Showing posts with label tutorial network. Show all posts
Showing posts with label tutorial network. Show all posts

Friday, April 22, 2011

Selamat siang buat sahabat blogger maupun para pengunjug setia Alexa-com Weblog Lovers sudah beberapa minggu Alexa-com Weblog tidak update posting karena admin lagi sibuk banget di dunia offline. admin sedang menghadapi UAN kemarin namun Alhamdulilah semua kegiatan sudah kelar semua. tinggal melihat hasilnya saja, semoga admin lulus dengan nilai baik, amin.
Tips and Trick Membuka Situs Yang Di Blokir Oleh Nawala, Telkom, AHA by www.alexa-com.co.cc

Dikesempatan kali ini admin Alexa-com Weblog ingin sekali berbagi/sharing ilmu yang admin dapatkan di dunia offline atau online. bagi sahabat blogger dan ACW Lovers yang suka sekali browsing pastinya tidak asing lagi dong dengan DNS Nawala ? banyak banget ACW Lovers dan sahabat blogger yang bertanya ke admin. saya tidak mencantumkan gimana cara bertanya nya. langsung saja kalian simak bagaimana caranya, berikut ini.
Nawala (DNS) adalah salah satu layanan sistem penyaring berdasarkan nama Domain Name System yang didukung oleh berbagai pihak, yaitu pelaku bisnis warnet, Kemkominfo, dan PT. Telkom sebagai BUMN penyedia jasa layanan internet di Indonesia.

DNS Nawala secara spesifik menyaring segala jenis konten negatif, seperti Pornografi, Judi, situs Phising (penyesatan) serta situs yang mengandung Malware (software berbahaya).

Nah sekarang, bagaimana untuk menghindari pemblokiran tersebut ? intinya kalian harus mengganti DNS Nawala dengan DNS yang lainnya. bisa menggunakan OpenDNS, DNS Google, dan masih banyak kok DNS yang lainnya. di tutorial ini admin akan share bagaimana cara setting tool yang bernama DNS Jumper karena menggunakan Tool/Software ini sangat mudah sekali, bahkan pemula saja bisa menggunakannya.

Cara menggunakan DNS Jumper :
  1. Download DNS Jumper
  2. Ekstrak (keluarkan file dari zip) ke desktop atau kemana aja.
  3. Jalankan DNS Jumper
  4. Pilih Network card (sesuaikan dengan komputer anda)
  5. Pilih DNS Service yang akan kita gunakan di menu dropdown.
  6. Klik apply DNS.
  7. Done.

Selain itu, dengan menggunakan DNS Jumper sobat blogger juga bisa menggunakan mengecek DNS yang cepat untuk komputer/internet sobat blogger, dengan klik menu Fastest DNS.
DISCLAIMER : Artikel ini saya share hanya untuk pengetahuan semata. Resiko dan penyalahgunakan informasi ini merupakan tanggung jawab individu masing-masing.

NB : Untuk mendapatkan software / tool DNS Jumper silahkan anda mencari di Google, disini admin ACW hanya share tutorial / tips and trick nya saja untuk software nya cari sendiri saja.

Semoga tutorial / tips and trick ini bermanfaat buat kalian dan bisa di manfaatkan untuk kebaikan, admin ACW mengucapkan banyak terima kasih atas dukungan untuk ACW sendiri, terima kasih.

Tuesday, July 13, 2010


hotspot areas is a new network but has now mushroomed and Became very popular Indonesian Among netters. and now this lot are using laptops or mobile phones That already use Wi-Fi services as well. but this time I Will discuss about the laptop.

WHO for Those of you frequently use your laptop must have been trying to internet use in Various hotspots hotspot areas like in malls, universities, companies, cafes and much more. use hotspot services is relatively easy and cheap. event not rarely, are now so many hotspots That Can be enjoyed free of charge and cans be Used much as you like if not turned off hotspotnya, hehehehe.

laptop into hotspot areas
but on certain conditions These Can not enjoy hotspots. Pls for example at home, friends Who Are still using ADSL or cable network connection. but you do not worry Anymore with it all, for the WHO Those of you have laptops with operating system Windows 7, Can you only build a hotspot network with Internet connection and your laptop is its operating system Windows 7, yes.


so, Enough of a notebook, netbook or laptop you are connected to the internet (ethernet connection cable / internet) and your other friends cans already use the Internet access using the hotspot That network has been created in your area.

You Want to know how to make our laptop as a hotspot area, follow the Steps - Steps Below :

1. For the first step you must first download the software here,
2. then you install connectify, to not install the First Steps Explained in detail as to how it all would have been Able to.
3. connectify open it from an existing icon on the taskbar.
4. then you fill in a WIFI network, accses passwords, then Specify the type of connection you want to use for sharing (LAN support, Virtual Box Host Only, Wireless Network, and without internet sharing).
5. That after click start hotspots.

6. That after the program works and please you connect with a laptop computer or your friend into your laptop.
it should be noted that connectify can only be installed and working on my laptop with windows 7 operating system, but the computer with any operating system can connect with the network. For example, we connect the laptop to windows XP operating applying hotspot network created by applying a laptop connectify in windows 7
1. open wireless network
2. Select the Network That Have Been Made Earlier
3. Enter your password and click connect
4. applying a laptop for windows XP are connected to a hotspot network created by a laptop with windows 7 connectify.

HotSpot LAPTOP WITH YOUR FRIENDS Connected

all the laptops friend - your friend Can Can you connect and start surfing with friends - friends only from a cable Internet connection only, not at all easy?



I hope These tips and tricks useful for all of you. and I apologize in this article gampar or not I include a screenshot Because of the limitations of time and maybe everyone has been Able to all for the setting.

Tuesday, May 11, 2010

Had long since I do not post my Chances of not blogging about three months more, why I was not blogging Because I was really busy at my job and Become a computer technician at a university network in the poor. yesterday I was posting about the history of the MikroTik Which I have written a complete and detailed without cheap to post about this MikroTik. in the post this time I'm still going to discuss about the MikroTik RouterOS is in use in many countries - developing countries like Indonesia this. but on this occasion I just give an explanation what it is MikroTik RouterOS and MikroTik Hardware Built-ins? we go straight to the subject below.

MikroTik ROUTERSTM

RouterOS Mikrotik is a variant of linux that is specifically packaged into an independent operating system where its main function is to create ordinary personal computer into a powerful router, and enables network administrators in managing their network without having to study for a long time.

MikroTik RouterOS does not support multiple operating systems and only make a single partition on the hard drive, so when the installation process Mikrotik RouterOS happens is all the data on the disk will be formatted. To start the installation process make sure the boot device in bios is directed toward the cd-room, the first step is to determine the package or what features will be in use.

BUILT IN MikroTik HARDWARE

MikroTik is in the form of hardware packed in a very special board within the board router Routers that are already installed with Mikrotik RouterOS. For versions of the Built In Hardware Mikrotik license is included in the price of board Mikrotik router.

Sunday, May 9, 2010


CISCO certainly not a familiar name in the world of routers, the devices That serves to direct the address on the Internet. However, there are other names besides CISCO very Well Known as one of a very Inexpensive solution to build a router, ie ROUTEROSTM MikroTik.

MikroTik RouterOSTM That is an operating system has been specifically Designed for network routers at all. With the operating system of MikroTik RouterOSTM, We Can all make a home computer or router from the crowd Called PC (Personal Computer).

MikroTik is a small company headquartered in Latvia, Which is adjacent to Russia. Constituent in prakaryai by a John Trully and Arnis Riekstins. John Trully Who is a Native American to WHO later migrated to Latvia. John Trully at the time in Latvia Latvia Arnis met with WHO's native people have expertise in Physics and Mechanics for arnis a scholar of physics and mechanics in 1995.

In 1996 John and Arnis have started to Routing World, And John & Arnis have a VISION of Itself is MikroTik Routing to the entire World. Starting from the Linux and MS systems. Which DOS has been combined with WLAN technology or Wireless LAN (WLAN) That Aeronet speed 2Mbps in Molcova, neighbors Latvia and then John and Arnis serve five (5) customers in Latvia.

The basic principle of on on their beruda it instead of making a wireless ISP (WISP), but they want want want to create a program beruda That router is very reliable and Cans run all over the world. According to on on their small town in Russia was a place of experimental only. John & Arnis Because now they want want have helped the country - other countries including Sri Lanka That has served about four Hundred karnel 2.2, Which has been developed jointly - with the help of 5-15 staff &amp R; D MikroTik Which now holds the They have staff, customers within the MikroTik Also merekut power - power off and the third party to develop an intensive marathon MikroTik (Joint - Same thing).

For countries - developing countries Poor 'Indonesia, MikroTik solution is Helping the ISP or company - That a small company wants to join the Internet. Waupun has a lot of available devices similar mini-NAT routers, MikroTik is a very good solution in many circumstances the use of computers and software.

Saturday, January 23, 2010

 in this post I want to give Patrick a very telling and powerful in my opinion in raising the internet bandwidth. today many people are complaining to me because the internet connection he used often drop precipitously at the time to download.



connection even in use can not be anything for browsing or downloading. in this post I want to give a solution. want to know solving the problem? follow the steps - the steps below:

1. Click "Start | Run" then click "gpedit.msc" (without "mark-click). This will open the group policy editor.
2. Next search for the item: "Local Computer Policy / Computer Configuration / Administrative Templates / Network / QOS PacketScheduler / Limit Reservable Bandwidth".
3. Double click on Limit Reservable bandwidth. By default settings set to it is not configured but the actual default value is 20 percent, look at the explain tab "By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override The default ".
4. To increase bandwidth, then set the Limit Reservable bandwidth to "enabled" and the Bandwidth Limit (%) a: "0".

explanation of admin:
why should we bandwidth settings or settings in regedit in the window because the window has been set up microsoft bandwidth up to 20% or more for processing such as Windows Update, even for the review process on your PC and other inspection processes. and for me makes this setting aims to liberate the 20% Bandwidth in use by the window and increase our connection Bandwidth capacity up to 20% so we no longer use the 20% just bandwidth but we use bandwidth more than 20% or more. until now I use this trick, my connection never download time Down on my download speeds even at this point to reach 60 Kbps up and to browse to the site very little weight or just need 20 seconds, even 10 seconds can only direct opening all contents of your blog or site.

if you want to try these tips and tricks? maybe you do not want to try this trick because it is not possible, it's up to you to try or not. I recommend reading this article out you try this trick. This is only just this post may be useful for all trick is telling and powerful. thank you very much.

Thursday, October 15, 2009


Tag Technorati: {grup-tag},
the post this time I want to share knowledge with you all about a network that has evolved in this world. actually post this time suitable for students who have majors TKJ (computer and network technicians) but other users or people who are not majoring in computer and networks can also learn a network is also very easy to very cheap in studied. This post will I love a tutorial to make cables LAN / UTP. however, prior to the making of a wired LAN / UTP we have to understand what he meant by networking? network is a PC / computer interconnected with a PC / other computer and PCs can communicate, sharing, among other computer. and What is UTP cable? UTP cable is a special cable for data transmission. and the abbr eviation of UTP unshielded Twisted Pair. that's the basis of the identifier for the network for more information you can follow the next post, we went straight to the introduction of direct scene whatever equipment is needed to make a LAN cable / network, along with the functions of the device.
1. UTP cable, I've explained this over so I did not explain to shorten our time to learn we immediately go to the tool to two (2) only.
2. Head Connector or RJ-45 is a functional tool for the placement and for UTP cable is plugged into a PC or a computer.  
3. Special pliers / Crimping Tool, the tool is in use Untk "deadly" or "plant" connector to the UTP cable. so it was on the steps it is no longer on the loose Ladi connector.
4. LAN tester, a tool to test the UTP cable that has been in Crimping with pliers, if the cable you've made is correct or not.

If you are ready for it all with the equipment that your network cable directly into the stage just right for it is as follows:
1. You first peel the protective UTP cable is less than 2 cm, or do you think is enough to go to RJ-45.
2. when you're done for the first phase, you trim the ends of UTP cable to avoid messy and not experience mistakes in our cable network that made and used when no network cable is a cable tidy no. 1 with the others would not and did not fit right, the essential core of the cable must be neat or parallel with other cables.
4. selection of cable types you will make later to your network computer ie, Type and Type Cross straight over.
to order the cable type and cross straight over us choose the ISO standard just let simple and obvious fact we can choose our cable suit but we must notice the difference from the type of cable. we just straight to the scene.
Type straight
This was easiest in making important end of the one with the other should be the same.
ISO standards are:


1. young orange 
2. old orange 
3. green 
4. blue 
5. navy 
6. dark green 
7. brown 
8. sepia


Then the other end also has a sequence too.Jadi essentially end the only one with the same,and special straight between pc to pc only.
Type Cross / Cross:
Cross cable used to connect from PC to PC / PC to router, just all connections from devices that normally connect through a switch or hub, but fixed directly. Here are examples of cable's position in this condition only crossover.model crossing between the tip of one another.
the following details: the end of the first


1. young orange 
2. old orange 
3. green 
4. blue 
5. navy 
6. dark green 
7. brown 
8. sepia


The other end:


1. green 
2. dark green 
3. young orange 
4. blue 
5. navy 
6. old orange 
7. brown 
8. sepia

good luck for your skills course ... Do not forget to comment ?

Sunday, October 11, 2009

the opportunity this time I took time to post because this month I'm very busy with my school and my job became a computer technician and network. but for you all do not worry I will always be bothered to post this on my website almost every day or week. us directly to our subject in the conduct of wireless security .... why did I post about security or wireless security because lots of software and lots of hackers or crack spread in cyberspace or the internet so I release tips and tricks in this post. but we must know what is meant by wireless networks or who is often called a wireless network understanding very simple and clear is very easy for the setup, and also feels comfortable, especially if we want to be able to walk around the house or office with a portable computer / laptop / net book, but we are still able to access the Internet network. however, because the wireless waves, it will be easier on the hack by hackers or crackers or a can of computer and network experts from the connections that are still using the cable.
I took out my 10 tips and tricks you can use to secure the wireless network / wireless us, is as follows:
1. Wearing encryption.

Encryption is the first security measure, but many wireless access points (WAPs) do not use encryption as a default. Although many WAP has Wired Equivalent Privacy (WEP) protocol, but not enabled by default. WEP does have som
e holes in securitynya, and an experienced hacker would be able to open it, but it was still better than no encryption at all. Be sure to set the WEP authentication method to "shared key" rather than "open system". To "open system", he does not encrypt data, but only authenticate the client. Change the WEP key as often as possible, and use 128-bit WEP compared with the 40-bit.

2. Use strong encryption.
Because of the weakness weaknesse s in WEP, it is recommended to use Wi-Fi Protected Access (WPA) as well. To use WPA, WAP had to the support. The client side must also be able to support WPA tsb.
3. Change the default administrator password.
Most manufacturers use the same administrative password for all their products WAP. The default password is generally known by the hackers, which can then be used to change the settings on your WAP. The first thing to do in the WAP configuration is changing the default password tsb. Use at least 8 characters, a combination of letters and numbers, and do not use the word word in the dictionary.
4. Turn off SSID Broadcasting.
Service Set Identifier (SSID) is the name of our wireless network. By default, the SSID of the WAP will be broadcast. This will make users easy to find the network they will be, because the SSID will appear in the list of available networks that have the wireless client. If the SSID is turned off, the user must first know a bit SSID can be connected with the network.
5. Turn off the WAP when not in use.
The way this one looks very simple, but some companies or individuals do it. If we have users who only connect at a certain moment, there is no reason to run a wireless network at all times and provide the opportunity for intruders in an automated to carry out his evil intentions. We can turn off access point when not in use.
6. Change the default SSID.
Factory default SSID provided. Usefulness of the SSID broadcast is switched off to prevent anyone else know the name of our network, but if you still use the default SSID, will not be difficult to guess the SSID of our network.
7. Wearing MAC filtering.
Most WAP (not the cheap cheap of course) will permit us to use the filter media access control (MAC). This means we can make a "white list" of the computer computer that can access our wireless network, based on the MAC or physical addresses on each network card pc. Connections from the MAC is not on the list will be rejected.
This method is not always safe, because it is still possible for a hacker to do packet sniffing that we transmit via the wireless network and get a valid MAC address from one user, and then use it to make spoof. But the MAC filtering will make a intruders in an automated trouble is still not really good candidate.
8. Isolate the wireless network from the LAN.
To protect the cable from the internal network threats coming from the wireless network, it is important to make wireless DMZ or perimeter network is isolated from the LAN. It means installing a firewall between the wireless network and LAN.
And for the wireless client that requires access to the internal network, he must first authenticate to the RAS server or use a VPN. This provides extra layers for protection.
9. Control the wireless signal
802.11b WAP to emit waves of about 300 feet. But this distance can be added by replacing the antenna with a better one. By using high-gain antenna, we can get more distance. Directional antenna will transmit the signal to a particular direction, and the radiance is not circular as in Omnidirectional antenna that usually found in standard WAP package. In addition, by selecting the appropriate antenna, we can control distance and direction signals to protect themselves from intruders in an automated. In addition, there are some WAP settings that can be in signal strength and direction through WAP config tsb.
10. Emits waves at a different frequency.
One way to hide from hackers who often use technologies 802.11b / g, which is more popular is to use 802.11a. Because 802.11a works on a different frequency (ie at the frequency of 5 GHz), NIC is designed to work on a popular technology will not be able to catch the signal tsb.
good luck hope it can be useful for you all, but do not forget to give your comments on this post or other posts.
Subscribe to RSS Feed Follow me on Twitter!