Minggu, 26 Februari 2012

Cara menginstal game jika ponsel tidak mendukung Java atau NES

Jika ponsel Anda tidak mendukung Java atau NES game tetapi ingin menambah atau menginstal game di ponsel, apakah bisa? Itulah masalah yang sering di alami oleh para pengguna Handphone China yang sekarang banyak beredar di pasaran Indonesia.

Sebelumnya lakukan dulu tes dibawah ini : "
Tekan *#220807#, jika ponsel Anda merespon dengan mencoba terhubung ke internet (membuka browser hp anda), maka Selamat...! ponsel Anda bisa mendukung permainan MRP,
tetapi jika ponsel Anda tidak merespon apapun, itu berarti ponsel anda tidak mendukung permainan MRP." Nah, jika hasil dari tes tadi ponsel anda mendukung permainan MRP, maka kita dapat menambahkan file-file MRP ke ponsel kita dengan cara seperti berikut :
1. Download file "dsm_ gm.mrp" , download disini
2. Buat folder dengan nama "mythroad" di memory card.
3. Tekan*#220807# dan akan muncul daftar game yang masih kosong. Untuk menambah game, cari dan download file .mrp kemudian masukan ke folder "mythroad". Saya sudah coba di ponsel Ktouch H699 bisa berjalan dgn baik.
Neh koleksi file mrp ane download ucweb-eng 7.0.Mrp

Selasa, 21 Februari 2012

cara mengubah domain blogger menjadi co.cc

Biasanya ketika membuat blog di blogger, kita akan mendapat nama blog http://namablog.blogspot.com, kita bisa merubah nama domain blog dengan yang lebih bagus. Salah satu layanan penyedia domain gratis yaitu co.cc. Jadi nantinya nama domain blog kita akan menjadi http://namablog.co.cc. Kemarin saya coba mengganti domain blog saya ke co.cc, dan ternyata berhasil dengan mudah.
caranya:
1. buka di situs www.co.cc
2. apabila belum terdaftar maka daftar terlebih dahulu. Dapatkan nama domain terlebih dahulu dengan mengisi pada kotak yang tersedia, dan
klik Check Availability.
3.jika domain yang anda inginkan tersedia, register/sign up-lah terlebih dahulu sebelum anda dapat melakukan setting ini dan itu terhadap domain yang anda daftarkan. Jika domain yang anda inginkan tidak tersedia, carilah alternatif nama domain lain.
4.Setelah mendapatkan nama domain, selanjutnya Masuk pada menu Domain setting >>
Manage Domain dan klik Setup
5.Anda akan melihat tiga fitur pengaturan, yakni Manage DNS, Zone Record, dan URL

TRICK PASANG TV ONLINE DI BLOG

Salam blogger!!!
Temen2 kali ini postingan saya tentang TV online, Temen2 tentu sudah tahu gimana kebutuhan akan Tv sangat penting sekali, makanya saya memberikan Cuma buat temen2..cieee.heee….Tapi script yang saya berikan hanya AN TV.gpp yah???
Oke langsung aja gmana caranya
1. Copy scipt dibawah ini
<br
 />embed allowscriptaccess="always" width="220"
src="http://www.tvone.co.id/embed/player.swf" allowfullscreen="true"
flashvars="&file=antv&type=video&streamer=rtmp://202.129.216.34/live/&stretching=exactfit&logo=
 &autostart=false" height="170" bgcolor="transparent">
2. Login ke blogger >> tata letak >>elemen laman>>
3. Tambah gadget, pilih HTML/java script
4. Paste kode scipt di atas, kemudian simpan
5. Anda bias mengubah ukuran dari TV ONLINE tersebut sesuai kebutuhan.

SELAMAT MENIKMATI
SALAM BLOGGER!!!!

Minggu, 19 Februari 2012

Jawaban CISCO Chapter 9

Jawaban CCNA Discovery 1 chapter 9
Answer CCNA Discovery 1 chapter 9

DHomesb Chapter 9 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)


1
A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
#Ensure the correct cable is used.
#Ensure the link status LED on the integrated router is lit.

2
Identify two physical-layer network problems. (Choose two.)
#hardware failure
#loose cable connections

3
Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
#Check the workstation TCP/IP configuration.

4
Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
#documenting the troubleshooting process
#keeping a record of system upgrades and software versions

5
What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
#router status page
#connectivity status as indicated by LEDs

6
When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
#default gateway
#dynamic IP address
#DNS server address

7
A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
#substitution

8
Which troubleshooting method begins by examining cable connections and wiring issues?
#bottom-up

9
What command is used to determine the location of delay for a packet traversing the Internet?
#tracert

10
A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
#The ports are operational and are receiving traffic.

11
Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
#SSID
#authentication
#encryption key

12
What should a network administrator do first after receiving a call from a user who cannot access the company web server?
#Ask the user what URL has been typed and what error message displays.

13

Refer to the graphic. What configuration is incorrect in the network shown?
#The wired connection is the wrong type of cable.

14
A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
#broadcasting the SSID
#using open authentication
#using the default internal IP address

15

Refer to the graphic. What configuration is incorrect in the network shown?
#The host IP address is incorrect.

16
Typically, help desk personnel assist end users in which two tasks? (Choose two.)
#identifying when the problem occurred
#implementing the solution to the problem

17
Network baselines should be performed in which two situations? (Choose two.)
#after the network is installed and running optimally
#after major changes are implemented on the network

18
Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
#final resolution
#results of successful and unsuccessful troubleshooting steps

19
A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
#A crossover cable is being used.

20
Which ipconfig command requests IP configuration from a DHCP server?
#ipconfig /renew

21

Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
#The host WEP key is incorrect.

22
How does remote-access software help in the troubleshooting process?
#Diagnostics can be run without a technician being present at the site.

23
What command is used to determine if a DNS server is providing name resolution?
#nslookup

Jawaban CISCO Chapter 8

Jawaban CCNA Discovery 1 chapter 8
Answer CCNA Discovery 1 chapter 8

DHomesb Chapter 8 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)


1
Identify three techniques used in social engineering. (Choose three.)
#vishing
#phishing
#pretexting

2
A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
#SYN flooding

3
While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
#Trojan horse

4
What is a major characteristic of a Worm?
#exploits vulnerabilities with the intent of propagating itself across a network

5
During a pretexting event, how is a target typically contacted?
#by phone

Jawaban CISCO Chapter 7

Jawaban CCNA Discovery 1 chapter 7
Answer CCNA Discovery 1 chapter 7

DHomesb Chapter 7 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)


1
Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
#encrypt; authenticate users on

2
What are three advantages of wireless over wired technology? (Choose three.)
#anytime, anywhere connectivity
#ease of adding additional devices

3
A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
#the size of the building
#the number of solid interior walls in the building
#the presence of microwave ovens in several offices

4
Which statement is true concerning wireless bridges?
#connects two networks with a wireless link

5


Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
#The router supports 802.11b, 802.11g, and 802.11n devices.

Jawaban CISCO Chapter 6

Jawaban CCNA Discovery 1 chapter 6
Answer CCNA Discovery 1 chapter 6

DHomesb Chapter 6 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)



1
What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model?
#physical, data link, network, transport, session, presentation, application

2
What three items are contained in an Ethernet header and trailer? (Choose three.)
#source MAC address
#destination MAC address
#error-checking information

3
Which protocols are TCP/IP application layer protocols? (Choose two.)
#FTP
#SMTP

4


Refer to the graphic. Which protocol is used to access this website?
#HTTP

5
What is an advantage of the use of layers in the OSI reference model?
#It prevents changes in one layer from affecting other layers.

Jawaban CISCO Chapter 5

Jawaban CCNA Discovery 1 chapter 5
Answer CCNA Discovery 1 chapter 5

DHomesb Chapter 5 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1
Which two statements describe packets that are sent through a Linksys integrated router using NAT? (Choose two.)
#Packets that are sent to a destination outside the local network need to be translated.
#Packets that are sent between hosts on the same local network do not need to be translated.

2
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
#The address is returned to the pool for reuse when the lease expires.

3
What is the destination MAC address in a multicast Ethernet frame?
#an address that begins with 01-00-5E in hexadecimal

4
How many bits are available for Class B host IP addresses using a default subnet mask?
#16

5
Which default subnet mask provides the most host bits?
#255.0.0.0

Jawaban CISCO Chapter 4

Jawaban CCNA Discovery 1 chapter 4
Answer CCNA Discovery 1 chapter 4

DHomesb Chapter 4 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1
Which definition describes the term Internet?
#a network of networks that connects countries around the world

2
What type of connection point is a point of presence (POP)?
#between an ISP and a home-based LAN

3
What is the term for the group of high-speed data links that interconnect ISPs?
#Internet backbone

4
What are three characteristics of business class ISP service? (Choose three.)
# fast connections
# extra web space
# additional e-mail accounts

5
What does the tracert command test?
#the network path to a destination

Jawaban CISCO Chapter 3

awaban CCNA Discovery 1 chapter 3
Answer CCNA Discovery 1 chapter 3

DHomesb Chapter 3 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1
Which two statements concerning networking standards are true? (Choose two.)
#provides consistent interconnections across networks
#simplifies new product development

2
Which two items are included in a network logical map? (Choose two.)
#naming scheme
#IP addressing scheme

3
What is a reason for disabling simple file sharing?
#It enables the user to set more specific security access levels.

4
Which address does an NIC use when deciding whether to accept a frame?
#destination MAC address

5
If the default gateway is configured incorrectly on the host, what is the impact on communications?
#The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

Jawaban CISCO Chapter 2

Jawaban CCNA Discovery 1 chapter 2
Answer CCNA Discovery 1 chapter 2


DHomesb Chapter 2 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)


1
Which method of interacting with an operating system involves typing commands at a command prompt?
#CLI

2
What occurs when computers are configured to receive their network configurations dynamically?
#Each computer requests configuration information from a server.

3
An operating system is severely damaged. All data on the partition needs to be deleted, and all application software must be reinstalled. Which installation method should be used to correct the problem?
#clean install

4
Which Windows file system is more likely to be used in an enterprise-level environment?
#NTFS

5
What are two ways that a user can interact with an operating system shell? (Choose two.)
#CLI
#GUI

6
Windows XP has a known problem with specific Intel processors. What is the best course of action to take in this situation?
#Download and install the Windows patch that fixes this problem.

Jawaban CISCO Chapter 1

Jawaban CCNA Discovery 1 chapter 1
Answer CCNA Discovery 1 chapter 1

DHomesb Chapter 1 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1
Which adapter enables a computer system to exchange information with other systems on a local network?
#network interface card

2
What measurement is commonly associated with computer processing speed?
#hertz

3
Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
#CPU

4
Why do servers often contain duplicate or redundant parts?
#Servers should be accessible at all times.

5
What are two benefits of connecting a laptop computer to a docking station? (Choose two.)
#An external monitor can be used.
#Alternate connectivity options may be available.

6
What characteristic of word processing software would make it a local application?
#The software is stored on the local hard drive.

7
A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
#RAM

8
What are two advantages of purchasing a preassembled computer? (Choose two.)
#usually a lower cost
#adequate for performing most general applications

9
Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
#an educational tool
#medical practice management software

10
What is the main storage drive used by servers, desktops, and laptops?
#hard drive

11
A user reports that a peripheral device that was installed correctly last week has not been functioning since the PC was booted today. All other PC functions are working properly. What are three things a service technician should do to solve the problem? (Choose three.)
#Use the testing functionality on the peripheral itself, if available.
#Disconnect all cables connected to the computer except those connected to the peripheral.
#Ensure that the peripheral is powered on.

Sabtu, 18 Februari 2012

Cara Menghilangkan Tulisan "Langgan: Entri (Atom)"

1. Login ke Blogger.
2. Di halaman Dasbor, kita pilih Tata Letak.
3. Kemudian pilih Edit HTML
4. Beri tanda centang pada Expand Template Widget
5. Cari kode berikut ini

<div class='feed-links'>
<data:feedLinksMsg/>
<b:loop values='data:links' var='f'>
<a class='feed-link' expr:href='data:f.url' expr:type='data:f.mimeType' target='_blank'><data:f.name/> (<data:f.feedType/>)</a>
</b:loop>
</div>

6. Hapus (delete) kode tersebut.
7. Simpan template jika sudah selesai.

Rabu, 15 Februari 2012

Cara Membuat Crack Software Trial

Membuat Crack Software Trial . baik sobat sobat blogger semua, kali ini saya ingin memberikan bagaimana sih cara teknik Membuat Crack Software Trial ? nah kali ini , inilah yang saya akan bahas, ini saya dapatkan dari gruf fb bukan PC+ , semoga ini bermanfaat :

Mengakali suatu software bajakan menjadi asli adalah suatu yang bisa dibilang suatu tindakan ilegal, saya disini akan menjelaskan tentang tutorial cara membuat software trial menjadi full version.

Cara ini sebenarnya saya tujukan hanya untuk pelajaran semata, dan bukan untuk mendorong adanya tindakan-tindakan illegal, khususnya dalam pembajakan software dalam dunia IT.
untuk mengetahui lebih lanjut tentang membuat crack sederhana untuk Softwatre berbayar/trial/komersil/shareware, cara ini sangat sederhana, sehingga mudah dilakukan oleh siapapun, untuk lebih lanjut silahkan ikuti cara dibawah ini :

Minggu, 12 Februari 2012

Cara Membuat Account Skype Disertai Gambar Terbaru

Tutorial Cara Membuat Account Skype Disertai Gambar Terbaru
Langkah awal, anda harus mendownload file setup installer Skype Ver.5 yang hanya berukuran 1 Mb, atau download skype versi Full (tanpa perlu koneksi internet sewaktu mengistall skype) dengan mengklik link ini : Download SkypeSetup Full Now !

>Klik 2x SkypeSetup untuk memulai download dan installasi Skype Ver.5
>Langsung saja klik " Saya Setuju - Berikutnya " ...
>Tunggu Proses Download dan Installasi hingga selesai Finish ^^

Setelah Installasi selesai, inilah saatnya membuat Account Skype agar kita bisa Login untuk dapat memanfaatkan semua fasilitas2 Skype. Nah perbedaan antara Skype lama dengan yang baru ini adalah pada proses pembuatan Accountnya, Kalau dulu kita bisa langsung membuat Account dari program skype itu sendiri, Namun kalau sekarang saat kita hendak membuat account baru skype, kita akan dirujuk langsung ke website Skype di www.skype.com. Nah jadi sekarang hampir sama seperti Yahoo, kita diharuskan daftar registrasi melalui Website. Oke bagaimana caranya ? mari kita simak penampakan2 di bawah ini ... !

Scrip jahil

Buat temen2 yang pengen beramain-main dengan script-script nakal, neh ada sedikit script sederhana, dokumentasi yang sudah lama aku simpan, khusus saya share di sini buat sesama newbie yang pengen tau dan belajar …hehehe.

Sebelumnya, aku saranin, ini jangan disalahgunakan ya, soalnya neh script lumayan bikin pusing juga klo sampai dieksekusi, tapi gunakanlah sebaik mungkin sebagai media pembelajaran saja. Jika temen-temen siap menerima segala resiko yang ditimbulkan oleh script-script dalam postingan ini silakan lanjutin baca….

Karena temen2 dah setuju sama kondisi di atas, baiklah mari simak baik-baik. Script-script ini sangat mudah digunakan, tinggal co-past aja ke notepad atau text editor lainnya yang biasa temen2 pakai.

1.Otomatis Ngetik di notepad atau text editor lainnya

Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “Muka lu standart abis, format ajah bro”
loop

Simpan dengan extensi *.vbs contoh scriptnakal_1.vbs

Cara membuat aplikasi portable

Sebelum lanjut membaca, saya ingin mengajukan 2 pertanyaan. Pertama, tahukah anda apa itu aplikasi (program) portable? Kedua, apa keuntungan dari aplikasi (program) portable? Jika belum, silahkan googling saja :lol: :lol: Untuk membuat Aplikasi portable, caranya cukup mudah. Program yang diperlukan disini adalah Winrar, tidak ada yang lain. Belum punya Winrar? Silahkan download Winrar V4.00 Beta plus keygen di sini. Langkah2nya adalah sebagai berikut:

1. Pilih folder dimana aplikasi yang akan dibuat portable, berikut file pendukungnya (*.dll, *.ini, dsb, beserta folder2nya).

2. Buka notepad, ketikkan nama file program (*.exe) yang akan dibuat portabel (ex:Artmoney.exe), save dengan nama “launch.bat” (tanpa tanda kutip), save ke dalam satu direktori program yang akan dibuat portable.

3. Pilih semua file program (ctrl+a), berikut file pendukungnya (*.dll, *.ini, dsb, beserta folder2nya), ditambah dengan file “launch.bat yang baru saja dibuat. klik kanan, pilih add to archive.

4. aktifkan pilihan create sfx archive

5. pilih tab comment, masukkan perintah berikut ini:

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Host
pasang teks berjalannya disini