Breaking News

Garis besar model usaha di Internet

Untuk melihat berbagai kesempatan usaha yang ada di Internet ada baiknya kita melihat sebuah model sederhana dari bisnis / aplikasi Internet & telekomunikasi. Bagi pembaca yang masih pemula salah satu situs yang menerangkan secara sederhana tentang Internet adalah http://www.learnthenet.com. Prinsip dasar dari usaha Internet yang sering disebut sebagai dotcom company sebetulnya tidak rumit bahkan sederhana sekali; yaitu bagaimana caranya supaya …

Read More »

Penggunaan Cookie terhadap Privacy User

Inti utama dalam permasalahan keamanan privacy di Internet adalah adanya kegiatan-kegiatan gelap dalam suatu Web Site yang pada umumnya tidak diketahui oleh user dalam mengumpuli informasi secara personal untuk melakukan pencurian dengan menggunakan teknologi yang disebut dengan “Cookie ”. Ini merupakan suatu tindakan yang tidak merusak secara teknologi dimana memungkinkan sebuah web site dapat mengumpulkan informasi mengenai user dan semua …

Read More »

Report Says Windows Gets The Fastest Repairs

Microsoft is frequently dinged for having insecure products, with security holes and vulnerabilities. But Symantec (Quote), no friend of Microsoft, said in its latest research report that when it comes to widely-used operating systems, Microsoft is doing better overall than its leading commercial competitors. The information was a part of Symantec’s 11th Internet Security Threat Report. The report, released this …

Read More »

Motivation of The Day

“Miskin dan kaya adalah nasib ” ini adalah mitos yang berlaku di dalam masyarakat, khususnya di negara berkembang. Tak terkecuali di negara kita, Indonesia . Kita sering mendengar, bahkan mungkin termasuk di antara kita pernah berucap; miskin sudah merupakan nasib kita. Bagaimanapun kita bekerja keras, nasib tidak mungkin berubah, karena ini sudah suratan takdir. Sebaliknya, kalau nasib kita sudah ditentukan …

Read More »

Customizing the Look of Outlook Web Access

One way to impress your users and management is to customize Microsoft Office Outlook Web Access by using your organization’s logo and colors. Customizing Outlook Web Access is a great way to help build an identity for your organization into a tool that many users rely on. In this article, we’ll show you how to customize the logon, language selection, …

Read More »

Look how easy setup is for Exchange Server 2007

Does this sound familiar? You decide to deploy Microsoft Exchange Server 2007 and you’re ready to get started. You think “A deployment guide would be helpful,” so you visit the Microsoft Exchange Server TechCenter. After searching for deployment content, you find a link to download a document called Deploying a Standard Exchange Server 2007 Organization. Sounds like just the thing …

Read More »

What Administrators Will Want to Know about Exchange 2007 Features for Information Workers

Administrators aren’t the only ones who benefit from deploying Microsoft Exchange Server 2007. Some new and improved features also enhance the experience for your information workers. From the improvements to familiar features such as calendaring, resource management, Out of Office, Microsoft Outlook Web Access, and Microsoft Outlook Anywhere (formerly called RPC over HTTP), to the new messaging records management (MRM) …

Read More »

Why Does Windows Get Slower Over Time?

If you use Windows, you know the story: the months pass, and your once-snappy computer becomes sluggish, unstable, or unpredictable. The natural impulse is to blame Windows itself. The phenomenon is so well known and widespread that some in the industry have even coined a term for it: “Windows rot.” The idea is that, for lack of a specific cause, …

Read More »

Kaspersky Reports First “Proof Of Concept” iPod Virus

According to a press statement posted on its website, Kaspersky Lab has discovered the first virus designed to infect iPod portable media players. The virus, which has been named Podloso, is a proof of concept program which does not pose a real threat. Security researchers use such malware to demonstrate vulnerabilities and potential attack vectors, but lack any payload. The …

Read More »