Selasa, 23 Maret 2010

4 Istri !!!

Suatu ketika, ada seorang pedagang kaya yang mempunyai 4 isteri.

Dia mencintai isteri ke-4 dan menganugerahinya harta dan kesenangan,
sebab ia yang tercantik di antara semua isterinya.
Pria ini juga mencintai isterinya yang
ke-3. ia sangat bangga dengan
sang isteri dan selalu berusaha untuk memperkenalkan wanita cantik ini
kepada semua temannya. Namun ia juga selalu kuatir kalau isterinya
ini lari dengan pria lain.

Begitu juga dengan isteri ke-2. Sang pedagang sangat menyukainya
karena ia isteri yang sabar dan penuh pengertian. Kapan pun pedagang
mendapat masalah, ia selalu minta pertimbangan isteri ke-2-nya ini,
yang selalu menolong dan mendampingi sang suami melewati masa2 sulit.
Sama halnya dengan isteri pertama. Ia adalah pasangan yang sangat
setia dan selalu membawa perbaikan bagi kehidupan keluarganya. Wanita
ini yang merawat dan mengatur semua kekayaan dan bisnis sang suami.
Akan tetapi, sang pedagang kurang mencintainya meski isteri pertama
ini begitu sayang kepadanya.

Suatu hari si pedagang sakit dan menyadari bahwa ia akan segera
meninggal. Ia meresapi semua kehidupan indahnya dan berkata dalam
hati, "Saat ini aku punya 4 isteri. Namun saat aku meninggal, aku akan
sendiri. Betapa menyedihkan. "

ISTERI KE-4: NO WAY
Lalu pedagang itu memanggil semua isterinya dan bertanya pada
isteri ke-4-nya. "Engkaulah yang paling kucintai, kuberikan kau gaun dan
perhiasan indah. Nah, sekarang aku akan mati. Maukah kamu
mendampingi dan menemaniku?" Ia terdiam.... tentu saja tidak!
Jawab isteri ke-4 dan pergi begitu saja tanpa berkata apa2 lagi.

Jawaban ini sangat menyakitkan hati. Seakan2 ada pisau terhunus dan
mengiris- iris hatinya.

ISTERI KE-3: MENIKAH LAGI
Pedagang itu sedih lalu bertanya pada isteri ke-3. "Aku pun
mencintaimu sepenuh hati dan saat ini hidupku akan berakhir.
Maukah kau ikut denganku dan menemani akhir hayatku?" Isterinya menjawab,
hidup begitu indah di sini. Aku akan menikah lagi jika kau mati.
Bagai disambar petir di siang bolong, sang pedagang sangat terpukul
dengan jawaban tsb. Badannya terasa demam.

ISTERI KE-2: SAMPAI LIANG KUBUR
Kemudian ia memanggil isteri ke-2. "Aku selalu berpaling kepadamu
setiap kali aku mendapat masalah dan kau selalu membantuku sepenuh
hati. Kini aku butuh sekali bantuanmu. Kalau aku mati, maukah
engkau mendampingiku? " Jawab sang isteri, "Maafkan aku kali ini aku tak
bisa menolongmu. Aku hanya bisa mengantarmu hingga ke liang kubur.
Nanti akan kubuatkan makam yang indah untukmu."

ISTERI KE-1: SETIA BERSAMA SUAMI
Pedagang ini merasa putus asa. Dalam kondisi kecewa itu, tiba2
terdengar suara, "Aku akan tinggal bersamamu dan menemanimu kemana
pun kau pergi. Aku tak akan meninggalkanmu, aku akan setia bersamamu.

Pria itu lalu menoleh ke samping, dan mendapati isteri pertamanya
di sana. Ia tampak begitu kurus. Badannya seperti orang kelaparan.
Merasa menyesal, sang pedagang lalu bergumam, "Kalau saja aku bisa
merawatmu lebih baik saat aku mampu, tak akan kubiarkan engkau
kurus seperti ini, isteriku."

HIDUP KITA DIWARNAI 4 ISTERI
Sesungguhnya, kita punya 4 isteri dalam hidup ini. Isteri ke-4
adalah TUBUH kita. Seberapa banyak waktu dan biaya yang kita
keluarkan untuk tubuh kita supaya tampak indah dan gagah. Semua
ini akan hilang dalam suatu batas waktu dan ruang. Tak ada keindahan
dan kegagahan yang tersisa saat kita menghadap kepada-Nya.

Isteri ke-3, STATUS SOSIAL DAN KEKAYAAN.

Saat kita meninggal, semuanya akan pergi kepada yang lain. Mereka akan
berpindah dan melupakan kita yang pernah memilikinya. Sebesar apapun
kedudukan kita dalam masyarakat dan sebanyak apapun harta kita, semua
itu akan berpindah tangan dalam waktu sekejap ketika kita tiada.

Sedangkan isteri ke-2, yakni KERABAT DAN TEMAN.

Seberapa pun dekat hubungan kita dengan mereka, kita tak akan bisa
terus bersama mereka. Hanya sampai liang kuburlah mereka menemani
kita.

Dan sesungguhnya isteri pertama kita adalah JIWA DAN AMAL KITA.
Sebenarnya hanya jiwa dan amal kita sajalah yang mampu untuk terus
setia mendampingi kemana pun kita melangkah.

Hanya amallah yang mampu menolong kita di akhirat kelak.

Jadi, selagi mampu, perlakukanlah jiwa kita dengan bijak serta
jangan pernah malu untuk berbuat amal, memberikan pertolongan kepada
sesama yang membutuhkan. Betapa pun kecilnya bantuan kita, pemberian kita
menjadi sangat berarti bagi mereka yang memerlukannya.

Mari kita belajar memperlakukan jiwa dan amal kita dengan bijak.

--
Gun Gun Gunawan

Selengkapnya...

Renungan di Bulan Ramadhan . . . Bacalah . . . . .

Di sudut pasar Madinah ada seorang pengemis Yahudi buta yang setiap
harinya
selalu berkata kepada setiap orang yang mendekatinya,
Wahai saudaraku, jangan dekati Muhammad, dia itu orang gila, dia itu
pembohong,
dia itu tukang sihir, apabila kalian mendekatinya maka kalian akan
dipengaruhinya.

Namun, setiap pagi Muhammad Rasulullah SAW mendatanginya dengan membawakan
makanan,
dan tanpa berucap sepatah kata pun Rasulullah SAW menyuapkan makanan yang
dibawanya
kepada pengemis itu sedangkan pengemis itu tidak mengetahui bahwa yang
menyuapinya
itu adalah Rasulullah SAW. Rasulullah SAW melakukan hal ini setiap hari
sampai beliau wafat.

Setelah wafatnya Rasulullah SAW, tidak ada lagi orang yang membawakan
makanan setiap
pagi kepada pengemis Yahudi buta itu. Suatu hari sahabat terdekat
Rasulullah SAW yakni
Abubakar RA berkunjung ke rumah anaknya Aisyah RA yang tidak lain tidak
bukan merupakan
isteri Rasulullah SAW dan beliau bertanya kepada anaknya itu,Anakku,
adakah kebiasaan
kekasihku yang belum aku kerjakan?

Aisyah RA menjawab,Wahai ayah, engkau adalah seorang ahli sunnah dan
hampir tidak ada
satu kebiasaannya pun yang belum ayah lakukan kecuali satu saja.
Apakah Itu?, tanya Abubakar RA.
Setiap pagi Rasulullah SAW selalu pergi ke ujung pasar dengan
membawakan
makanan untuk
seorang pengemis Yahudi buta yang ada disana, kata Aisyah RA..

Keesokan harinya Abubakar RA pergi ke pasar dengan membawa makanan untuk
diberikan kepada
pengemis itu. Abubakar RA mendatangi pengemis itu lalu memberikan makanan
itu kepadanya.
Ketika Abubakar RA mulai menyuapinya, sipengemis marah sambil menghardik,
Siapakah kamu?
Abubakar RA menjawab,Aku orang yang biasa (mendatangi engkau).
Bukan! Engkau bukan orang yang biasa mendatangiku, bantah si
pengemis
buta itu.

Apabila ia datang kepadaku tidak susah tangan ini memegang dan tidak
susah mulut ini mengunyah.
Orang yang biasa mendatangiku itu selalu menyuapiku,
tapi terlebih dahulu dihaluskannya makanan tersebut,
setelah itu ia berikan padaku, pengemis itu melanjutkan perkataannya.

Abubakar RA tidak dapat menahan air matanya, ia menangis sambil berkata
kepada pengemis itu,
Aku memang bukan orang yang biasa datang padamu. Aku adalah salah
seorang
dari sahabatnya,
orang yang mulia itu telah tiada. Ia adalah Muhammad Rasulullah SAW.

Seketika itu juga pengemis itu pun menangis mendengar penjelasan Abubakar
RA, dan kemudian berkata,
Benarkah demikian? Selama ini aku selalu menghinanya, memfitnahnya,
ia tidak pernah memarahiku sedikitpun,
ia mendatangiku dengan membawa makanan setiap pagi, ia begitu mulia....

Pengemis Yahudi buta tersebut akhirnya bersyahadat di hadapan Abubakar RA
saat itu juga
dan sejak hari itu menjadi muslim.

Nah, wahai saudaraku, bisakah kita meneladani kemuliaan akhlaq Rasulullah
SAW?
Atau adakah setidaknya niatan untuk meneladani beliau?
Beliau adalah ahsanul akhlaq, semulia-mulia akhlaq.

Kalaupun tidak bisa kita meneladani beliau seratus persen, alangkah
baiknya kita berusaha
meneladani sedikit demi sedikit, kita mulai dari apa yang kita sanggup
melakukannya.

Sebarkanlah riwayat ini ke sebanyak orang apabila kamu mencintai
Rasulullahmu...

Sadaqah Jariah salah satu dari nya mudah dilakukan, pahalanya?
MasyaAllah....macam meter taxi...jalan terus.

Sadaqah Jariah - Kebajikan yang tak berakhir.

1. Berikan al-Quran pada seseorang, dan setiap dibaca, Anda mendapatkan
hasanah.

2. Sumbangkan kursi roda ke RS dan setiap orang sakit menggunakannya, Anda
dapat hasanah.

4. Bantu pendidikan seorang anak.

5. Ajarkan seseorang sebuah do'a. Pada setiap bacaan do'a itu, Anda dapat
hasanah.

6. Bagi CD Quran atau Do'a.

7. Terlibat dalam pembangunan sebuah mesjid.

8. Tempatkan pendingin air di tempat umum.

9. Tanam sebuah pohon. Setiap seseorang atau binatang berlindung
dibawahnya, Anda dapat hasanah.

Aminnnnnn...


--
Gun Gun Gunawan

Selengkapnya...

Cara Membuar Readmore/Baca Selengkapnya

Biasanya postingan terbaru akan ditampilkan dihalaman utama blog. Namun jika postingan kamu terlalu panjang maka hal tersebut akan membuat penuh halaman utama. Jika kamu ingin supaya postingan kamu yang ditampilkan dihalaman utama cuma abstraksinya saja kemudian ada sebuah link Read More / Baca Selengkapnya untuk melihat selengkapnya maka ikutilah langkah-langkah berikut :




Login ke blogger.com, pilih blog yang pengen kamu edit, klik link Layout kemudian masuk ke Edit HTML



Untuk bisa ngedit template secara keseluruhan, kamu harus centang/tandai/aktifkan Expand Widget Templates


Masukkan kode berikut sebelum tag </head> atau tepat sesudah kode } ]]></b:skin> seperti ini:

<style>
<b:if cond='data:blog.pageType == "item"'>

span.fullpost {display:inline;}
<b:else/>
span.fullpost {display:none;}
</b:if>
</style>





Selanjutnya mengatur supaya postingan terpotong, cari kode <p><data:post.body/></p> dalam template kamu dan tambahkan kode berikut tepat dibawahnya:


<b:if cond='data:blog.pageType != "item"'>
<a expr:href='data:post.url'> Read More..</a>
</b:if>





Nah supaya terpotong, setiap kali kamu posting, klik pada bagian posting dimana kamu pengen tulisan Read More.. muncul, dan ketik <span class="fullpost"> sisa postingan sampai selesai </span>. Untuk menmbahkan kode ini, ketika posting kamu harus dalam mode Edit HTML bukan Compose


Contoh penulisan posting:



Ini adalah awal berita yang ingin saya potong karena terlalu panjang kalo postingan muncul semua, oleh karena itu saya perlu memotong berita sampai disini saja. <span class="fullpost"> Dan ini adalah sisa postingan saya yang akan saya sembunyikan dan hanya muncul pada saat post page atau link read more.. diklik </span>




Hasil akhir postingan akan seperti ini:



Ini adalah awal berita yang ingin saya potong karena terlalu panjang kalo postingan muncul semua, oleh karena itu saya perlu memotong berita sampai disini saja.Read more..



Selamat Mencoba!





Selengkapnya...

Galuh Web Hosting

Manual CPanel CMS Whois Domain Internasional Whois TLD ID

Selamat Datang di Galuh Technologies


galuh hadir untuk memberikan solusi bagi anda baik atas nama instansi maupun pribadi yang ingin memiliki akses tak terbatas dalam dunia World Wide Web.Dengan dukungan hardware dan jaringan yang handal serta sumber daya manusia yang mempunyai kompetensi dan komitmen tinggi dibidangnya kami berusaha semaksimal mungkin untuk memberikan yang terbaik kepada mitra kami untuk memulai karya di dunia World Wide Web. Kami sangat berharap layanan kami menjadi sumbangsih yang berarti untuk perkembangan dunia World Wide Web di Indonesia.galuh memberikan layanan Web Hosting, Web Desain dan Reseller Hosting dengan harga yang sangat terjangkau dan kompetitif, silakan anda pilih paket hosting yang paling sesuai dengan kebutuhan anda dan klik disini untuk melakukan pemesanan.Paker reseller kami sediakan untuk anda yang ingin memulai usaha hosting sendiri tanpa harus mengeluarkan lebih banyak biaya untuk pengadaan peralatan awal serta untuk menggaji karyawan. Sebagai reseller, anda tidak perlu memiliki kemampuan teknis untuk mengelola server.Selain itu galuh memberikan layanan registrasi domain .com, .net, .org, .biz, .info, .name (Rp. 78.000,-) dan domain TLD-ID.

--------------------------------------------------------------------------------

PAKET HOSTING GALUH

PAKET Basic25 Basic50 Basic100 Basic300 Basic500
Web Space
25 MB 50 MB 100 MB 300 MB 500 MB
Biaya Setup
GRATIS GRATIS GRATIS GRATIS GRATIS
Biaya Domain
** [ optional ]

PESAN PESAN PESAN PESAN PESAN

*) Harga Domain bisa dilihat disini
*) Fasilitas Hosting bisa dilihat disini
*) Paket Hosting Pro bisa dilihat disini
**) Domain .com, .net, .org, .biz, .info, .name (Rp. 78.000,-) dan domain TLD-ID.
PAKET WEB DESAIN GALUH

PAKET WD1 WD2 WDSCHOOL WDICT
Informasi Detil Detil Detil Detil

PESAN PESAN PESAN PESAN


--------------------------------------------------------------------------------

PAKET RESELLER HOSTING GALUH

PAKET Reseller Small Reseller Medium Reseller Large
Web Space
1 G B 2 GB 5 GB
Biaya Setup
GRATIS GRATIS GRATIS
Addons
*) [ optional ]
Minimal Kontrak
3 Bulan

PESAN PESAN PESAN

Last modified: July 20 2007 10:05:51.


Selengkapnya...

Senin, 22 Maret 2010

Free Downaload Mp3

5'Langit - Dengar.mp3
5'Langit - Ku ingin.mp3
5'Langit - Sayang Edit.mp3
AHMAD DHANI - MADU 3.mp3
Ahmad Dhani - UNDERNEATH THE APPLE TREE.mp3
alvin and the chipmunks - beautiful girls.mp3
Alvin and the Chipmunks - Hula Hoop.mp3
Anang - Separuh Jiwaku Pergi.mp3
Angkasa - Datang Dan Hilang (Seperti Hantu) Promo.mp3
Armada - Ku Ingin Setia.mp3
Armada - Mau Dibawa Kemana.mp3
Asmirandah - SaLahkah Kita.mp3
AVENGED SEVENFOLD - AFTERLIFE.mp3
AVENGED SEVENFOLD - BAT COUNTRY.mp3
AVENGED SEVENFOLD - DEAR GOOD.mp3
AVENGED SEVENFOLD - SCREAM.mp3
AVENGED SEVENFOLD - SECOND HEARTBEAT.MP3
AVENGED SEVENFOLD - UNHOLY COFESSION.mp3
AVENGED SEVENFOLD - UNTIL THE END.mp3
FUNK ROCK JALANAN - FUNK ROCK.mp3
Funky Kopral - Mawarku.mp3
Geisha - Tak Kan Pernah Ada.mp3
Gigi - Ya Ya Ya.mp3
Goliatz - Cinta Monyet.mp3
Goliatz - Masih Disini Masih Denganmu.mp3
Hello - Dua Cincin.mp3
Hey Cantik.MP3
Ipang Feat Ridho Slank - Jadilah Juara (OST Film King).mp3
KOJO - Setitik Hasrat.mp3
Kotak - Terbang (Khayal).mp3
Kotak Band - Berbeda (Sendu).mp3
NaTurAl - Jangan Pergi.mp3
ST 12 - Jangan Takut Menjadi Indonesia.mp3
ST 12 - P.U.S.P.A Putri Iklan.mp3
ST 12 - Sebuah Kenyataan.mp3
ST 12 - Sinar Pahlawanku.mp3
ST 12 - Surga Sudah.mp3
ST 12 ft Sembilan Band - Terlanjur cinta.mp3
Superman Is Dead - Jika Kami Bersama.MP3
The Rock Indonesia - Selir Hati.mp3
TQLA - Jangan Bilang Bilang.mp3
TRIAD - Dunia Lelaki.mp3
Ungu - Cinta Gila.mp3
Ungu - Waktu Yang Dinanti.mp3
Vena - Hilang.mp3
Zigaz - Hidupmu Hidupku.mp3
Zigaz - Sahabat Jadi Cinta.mp3


Selengkapnya...

Windows-to-Linux roadmap: Part 9. Installing software

Using pre-compiled RPMs and compiling applications from source
Level: Introductory
Chris Walden (dwinfo@us.ibm.com), e-business Architect, IBM

11 Nov 2003
IBM e-business architect Chris Walden is your guide through a nine-part developerWorks series on moving your operational skills from a Windows to a Linux environment. He covers everything from logging to networking, and from the command-line to help systems -- even compiling packages from available source code. In this final part, we download and compile a software package, discuss the pros and cons of automated package management, and get to know the RPM system.


One of the first things you notice when you install Linux is that there are so many packages available with your distribution. Most distributions come with the Linux operating system, installation tools, and administration tools. Then they include Internet tools, development tools, office tools, games, and some things that you haven't even heard of. It is not uncommon for a Linux distribution to come with thousands of available packages. If you didn't select "install everything," then some subset of these packages were installed.
Now you may be wondering "How do I remove packages I don't want? How do I install things I missed? Can I use software that didn't come with my distribution?"
RPMs
As Linux installed, you probably noticed a lot of information about RPMs being installed. RPM stands for Redhat Package Manager, a contribution by Redhat that has become a standard for managing software on Redhat and UnitedLinux as well as on many other distributions.
Essentially, an RPM is a package, containing software for Linux ready to install and run on a particular machine architecture. For example, we installed the webmin package from an RPM in "Part 3. Introduction to Webmin." All of the software initially loaded in your distribution was installed from an RPM.
Anatomy of an RPM
An RPM is a package of files. It includes a .spec file, which provides information about the package, its function, and its dependencies (what packages must be in place before it can run). The .spec also contains a manifest of files in the package, where they must be loaded on the system, and what their initial permissions will be. The RPM also contains a pre-install script, which is written by the package developer. Then the RPM contains the compiled binary files. Finally, the RPM contains a post-install script.
RPM layout
.spec pre-install script binary file binary file ... binary file post-install script
When an RPM is installed, the system first looks to see if the dependencies for the package are satisfied. If not, then the installation terminates unless you specify options to force an install anyway.
If all is clear, the pre-install script runs. This script can do anything. Normally it creates users and directories. However, it can do many types of dynamic configuration, even custom-compile source code for the running system.
Know where your RPMs have been

When RPMs install, they copy files onto your system and execute scripts. Since RPM is run as root, all of these functions are performed as root. It is therefore important that you know the origin of an RPM before you install it on your system. Just as with Windows software, malicious code can be contained inside an RPM as easily as any other package. RPMs from the manufacturer are generally safe, but be cautious about randomly downloading and installing things from unknown sources.
If the pre-install script completes successfully, then the binary files are copied onto the system according to the manifest. Once all of the files have been copied and their permissions are set, then the post-install script is run. Again, this script can do almost anything.
Once all of that is completed, the information about the package is added to the RPM database, and the installation is complete. With this simple system, it is possible to perform all of the functions that could be done with a more elaborate commercial installer.
The RPM database
The piece of the RPM that adds elegance is the RPM database. This database typically lives in the /var/lib/rpm directory and holds information about every RPM installed on the system. The database knows the dependency relationships between packages and will warn if removing a package could cause other packages to break. The database knows about every file that was originally installed with a package and its original state on the system. It also knows the locations of the documentation and configuration files for each package. This may sound like a lot of information, and it is. But it isn't bloated and bulky. On a system containing 1,066 packages, comprised of 203,272 files, the database files are only 45 MB! RPM uses the database to check dependencies when packages are loaded and unloaded. Users can also query the database for information on packages.


Back to top


Using RPM
The program to work with RPM packages is appropriately named rpm. rpm runs in several different modes, but the most common tasks are install, upgrade, query, verify, and erase.
rpm -i (install)
When you install a package for the first time, you will use the -i or install mode. Simply point the rpm to a binary package and execute it. The rpm will be installed on your system. Installation normally takes seconds. Often when installing a package, I will add the -v (verbose) switch to provide more information about the process, and the -h (hash bar) switch to provide progress updates via hash (#) marks printed on the console as the package is installed. Here's an example of installing a package:

Listing 1. Installing MyPackage

$ rpm -ivh MyPackage-1.0.0.i386.rpm
Preparing... ########################################### [100%]
1:MyPackage ########################################### [100%]



That's it! MyPackage is now installed and ready to use.
rpm must be run as root

rpm installs and erases must be done as root, because access is required to the file system and the rpm databases.
rpm -e (erase)
To remove an installed package, use the -e switch to erase it. rpm will use the database to remove all of the files for the package. If there are other packages installed that depend on the one you are removing, rpm will abort. You will have to force the erase with the nodeps switch. (nodeps can also be used to force an installation.) Be very careful when using this switch to force an install or erase. Removing packages that others are dependent on can have unfortunate results. Here is the command to remove the package we installed above:
$ rpm -e MyPackage
Notice that the full version of the package is not necessary to remove it. The full name was required at installation because we were pointing to a file name. Installed packages are referenced by their name only. The package's name is everything up to the version number.
rpm -V (verify)
The verify switch is very useful. It compares the current state of a package's files to their original state upon installation. Differences are shown using a code:
Results of verifying files
S File Size differs
M Mode differs (includes permissions and file type)
5 MD5 sum differs
D Device major/minor number mis-match
L readLink(2) path mis-match
U User ownership differs
G Group ownership differs
T mTime differs
If you were to run rpm -V on a package and discover that the size had changed for an executable, that would be a possible sign of a security breach.
rpm -U (upgrade)
Once a package has been installed, any attempt to install a package with the same name will result in a message that the package is already installed. If you want to update a package to a later version, use the -U switch to upgrade. Upgrade has another affect. When upgrade is run on multiple package names, it will try to put the packages in order of dependencies. In other words, required packages will be installed first. The upgrade switch can be used whether or not a package is already installed, so many people use it for installs as well as upgrades instead of using the -i switch. Here is an example of using the upgrade switch to load several rpm packages:

Listing 2. Interactive upgrade

$ rpm -Uvh My*.rpm
Preparing... ########################################### [100%]
1:bMyPackageDep ########################################### [ 50%]
1:aMyPackageNew ########################################### [100%]



In the case above, bMyPackageDep was a prerequisite for aMyPackageNew, so even though the file names sorted in reverse order, rpm ordered them correctly.
rpm -q (query)
Several pieces of useful information can be queried from the rpm database. Queries can be run by any user who has read access to the rpm database. By default, all users have read access. To run a query, use the -q switch with the name of the package to query. This will return the version of the package.
$ rpm -q MyPackage
MyPackage-1.0.0
The name of the package must be exactly correct. Wild cards are not allowed. However, if you cannot remember the full name of a package, you can use the grep tool to help find it. Use the -qa switch to query all installed packages and pipe the information through grep with the text you can remember. For example:
The joy of grep

grep is a text search tool that has a wide variety of uses. By default, grep will search files to show you lines that contain the text you indicate. In our example, we searched for "IBM." grep is a powerful tool in your scripting and console work.
$ rpm -qa | grep IBM
IBMWSAppDev-Product-5.0-0
IBMWSSiteDevExp-Core-5.0-0
IBMWSSiteDev-Core-5.0-0
IBMWSTools-WAS-BASE-V5-5.0-0
IBMJava118-SDK-1.1.8-5.0
IBMWSWB-samples-5.0-0
IBMWSWB-5.0-0
IBMWSAppDev-Core-5.0-0
IBMWSAppDev-5.0-0
IBMWSTools-5.0-0
Besides version numbers, rpm -q can provide other useful information about a package. Here are some examples:
Getting information with an rpm query
rpm -q changelog Shows the development change history for the package
rpm -qc Shows the configuration files for the package
rpm -qd Shows the documentation files for the package
rpm -qi Shows the package description
rpm -ql Shows a list of the package's files
rpm -qR Shows the dependencies for the package
The query also has another interesting command which is run on files rather than packages.
rpm -q whatprovides
The above command will identify the package that is associated with the filename given. The filename must include the absolute path to the file, since that is how the information is stored in the rpm database.


Back to top


RPM front ends
Working with rpm from the console is easy, but sometimes it is more convenient to work with a graphical interface. In typical Linux style, there are front-end programs which provide an interface to the rpm program. Each distribution has a front end, which will vary. Consult your distribution documentation for information about the package management tool provided.


Back to top


Webmin software packages
Webmin also provides a simple Web-based front end for dealing with RPM packages.

Figure 1. Webmin RPM interface
Figure 1. Webmin RPM interface

Software can be easily installed erased and queried from here. Software can also be installed directly from URL sites. If you have rpm enhancement tools installed such as apt or the Redhat Network, Webmin will pick them up and provide an interface to them.


Back to top


Source code
Since Linux is an open source operating system, it comes with all of the development tools required to compile software. While most of the packages that you work with will be provided as binary RPMs, you are not limited to only those packages. If you wish, you can download the raw source code and custom-compile it for your system.
You should be cautious about compiling from source on a production system as it may cause problems or void your support for commercial software which you are using on the system, such as IBM DB2. However, being familiar with compiling from source will allow you to apply patches to software and work with packages ported from other environments. Once you have compiled the code successfully, it is even possible to create your own RPM!


Back to top


Corewars source demonstration
To demonstrate how simple it can be to compile from source, we will compile a simulation game called Corewars (see Resources for a link). Here's a note about Corewars from their Web site: "Corewars is a simulation game where a number of warriors try to crash each other while they are running in a virtual computer. The warriors can be written in one of two assembler-like languages called Corewars and Redcode. Corewars is the default language and is easier to learn and understand. Redcode provides more advanced and powerful instructions but also requires more time to learn."
The first step to compiling from source is to download the source code package from the Web site:
http://prdownloads.sourceforge.net/corewars/corewars-0.9.13.tar.gz?download
Once the code is downloaded, I expand the package.
tar -xvzf corewars-0.9.13.tar.gz
The file is expanded into my current directory. The standard approach is for the source code to be contained in a directory which matches the product name. In this case, it's in a directory called corewars-0.9.13.
I enter into that directory and find the source code, some documentation, configure scripts and README files. Most source packages will come with a file called INSTALL and one called README. You should read these materials before you compile the software. They will usually save you a lot of pain by identifying problems before you have them and advising you of the correct procedures for compiling and installation. Most problems I have had compiling from source were simply because I didn't follow the directions.
The most common next step is to run the configure script. configure is part of the Autoconf package, included with the development tools of your Linux distribution. Quoting Autoconf's package description: "GNU's Autoconf is a tool for configuring source code and Makefiles. Using Autoconf, programmers can create portable and configurable packages, since the person building the package is allowed to specify various configuration options."
The configure script runs a series of tests on the system to determine the best way to compile the package for your distribution and architecture. It then createx a custom Makefile for your system. If there are problems with compiling on your system, configure tells you. configure will usually let you customize the features to be included in the compile, or let you provide parameters about locations of libraries or other needed files so that the package can be compiled successfully. Here we execute configure with no additional parameters:
./configure
Several tests run on the system ultimately end with success. Now build the program using:
make
If the compile has errors, I will need to determine the problems and fix them. This can be non-trivial and may require a good deal of knowledge about your environment and programming in general. If all goes well, we typically install the software with:
make install
The files are copied into the correct areas of the system, file permissions are updated, configuration files are copied and documentation is added to the manual pages.
Now let's test our handiwork by executing the program. It is a graphical program, so you will need to have X running when you start it. The make install which we did above should put the program in our executable path.
corewars
A graphical screen should appear to reward us.

Figure 2. Success!
Figure 2. Corewars game

The topic of corewars rules is outside of the scope of this article, but you will find documentation about this interesting simulation game in the man page (man corewars).
The corewars compile was a typical scenario. There are many possible variations including using switches on the configure script to adjust the features that are compiled into the program, using different commands from the Makefile to adjust how the compile is done, and others.
Since this program was not installed using rpm, there are no entries in the rpm database. If a program doesn't work out after it's been installed, most Makefiles include an uninstall parameter to remove the software:
make uninstall
Bear in mind that working with raw source code does not enter anything into the RPM database. Software installed in this way is unmanaged, so it should be done with care.
Source RPMs
When an RPM is created, there is an artifact called a Source RPM. This is a SPEC file combined with source code designed to build on one or more architectures. This is the best of both worlds! With a source RPM, you can custom compile the software on your system, but the finished product will be an installable RPM rather than the raw binaries. Most packages that are available as a pre-compiled RPM are also available as a SRPM. This can be a simple way to move software across platforms in Linux. When you have success recompiling onto a different platform, consider sharing your finished RPMs with the community.


Back to top


May the source be with you
If you are new to Linux, installing software has a different approach than what you are used to. However, the RPM approach to installation is elegant and provides new power which you will soon grow to appreciate.
You should become familiar with the options for working with rpms from the console, but for daily use there are front-end interface options to make rpms easier to manage. One was provided by your distribution, and others are available, such as the one in Webmin.
You are not limited by pre-compiled rpms, though. You can take advantage of the open source nature of Linux to compile applications directly from the source code. Compiling is generally easy for a mature project. Remember that code installed from source code will not have an entry in your rpm database. When working with source, consider using source rpms, which combine the power of compiled source with the manageability of rpms.


Resources
Check out the other parts in the Windows-to-Linux roadmap series (developerWorks, November 2003).

The IBM developerWorks tutorials LPI certification exam prep are very useful. Part 1 covers Red Hat and Debian package managers as well ascompiling programs from sources and managing shared libraries. Part 2 covers important kernel configuration and in-kernel PCI and USB support.

The IBM developerWorks tutorial Compiling and installing software from sources goes into more depth on unpacking, inspecting, configuring and installing software packages from source code.

Learn more about compiling and installing source code on Linux with the IBM developerWorks feature, Compiling and installing software from sources .

Learn how to create your own packages with the IBM developerWorks features Create Debian Linux packages and Packaging software with RPM.

Learn about an alternative to RPM and Debian's package management solutions in the IBM developerWorks feature Manage packages using Stow.

Regularly upgrading software is an important part of security. Learn how to keep your system up to date quickly and easily with the IBM developerWorks Tip on Upgrading applications from sources.

Learn more about United Linux in this IBM developerWorks feature.

SourceForge is an excellent resource for open source projects; you can add your own projects as well.

The Corewars project is just one of many posted at SourceForge.

The developerWorks Open source zone hosts open-source projects at IBM.

IBM's alphaWorks offers early access to emerging IBM technologies including things like the Web services and Grid toolboxes.

The IBM Speed-start your Linux app 2003 initiative offers a free Linux Software Evaluation Kit (SEK) which includes DB2 Universal Database, WebSphere Application Server, WebSphere Studio Site Developer, WebSphere MQ, Lotus Domino, Tivoli Access Manager -- and more!


About the author
Chris Walden is an e-business Architect for IBM Developer Relations Technical Consulting in Austin, Texas, providing education, enablement, and consulting to IBM Business Partners. He is the official Linux fanatic on his hallway and does his best to spread the good news to all who will hear it. In addition to his architect duties, he manages the area's all-Linux infrastructure servers, which include file, print, and other application services in a mixed-platform user environment. Chris has ten years of experience in the computer industry ranging from field support to Web application development and consulting.



Rate this page
1Windows-to-Linux roadmap: Part 9. Installing softwareLinuxhttp://www.ibm.com/developerworks/thankyou/feedback-thankyou.html1135711112003dwinfo@us.ibm.comfile:///home/client06/Documents/New Folder/Windows-to-Linux roadmap: Part 9. Installing software.htmlhttp://www.ibm.com/developerworks/linux/library/l-roadmap9/
Please take a moment to complete this form to help us better serve you.

Did the information help you to achieve your goal?

Yes YesNo NoDon't know Don't know


Please provide us with comments to help improve this page:



How useful is the information?

1 12 23 34 45 5
Not
useful Extremely
useful
Selengkapnya...

Setup Modem ADSL Speedy Sebagai Bridge di Linux

Telkomspeedy lauching pertama kali di Jember, kota di mana saya bekerja, sekitar bulan Juli 2006. Saat itu saya belum pernah merasakan internet dengan speedy, tahu-tahu diminta bos untuk membantu men-setup modem adsl di Kopegtel (Koperasi Pegawai Telkom) di jalan Kartini. Modemnya merek linksys, tipenya mungkin
ADSL2MUE, pada link tersebut terdapat manual untuk konfigure modem tersebut untuk mode bridge (winxp).Modem ADSL Linksys ADSL2MUE Pertama, saya minta manualnya, kemudian baca2 sebentar dan akhirnya tahu bahwa modem adsl ini berfungsi sebagai router dan bisa dicolokkan langsung ke swicth/hub untuk melayani koneksi internet bagi semua komputer yang terhubung ke swicth/hub, asal fungsi dhcp clientnya diaktifkan.
Berhubung cukup lama mainan iptables di mesin linux, saya coba lihat apakah ada fungsi firewall di modem tsb. Setelah login melalui web configuration, saya lihat banyak sekali fitur yang ditampilkan sampai saya bingung sendiri :-)
Yang pertama saya baca-baca adalah seting koneksi untuk speedy, tidak ada yang saya mengerti di sini :-? , kecuali login speedy dan ini dia fungsi bridge, jadi modemnya bisa berfungsi sebagai bridge mirip modem eksternal yang biasa dipakai untuk dial ke isp. Pokoknya diterima apa adanya dulu deh. Lantas saya lihat fungsi firewall, nah ini dia yang bisa saya otak-atik. Yang diinginkan pertama adalah mencegah icmp dan smtp keluar dari client karena virus brontok suka ping ke domain internet dan mencegah virus dari client kirim email. Selain itu juga saya batasi hanya beberapa ip client yang bisa konek internet. Setelah save dan reboot modem, ternyata hasilnya mengecewakan, beberapa client bisa konek dan ada yang tidak. Saya masih belum tahu salahnya dimana, lagian keisengan setup modem linksys tsb terbatas waktunya karena saya harus balik ke kantor dan lagipula saya tidak mau direpotkan apabila dapat keluhan dari pengguna. Jadi saya balikin deh seting modem tsb ke default.
Sejak saat itu saya terobsesi bagaimana membuat modem adsl bisa jalan sebagai bridge di mesin linux. Khusus modem linksys ADSL2MUE ini rupanya sudah ada driver bridge untuk mesin windows. Kesempatan itu akhirnya datang setelah kantor saya jadi berlangganan speedy, itu pun setelah saya provokasi agar pakai speedy daripada pakai telkomnet instan (tni) yang koneksinya tidak bisa dijamin, sudah konek tapi tidak bisa browsing internet, baru bisa browsing setelah beberapa kali konek :-( . Yang datang ke kantor bawa modem speedy rupanya orang telkom yang dulu saya temui sewaktu di Kopegtel Kartini, karena sudah mengenal saya, dia memberikan saya modem adsl yang masih terbungkus agar disetup sendiri.
Sewaktu dibongkar, ternyata modemnya adalah DareGlobal model DB108-E. Padahal saya pingin dapat yang linksys , alasannya keren karena keluaran Cisco :) . Modem ADSL DareGlobal DB108-ESaya baca sekilas di manualnya bahwa modem ini mempunyai ip default 192.168.1.1, akhirnya server linux yang biasa pakai modem eksternal untuk konek ke tni dikonfigurasikan untuk client modem tsb. Modem dikonekkan ke link adsl dan ke server linux pakai cross cable, terus dinyalakan. Waktu itu saya belum setup login speedy di modemnya, iseng-iseng nge-ping dns telkom, eh kok ternyata tembus, wah dapat koneksi speedy gratis nich :d .
Masa gratisnya cukup lama, dua minggu lebih. Selama itu saya belum sempat mencoba setup modemnya sebagai bridge, keasyikan download macam-macam, mumpung gratis. Akhirnya masa foya-foya lewat sudah sekarang waktunya bekerja. Berikut ini prosedur setup modem adsl DareGlobal untuk mode bridge:
Login ke web configuration modem adsl.
Tampilan pertama kali adalah Device Info seperti gambar di bawah (ini saat mode router dan status konek ke internet):
device info mode router
Tampilan DSL Status seperti pada gambar di bawah:DSL Status Modem ADSL Speedy
Klik WAN akan menampilkan default WAN Setup (mode router), untuk mengubah ke mode bridge, baris yang mengandung Protocol PPPoE dicawang lantas klik tombol Remove:
Wan Setup Modem ADSL DareGlobal
Lalu klik Add akan muncul isian untuk ATM PVC Configuration, isikan seperti contoh di bawah, kemudian klik Next.
VPI:[0-255] 0
VCI:[0-65535] 35
Untuk tipe network protocol pilih Bridging dan untuk encapsulation mode pilih LLC/SNAP-BRIDGING, klik Next.
Beri cawang pada Enable Bridge Service dan kasih nama br_0_35 untuk Service Name, klik Next.
Berikut WAN Setup - Summary seperti pada gambar di bawah, klik Save apabila konfigurasinya sudah benar dan reboot modem adsl-nya:
Wan Setup Summary Modem ADSL DareGlobal
Tampilan WAN Setup (mode bridge) yang baru akan seperti gambar di bawah:
Wan Setup Modem ADSL DareGlobal (mode bridge)

Klik Save dan Reboot modem.
Modem adsl telah selesai disetup sebagai bridge, sekarang kita akan membuat koneksi pppoe di linux. Untuk linux redhat 9, nama paketnya rp-pppoe-3.5-2.rpm, untuk slackware 10.2 rp-pppoe-3.6-i486-1.tgz, jika ingin install dari source silahkan download di RP-PPPoE | Roaring Penguin.
Mungkin ada yang bertanya bagaimana mengakses web configuration modem apabila telah diset mode bridge ? Caranya mudah, untuk ini kita perlu komputer dengan OS windows, install driver yang dibutuhkan untuk koneksi ke modem melalui port usb, kemudian konfigur ip address windows dengan ip addres selain 192.168.1.1. Jadi meski modem tersebut sedang konek ke speedy dan user-user sedang browsing internet kita bisa monitor dsl statusnya.
Selengkapnya...

Setup Linux untuk Speedy

Berikut ini akan saya tulis pengalaman setup linux RedHat 9 untuk koneksi adsl speedy. Modem yang digunakan adalah DareGlobal model DB108-E dan dikonfigur sebagai mode bridge, untuk setup modemnya silahkan baca Setup Modem ADSL Speedy Sebagai Bridge di Linux. Distro linux yang pernah saya coba adalah Redhat 9 dan Slackware 10.2. Untuk koneksi ke modem adsl (bridged mode) menggunakan tool rp-pppoe, dan kebetulan sudah menjadi paket default distro yang disebutkan di atas. Kalau ingin install dari source code, download di sini RP-PPPoE | Roaring Penguin. Pastikan bahwa komputer linux telah diinstall network card, apabila kita ingin meng-sharing koneksi speedy dengan yang lain maka perlu install satu network card lagi. Satu network untuk LAN dan satunya untuk koneksi bridge ke modem adsl speedy. Selanjutnya penamaan network card untuk LAN adalah eth0 dan untuk bridge adalah eth1.
Asumsi linux telah diinstall satu buah network card, dan sekarang kita pasang satu network card lagi. Saat komputer diboot maka kudzu - pastikan kudzu telah jalan sebagai service - secara otomatis akan mendeteksi adanya penambahan hardware baru, lompati atau skip pertanyaan untuk konfigurasi networking. Apabila kudzu gagal mendeteksi, maka lihat devicenya melalui lspci. Contoh nyata adalah kejadian yang saya alami setelah selesai pasang network card 3Com 3c905B, ternyata kudzu gagal mendeteksi dan tampilan dmesg juga tidak menghasilkan deteksi untuk lan card ini, akhirnya saya melihat dengan lspci:
# lspci
00:00.0 Host bridge: VIA Technologies, Inc. P4M266 Host Bridge
00:01.0 PCI bridge: VIA Technologies, Inc. VT8633 [Apollo Pro266 AGP]
00:0a.0 Ethernet controller: 3Com Corporation 3c905B 100BaseTX [Cyclone] (rev 30)
00:10.0 USB Controller: VIA Technologies, Inc. USB (rev 80)
00:10.1 USB Controller: VIA Technologies, Inc. USB (rev 80)
00:10.2 USB Controller: VIA Technologies, Inc. USB (rev 80)
00:10.3 USB Controller: VIA Technologies, Inc. USB 2.0 (rev 82)
00:11.0 ISA bridge: VIA Technologies, Inc. VT8235 ISA Bridge
00:11.1 IDE interface: VIA Technologies, Inc. VT82C586/B/686A/B PIPC Bus Master IDE (rev 06)
00:12.0 Ethernet controller: VIA Technologies, Inc. VT6102 [Rhine-II] (rev 74)
01:00.0 VGA compatible controller: S3 Inc. [ProSavageDDR K4M266]
Terlihat bahwa networknya ada. Sekarang kita mencari driver atau module untuk 3c509B, berdasarkan /usr/src/linux/Documentation/networking/vortex.txt, modulenya adalah 3c59x.o. Sebagian besar lancard sekarang sudah bisa dideteksi dan diload modulenya secara otomatis saat boot, jadi tidak usah khawatir kalau lan cardnya tidak bisa dideteksi. Setelah itu load modulenya dengan modprobe 3c59x (huruf-huruf yang dicetak tebal itu merupakan perintah yang dijalankan root atau argumen yang diisi root di command prompt). Lihat hasilnya dengan lsmod.
# lsmod

3c59x 29488 1 (autoclean)

Saat ini device tersebut belum dikonfigur untuk networking, ini akan dilakukan secara otomatis saat koneksi ke adsl berlangsung. Setelah itu edit file /etc/modules.conf, lihat contoh di bawah:
# cd /etc
# cat modules.conf
alias eth0 via-rhine
alias usb-controller usb-uhci
alias usb-controller1 ehci-hcd
# echo “alias eth1 3c59x” >> modules.conf
Setelah ini kita install paket rp-pppoe dan menjalankan adsl setup untuk koneksi speedy:
Cek apakah rp-pppoe sudah terinstall dengan rpm -qi rp-pppoe, jika belum install dengan rpm -ivh rp-pppoe-3.5-2.rpm
Jalankan adsl-setup:
Pertama kali akan ditanya Login Name, masukkan PPPoE username, misal 1525xxxx@telkom.net
Masukkan eth1 untuk nama device network card yang terhubung ke modem adsl.
Masukkan no untuk demand value.
Untuk informasi dns server, tekan , kita akan mengisinya nanti.
Masukkan PPPoE password.
Untuk USERCTRL masukkan yes agar user biasa bisa start dan stop koneksi dsl.
Masukkan eth1 untuk nama device network card yang terhubung ke modem adsl. Selanjutnya untuk firewall, pilih 0 untuk NONE, kita akan membuat firewall sendiri nanti. Jika kita tidak menginginkan linux start koneksi adsl saat boot time maka tekan untuk no. Ringkasan hasil setup atau konfigurasi adalah sebagai berikut, masukkan y untuk menerima seting ini:
* Summary of what you entered **
Ethernet Interface: eth1
User name: 15250xxxxx@telkom.net
Activate-on-demand: No
DNS: Do not adjust
Firewalling: NONE
User Control: yes
Lihat isi /etc/ppp/pap-secrets
# cd /etc/ppp/
# cat pap-secrets
“15250xxxxx@telkom.net” * “password”
Isi /etc/ppp/chap-secrets sama dengan /etc/ppp/pap-secrets
Untuk menjalankan adsl, perintahnya adalah adsl-start. Apabila dijalankan tanpa argumen, maka adsl-start akan mencari file konfigurasi /etc/sysconfig/network-scripts/ifcfg-ppp0. Kini kita lihat isi konfigurasi /etc/sysconfig/network-scripts/ifcfg-ppp0, untuk penjelasannya bisa man pppoe.conf:
# cat /etc/sysconfig/network-scripts/ifcfg-ppp0
USERCTL=yes
BOOTPROTO=dialup
NAME=DSLppp0
DEVICE=ppp0
TYPE=xDSL
ONBOOT=no
PIDFILE=/var/run/pppoe-adsl.pid
FIREWALL=NONE
PING=.
PPPOE_TIMEOUT=300
LCP_FAILURE=3
LCP_INTERVAL=80
CLAMPMSS=1412
CONNECT_POLL=6
CONNECT_TIMEOUT=30
DEFROUTE=yes
SYNCHRONOUS=no
ETH=eth1
PROVIDER=DSLppp0
USER=15250xxxxx@telkom.net
PEERDNS=no
Masukkan DNS telkom ke /etc/resolv.conf:
# cd /etc
echo “nameserver 202.134.0.155″ >> resolv.conf
echo “nameserver 202.134.1.10″ >> resolv.conf
echo “nameserver 202.134.2.5″ >> resolv.conf
Untuk install name server dan dns caching, penulis biasanya memakai djbdns karena dijamin oleh pembuatnya lebih secure (lihat The djbdns security guarantee), untuk instalasinya kebetulan rekan milis tanya-jawab@linux.or.id telah membuat blog Install and Configure DJBDNS. Jadi untuk menggunakan dns lokal tinggal menjalankan perintah ini echo “nameserver 192.168.0.254″ > /etc/resolv.conf di mana 192.168.0.254 adalah ip address linux server.
Konfigurasikan firewall /etc/rc.d/rc.firewall.ppp0, silahkan download script firewall koneksi adsl speedy. Ubah nama filenya menjadi rc.firewall.ppp0 dan simpan di direktori /etc/rc.d dan lakukan chmod 755 rc.firewall.ppp0. Script firewall ini akan dieksekusi saat konek ke internet.
Buat file /etc/ppp/ip-up.local, lihat contoh di bawah, lakukan chmod 755 /etc/ppp/ip-up.local, script ini akan dieksekusi otomatis sesaat setelah koneksi adsl speedy berhasil.
#!/bin/sh
PATH=/bin:/usr/sbin
echo “1″ > /proc/sys/net/ipv4/ip_forward
echo “1″ > /proc/sys/net/ipv4/ip_dynaddr
# Firewall
/etc/rc.d/rc.firewall.ppp0
# update time
ntpdate id.pool.ntp.org
# kirim email jika sudah konek
date +’%Y-%m-%d %H:%M:%S’ | mail -s “Konek Speedy” root
Buat file /etc/ppp/ip-down.local, lihat contoh di bawah, lakukan chmod 755 /etc/ppp/ip-down.local, script ini akan dieksekusi otomatis sesaat setelah pemutusan koneksi adsl speedy (download file /etc/rc.d/rc.flush, ubah namanya ke rc.flush, jangan lupa untuk chmod 755 /etc/rc.d/rc.flush dahulu):
#!/bin/sh
PATH=/bin:/usr/sbin:/sbin
echo “0″ > /proc/sys/net/ipv4/ip_forward
echo “0″ > /proc/sys/net/ipv4/ip_dynaddr
# flush iptables
/etc/rc.d/rc.flush
# kirim email jika diskonek
date +’%Y-%m-%d %H:%M:%S’ | mail -s “Diskonek Speedy” root
Setelah ini selesai kita bisa mencoba speedy dengan menjalankan adsl-start
Untuk melihat apakah linux sudah konek ke internet kita bisa ping ke dns telkom dengan hostname agar kita bisa mengetahui dnsnya bekerja. Selain itu kita bisa lihat status dari ppp0 dengan ifconfig ppp0, akan terlihat linux sudah memperoleh ip dinamik:
# ping nsjkt1.telkom.net.id
PING nsjkt1.telkom.net.id (202.134.0.155) 56(84) bytes of data.
64 bytes from nsjkt1.telkom.net.id (202.134.0.155): icmp_seq=1 ttl=250 time=76.0 ms
64 bytes from nsjkt1.telkom.net.id (202.134.0.155): icmp_seq=2 ttl=250 time=75.2 ms
— nsjkt1.telkom.net.id ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 1015ms
rtt min/avg/max/mdev = 75.208/75.607/76.006/0.399 ms# ping ns3.telkom.net.id
PING ns3.telkom.net.id (202.134.1.10) 56(84) bytes of data.
64 bytes from ns3.telkom.net.id (202.134.1.10): icmp_seq=1 ttl=251 time=59.4 ms
64 bytes from ns3.telkom.net.id (202.134.1.10): icmp_seq=2 ttl=251 time=62.3 ms
— ns3.telkom.net.id ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 1010ms
rtt min/avg/max/mdev = 59.494/60.934/62.375/1.461 ms
# ping ns2.telkom.net.id
PING ns2.telkom.net.id (202.134.2.5) 56(84) bytes of data.
64 bytes from ns2.telkom.net.id (202.134.2.5): icmp_seq=1 ttl=248 time=77.2 ms
64 bytes from ns2.telkom.net.id (202.134.2.5): icmp_seq=2 ttl=248 time=77.2 ms
— ns2.telkom.net.id ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 1008ms
rtt min/avg/max/mdev = 77.218/77.240/77.263/0.278 ms
# ifconfig ppp0
ppp0 Link encap:Point-to-Point Protocol
inet addr:125.164.241.2 P-t-P:125.164.240.1 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1492 Metric:1
RX packets:7355 errors:0 dropped:0 overruns:0 frame:0
TX packets:7859 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:4765097 (4.5 Mb) TX bytes:688637 (672.4 Kb)
Tentu kita ingat bahwa kita sudah load module lan card (eth1) - tetapi belum konfigur networknya dengan ifconfig - sesaat setelah eksekusi adsl, interface eth1 akan terkonfigur networknya secara otomatis:
# ifconfig eth1
eth1 Link encap:Ethernet HWaddr 00:10:5A:A2:76:F1
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:7929 errors:0 dropped:0 overruns:0 frame:0
TX packets:8431 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:4968164 (4.7 Mb) TX bytes:896249 (875.2 Kb)
Interrupt:5 Base address:0xe080
Log koneksi adsl speedy lebih detail bisa dibaca di /var/log/messages. Untuk memutus koneksi adsl, jalankan perintah adsl-stop.
Agar client-client dalam satu jaringan bisa memanfaatkan koneksi speedy, isi ip gateway dan dns server dengan ip linux.

Selengkapnya...

Cara menginstall Slackware di Linux

Installing software can be confusing. Make this, run that, download this, display that. At first glance, it doesn't make sense. In reality, there are only a few techniques. These techniques are used in different ways, or called in a different order, but once you know the main techniques you can recognize them and make sense of software installation.
Packages
Most Linux distributions use package systems, which contain programs ready for installation and a record of what else those programs rely on.
When a package is installed, the installer checks whether the other files the program will need are present. Each installer handles missing files differently.
There are two major types of packages for Linux systems. .rpm, used by Red Hat Linux and distributions based on Red Hat (such as SuSE and Mandrake); and .deb, used by Debian Linux and distributions based on Debian.
Package managers can also be used to remove or upgrade software.
.rpm and rpm: To install a .rpm on a Linux system that uses rpms, first download the file then use the rpm package manager. The graphical versions are gnorpm for Gnome systems, and KPackage for KDE. If you use neither, the command line version is rpm --install (package file) .
On the command line, run rpm --install --test (package file) to determine which packages are needed by the package you're trying to install, and any other conflicts that the new software may cause. If this shows packages that aren't installed on your system, rpm may need to install those as well.
You can also find out which packages are required with rpm --query --requires -p (package file).
apt, deb and dpkg
deb packages are designed for Debian Linux. The apt system is the simplest way to retrieve and install packages for Debian Linux.
apt: apt is a system for installing packages. It can be used for both types of package, and is primarily used on Debian systems.
To use apt, you need to set up an apt source. On Debian systems, the debian-config program sets up the sources during the installation process. Apt sources are locations where packages and package information can be downloaded. Once you have an apt source set up, the command apt-get install (package name) will install the package for you, and also install anything the package requires.
If you do not know the package name, the command apt-cache search (keywords) will search package names, file names and package descriptions for the keywords; and present a list of matching packages.

$ apt-cache search cervisia
cervisia - KDE based CVS frontend

The command apt-get update will automatically update the source and package lists, and should be used if you want the latest version of a package.
dpkg: The Debian package manager is another way to install .deb packages. dselect is a graphic front end to dpkg, and can be called by running the command dselect from the command line.
dpkg can be run directly from the command line, if desired.
alien: alien will convert one sort of package to the other. It works on rpm (Red Hat), deb (Debian), slp (Stampede), pkg (Solaris) and tgz (archived and compressed) files.
The alien manual explicitly states not to use it for system-critical programs, only for applications.
Unpackaged software
If a program is not packaged, it will usually come as a compressed archive. The archive may contain source code, precompiled binaries, and/or scripts.
All of these will need to be installed before they can be run. Source code will need to be compiled. Precompiled binaries and scripts will just need to be installed into the correct locations.
Scripts need an interpreter to be installed on the system they will run on -- most Linux systems will already have interpreters for the most common scripting languages. Some scripts can be interpreted by a Linux shell.
Preparing the software: Software that isn't in a package is usually in some sort of archive. The most common archiving system is tar. Archives are then usually compressed, with one of the zip family of compression tools.
Download the archive file, and put it in its own directory in /tmp. Then cd to that directory, and run the appropriate un-archive and decompress commands. Run the last extension first, so if a file is called filename.tar.gz, you should ungzip it before you untar it.
Note: While the zip family of tools bear the same name as the Windows zip compression tools, they are only loosely related.
Tarred archives have the file extension .tar. To untar a file, run the command: tar -xvf (file name)
Zipped compressions have the file extension .zip. To unzip a file, run the command: unzip (file name)
Gzipped compressions have the file extension .gz, .Z, .z, .taz and .tgz. To ungzip a file, run the command: gunzip (file name)
Bzipped compressions have the file extensions .bz, .bz2, .tbz or .tbz2. To unbzip a file, run the command: bunzip2 (file name)
There may be other archive formats, or other things to be done before compiling or installing the software. If there is anything unusual to be done, there should be instructions on the site where you found the software, or with the downloaded file.
Compiling: Most developers provide README or INSTALL files in the program archive. These are text files that include instructions on compiling and installing the program.
Linux provides a developer's utility called make. This utility allows the developer to provide a script called a Makefile, which, when run through make, will compile the program automatically. The Makefile can also include installation instructions.
In most cases, change to the directory containing the source code, then run the command make, followed by the command make install. There might also a configure script that needs to be run with ./configure before the make command.

Some software, usually CVS snapshots of open source code, comes without a configure script but with an autogen.sh file. If the documentation is unavailable or unclear, leave this for a more experienced user.
Binaries and scripts: As with compiled software, most developers provide files called README and INSTALL, in the program archive. These files should provide installation instructions. Many programs will have an installation script, that installs the software automatically.
The most common form of installation script uses the program make. These are usually called with the command make install.
Script interpreters: Programs that are distributed as source code, but do not require compilation, are dependent on special programs called interpreters. If the interpreter is not available on your system, the script will not run.
To fix this, install the appropriate interpreter. The most common interpreters are available as both .rpm and .deb packages.
Final Words
These are just general guidelines. If the instructions with the software tell you to do something different, trust those instructions rather than this article. If you have a package manager that you like that works for your distribution, use that.
If the software fails to install on your system and neither the instructions with the software nor this article helped, file a bug report with the maintainer of the software. Include everything they ask for, and be sure to include the distribution and version of your operating system.
Further reading
man and info pages for alien, apt, bzip2, dpkg, dselect, gnorpm, gzip, KPackage, rpm, tar and zip.
The instructions with the software you want to install.
The bug reporting instructions with the software you want to install.
Selengkapnya...

Cara Memilih Laptop

Laptop sepertinya sudah bukan menjadi barang mewah lagi. Mereka yang mobilitasnya tinggi dan sering bepergian, memilih laptop sebagai 'teman sejati' yang menemani setiap pekerjaan mereka kemanapun mereka pergi.

Namun tak sedikit konsumen yang bimbang dan kebingungan saat ingin membeli laptop baru mengingat laptop bukanlah barang murah. Terlebih lagi saat ini bermunculan berbagai jenis laptop dengan beragam spesifikasi dan merk, pun harganya bervariasi. Tak jarang pula konsumen membeli laptop dengan spesifikasi yang 'wah' tanpa memikirkan kegunaannya.

Bagaimana memilih laptop yang sesuai dengan kebutuhan? Simak beberapa tips singkat yang diramu detikINET.

1. Tentukan dulu kegunaannya, apakah laptop akan dipakai untuk disain dan gaming, men-develop sistem, atau mobile.
- Jika laptop dipakai untuk tujuan disain dan gaming, sebaiknya Anda memilih spesifikasi laptop dengan menitikberatkan pada kartu VGA (Video Graphics Array) dan memori yang handal. Jika Anda ingin laptop dengan kemampuan lebih tinggi, memilih teknologi multi-core dan arsitektur 64-bit sangat disarankan.

Untuk penggunaan disain grafis ataupun bermain game, sebaiknya pilih laptop dengan VGA yang tinggi kekuatannya dan memori yang besar agar disain dan bermain game terasa lebih 'ringan'. Kartu VGA sendiri berguna untuk menerjemahkan output komputer ke monitor. Sedangkan memori merupakan sebuat alat penyimpan data digital sementara yang biasanya mempunyai kapasitas ukuran berdasarkan standard bit digital yaitu 16MB, 32MB,64MB, 128MB, 256MB dan seterusnya (kelipatan dua).

- Untuk developing, biasanya dibutuhkan software develop yang membutuhkan resource tinggi. Anda bisa memilih laptop dengan mempertimbangkan prosesor dan memori dengan spesifikasi tinggi agar bisa mengimbangi perkembangan piranti lunak dan developing tools yang kian hari kian 'rakus' memori. Teknologi multi-core dan arsitektur 64-bit juga disarankan.

- Untuk mobile, Anda bisa menekankan pilihan pada umur baterai, berat laptop, ukuran layar, serta beberapa fitur internal konektifitas seperti wifi, bluetooth, IrDA, NetworkCard, Modem.

2. Terlepas dari pemilihan penggunaan, beberapa yang harus dipertimbangkan dalam memilih laptop adalah soal besar layar, berat laptop dan umur baterai. Jika Anda akan sering memakai laptop di perjalanan, sebaiknya pilih laptop yang ringan, dengan ukuran layar yang tidak terlalu besar agar tidak kesulitan membawanya.

Umur baterai juga patut dipertimbangkan. Umumnya baterai laptop paling tidak bisa bertahan 2 hingga 3 jam tanpa terhubung ke adapter. Jika Anda ingin menghemat penggunaan baterai, matikan fungsi konektifitas seperti Wifi atau Bluetooth karena fungsi tersebut akan memperbanyak konsumsi baterai.

3. Pertimbangkan layanan purna jualnya.
Saat hendak membeli laptop, jangan lupa untuk mempertimbangkan layanan purna jualnya mulai dari gerai service (banyak atau tidak, mudah dijangkau atau tidak), ketersediaan spare parts serta harga jual kembali. Jangan memilih laptop yang spare parts-nya sulit dicari. Disarankan, jangan membeli laptop yang spare parts-nya sulit dicari.
Selengkapnya...

Cara Praktis Menghemat Hardisk

Seiring dengan bertambahnya data dan aplikasi yang disimpan, lambat laun “ruang kosong” dalam hard disk tentu akan berkurang. Dan kalau ruang tersebut makin sempit, penggunaan komputer akan dihadapkan pada beberapa pilihan:

* Menambah/mengganti hard disk dengan kapasitas yang lebih besar
* Memback-up data pada CD/media penyimpan yang lain
* Atau menghapus beberapa data atau aplikasi yang sudah ada

Namun disamping cara-cara tersebut diatas, ada cara lain yang dapat dilakukan untuk menghemat pemakaian ruang hard disk, yaitu :

1. Mengggunakan fasilitas kompresi yang kini menjadi fasilitas standar dalam sebuah komputer.
Dengan cara ini ukuran file bisa dipadatkan dan tentu menghemat hard disk. Fasilitas ini bisa didapat dengan mudah lewat internet atau dalam CD perangkat lunak.
2. Menghapus semua file yang ada dalam recycle bin.
Beberapa pengguna Komputer tidak menyadari bahwa data-data yang sudah dihapus dan masuk ke dalam recycle bin masih memiliki ukuran data yang memakan hard disk. Oleh karenanya kalau yakin data dalam recycle bin sudah tidak digunakan lagi, lebih baik dihapus. Kemudian akan lebih baik kalau alokasi untuk tempat sampah ini diatur sedemikian rupa sesuai dengan kebutuhan.
3. Kemudian seringkali komputer membuat file-file baru, misalnya file yang dibuat untuk mengcover ketika komputer hang, crash, atau sekedar memback up saat pengguna membuka sebuah data misalnya dengan extensi*.tmp.
File-file yang sudah tidak diperlukan ini lebih baik dihapus. Dalam sistem operasi Windows, langkah ini bisa dilakukan dengan fasilitas Scandisk.
4. Melakukan defragment secara teratur paling tidak sebulan atau dua bulan sekali menjadi langkah yang dapat dilakukan agar file-file dalam komputer tertata dengan rapi.
Ini memang tidak akan menambah ruang kosong hard disk, namun selain lebih efisien cara ini akan mempercepat akses data.
Selengkapnya...

Cara Menjalankan Account YM secara bersamaan

Hanya dengan cara sederhana Anda bisa menjalankan dua account Yahoo Messager secara bersamaan, hanya dengan sedikit mengedit registry Anda sudah bisa melakukannya, untuk itu ikutilah langka-langkah berikut ini :

1. Start ->Run lalu ketik regedit
2. pilih HKEY_CURRENT_USER/Software/yahoo/pager/Test
3. Klik kanan pilih new -> DWORD value lalu rename menjadi Plural lalu sesudah di rename klik ganda dan kasih value 1

Tutuplah registry editor lalu jalankan YM Anda sesudah login pertama lalu klik ganda icon Ym lagi untuk Login kedua dengan user yang berbeda.
Selengkapnya...

Menjahili Orang Pake Netbus

NetBus merupakan backdoor yang berjalan di sistem operasi Windows 9x dan NT. Dengan Netbus tersebut banyak hal menyenangkan yang bisa Anda lakukan, diantaranya adalah :

1. Membuka dan menutup CD-ROM Drive.
2. Melakukan shut down, log off, reboot dan power off.
3. Mengontrol gerakan mouse dan keyboard.
4. Menutup program.
5. Mengirimkan pesan atau text.
6. Memata-matai komputer “korban”.
7. Mengarahkan komputer “korban” sehingga membuka URL tertentu.

Untuk menjalankan NetBus dibutuhkan 2 buah file, yaitu NetBus.exe dan Patch.exe (tapi nama file tersebut bisa saja diganti dengan nama yang lain). NetBus.exe merupakan file yang diletakkan di komputer kita, sedangkan Patch.exe diletakkan di komputer “korban”.

Ada beberapa cara untuk “menanam” file Patch.exe di komputer “korban”. Misalnya dengan mengirimkan sebagai attachment saat Anda mengirim email. Jika penerima email tersebut mengeksekusi file Patch.exe maka file tersebut akan ter-copy ke directory Windows ( pada komputer “korban”). Cara lain adalah (ini yang lebih asyik) letakkan file tersebut di semua komputer pada suatu warnet.

Jika berhasil Anda tinggal jalankan file NetBus.exe. Pada kolom Host name/IP Address isi dengan host name/ip address pada komputer si “korban”. Kalau Anda bingung, gunakan fasilitas Scan yang akan memeriksa komputer mana saja yang telah terdapat file Patch.exe. Selesai mengisi ip address klik tombol Connect. Tunggu beberapa saat. Jika koneksi berhasil tombol Connect akan berganti menjadi tombol Cancel dan setelah itu Anda bisa melakukan apa yang Anda sukai, termasuk menyadap password email orang lain.

Untuk mendapatkan NetBus Anda bisa mendownloadnya dari HackersClub.

Peringatan :
Gunakan artikel ini untuk menambah pengetahuan Anda. Jangan melakukan hal-hal yang dapat merugikan orang lain.
Selengkapnya...

Zoiper Softphone

ZOIPER SOFTPHONE NOW SUPPORTS T.38 FAX OVER IP

Zoiper 2,0 IAX & SIP softphone (dulunya dikenal sebagai Idefisk) sekarang menyangga T.38 Fax di seberang IP. Zoiper VoIP halus pelanggan, bermaksud bekerja dengan Tanda Aster dan sistem komunikasi yang berbasis di IP yang SESAPAN-cakap dan prasarana.
Zoiper bisa melakukan Jendela, Mac OS X dan Linux.

Click here to buy Zoiper Biz
Zoiper
Softphone - Free Edition Zoiper for Linux
Anda juga bisa mendownload itu untuk:
Zoiper for Windows Zoiper for Mac OS

Untuk menyimpan terbaru dengan paling baru berganti/tambahan di ZoIPer IAX & SIP telepon untuk Linux,
berbunyi klik di sini untuk melihat/bersembunyi kami changelog untuk versi terakhir.
Terakhir version

DownloadVersi Baru ZoIPer 2,02 bagi Linux - 07.02.2008
Zoiper2.02-linux.tar.gz - 4 413 KB
Klik disini untuk melihat/menyembunyikan perintah untuk memasang ZoIPer
DownloadVersi Baru ZoIPer 2,01 bagi Linux - 21.11.2007
Zoiper2.01-linux.tar.gz - 4 180 KB
Klik disini untuk melihat/menyembunyikan perintah untuk memasang ZoIPer.
Selengkapnya...

Installasi di Slackware 1.7

1) Requirements

Semua bungkus anda perlu bisa ditemukan di Slackware memasang cakra.
Untuk mengelola bungkus memakai alat asli Slackware pkgtool dan
installpkg.

Standard compilation tools:

* gcc
* make
* diffutils
* binutils

Required packages for the Asterisk compilation:
* Linux kernel header files.
* bison
* ncurses
* zlib
* openssl
* subversion (optional: if you want the latest source code) - this is missing on Slackware 10.1 and the older versions.

2) mendapat Asterisk

Download tarballs

Pada saat tulisan ini pengeluaran resmi ialah:
Jika anda memerlukan beberapa bungkus ekstra mereka bisa didapatkan dari Situs Web Slackware -> Bungkus bagian, atau anda bisa menggeledah mereka dengan nama - disini.

1,1) Subversi susunan.
Jika anda tidak mempunyai Subversi terpasang, download bungkus Slackware dari sini.

Subversi-1,2,3 memerlukan glibc > = 2,3,3.
Jika Slackware anda ialah versi 10,1 atau lebih hebat ketergantungan ini puas.
Jika tidak, anda bisa menggunakan glibc-2.3.4-i486-1 atau glibc-2.3.6-i486-1

Untuk memasang Subversi dan/atau glibc menggunakan installpkg:
# installpkg subversi-1,2,3-i486-1.tgz
# installpkg glibc-2,3,4-i486-1.tgz atau glibc-2,3,6-i486-1.tgz

2) mendapat Asterisk

Download tarballs

Pada saat tulisan ini pengeluaran resmi ialah:

Asterisk 1.2.4
Zaptel 1.2.3
LibPRI 1.2.2

Karena lebih banyak download berbunyi klik disini
Kode sumber bisa didapatkan juga dari gudang SVN.
Ikuti langkah di bawah:

# mkdir /usr/src/asterisk

# cd /usr/src/asterisk

For the latest SVN Head version:

# svn checkout http://svn.digium.com/svn/libpri/trunk libpri

# svn checkout http://svn.digium.com/svn/zaptel/trunk zaptel

# svn checkout http://svn.digium.com/svn/asterisk/trunk asterisk

For the latest stable version 1.2:

# svn checkout http://svn.digium.com/svn/libpri/branches/1.2 libpri-1.2

# svn checkout http://svn.digium.com/svn/zaptel/branches/1.2 zaptel-1.2

# svn checkout http://svn.digium.com/svn/asterisk/branches/1.2 asterisk-1.2

3) menyusun Asterisk

Silahkan, mengikuti perintah dan membaca dengan cermat petunjuk.
Juga gagasan baik melihat di semua READMEs di masing-masing petunjuk
bungkus.
Jika anda pilih untuk download tarballs, lalu membuat petunjuk berikut:
/usr/src/asterisk
# mkdir /usr/src/asterisk
Dan menaruh tarballs di dalam.
Lalu mendekompres arsip dengan memakai perintah berikut:
# tar zxvf package_name-version.tar.gz

PENTING: mengikuti perintah instalasi ini: 1.Libpri, 2.Zaptel dan
3.Asterisk.
Terlebih dulu menyusun libpri:
# cd /usr/src/asterisk/libpri-1.2.2
# make clean
# make
# make install

Terus dengan zaptel bungkus:
# cd /usr/src/asterisk/zaptel-1.2.3
# make clean
# make linux26 (optional) - if you are using kernel 2.6
# make
# make install

Akhirnya menyusun Asterisk
Apa anda ingin ke optimize himpunan Tanda Aster, melihat di atas Makefile.

Pergi ke petunjuk sumber tanda aster -
# CD /usr/src/asterisk/asterisk-1,2,4

Jika anda sedang memakai VIA motherboards, Tanda Aster mungkin mengetahui pengolah anda sebagai i686 lebih baik daripada i586.
Di kasus ini anda harus untuk menyunting Makefile.
Hilangkan komentar (#) dari garis berikut PROC:
# Pentium & VIA processors optimize
# PROC=i586

Sekarang melaksanakan mengikuti commands:
# membuat clean
# membuat mpg123 (Mengamati: Memasang hanya mpg123 bungkus yang sedang terdapat dengan bungkus Tanda Aster!
(ver.
0.59r) )
# make
# membuat memasang
Jika ini menjadi instalasi pertama anda anda mesti melaksanakan 'sampel buatan' menguasai untuk memasang berkas konfigurasi sampel.
Ada startup naskah bagi Slackware.
Anda bisa menirunya ke dalam/dll/rc.d:

# cp /usr/src/asterisk/contrib/init.d/rc.slackware.asterisk /etc/rc.d/rc.asterisk

4) Idefisk
Idefisk adalah sehelai lamaran grafis.
Oleh sebab itu anda memerlukan server bekerja X dengan suatu manajer jendela dilantik.Misalnya Jembalang atau KDE.

Idefisk mengandalkan GTK (GTK 2,6 atau nanti) dan menepuk perpustakaan.
Oleh sebab itu anda mesti melantik mereka.
Menggunakan installpkg:
# installpkg /path/to/package/pkg-name.tgz

Misalnya, jika anda sandaran 1-St Slackware memasang cakra di/Mnt/cdrom, perpustakaan eks-tepukan di/Mnt/cdrom/slackware/l/petunjuk.
Oleh sebab itu anda bisa melantiknya dengan ini command:
# installpkg /mnt/cdrom/slackware/l/expat-1,95,7-i486-1.tgz

4,1) Download dan Install

Untuk mendapat versi lebih baik Idefisk, silahkan mengikuti hubungan ini.
Untuk instalasi, memakai petunjuk, di mana anda mempunyai hak-hak ke write!.
Di dalam, membuat sub-petunjuk.
Misalnya kami akan memakai petunjuk rumah seorang pemakai biasa Linux.

$ cd ~
$ mkdir idefisk - put the Idefisk archive inside
$ tar zxvf idefisk.tar.gz
$ sudo cp libiaxclient.so /usr/lib
or
$ su <>
# cp libiaxclient.so /usr/lib - you may copy libiaxclient.so in /usr/local/lib if you prefer
# ldconfig
# exit
$ ./idefisk

4,2) kesalahan Mungkin dan solutions

4,2,1) Jika anda mendapat kesalahan like:
"libexpat.so.1: Tak Ada Seperti Itu menyimpan atau petunjuk"
Coba periksa untuk libexpat petunjuk di/usr/lib

# cd /usr/lib
# ls -l libexpat*

Anda harus suka melihat sesuatu :

-rw-r–r– 1 root root 160636 2005-09-09 18:58 libexpat.a
-rw-r–r– 1 root root 706 2005-09-09 18:58 libexpat.la
lrwxrwxrwx 1 root root 17 2006-01-13 12:26 libexpat.so -> libexpat.so.0.5.0
lrwxrwxrwx 1 root root 17 2006-01-13 12:26 libexpat.so.0 -> libexpat.so.0.5.0
-rwxr-xr-x 1 root root 127428 2005-09-09 18:58 libexpat.so.0.5.0

Jika anda tidak mempunyai libexpat.so. <> berbaris, mencoba "lagi" memasang eks-tepukan.

Berikutnya langkah: menciptakan symlink menamai libexpat.so.1 yang mempunyai untuk menunjukkan ke libexpat.so.0.5.0 menyimpan (nomor versi mungkin berbeda).
Untuk melakukan penggunaan ini:
# cd /usr/lib
# ln -s libexpat.so.0.5.0 libexpat.so.1

4,2,2) kesalahan alat Audio
idefisk_dsp_permissions_error.png

atau

idefisk_permission_error2.png

Periksa izin. Menggunakan:
ls -l , /dev/dsp
atau
/dev/mixer

Untuk ditentukan thepermissions alat baik anda menggunakan:
# chmod 660 /dev/dsp
atau
# chmod 666 /dev/dsp

Untuk alat mikser mengganti/dev/dsp dengan/dev/mikser

5) References
Versi Linux Idefisk
Tutor di sekitar Idefisk Softphone
Halaman Tanda Aster resmi
Slackware situs web
Instalasi tanda aster dari luka garukan (oleh astGUIclient kelompok)
Selengkapnya...

Cara Melacak No HP yang Private Number

Untuk Nokia :
Melihat nomor / nomer private number yang menghubungi ponsel anda
Caranya tekan * # 3 0 #, kemudian tekan tombol Call (Warna hijau)
Kode di atas fungsinya untuk memunculkan nomor penelepon dengan private number. Jadi pada lain kali jika nomor tersebut menghubungi anda, anda akan mengetahui peneleponnya, tidak lagi berupa Private Number. Selengkapnya...

Setting GPRS IM3

Khusus untuk operator indosatM3 / IM3 tidak memerlukan pengaktifan pada operator karena sudah aktif sejak awal nomor diaktifkan. Yang anda perlukan hanyalah melakukan konfigurasi dan seting pada handset / handphone anda sehigga bisa terhubung dengan server gprs IM3.
Setting Manual Parameter Untuk Dapat Terhubung Internet GPRS Indosat M3 / IM3 :- Connection name : M3-GPRS- APN / Access point name : www.indosat-m3.net- User name : gprs- Password : im3- Authentication : Normal- Homepage : http://wap.indosat-m3.net- IP address : 010.019.019.019- Port : 9201 (standard), 8080 (proxy)
Setting Otomatis Parameter Melalui SMS Untuk Dapat Terhubung Internet GPRS Indosat M3 / IM3 :- Ketik GPRS[spasi]merk hp[spasi]tipe hpContoh : GPRS NOKIA 6600 atau GPRS SE P800- Kirim ke nomor 3939- Anda akan mendapat sms konfirmasi balasan dari IM3
* operator telepon
Selengkapnya...

Do You Want Audio on Your Website? Consider These Points

Have you been thinking about adding audio to your website? Here are a few things to consider before you do.First, a word of warning...There are several inexpensive programs making the rounds that allow you to record your audio, add background music, even redirect your listener to a different page at the end of the recording. Do they work as promised? Yes, and no. Yes, you can easily produce a very acceptable audio. Getting it to work on your web site is an entirely different matter. You had better be familiar with FTPing and have at least a basic knowledge of HTML, or you can end up wasting days, even weeks, before you are through. For example, what works on Mozilla Firefox doesn't always work on Internet Explorer and visa versa.* Do you really have something to say? Adding audio to your website, just because you can, is like adding extra salt to the soup, just because you have a lot of salt. It may be too much of a good thing.* Don't just read the content on your web page. Use your audio as an introduction to your web site. Use it to emphasize the main points on your so your visitor will have a reason to read the content. Of course, you can do it the other way. Have your audio be the content. This can be very effective on a short squeeze page. Good graphics, a great audio and very little text can FORCE your visitor to listen to you, but you better get it right, orCLICK! They are outta there.* Will an audio message add to your website, or be a distraction? Personally, I like audio-websites, but sometimes they are downright annoying. When some guy is yapping away at me, competing with his own background music, while I am trying to concentrate on the content of his sales letter,CLICK! I'm outta there.* Should you "do it yourself", or should you use a "professional" voice? I want to sound like Hugh Grant. I want to sound as if I never lose my cool, never sweat. Unfortunately, I am a mid-westerner. I have that flat, nasal twang that is common where I come from. When I hear a playback of my voice it reminds me of a gaggle of geese crossing a highway. Is it really that important? Let's just say that I would never hire me to record an audio message. On the other hand, most people don't like the sound of their own voice and while a professional narrator will sound cool, he, or she, will never sound as authentic and personal as you will. When I hear something too slick,CLICK! I'm outta there.So, what should you do?* Use a decent microphone. Used correctly, the mike on your web cam may be good enough. If not, beg, borrow, or buy one. A unidirectional microphone is your best bet. A headset mike, even an inexpensive one, is probably the best choice because, once you get the sound level right, the mike will always be the same distance from your mouth. This will produce a very consistent sound level.* Get the sound level right. Tweak it until it is right. Don't have the volume so high that the listener goes into cardiac arrest, or has to crank the volume up, just to hear you. After you upload your audio, go to your web site and listen to it there. That is where it has to sound right.* Don't have the dog barking, or the baby crying in the background. Don't bump the mike while you are recording. Don't cough into the mike. Don't rattle paper while you are recording. Pay attention to all the little details. They are important.* Use appropriate background music, or none at all. Your visitor wants to hear your message, not your favorite song.* Your message is ALL important. Unless you are accustomed to doing so, don't try to ad-lib. Follow a script, but if your audio sounds too much like you are reading it, try using just an outline and ad-lib the content. Don't try to do it in one take. Do it over and over until you have it right. Got it?CLICK! I'm outta here.Free web design, free audio/video programs and free list building tools are some of the subjects David Hardin covers in his "Write Yourself Rich" program at The Ugly Web Site at http://www.davehardinonline.com Go sign up for his FREE "Not Just A Sales pitch" newsletter.Article Source: http://EzineArticles.com/?expert=David_Hardin Selengkapnya...

Adding Audio to Your Site - "Why" and "How" Answered

For those of you that surf the 'net often, you might be noticing audio clips that are popping up. Some will start playing as soon as you enter a site, and others you are beckoned to click "play" to hear their message.Adding an audio clip to your website gives a personal touch where reading text is hard to portray. It puts a voice to you representing your product or service and can make a big effect on how you are perceived. It assists your website visitors so they can gain a better understanding of what you offer - just as a face-to-face meeting would - having an audio clip helps your web audience build that important relationship with you.Audio also enhances your professional presentation - in most circumstances. In my opinion, having an audio clip (whether it is music or a voice-over) automatically play when a web page is opened is not a good idea. It is forcing the visitor to listen to something they may not have cared to hear and more importantly, it interferes with the music or radio program they are playing while surfing. It is best to provide an invitation to listen to the audio clip when it is appropriate to introduce it in your website content. This way, you are making your visitors feel comfortable and you appear professional and trustworthy at the same time.From a marketing perspective, audio can act as an "attention grabber". You have the ability to guide your website visitor through your site and talk about the product or service you have to offer. The audio clip can also be a powerful motivator to explore and discover your site.There are several ways to utilize audio on your website:*Personal Messages: Add a personal greeting by means of introducing yourself, your products or your services. This is a quick way to capture their attention as opposed to counting on them to read all of the text you have provided. In fact, simply do that - read what you already have written on your site! This will give your visitors a lasting impression once they hear your voice.*Promotional Message: Promote a sale, special give-away, or announce a brand new product you want to let everyone know about. Your passionate message speaking about how much you truly believe in your product or service will be sure to catch people's interest.*Audio Testimonials: Ask your clients to record a quick sound byte for you and post this audio message, along with their name and website address (or contact information) and it becomes a powerful way to tell others of your credibility. Your visitors will be more apt to believe the testimonial if it's attached with a live voice of your client. Your client also wins by giving them some extra exposure of their business.*Audio Instructions: If you offer a product that needs some instruction, provide an audio clip that explains the steps involved. You can accompany it with a picture of what you're talking about. Seeing and hearing how something works is very powerful and will give people the confidence they need to purchase what you have to offer.* Audio Invitation: If you have a free e-newsletter, it's important to try and get as many people to sign up for it as possible - they are your target market just waiting to hear more from you! By using an audio message inviting people to sign and explain what they will get for their efforts (answering the "what's in it for me" question), can be very effective. Be sure to mention that you are giving away a free item to anyone signing up - such as a free article, e-book, or piece of artwork etc - people love receiving something free!How to Put Audio on Your SiteDigital audio can come in many different formats, but the most common and safe format to use is MP3. There are several ways to going about creating these MP3 files - some more expensive than others. I'll detail a few here:*Recording the audio on your home PC: There are lots of audio recording software available for you to install and start recording your message. All you need is a good quality computer microphone, a quiet room and you're good to go. Here are a couple of software suggestions:- Audacity is a free, open source audio software program you download and install yourself.- Web Audio Plus 1.0 is another free software program. I found instructions to use it here: How to put audio on your website- Sony Sound Forge is a software package that you purchase. Sony Sound Forge enables you to create CD tracks and web audio files. You can even capture audio from an analog source and digitize it onto CD's and MP3's.- Internet Audio-Video. These guys offer several different pieces of software in one bundle - which includes creating your own video as well. But be careful making your own video clips, if not done professionally, they could work against you. I'll be talking more about video next month.* Using an on-line service:- BYOAudio is an audio recording service where you can use your computer microphone or call in via the telephone. The MP3 sound clip is produced for you. They have a sale on right now for a 30-day trial for $1 and after that, it costs $19.95 a month.- Audio Generator is also a monthly fee-based audio generating service. Beware - you have to sign up to get any information on them and then it is a very intense marketing campaign you need to endure. I was turned off right away - but that's just me.* Hiring a Professional: With this option, you hire a local audio recording company and go into their studio where they record your voice-over, do edits to make it sound professional and perfect, add some background music and then your audio file is ready to be burned to CD or uploaded to your website.As you can see, there are many options to consider on how to go about adding audio to your website; in my opinion, give the free open source software a try first and see how that works. If you find it's too difficult to manage and you want an easier way, try the services offered. Once you have your audio clip created, simply contact me or your web developer to have it added to your site.PS. The resources mentioned above are sites I have found in my Internet searches - I do not make any guarantees; I'm just sharing my research results and do not endorse any of them personally.Kind regards,Susan Friesen, B.B.A.eVision Media ~ Definitive eBusiness Solutionsevisionmedia.caAbout the Author: Susan is a professional website developer with over eight year's experience in the industry. With a bachelor's degree in Business Administration, concentration in Computer Information Systems, she is able to provide a unique and caring service to her clients not only as a website designer, but also an eBusiness Advisor; assisting individuals, businesses and organizations establish and brand product or service effectively on the World Wide Web. Contact Susan today for your free consultation on building your website presence to the effective marketing tool is can be. susan@evisionmedia.ca or visit http://www.evisionmedia.caArticle Source: http://EzineArticles.com/?expert=Susan_Friesen Selengkapnya...

Tips For Owning Boxer Puppies

Boxer puppies are famous for their energetic and lively nature and are ideal pets for companionship. Not only are they very fond of humans but also are very attentive to their master's commands. But, boxer puppies, like the young ones of most breed of dogs, have a tendency to bite anything and everything. This habit can prove to be very annoying and become cause of nuisance to others. Thus, never leave your boxer puppies unattended in the outdoors. Due to their curious nature and penchant to explore their surroundings, they can either hurt themselves or someone else, unintentionally.In order to ensure the safety your boxer puppies as well as others', it would be helpful to put them in a crate, rather than leave them unsupervised. Put some toys also in the crate, so that they don't get bored. However, you cannot rule out the possibility that they may start biting and chewing on the toys too. If the problem is not checked, the situation can aggravate and the biting may progress and develop into a habitual routine. Biting and chewing clearly point out that your boxer puppies are getting bored and need some exercise. Thus, to keep such disagreeable behavior from developing into a worse problem, make sure that they get enough exercise and attention.Intelligence and smartness are a characteristic trait of all boxer puppies. So, there is no need for you to scold or yell at them. You merely need to provide them with obedience training and teach them the difference between right and wrong at an early age. You need to be firm and consistent when dealing with them. Put the boxer puppies back in the crate, to let them know that this kind of behavior is unacceptable. Doing this every time, he bites will give him an idea that you do not like it. Praise it when he obeys. Boxer puppies love being appreciated and will obey just to see their master happy. Rearing boxer puppies can prove to be quite an expensive affair not only because of their medical expenses, dog treats, toys and food, but also because they require constant attention and care.One word of advice before you get boxer puppies as pets, inquire about their lineage and parents for undesirable traits like extreme shyness, aggression or hyperactivity. This is the best possible way of gaining an insight into what your boxer puppies will grow into and at the same time, will also eliminate the risk of any future problems. Owing to their exuberant nature, it is advisable to socialize and play with your boxer puppies before you start any training session. This tires them a bit and makes for a more cooperative pup. Draining them walking them is another good way of curbing their impulsive tendency. Group obedience training classes are strictly out of the question.Experts suggest using positive reinforcement training techniques for your boxer puppies. This is one of the four types of Operant conditioning. Positive reinforces like dog treats, like toys, stroke or a hug are known to receive better response than training based on corrections.Do you want to know more about training and caring for boxer puppies? If so you will need some basic training tips to get you started. Save your time and energy searching the internet looking for magical solutions and check out my 5 essential training tips (click the blue link). You'll discover some ultra useful tips for training your boxer quickly and easily, and most importantly you'll save time by not having to scour through the junk that's out there! Visit http://www.boxerdogessentials.comArticle Source: http://EzineArticles.com/?expert=Jason_Jr_Rusch Selengkapnya...

Post Nasal Drip - Is Nasal Irrigation a Safe Solution?

Post nasal drip is an unpleasant topic. But if you struggle with it on a regular basis, you'd probably do just about anything for relief. That's certainly how I felt before learning about nasal irrigation. I still experience post nasal drip, but it's nowhere near as terrible as it used to be.Does This Happen to You?Post nasal drip is a nightmare. Those of you who experience it know what I mean. Sometimes it makes you feel like you need to gag or vomit. And when you're trying to sleep, post nasal drip drains down the back of your throat. This often causes a choking sensation that makes it impossible to sleep.You can't swallow it (not that you'd want to) or cough it up easily. Drinking or eating also doesn't dislodge it, but usually makes it feel worse. Post nasal drip just sits in the back of your throat until you find a way to get it out.The good news is this nightmare can have a happy ending. Thanks to nasal irrigation, my post nasal drip isn't a big problem anymore. It still bothers me from time to time, but I've been sleeping much better these days.How Does Nasal Irrigation Relieve Post Nasal Drip?Nasal irrigation rinses excess mucus and gunk out of your sinuses. This in turn reduces post nasal drip.Using a Neti Pot or squirt bottle, you squirt warm water mixed with a saline solution into your nostrils. You have to do one nostril at a time. The water enters your nostril, travels through your nasal passage, and exits the opposite nostril. It's easy, painless, and quick.I rinse at least an hour before going to bed. As a result, I don't suffer with post nasal drip during the night. I also rinse in the morning to help control my chronic sinusitis during the day. Yes, I do experience post nasal drip occasionally. But is it as bad as before? The answer is no.And here's a tip: If you feel yourself about to get a sinus headache, irrigate your sinuses immediately. I find that this helps relieve the pain.Is Nasal Irrigation Safe?Nasal irrigation is safe when done correctly. Like most people, I was afraid to try it at first. I imagined horrible things resulting from squirting water up my nose. Thankfully, I didn't drown or get water stuck in some awful place.My one negative experience was getting water stuck in my inner ear. This was my own fault because I didn't follow instructions. Instead of gently blowing the remaining water from my nose before blowing forcefully, I blew my nose like a foghorn right after the rinse. That was a bad idea. If you follow the instructions, you won't have any problems.After you get past the first-time jitters, nasal irrigation is easy. And it's worth it, especially if you're tired of having your throat clogged with post nasal drip. So if you're tired of sinus problems, give nasal irrigation a try. The results will surprise you.Put an end to your post nasal drip problems. Visit http://nasalirrigationreviews.com to learn how nasal irrigation can provide long-lasting relief.Article Source: http://EzineArticlMempublikasikan Postinges.com/?expert=Michelle_Strait Selengkapnya...
Template by : lismah lismah.blogspot.com