Popular Posts

RSS Subscription

Subscribe via RSS reader:
Subscribe via Email Address:
 

Understanding Wireless

Posted By pas unik On 03:14 0 comments
Wireless or in the Indonesian language is called a Nirkabel, is a technology that connects the two devices to exchange data without wires media. Data is exchanged through the medium of certain light waves (such as infrared technology in the TV remote) or radio waves (such as bluetooth on your computer and phone) with a certain frequency.
wireless
The advantages of this technology is to eliminate the use of cables, which can be quite disturbing is aesthetically, and also the complexity of installation to connect more than 2 devices simultaneously. For example: to connect a computer server with 1 client computer 100, it takes at least 100 pieces of cable, length varies according to distance from the server the client computer. If the cables are not through a special lane covered (such as cable tray or conduit), this can interfere with eye sight or the interior of a building. Unpleasant scene found no connection between devices on wireless technology.

Disadvantages of this technology is the possibility of interference to each other wireless connection in another device.

Understanding Modem

Posted By pas unik On 03:11 0 comments

Modem stands for Modulator comes from demodulator. Modulator is part of changing the information signal into the carrier signal (Carrier) and is ready to be sent, while the demodulator is the part that separates the information signal (which contain data or messages) of the carrier signal (carrier) that accepted that the information can be received well. Modem is a merger of both, it means the modem is a two-way communication tool. Each remote communications device of two-way commonly use the so-called "modern", such as VSAT, microwave radio, etc., but generally the more modern term known as the hardware is often used for communications on the computer.

Data from the computer in the form of digital signal provided to a modem to convert into analog signals. Analog signals can be transmitted through several media such as mobile telecommunications and radio.

On arrival at the destination modem, the analog signal is converted into digital signals and transmitted back to the computer. There are two types of modems are physical, ie an external modem and internal modem.
Source : http://id.wikipedia.org/wiki/Modem

Understanding Optical Drive

Posted By pas unik On 03:08 0 comments
In computing, an optical disc drive (ODD) is a disk drive that uses laser light or electromagnetic waves near the light spectrum as part of the process of reading or writing data to or from optical discs. Some drives can only read from discs, but recent drives are commonly both readers and recorders. Recorders are sometimes called burners or writers. Compact discs, DVDs, HD DVDs and Blu-ray discs are common types of optical media which can be read and recorded by such drives.

Optical disc drives are an integral part of stand-alone consumer appliances such as CD players, DVD players and DVD recorders. They are also very commonly used in computers to read software and consumer media distributed in disc form, and to record discs for archival and data exchange. Optical drives—along with flash memory—have mostly displaced floppy disk drives and magnetic tape drives for this purpose because of the low cost of optical media and the near-ubiquity of optical drives in computers and consumer entertainment hardware.

Disc recording is generally restricted to small-scale backup and distribution, being slower and more materially expensive per unit than the moulding process used to mass-manufacture pressed discs.
Source : http://en.wikipedia.org/wiki/Optical_disc_drive

Understanding Hard Disk

Posted By pas unik On 02:46 0 comments
Hard disk (English: hard disk or hard disk drive HDD abbreviated or shortened hard drive HD) is a hardware component that stores data and includes secondary magnetic disk. Hard disk was first invented by IBM engineers, Reynold Johnson in 1956. The first hard disk is composed of 50 disks measuring 2 feet (0.6 meters) with the rotational speed reaches 1200 rpm (rotation per minute) with 4.4 MB of storage capacity. Hard disks today there are only 0.6 cm wide with a capacity of 750 GB.
If opened, the eye looks at the end of a hard disk bertuas arm attached to the disk that can spin

Data stored on the hard disk will not be lost when the voltage is not given. In a hard disk, there is usually more than one disk to increase the data capacity can be accommodated.

In its development is now a physical hard disk becomes increasingly thin and small but has a data capacity is very large. Hard disk is now not only be installed on the device (internally) but also can be installed outside the device (external) using a USB or FireWire cable.
Source : Wikipedia

Understanding Sound Card

Posted By pas unik On 02:38 0 comments
Sound card (Sound Card) is a computer hardware used to make a sound and record sound. At first, Sound Card is just as complementary of the computer. But now, the sound card is a mandatory tool in every computer. Judging from how to install, sound cards divided 3:

* Sound Card Onboard, the sound card is attached directly to the computer motherboard.
* Sound Card Offboard, namely the installation sound card in slot ISA / PCI on the motherboard. On average, now it uses the PCI
* External Soundcard, sound card is the use of which is connected to the computer through an external port, like USB or FireWire

Sound Blaster Live!

One example of a fairly sound card is very successful in the market is the Sound Blaster Indonesia, from Creative Labs.

To play MIDI music, at first using FM Synthesis technology, but now it uses for Wavetable Synthesis The digital audio business, which used only 2 channel (stereo), it was using 4 or more voice channels (Surround). Its quality was already increased from 8 bits, 16 bits, 24 bits, 32 bits, even now already 64 bits.
Source : Wikipedia

Understanding VGA

Posted By pas unik On 02:27 0 comments
VGA, stands for Video Graphics Adapter, is an analog computer display standard that was first marketed by IBM in 1987. Although the VGA standard is no longer used because it has been replaced by a newer standard, VGA is still implemented on the Pocket PC. VGA is the latest graphics standards followed by the majority of graphics card manufacturer of your computer. Display Windows until now still use VGA mode as supported by many manufacturers of monitors and graphics cards.

The term VGA is often used to refer to a screen resolution of 640 × 480 size, whatever the hardware maker graphics card. VGA card allows you to translate the computer output to the monitor. For the graphic design or playing video games, needed a powerful graphics card is high. Manufacturer of the famous graphics cards include ATI and nVidia.

In addition, the VGA can also refer to the connector 15-pin VGA which is still widely used to deliver analog video signals to the monitor. VGA standard was officially replaced by IBM's XGA standard, but in fact it was replaced by VGA Super VGA.
Source : Wikipedia

Understanding Memory

Posted By pas unik On 16:43 0 comments

Memory is the generic term for data storage in computers. Some types of memory used is as follows:

* Register processors
* RAM or Random Access Memory
* Cache Memory (SRAM) (Static RAM)
* Physical Memory (DRAM) (Dynamic RAM)
* The device magnetic disk-based storage
* The device optical disk-based storage
* Memory can only be read or ROM (Read Only Memory)
* Flash Memory
* Punched Card (ancient)
* CD or Compact Disk
* DVD

In the discussion of computer architecture such as the von Neumann architecture, for example, memory capacity and speed are distinguished by using the memory hierarchy. Hierarchy is organized from the memory of the fastest to the slowest; arranged from smallest to largest capacity capacity; and sorted by price every bit of his memory from the most high (expensive) to the lowest (cost).
Source : Wikipedia

Understanding Chipset

Posted By pas unik On 16:34 0 comments

Chipset is the small size IC of the computer is like a "traffic cop" on the main board (motherboard), directing the flow of data and determine what devices are supported by a Personal Computer (PC).

A chipset directs data from the CPU to the graphics card (VGA) and system memory (RAM). Chipset also determines the speed of the front-side bus, memory bus and bus graphics, as well as the capacity and type of memory on the motherboard support. Also also, chipset directs the flow of data through the PCI bus, IDE drives and port I / O and determines the type of IDE ports are also supported by the system.
Source : Wikipedia

Understanding Mainboard

Posted By pas unik On 15:43 0 comments
The motherboard or mainboard is the main board where there are components and the controller chip on duty directing traffic data in the system motherboard. On the motherboard there are also sockets for the processor, which slots are used for installation of components such as VGA cards Card, Sound Card, Internal Modem, and others.

We have many brands and types of motherboards. For those of you who want to assemble their own computer, I recommend to be careful in choosing the brand and type of motherboard. Problems common motherboard that will be discussed further in accordance with the case.
Source : http://babesajabu.wordpress.com/2009/06/16/pengertian-motherboard/

Understanding Processor

Posted By pas unik On 15:25 0 comments
Processor is often referred to as the brain and the computer control center that is supported by other kompunen. Processor is an IC that controls the entire course of a computer system and used as a center or brain of the computer that functions to perform calculations and run the task. Processor socket is located on that provided by the motherboard, and can be replaced with another processor provided in accordance with the existing socket on the motherboard. One of the very large influence on computer speed depending on the type and capacity of the processor.

Processor is a chip that is often called "Microprosessor" which now has reached processor1ukurannya Gigahertz (GHz). The measure is a count of processor speed in processing data or information. Brand processor is much outstanding dipasatan AMD, Apple, VIA Cyrix, IBM, IDT, and Intel. Part of the processor most important part of the processor 3 is divided as follows:

* Aritcmatics Logical Unit (ALU)
* Control Unit (CU)
* Memory Unit (MU)

Source : http://babesajabu.wordpress.com/2009/06/17/pengertian-dan-jenis-processor/

Dell Vostro A840 | Laptops

Posted By pas unik On 14:55 0 comments
Dell Vostro A840 | Laptops
Platform : Notebook PC with Intel Centrino Duo Technology | Processor Type : Intel Pentium Dual-Core Processor | Processor Onboard : Intel® Pentium® Dual-Core T2390 (1.8 GHz, FSB 533, Cache 1 MB) | Chipset : Intel 965GM | Standard Memory 1 GB DDR2 SDRAM PC-5300 | Max. Memory : 4 GB (2 DIMMs) | Video Type : Intel® Graphics Media Accelerator X3100 256 MB (shared) | Display Size : 14.1" WXGA TFT | Display Max. Resolution : 1280 x 800 | Display Technology : Anti-glare TFT | Audio Type : Integrated | Speakers Type : Integrated | Floppy Drive : Optional : Hard Drive Type : 120 GB Serial ATA 5400 RPM | Optical Drive Type : DVD±RW | Modem : Integrated | Networking : Integrated | Network Speed : 10 / 100 Mbps | Wireless Network Type : Intel PRO/Wireless 3945ABG | Wireless Network Protocol : IEEE 802.11a, IEEE 802.11b, IEEE 802.11g | Wireless Bluetooth : Integrated | Keyboard Type : QWERTY 82 keys | Input Device Type : Touch Pad | Slot Provided : Optional | Card Reader Provided : SD, MMC, Memory Stick | Interface Provided : 3x USB 2.0, VGA, LAN, Audio | O/S Provided : Pre-sales Request Available Linux | Battery Type : Rechargeable Lithium-ion Battery | Power Supply : External AC Adapter | Weight : 2.4 kg | Standard Warranty : 1-year Limited Warranty by Authorized Distributor | Bundled Peripherals : Carrying Case
Price : Rp 5,250,000

It seems like Twitter, but not | Tips and Tricks

Posted By pas unik On 14:26 0 comments
Tips Prevent Hackers Steal Twitter Account | Step 2
The second way, is a pretty convincing trick involving a URL is added to the tweet. When you click the link that you think will lead you to a particular video, or would invite you to do an IQ test, you may be directed to Twitter.com duplicate.

Fraudster has made Twitter diplikasi from their sites put on their servers. So, when you login to the site 'Twitter' with your username and password, they will save the data only then they direct you to the actual Twitter site.

You may be confused, where the 'IQ test' the promised links and wondered if maybe you're one click and miss. Actually, no. But now you have become part of the problem, and soon, your follower on Twitter will begin to receive a 'message' the same from you and so on repeatedly. So, do not click the link.
Tips Prevent Hackers Steal Twitter Account | Step 1
Tips Prevent Hackers Steal Twitter Account | Step 3
Source : http://teknologi.vivanews.com/news/read/109659-tips_cegah_hacker_curi_akun_twitter

Links from people we 'know' | Tips and Trics

Posted By pas unik On 14:26 0 comments
Tips Prevent Hackers Steal Twitter Account | Step 1Every day more and more Twitter accounts were stolen and sent spam to a follower of the owner of that account. Generally, the message sent contains a malicious link aims to steal the victim's identity.

Here are tips on how to avoid your Twitter account stolen. Please forward this article or tweet to prevent more casualties due to actions hackers or spammers. The perpetrators use a trick that is generally classified into two types.

Links from people we 'know'
A Twitter account that has taken over sending a message like:
- Huh, this really you? http://URL
- Wow, look at this http://URL
- What is your IQ? http://URL

Or many other variations. One similarity of the tweet is, they are not targeted specifically to you. It is an important clue because generally, the original message will not be so short and usually contains more information or comments from people who sent it to you.

URLs are used are also strange, is not Tiny.url Bit.ly or used by 99.999 percent of Twitter users. It also is another clue that the message is not really a message from people you know.
Tips Prevent Hackers Steal Twitter Account | Step 2
Tips Prevent Hackers Steal Twitter Account | Step 3
Source : http://teknologi.vivanews.com/news/read/109659-tips_cegah_hacker_curi_akun_twitter


Do not click on links that do not clearly | Tips and Tricks

Posted By pas unik On 14:24 0 comments
Tips Prevent Hackers Steal Twitter Account | Step 3
Well, once you know where the origin of the 'message' it comes from, you can prevent that happening in a way that easily. That is not clicking the relevant link. If you receive a direct message with a link in it, should send a direct message back to the person to ascertain whether he really is sending the link.

This needs to be done, especially if you do not expect to get a message containing a link from someone who rarely make contact with you in some time.

Keep in mind, this model of attack can only succeed if users continue to click on the link provided and include detailed information to the fake Twitter site. You can help your follower not to become victims of similar attacks by being careful to not click the link sent to you.

If you've already clicked the link and enter a user name and password are the fake Twitter site, you should change your password or ask Twitter reset your password.
Tips Prevent Hackers Steal Twitter Account | Step 1
Tips Prevent Hackers Steal Twitter Account | Step 2
Source : http://teknologi.vivanews.com/news/read/109659-tips_cegah_hacker_curi_akun_twitter

Denied, the White Tiger Safari Park Man Eating | Amazing News

Posted By pas unik On 13:52 0 comments
BOGOR (Pos Kota) - image via a video that spread in HP memperlihatan journalists recording a famous white tigers are ferocious human prey.

This image of a surprise while making rippled Bogor residents. And the news quickly spread.

The management Taman Safari Indonesia (TSI) which has been maintaining these wild animals live a rebuttal. This argument because the scene is similar to a family-owned resorts that Mamansang.

"No incident of white tigers prey on humans at the Safari Park there is always closely watched by visitors. So the story was a lie. Maybe it happened outside the country, but made news in the TSI Bogor. Overseas there is a tiger ate people, "said Julius, PR TSI during the confirmation.

Director of TSI, Manangseng Jansen also said the same thing Saturday (28/11). According to him, the news, do not need to respond to excess. Entertainment business competition in the area Bogor summit, recognized Yansen, an effort that now lead to unfair competition.

Meanwhile, a number of officers Satuann Security (Security) Indonesia Safari Park encountered choose to shut up. They are reluctant to say the least when confirmed about it.

"There is or not, I'm not in the capacity to comment on it. Please direct to our superiors, "says Post a security guard at the entrance to the TSI.

Some residents who had seen pictures of human eating tiger said, these pictures are actually there three weeks ago. Figure lasted approximately 7 minutes, it is true there was a white tiger prey on people who were visiting.

"The victim was a man dressed like a blue security guard and shoe boot donker. Even in the face of the victim is clear tiger prey. The location also like TSI. But what is true, the police must mengusutnya, "said Erna, a visitor.
source : http://www.poskota.co.id/berita-terkini/2009/11/28/dibantah-harimau-putih-taman-safari-menyantap-manusia

Similar Stingrays Alien | Amazing News

Posted By pas unik On 02:12 0 comments
Ikan Pari or name saintifiknya Dasyatis uarnak is a delicious kind of fish consumed and there around the world.

Ikan Pari is related to fish jerung. But unlike fish jerung, which is a predator who menggerunkan with powerful jaws, stingrays rarely menugut humans and small mouth is not a threat at all.

Be near the base of the tail stingrays are spurs around the 8-inch diselitupi with the same ingredients that make up the scales yu, are recognized as dentikle dermis (dermal denticles). This Hujung, which becomes hard and tense when the stingray feels threatened, shaped like a serrated steak knife and a can of threatening predators.

The greater part of the poison itself is berasaskan protein toxin that causes pain in mammals and may also alter levels of heart and respiratory degupan, followed at Mote Marine Makmal.

Stingrays rarely attack humans, however if he dipijak, stingrays tajinya will use as a form of self-defense, "to follow Nancy Passarelli and Andrew Piercy for Muzium Sejarah Semulajadi Florida." Despite being stabbed by a stingray's tail is very painful, it is rarely a threat to human life. "

There are approximately 200 species of stingrays. He was found in both fresh water and at sea. Most of them do not have to keupayaan stinging.


Stingrays have been found with a face like a human. It's strange but true, his face like an alien form. But this is actually the original stingrays.
Figure fish above the spitting image of aliens .. but actually is stingrays ... .. wah serem yes, just like human face

Show romanization Train Wheels D Pharaoh found the Red Sea | Amazing News

Posted By pas unik On 09:47 0 comments
Remember the story of the miracle of Moses split the red sea with his staff? If one of you think the story is just fairy tales, now let us refer to writing under the name ini.Seorang archaeologist Ron Wyatt (see http://www.wyattmus eum.com/ron- wyatt.htm) at end of year 1988 earlier claim that he had found several corpses of ancient chariot wheels based on the red sea. According to him, maybe this is a chariot dead Pharaoh who drowned at sea they will be used to pursue Moses with his followers.

According to his confession, but found a few dead horse chariot wheels, Wyatt with his crew also found some human bones and the bones of horses the same place.


These findings certainly reinforces the notion that the remains of bones that are part of the framework of the Pharaoh's army drowned in the Red Sea.

Moreover, the results of tests conducted at the University of Stockhlom few remaining bones are found, is true that the structure and content of some old bones have been around 3500 years ago, which according to history, the chase scene also occurs in the same period.


In addition, there is an interesting thing that also was found, the wheel axle of one carriage had now entirely covered by rocks, so for now its original form is very difficult to be seen clearly.

May God protect these things deliberately to show us all that the miracle was revealed to the Prophet-His prophets is a real thing and not a mere essay story.

Among the dead was the train, also found a wheel with 4 fruit bars made from emas.Sepertinya, this is the rest of the wheel carriage horse by Pharaoh the king.
Source : http://unic77.blogspot.com/2008/10/roda-kereta-firaun-ditemukan-dilaut.html

One-eyed baby photos is believed is the Dajjal [Amazing News]

Posted By pas unik On 09:08 0 comments
Photo of a baby's circulation with a single eye in various media forums on the Internet, which is believed the baby was born in Israel are also debated, as some among the netters in the forum, stated that this baby is the liars who will come to earth on the Day of Resurrection is not long more will come.

This incident could have something to do with the Day of Resurrection, or simply a genetic defect of the womb. You may believe it or not. But this real happening. We humans are born completely without defects should be grateful to the creator of the creator god of the universe and its contents-contents.

The forum which discusses about these baby pictures is a forum kaskus Indonesian language, is also a forum in English 7cgen

Source : http://unic77.blogspot.com/2008_09_29_archive.html

Ancient Bridges Aged 1 Million Years of Mysterious! [Amazing News]

Posted By pas unik On 08:41 0 comments
Rama's Bridge is one of the "Mysterious Places in the World's" mysterious ancient bridge along the 18 miles (30 km) which connects between Manand Island (Sri Lanka) and Pamban Island (India) is estimated to have 1,000,000 years old! The image of Rama's Brige itself very easily visible from the surface of sea water because it was not too deep, lasting only as deep inundated about 1.2 meters (if the sea water is receding). Status of the bridge is still a mystery to this day, according to the interpretation of experts, estimated Rama Bridge is closely related to the famous Indian Epic, Ramayana.

SriLankan Archeology Department has issued a mention statment Bridge of Rama age may range between 1,000,000 to 2,000,000 years old, but whether this bridge was formed naturally or is a masterpiece of human, it could not explain them.

SUDeraniyagala, Director General of Archeology of Sri Lanka is also the author of the book "Early Man and the Rise of Civilization in Sri Lanka: the Archaeological Evidence" saying that human civilization has emerged in the Foot of Mount Himalayas about 2,000,000 years ago, although according to the historian of civilization The earliest civilization of India was didaratan Ca nation, it is not a guarantee that there is an older civilization more than they were before. Scholars decrees that may be this ancient bridge was built after the Sri Lankan mainland India are separated by millions of years ago.

In the Epic of Ramayana, the bridge was built by the ape-man squad under the supervision of Rama. The purpose of the construction itself is a place of crossing into the State of Lanka on a mission to rescue Shinta Dewi, which at that time Sinta Dewi was in the abduction by the King of the Kingdom of Lanka, Ravana is.

Epic Ramayana, according to Hindu calendar should be on the Tredha yuga (according to the evolution of disc Hindu / Hinduism on the Epic disc is divided in the Sathya (1,728,000 years), Tredha (1,296,000 years), dwapara (8.64.000 years) and Kali (4.32.000 years). Stage now according to their calendar is the time. That's according to Epic, the age of Rama's Bridge range from 1,700,000 years.
Source : http://donaemons.wordpress.com/2009/02/02/kejadian-aneh-di-dunia/