Monday , 20 May 2024
Breaking News

Electricity usage monitor

Many houses in the UK have an electricity meter with a light on it that flashes at a rate proportional to how fast electricity is being used (typically 800 times per kilowatt hour). I built a system that took advantage of this to measure our house’s electricity usage. We already had a PC (our router) …

Read More »

Falsafah 5 jari

1. Ada si gendut jempol yang selalu berkata baik dan menyanjung. 2. Ada telunjuk yang suka menunjuk dan memerintah. 3. Ada si jangkung jari tengah yang sombong dan suka menghasut jari telunjuk. 4. Ada jari manis yang selalu menjadi teladan, baik, dan sabar sehingga diberi hadiah cincin. 5. Dan ada kelingking yang lemah dan penurut serta pemaaf (ingatkah anda waktu kecil kalau kita berbaikan dengan musuh kita pasti saling sentuh jari kelingking?) . Dengan perbedaan positif dan negatif yang dimiliki masing-masing jari, mereka bersatu untuk mencapai tujuan (menulis, memegang, menolong anggota tubuh yg lain, melakukan pekerjaan, dll). Pernahkah kita bayangkan bila tangan kita hanya terdiri dari jempol semua? Falsafah ini sederhana namun sangat berarti. Kita diciptakan dengan segala perbedaan yang kita miliki dengan tujuan untuk bersatu, saling menyayangi, saling menolong, saling membantu, saling mengisi, bukan untuk saling menuduh, menunjuk, merusak, dan bahkan membunuh. Sudahkah kasih sayang Anda hari ini bertambah?

Read More »

HP dan Penerbangan Pesawat

Saya sedih mendengar terbakarnya pesawat Garuda, GA 200 pada tanggal 7 Maret 2007, pukul 07.00 pagi, jurusan Jakarta-Yogyakarta di Bandara Adisucipto. Kejadian itu sungguh menyayat hati dan perasaan. Kemudian saya teringat beberapa bulan yang lalu terbang ke Batam dengan menggunakan pesawat Garuda juga. Di dalam pesawat duduk disamping saya seorang warga Jerman. Pada saat itu dia merasa sangat gusar dan terlihat marah, karena tiba-tiba mendengar suara handphone tanda sms masuk dari salah satu penumpang, dimana pada saat itu pesawat dalam posisi mau mendarat. Orang ini terlihat ingin menegur tetapi tidak berdaya karena bukan merupakan tugasnya.

Read More »

Amankah Internet Banking Anda

Bagaimana caranya mengirimkan dokumen digital rahasia dengan cepat, aman dan praktis ke alamat email rekan atau kolega bisnis, yang mungkin sedang berada di Yogya dan tidak memiliki komputer dan terkoneksi ke internet hanya dari warnet ? Kalau filenya di kompres (zip) dan diberi password atau dokumen MS office di beri password dan relatif mudah dibuka oleh orang yang tidak berhak dengan tools pembuka password (password cracker) yang banyak tersedia di internet (underground seperti www.astalavista.com). Dengan menggunakan dictionary attack atau brute force hanya masalah waktu saja password tersebut akan dapat ditemukan. Gambar 2, Password Recovery Tools yang sering disalahgunakan untuk membuka file orang lain yang dipassword

Read More »

Which ISPs Are Spying on You?

The few souls that attempt to read and understand website privacy policies know they are almost universally unintelligible and shot through with clever loopholes. But one of the most important policies to know is your internet service provider’s — the company that ferries all your traffic to and from the internet, from search queries to BitTorrent uploads, flirty IMs to porn. Wired News, with help from some readers, attempted to get real answers from the largest United States-based ISPs about what information they gather on their customers’ use of the internet, and how long they retain records like IP addresses, e-mail and real-time browsing activity. Most importantly, we asked what they require from law-enforcement agencies before coughing up the data, and whether they sell your data to marketers. Only four of the eight largest ISPs responded to the 10-question survey, despite being contacted repeatedly over the course of two months. …

Read More »

AutoRuns for Windows v8.61

This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and other Registry keys. You can configure Autoruns to show other locations, including Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond the MSConfig utility bundled with Windows Me and XP. Autoruns‘ Hide Signed Microsoft Entries option helps you to zoom in on third-party auto-starting images that have been added to your system and it has support for looking at the auto-starting images configured for other accounts configured on a system. Also included in the download package is a command-line equivalent that can output in CSV format, Autorunsc. You’ll probably be surprised …

Read More »

Keys to Protecting Data with BitLocker Drive Encryption

Windows BitLocker Drive Encryption is certainly one of the most talked-about features in Windows Vista. However, most people haven’t yet had much opportunity to test BitLocker to find out firsthand. what it does and how it works—particularly not on a computer with a Trusted Platform Module (TPM). In this article, I introduce you to the basics of BitLocker™ so that you can evaluate its potential and include it in your upgrade planning. I will begin with some background and conceptual information, and then I take a look at enabling BitLocker, data recovery, administration, and how BitLocker can help at the end of a computer’s life. To better understand the terminology here, take a look at the sidebar “Disks and Volumes.”  

Read More »

Microsoft Plugs Critical Vista Hole

Microsoft has just patched another critical hole in Vista that it knew about as long ago as last Christmas. The delay was similar to its lag in patching the serious (and heavily targeted) animated-cursor flaw I told you about last month. The new problem involves the way that the OS’s Client/Server Run-time Subsystem (CSRSS) handles error messages, and it affects Windows 2000 SP4 and Windows XP too. This flaw may not be as severe as the cursor problem, as Microsoft says you’d have to perform certain unspecified “actions” on a malicious Web site before an assault could succeed. But if you were to get snared, an attacker could run any command or program on the victimized PC. Proof-of-concept code, which often presages attacks, is available, but no active attacks on this hole have been reported yet. If you have Automatic Updates enabled, the fix should already be installed. Otherwise, make …

Read More »

Configuring Exchange Server 2007 Preview – Disaster Recovery with Exchange Server 2007

Disaster Recovery with Exchange Server 2007 Solutions in this chapter: Backing Up Exchange 2007 Using Windows 2003 Backup Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil Restoring Mailbox Data Using the Recovery Storage Group Feature Recovering an Exchange 2007 Server Using the RecoverServer Switch Recovering an Exchange 2007 Cluster Using the RecoverCMS Switch Restoring Mailbox Databases Using the Improved Database Portability Feature

Read More »