-WEIGHT: bold; COLOR: rgb(102,255,153); FONT-STYLE: italic"&gt;switching bridges Ethernet Pakets&lt;/span&gt;&lt;/a&gt; at The &lt;a style="COLOR: rgb(255,102,102)" href="http://en.wikipedia.org/wiki/Special:Search?search=MAC+address&amp;amp;fulltext=Search"&gt;&lt;span style="FONT-WEIGHT: bold; FONT-STYLE: italic"&gt;MAC address&lt;/span&gt;&lt;/a&gt; level of the Ethernet Protocol ,transmitting among conected Ethernet or Fast Ethernet &lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=LAN&amp;amp;fulltext=Search"&gt;&lt;span style="FONT-WEIGHT: bold"&gt;LAN&lt;/span&gt;&lt;/a&gt; segment.&lt;br /&gt;Switching is a cost-evective way of increasing the total network capacity available to user on a local area network .A switch increases capacity and decreases network loading by divinding a local area network into different segmen , which don't compete with each other for network transmission capacity.&lt;br /&gt;The switch acts as a higih speed selective &lt;span style="FONT-WEIGHT: bold; FONT-STYLE: italic"&gt;&lt;a style="COLOR: rgb(255,0,0)" href="http://en.wikipedia.org/wiki/Special:Search?search=bridge&amp;amp;fulltext=Search"&gt;bridge&lt;/a&gt; &lt;/span&gt;network between the individual segment,automatically forward traffic that needs to go from one segment to another BY doing this the total network capacity is multiplied, while still maintaining the same &lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=network+cabling&amp;amp;fulltext=Search"&gt;&lt;span style="FONT-WEIGHT: bold; COLOR: rgb(255,0,0); FONT-STYLE: italic"&gt;network cabling&lt;/span&gt;&lt;/a&gt; and adapter cards.&lt;br /&gt;&lt;br /&gt;for fast ethernet networks, a switch is an effective way of eliminating problems of chaining hubs beyond the "two-repeater limit." a switch can be used to split parts of the network into different collision domains, making it possible to expand your fast ethernet network beyond the 205-meter network diameter limit for &lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=100BASE-TX&amp;amp;fulltext=Search"&gt;&lt;span style="FONT-WEIGHT: bold; COLOR: rgb(51,102,255); FONT-STYLE: italic"&gt;100BASE-TX&lt;/span&gt;&lt;/a&gt; network. switches supporting both traditional 10Mbps ethernet and 100Mbs fast ethernet are also ideal for bridging between the existing 10Mbps networks and the new 100Mbps networks.Switching LAN technology is a marked improvement over the previous generation of network bridges,which were characterized by higher by higher latencies.Routers have also been used to segment local area networks, but the cost of a router, the setup and maintenance required make routers relative relatively impractial.Today switches are an ideal solution to most kinds of local area network congestion.&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-1478048861829708343?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/1478048861829708343/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/switching-technology.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/1478048861829708343?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/1478048861829708343'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/switching-technology.html' title='Switching Technology'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/_h4mZ6L4BvI0/SaDdHuOEi5I/AAAAAAAAABA/53NfEvmIehw/s72-c/images' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;DkQFQ3s9fSp7ImA9WxVWEkU.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-8631621760804639511</id><published>2009-02-21T20:14:00.000-08:00</published><updated>2009-02-21T22:31:52.565-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-02-21T22:31:52.565-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='komputer'/><title>Fast Ethernet technology LAN / WAN</title><content type='html'>&lt;div style="text-align: justify;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SaDSqRc1p4I/AAAAAAAAAA4/2QmeNbHtQA0/s1600-h/images.jpg"&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 133px; height: 119px;" src="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SaDSqRc1p4I/AAAAAAAAAA4/2QmeNbHtQA0/s320/images.jpg" alt="" id="BLOGGER_PHOTO_ID_5305471984723142530" border="0" /&gt;&lt;/a&gt;Emmm ... in this statement of our comunity,we talking  more abaut &lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=hub+switch&amp;amp;go=Go"&gt;&lt;span style="font-weight: bold; font-style: italic; color: rgb(255, 0, 0);"&gt;Hub&lt;/span&gt;&lt;span style="color: rgb(255, 0, 0);"&gt; Switch&lt;/span&gt;&lt;/a&gt; .The growing importance of &lt;span style="font-weight: bold; font-style: italic;"&gt;LANs&lt;/span&gt; and the increasing complexity of desktop computing &lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=aplications+computing&amp;amp;go=Go"&gt;&lt;span style="font-weight: bold; font-style: italic; color: rgb(255, 0, 0);"&gt;aplications&lt;/span&gt; &lt;/a&gt;are fueling the need for high performance networks.A number of  high speed &lt;span style="font-weight: bold; font-style: italic;"&gt;LAN&lt;/span&gt; technologies have been proposed to profide greather &lt;a href="http://en.wikipedia.org/wiki/Bandwidth_%28computers%29"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;bandwidth&lt;/span&gt;&lt;/a&gt; and improve client / server response times . among them ,&lt;span style="font-weight: bold; font-style: italic;"&gt;100BASE-T (Fast Ethernet)&lt;/span&gt; provides a non-disruptive, smoot evolution from the curent 10BASE-T  Technology. The  non-disruptive and smooth evolution nature ,and the dominating potential market base,virtually gurantee cost-evektive and high-pervormance Fast Ethernet solution In the years to come.&lt;br /&gt;100Mbps Fast Ethernet is a new standartd specified by the &lt;span style="font-style: italic;"&gt;&lt;a style="color: rgb(255, 0, 0);" href="http://en.wikipedia.org/wiki/Special:Search?search=IEEE+802.3+LAN&amp;amp;fulltext=Search"&gt;&lt;span style="font-weight: bold;"&gt;IEEE 802.3 LAN&lt;/span&gt;&lt;/a&gt; committee. it is an extension of the 10Mbps  &lt;/span&gt;Ethernet standart with the ability  to transmit and receive data at 100Mbps &lt;span style="font-weight: bold; font-style: italic;"&gt;,&lt;/span&gt;&lt;span style="font-style: italic;"&gt;while maintaining  &lt;/span&gt;the  &lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=CSMA%2FCD&amp;amp;fulltext=Search"&gt;CSMA/CD&lt;/a&gt; Ethernet protocol. Since the 100Mbps Fast Ethernet is competible with all other 10Mbps Ethernet infironments ,it  provides a straightforward upgrade and takes adventage of the existing environment in hardware , software,and personal,,&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-8631621760804639511?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/8631621760804639511/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/fast-ethernet-technology-lan-wan.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/8631621760804639511?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/8631621760804639511'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/fast-ethernet-technology-lan-wan.html' title='Fast Ethernet technology LAN / WAN'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/_h4mZ6L4BvI0/SaDSqRc1p4I/AAAAAAAAAA4/2QmeNbHtQA0/s72-c/images.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;D04ER388cCp7ImA9WxVWGUg.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-3436977015932572184</id><published>2009-02-21T19:00:00.000-08:00</published><updated>2009-03-01T17:05:06.178-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-03-01T17:05:06.178-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='komputer'/><title>Recent development POST OFFICE  VS E - MAIL</title><content type='html'>&lt;a href="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SaswrYqOwQI/AAAAAAAAABo/ieTNvEV8QAI/s1600-h/images.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5308390107698348290" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 124px; CURSOR: hand; HEIGHT: 124px" alt="" src="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SaswrYqOwQI/AAAAAAAAABo/ieTNvEV8QAI/s320/images.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align="justify"&gt;dilema E-mail and post office ,similar with bycicle and motor cycle , whatt happen :&gt;&gt;??&lt;/div&gt;&lt;br /&gt;&lt;div align="justify"&gt;Post offices in industrial countries have a &lt;a href="http://www.msnbc.msn.com/id/29201377/"&gt;policy post office &lt;/a&gt;to provide their customers with a better service. One of their better services is the handling of mail. Government slso takes part to increase the function of post offices. Now, the postage rates have risen. Private firms are not normally allowed to handle ordinary mail, although some private carriers have been increasingly in circulating catalogues, magazines, and merchandise samples. Private parcel carriers also complete with the post office.&lt;br /&gt;The growth of electronic postal services has been a major development. In developing countries, the postal service being extended to rural areas, and modernised into new technological developments. Many small nations earn valuable income from the stamp collectors. However, delivery of letters remains job of post officers and postal workers around the world. &lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-3436977015932572184?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/3436977015932572184/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/recent-development-post-office-vs-e.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/3436977015932572184?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/3436977015932572184'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/recent-development-post-office-vs-e.html' title='Recent development POST OFFICE  VS E - MAIL'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/_h4mZ6L4BvI0/SaswrYqOwQI/AAAAAAAAABo/ieTNvEV8QAI/s72-c/images.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;DkMDRHs6fSp7ImA9WxVWEkU.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-5279131652615207024</id><published>2009-02-10T20:00:00.000-08:00</published><updated>2009-02-21T22:34:35.515-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-02-21T22:34:35.515-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='komputer'/><title>Multitester</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SZQSsV6N2eI/AAAAAAAAAAw/pnwLh2fSxvQ/s1600-h/multitester.jpg"&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 104px; height: 104px;" src="http://1.bp.blogspot.com/_h4mZ6L4BvI0/SZQSsV6N2eI/AAAAAAAAAAw/pnwLh2fSxvQ/s320/multitester.jpg" alt="" id="BLOGGER_PHOTO_ID_5301883214326782434" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=Multitester&amp;amp;fulltext=Search"&gt;&lt;span style="font-style: italic; font-weight: bold; color: rgb(255, 0, 0);"&gt;Multitester&lt;/span&gt;&lt;/a&gt; ia a tool to use for curent detection,a ... more poople using this toll to repair  her electrtricyty,     &lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=USING+MULTIMETER&amp;amp;fulltext=Search"&gt;&lt;span style="color: rgb(51, 102, 255);"&gt;USING MULTIMETER&lt;/span&gt;&lt;/a&gt; . for kon figuration see this manual&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;WARNING !!&lt;/span&gt;&lt;br /&gt;To ensure that the mater is used safety,follow all safety and operating instruction.&lt;span style="font-weight: bold;"&gt;N&lt;/span&gt;ever use meter on the electeric sircuit that exceed 3kva,Pay special attention  when measuring the voltage of AC 30 Vrms &lt;42.4&gt; or more to avoid injury.,never apply an input signals  exceeding the maximum allowable voltage,never use meter if the meter or test leads are damaged or broken,Never use uncased meter,be sure tu use a fuse  of the spesied  rating or type ,never  use SUBTITUTE of the fuse or never make a short sircuite of the fuse.,always keep your fingers behind the finger guard,.on the probe when making measurments.,be sure to disconect the test pins from the circuits  when changing the function or range.,before starting measurment, make sure that the function and range properly set in accordance with the measurement .,never use meter with wet hands or in a damp enviroment.;Never use test leads other than the specified test leads.;Never open tester case except when replacing batteries or fuses. Do not attemp any alteration of original specifications.;To ensure safety and maintain accuracy, calibrate and check the meter at least once a year.;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-5279131652615207024?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/5279131652615207024/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/multitester.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/5279131652615207024?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/5279131652615207024'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/multitester.html' title='Multitester'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/_h4mZ6L4BvI0/SZQSsV6N2eI/AAAAAAAAAAw/pnwLh2fSxvQ/s72-c/multitester.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;DkEARnYycSp7ImA9WxVWEkU.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-7641564751148375795</id><published>2009-02-05T18:44:00.001-08:00</published><updated>2009-02-21T22:37:27.899-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-02-21T22:37:27.899-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='komputer'/><title>Use Network Cabele Tester</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_h4mZ6L4BvI0/SYun-Nvl_6I/AAAAAAAAAAM/3QhjdRnTFMU/s1600-h/tester+lan.jpg"&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 137px; height: 142px;" src="http://3.bp.blogspot.com/_h4mZ6L4BvI0/SYun-Nvl_6I/AAAAAAAAAAM/3QhjdRnTFMU/s320/tester+lan.jpg" alt="" id="BLOGGER_PHOTO_ID_5299514073814532002" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;    To my friend wich work with computer with network,we must butuh some tool to repair if more pheripheral is down function and so rude to use,if this problem  is on the cable network we must check with LAN Tester UTP cable.&lt;br /&gt;BNC or UTP &lt;twin&gt;..?&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;functional of Network Cable Tester is more than I think now,&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;let"s to see this manual together :&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;&lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=BNC+port&amp;amp;go=Go"&gt;&lt;span style="font-weight: bold; color: rgb(255, 0, 0);"&gt;BNC Axes&lt;/span&gt;&lt;/a&gt; :&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;fristly&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;1.Put one end of the cable into both main tester and BNC Port,and put the&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;   other into the remote tester.&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;2.Switch on the power Network cable tester,wich works if the light is on&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;3.BNC Light will not to be on when the cable is connected.&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;4.Press the button on the left of the main tester,if the light is green,the cable is worked with surely , if not ,the cable is out of work , and see with carefully&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;&lt;a href="http://en.wikipedia.org/wiki/Special:Search?search=UTP+Cable&amp;amp;fulltext=Search"&gt;&lt;span style="font-weight: bold; color: rgb(255, 0, 0);"&gt;TEST UTP Cable&lt;/span&gt;&lt;/a&gt; :&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;1.put on end the cable into the main tester.&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;2.Swich on the power ,wich work if the light flashed.&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;3.Once swiched on ,LEDS of the remote tester will scan the cable accordingly. if the cables are&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;    good , the corresponding LEDS will turn green sequently.if the cable is out of work,the LEDS&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;   will first turn green then red or other , according to manufacturer./&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;&lt;/twin&gt;&lt;br /&gt;&lt;twin&gt;and the last  thank u for all&lt;/twin&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-7641564751148375795?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/7641564751148375795/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/use-network-cabele-tester.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/7641564751148375795?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/7641564751148375795'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/use-network-cabele-tester.html' title='Use Network Cabele Tester'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/_h4mZ6L4BvI0/SYun-Nvl_6I/AAAAAAAAAAM/3QhjdRnTFMU/s72-c/tester+lan.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry gd:etag='W/&quot;DkAGQXs8fCp7ImA9WxVWEkU.&quot;'><id>tag:blogger.com,1999:blog-5556550132294796114.post-1955229788997723394</id><published>2009-02-05T17:31:00.000-08:00</published><updated>2009-02-21T22:38:40.574-08:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2009-02-21T22:38:40.574-08:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='I AM'/><title>opening</title><content type='html'>&lt;div style="text-align: justify;"&gt;Firstly ,I make this blog with slowly and getting support by me friend , in this time i want studiy with more ilmu pengetahuan from all my friend and i get more solution from my friend.My friend says to give name to this blog with " &lt;span style="font-weight: bold;"&gt;FROM ZERO TO HERO &lt;/span&gt;" But it's too late and I think This stamen is TRUE AND RAIGHT SO I decide to give name to this blog with "&lt;span style="font-weight: bold;"&gt; TRAY FROM ZERO &lt;/span&gt;"mudah - mudahan God was give good name to this blog and this blog can give more inspiration to Writter and all pembaca,.The last I Can speak thank to Alloh SWT,Prophet Muhammad,Khalifah,Ulama,My Fammily,and muslim center in this World  and let's Devlop with our brain and pray to Alloh ,....&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='http://res1.blogblog.com/tracker/5556550132294796114-1955229788997723394?l=trayfromzero.blogspot.com'/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/1955229788997723394/comments/default' title='Poskan Komentar'/><link rel='replies' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/opening.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5556550132294796114/posts/default/1955229788997723394?v=2'/><link rel='self' type='application/atom+xml' href='http://trayfromzero.blogspot.com/feeds/posts/default/1955229788997723394'/><link rel='alternate' type='text/html' href='http://trayfromzero.blogspot.com/2009/02/opening.html' title='opening'/><author><name>HISYAM WAHID LUTHFI</name><uri>http://www.blogger.com/profile/07628706658405802538</uri><email>hisyamwahidluthfi@gmail.com</email></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry></feed>