Check Page Rank of your Web site pages instantly:

This page rank checking tool is powered by Page Rank Checker service

Jumat, 17 Desember 2010

How to backup user on Linux

Backup the following files: /etc/passwd /etc/shadow /etc/group /etc/samba/* /home/* If you have to rebuild, you can just copy these files back to their original locations then restart Samba. All of your Linux and Samba user accounts will be recreated. It's as simple as t...
read more...

Senin, 06 Desember 2010

Intranet network advantages mentioned above: 1. Simplify network cabling process Network Engineer. 2. The use of cable networks is relatively small (in size). Intranet Network losses mentioned above: 1. There are nodes that result in...
read more...

Distribution of Operating System in My Intranet

I dont Know, that word just out my mouth, last 4 years ago on my office use linux operatyng system, microsoft just 25 %, just finance dept use microsoft, but now after 4 years, moving - moving go microsoft, but i am as Admin doesn't like it.  i...
read more...

Check Port

Examining the port is open is a tool you can use to check your external IP address and detect open ports on your connection. This tool is useful to find out if your port forwarding setup correctly or if your server application is being blocked by a firewall.This tool can also be used as a port scanner to scan your network to a port that is usually...
read more...

Sabtu, 04 Desember 2010

Formula Granting Salary Increase and Bonuses

Year 2010 has been greeted sweet. So approximately what percentage of your salary will be raised by your office work? And how about a bonus that you receive? Of course the higher, the better - because if you wrote so much for, well ... .. the price of a kilo of chilli sauce pan will rise again soon. If salary naeknya so much for...
read more...

Wikileaks still Live

Although expelled and there, WikiLeaks still looking for ways to be able to divulge confidential information the U.S. government (U.S.).Whistleblower site is now providing four new domains that can be accessed internet users. Through his official Twitter account, WikiLeaks said that the site can now be accessed through the address http://wikileaks.de/,...
read more...

Kamis, 02 Desember 2010

CCNA Exploration 4.0: Network Fundamentals - Chapter 10 Exam Answers

1 Refer to the exhibit. A student working in the lab selects a cable that is wired as shown. Which connection types can successfully be made with this cable? (Choose two.) connecting a PC to a router's...
read more...

CCNA Exploration 4.0: Network Fundamentals - Chapter 9 Exam Answers

1.  In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do? Host B can transmit...
read more...

When Login on UBS Sytem appear " File Access Denied"

Description Message  prompted for difference version  are : n For version 8.x “ 9.0    show ’  File access  is denied’ For version 9.1 and above   show ’  >ousekeeping in progress, not allow to proceedSolution 1.    Login screen, 2.    Select User ID, 3.   ...
read more...

CCNA Exploration 4.0: Network Fundamentals - Chapter 8 Exam Answers

1. Which type of cable run is most often associated with fiber-optic cable? * backbone cable horizontal cable patch cable work area cable 2. In most business LANs, which connector is used with twisted-pair networking cable? BNC RJ-11 * RJ-45 Type F 3....
read more...

5 Cyber Security Trends in 2011

In fact, cyber crime is very attractive to criminals. With the growth of mobile services platform superb, criminals will have more ways to attack. Then would like apakira about cyber security trends in 2011? Here are 5 predictions according to Symantec: 1. Important Infrasturuktur So Target Attack, Slow Reacting Government The attackers seemed to...
read more...

Netbenas Platform 6.9 DG

Create professional desktop rich-client Swing applications using the world's only modular Swing application framework Create large, scalable, modular Swing applications from scratch Master a broad range of topics essential to have in your desktop...
read more...

CodeIgniter 1.7 Professional Development 2010

Become a CodeIgniter expert with professional tools, techniques and extended libraries Learn expert CodeIgniter techniques and move beyond the realms of the User Guide Create mini-applications that teach you a technique and allow you to easily build...
read more...

10 Tips Security Wifi

We often use wireless for internet connection, whether at home or in public places which provide hotspots. For those who have their own wireless devices at home, may need to consider a few things for the security of wireless devices, or for the convenience of the Internet through wireless devices whether it is "Access Point" or "Router". Some...
read more...

Rabu, 01 Desember 2010

wifi access point Security

Until now there are two safety standards in the Wi-Fi network already offered. The first standard adalam WEP (Wired Equivalent Protocol), followed by standard WPA (Wi-Fi Protected Access). WEP secures traffic information on the Wi-Fi using a system of "safety lock" called "WEP key". With the WEP key is all traffic data is encoded first...
read more...