Senin, 22 Maret 2010

Free Downaload Mp3

5'Langit - Dengar.mp3
5'Langit - Ku ingin.mp3
5'Langit - Sayang Edit.mp3
AHMAD DHANI - MADU 3.mp3
Ahmad Dhani - UNDERNEATH THE APPLE TREE.mp3
alvin and the chipmunks - beautiful girls.mp3
Alvin and the Chipmunks - Hula Hoop.mp3
Anang - Separuh Jiwaku Pergi.mp3
Angkasa - Datang Dan Hilang (Seperti Hantu) Promo.mp3
Armada - Ku Ingin Setia.mp3
Armada - Mau Dibawa Kemana.mp3
Asmirandah - SaLahkah Kita.mp3
AVENGED SEVENFOLD - AFTERLIFE.mp3
AVENGED SEVENFOLD - BAT COUNTRY.mp3
AVENGED SEVENFOLD - DEAR GOOD.mp3
AVENGED SEVENFOLD - SCREAM.mp3
AVENGED SEVENFOLD - SECOND HEARTBEAT.MP3
AVENGED SEVENFOLD - UNHOLY COFESSION.mp3
AVENGED SEVENFOLD - UNTIL THE END.mp3
FUNK ROCK JALANAN - FUNK ROCK.mp3
Funky Kopral - Mawarku.mp3
Geisha - Tak Kan Pernah Ada.mp3
Gigi - Ya Ya Ya.mp3
Goliatz - Cinta Monyet.mp3
Goliatz - Masih Disini Masih Denganmu.mp3
Hello - Dua Cincin.mp3
Hey Cantik.MP3
Ipang Feat Ridho Slank - Jadilah Juara (OST Film King).mp3
KOJO - Setitik Hasrat.mp3
Kotak - Terbang (Khayal).mp3
Kotak Band - Berbeda (Sendu).mp3
NaTurAl - Jangan Pergi.mp3
ST 12 - Jangan Takut Menjadi Indonesia.mp3
ST 12 - P.U.S.P.A Putri Iklan.mp3
ST 12 - Sebuah Kenyataan.mp3
ST 12 - Sinar Pahlawanku.mp3
ST 12 - Surga Sudah.mp3
ST 12 ft Sembilan Band - Terlanjur cinta.mp3
Superman Is Dead - Jika Kami Bersama.MP3
The Rock Indonesia - Selir Hati.mp3
TQLA - Jangan Bilang Bilang.mp3
TRIAD - Dunia Lelaki.mp3
Ungu - Cinta Gila.mp3
Ungu - Waktu Yang Dinanti.mp3
Vena - Hilang.mp3
Zigaz - Hidupmu Hidupku.mp3
Zigaz - Sahabat Jadi Cinta.mp3


Selengkapnya...

Windows-to-Linux roadmap: Part 9. Installing software

Using pre-compiled RPMs and compiling applications from source
Level: Introductory
Chris Walden (dwinfo@us.ibm.com), e-business Architect, IBM

11 Nov 2003
IBM e-business architect Chris Walden is your guide through a nine-part developerWorks series on moving your operational skills from a Windows to a Linux environment. He covers everything from logging to networking, and from the command-line to help systems -- even compiling packages from available source code. In this final part, we download and compile a software package, discuss the pros and cons of automated package management, and get to know the RPM system.


One of the first things you notice when you install Linux is that there are so many packages available with your distribution. Most distributions come with the Linux operating system, installation tools, and administration tools. Then they include Internet tools, development tools, office tools, games, and some things that you haven't even heard of. It is not uncommon for a Linux distribution to come with thousands of available packages. If you didn't select "install everything," then some subset of these packages were installed.
Now you may be wondering "How do I remove packages I don't want? How do I install things I missed? Can I use software that didn't come with my distribution?"
RPMs
As Linux installed, you probably noticed a lot of information about RPMs being installed. RPM stands for Redhat Package Manager, a contribution by Redhat that has become a standard for managing software on Redhat and UnitedLinux as well as on many other distributions.
Essentially, an RPM is a package, containing software for Linux ready to install and run on a particular machine architecture. For example, we installed the webmin package from an RPM in "Part 3. Introduction to Webmin." All of the software initially loaded in your distribution was installed from an RPM.
Anatomy of an RPM
An RPM is a package of files. It includes a .spec file, which provides information about the package, its function, and its dependencies (what packages must be in place before it can run). The .spec also contains a manifest of files in the package, where they must be loaded on the system, and what their initial permissions will be. The RPM also contains a pre-install script, which is written by the package developer. Then the RPM contains the compiled binary files. Finally, the RPM contains a post-install script.
RPM layout
.spec pre-install script binary file binary file ... binary file post-install script
When an RPM is installed, the system first looks to see if the dependencies for the package are satisfied. If not, then the installation terminates unless you specify options to force an install anyway.
If all is clear, the pre-install script runs. This script can do anything. Normally it creates users and directories. However, it can do many types of dynamic configuration, even custom-compile source code for the running system.
Know where your RPMs have been

When RPMs install, they copy files onto your system and execute scripts. Since RPM is run as root, all of these functions are performed as root. It is therefore important that you know the origin of an RPM before you install it on your system. Just as with Windows software, malicious code can be contained inside an RPM as easily as any other package. RPMs from the manufacturer are generally safe, but be cautious about randomly downloading and installing things from unknown sources.
If the pre-install script completes successfully, then the binary files are copied onto the system according to the manifest. Once all of the files have been copied and their permissions are set, then the post-install script is run. Again, this script can do almost anything.
Once all of that is completed, the information about the package is added to the RPM database, and the installation is complete. With this simple system, it is possible to perform all of the functions that could be done with a more elaborate commercial installer.
The RPM database
The piece of the RPM that adds elegance is the RPM database. This database typically lives in the /var/lib/rpm directory and holds information about every RPM installed on the system. The database knows the dependency relationships between packages and will warn if removing a package could cause other packages to break. The database knows about every file that was originally installed with a package and its original state on the system. It also knows the locations of the documentation and configuration files for each package. This may sound like a lot of information, and it is. But it isn't bloated and bulky. On a system containing 1,066 packages, comprised of 203,272 files, the database files are only 45 MB! RPM uses the database to check dependencies when packages are loaded and unloaded. Users can also query the database for information on packages.


Back to top


Using RPM
The program to work with RPM packages is appropriately named rpm. rpm runs in several different modes, but the most common tasks are install, upgrade, query, verify, and erase.
rpm -i (install)
When you install a package for the first time, you will use the -i or install mode. Simply point the rpm to a binary package and execute it. The rpm will be installed on your system. Installation normally takes seconds. Often when installing a package, I will add the -v (verbose) switch to provide more information about the process, and the -h (hash bar) switch to provide progress updates via hash (#) marks printed on the console as the package is installed. Here's an example of installing a package:

Listing 1. Installing MyPackage

$ rpm -ivh MyPackage-1.0.0.i386.rpm
Preparing... ########################################### [100%]
1:MyPackage ########################################### [100%]



That's it! MyPackage is now installed and ready to use.
rpm must be run as root

rpm installs and erases must be done as root, because access is required to the file system and the rpm databases.
rpm -e (erase)
To remove an installed package, use the -e switch to erase it. rpm will use the database to remove all of the files for the package. If there are other packages installed that depend on the one you are removing, rpm will abort. You will have to force the erase with the nodeps switch. (nodeps can also be used to force an installation.) Be very careful when using this switch to force an install or erase. Removing packages that others are dependent on can have unfortunate results. Here is the command to remove the package we installed above:
$ rpm -e MyPackage
Notice that the full version of the package is not necessary to remove it. The full name was required at installation because we were pointing to a file name. Installed packages are referenced by their name only. The package's name is everything up to the version number.
rpm -V (verify)
The verify switch is very useful. It compares the current state of a package's files to their original state upon installation. Differences are shown using a code:
Results of verifying files
S File Size differs
M Mode differs (includes permissions and file type)
5 MD5 sum differs
D Device major/minor number mis-match
L readLink(2) path mis-match
U User ownership differs
G Group ownership differs
T mTime differs
If you were to run rpm -V on a package and discover that the size had changed for an executable, that would be a possible sign of a security breach.
rpm -U (upgrade)
Once a package has been installed, any attempt to install a package with the same name will result in a message that the package is already installed. If you want to update a package to a later version, use the -U switch to upgrade. Upgrade has another affect. When upgrade is run on multiple package names, it will try to put the packages in order of dependencies. In other words, required packages will be installed first. The upgrade switch can be used whether or not a package is already installed, so many people use it for installs as well as upgrades instead of using the -i switch. Here is an example of using the upgrade switch to load several rpm packages:

Listing 2. Interactive upgrade

$ rpm -Uvh My*.rpm
Preparing... ########################################### [100%]
1:bMyPackageDep ########################################### [ 50%]
1:aMyPackageNew ########################################### [100%]



In the case above, bMyPackageDep was a prerequisite for aMyPackageNew, so even though the file names sorted in reverse order, rpm ordered them correctly.
rpm -q (query)
Several pieces of useful information can be queried from the rpm database. Queries can be run by any user who has read access to the rpm database. By default, all users have read access. To run a query, use the -q switch with the name of the package to query. This will return the version of the package.
$ rpm -q MyPackage
MyPackage-1.0.0
The name of the package must be exactly correct. Wild cards are not allowed. However, if you cannot remember the full name of a package, you can use the grep tool to help find it. Use the -qa switch to query all installed packages and pipe the information through grep with the text you can remember. For example:
The joy of grep

grep is a text search tool that has a wide variety of uses. By default, grep will search files to show you lines that contain the text you indicate. In our example, we searched for "IBM." grep is a powerful tool in your scripting and console work.
$ rpm -qa | grep IBM
IBMWSAppDev-Product-5.0-0
IBMWSSiteDevExp-Core-5.0-0
IBMWSSiteDev-Core-5.0-0
IBMWSTools-WAS-BASE-V5-5.0-0
IBMJava118-SDK-1.1.8-5.0
IBMWSWB-samples-5.0-0
IBMWSWB-5.0-0
IBMWSAppDev-Core-5.0-0
IBMWSAppDev-5.0-0
IBMWSTools-5.0-0
Besides version numbers, rpm -q can provide other useful information about a package. Here are some examples:
Getting information with an rpm query
rpm -q changelog Shows the development change history for the package
rpm -qc Shows the configuration files for the package
rpm -qd Shows the documentation files for the package
rpm -qi Shows the package description
rpm -ql Shows a list of the package's files
rpm -qR Shows the dependencies for the package
The query also has another interesting command which is run on files rather than packages.
rpm -q whatprovides
The above command will identify the package that is associated with the filename given. The filename must include the absolute path to the file, since that is how the information is stored in the rpm database.


Back to top


RPM front ends
Working with rpm from the console is easy, but sometimes it is more convenient to work with a graphical interface. In typical Linux style, there are front-end programs which provide an interface to the rpm program. Each distribution has a front end, which will vary. Consult your distribution documentation for information about the package management tool provided.


Back to top


Webmin software packages
Webmin also provides a simple Web-based front end for dealing with RPM packages.

Figure 1. Webmin RPM interface
Figure 1. Webmin RPM interface

Software can be easily installed erased and queried from here. Software can also be installed directly from URL sites. If you have rpm enhancement tools installed such as apt or the Redhat Network, Webmin will pick them up and provide an interface to them.


Back to top


Source code
Since Linux is an open source operating system, it comes with all of the development tools required to compile software. While most of the packages that you work with will be provided as binary RPMs, you are not limited to only those packages. If you wish, you can download the raw source code and custom-compile it for your system.
You should be cautious about compiling from source on a production system as it may cause problems or void your support for commercial software which you are using on the system, such as IBM DB2. However, being familiar with compiling from source will allow you to apply patches to software and work with packages ported from other environments. Once you have compiled the code successfully, it is even possible to create your own RPM!


Back to top


Corewars source demonstration
To demonstrate how simple it can be to compile from source, we will compile a simulation game called Corewars (see Resources for a link). Here's a note about Corewars from their Web site: "Corewars is a simulation game where a number of warriors try to crash each other while they are running in a virtual computer. The warriors can be written in one of two assembler-like languages called Corewars and Redcode. Corewars is the default language and is easier to learn and understand. Redcode provides more advanced and powerful instructions but also requires more time to learn."
The first step to compiling from source is to download the source code package from the Web site:
http://prdownloads.sourceforge.net/corewars/corewars-0.9.13.tar.gz?download
Once the code is downloaded, I expand the package.
tar -xvzf corewars-0.9.13.tar.gz
The file is expanded into my current directory. The standard approach is for the source code to be contained in a directory which matches the product name. In this case, it's in a directory called corewars-0.9.13.
I enter into that directory and find the source code, some documentation, configure scripts and README files. Most source packages will come with a file called INSTALL and one called README. You should read these materials before you compile the software. They will usually save you a lot of pain by identifying problems before you have them and advising you of the correct procedures for compiling and installation. Most problems I have had compiling from source were simply because I didn't follow the directions.
The most common next step is to run the configure script. configure is part of the Autoconf package, included with the development tools of your Linux distribution. Quoting Autoconf's package description: "GNU's Autoconf is a tool for configuring source code and Makefiles. Using Autoconf, programmers can create portable and configurable packages, since the person building the package is allowed to specify various configuration options."
The configure script runs a series of tests on the system to determine the best way to compile the package for your distribution and architecture. It then createx a custom Makefile for your system. If there are problems with compiling on your system, configure tells you. configure will usually let you customize the features to be included in the compile, or let you provide parameters about locations of libraries or other needed files so that the package can be compiled successfully. Here we execute configure with no additional parameters:
./configure
Several tests run on the system ultimately end with success. Now build the program using:
make
If the compile has errors, I will need to determine the problems and fix them. This can be non-trivial and may require a good deal of knowledge about your environment and programming in general. If all goes well, we typically install the software with:
make install
The files are copied into the correct areas of the system, file permissions are updated, configuration files are copied and documentation is added to the manual pages.
Now let's test our handiwork by executing the program. It is a graphical program, so you will need to have X running when you start it. The make install which we did above should put the program in our executable path.
corewars
A graphical screen should appear to reward us.

Figure 2. Success!
Figure 2. Corewars game

The topic of corewars rules is outside of the scope of this article, but you will find documentation about this interesting simulation game in the man page (man corewars).
The corewars compile was a typical scenario. There are many possible variations including using switches on the configure script to adjust the features that are compiled into the program, using different commands from the Makefile to adjust how the compile is done, and others.
Since this program was not installed using rpm, there are no entries in the rpm database. If a program doesn't work out after it's been installed, most Makefiles include an uninstall parameter to remove the software:
make uninstall
Bear in mind that working with raw source code does not enter anything into the RPM database. Software installed in this way is unmanaged, so it should be done with care.
Source RPMs
When an RPM is created, there is an artifact called a Source RPM. This is a SPEC file combined with source code designed to build on one or more architectures. This is the best of both worlds! With a source RPM, you can custom compile the software on your system, but the finished product will be an installable RPM rather than the raw binaries. Most packages that are available as a pre-compiled RPM are also available as a SRPM. This can be a simple way to move software across platforms in Linux. When you have success recompiling onto a different platform, consider sharing your finished RPMs with the community.


Back to top


May the source be with you
If you are new to Linux, installing software has a different approach than what you are used to. However, the RPM approach to installation is elegant and provides new power which you will soon grow to appreciate.
You should become familiar with the options for working with rpms from the console, but for daily use there are front-end interface options to make rpms easier to manage. One was provided by your distribution, and others are available, such as the one in Webmin.
You are not limited by pre-compiled rpms, though. You can take advantage of the open source nature of Linux to compile applications directly from the source code. Compiling is generally easy for a mature project. Remember that code installed from source code will not have an entry in your rpm database. When working with source, consider using source rpms, which combine the power of compiled source with the manageability of rpms.


Resources
Check out the other parts in the Windows-to-Linux roadmap series (developerWorks, November 2003).

The IBM developerWorks tutorials LPI certification exam prep are very useful. Part 1 covers Red Hat and Debian package managers as well ascompiling programs from sources and managing shared libraries. Part 2 covers important kernel configuration and in-kernel PCI and USB support.

The IBM developerWorks tutorial Compiling and installing software from sources goes into more depth on unpacking, inspecting, configuring and installing software packages from source code.

Learn more about compiling and installing source code on Linux with the IBM developerWorks feature, Compiling and installing software from sources .

Learn how to create your own packages with the IBM developerWorks features Create Debian Linux packages and Packaging software with RPM.

Learn about an alternative to RPM and Debian's package management solutions in the IBM developerWorks feature Manage packages using Stow.

Regularly upgrading software is an important part of security. Learn how to keep your system up to date quickly and easily with the IBM developerWorks Tip on Upgrading applications from sources.

Learn more about United Linux in this IBM developerWorks feature.

SourceForge is an excellent resource for open source projects; you can add your own projects as well.

The Corewars project is just one of many posted at SourceForge.

The developerWorks Open source zone hosts open-source projects at IBM.

IBM's alphaWorks offers early access to emerging IBM technologies including things like the Web services and Grid toolboxes.

The IBM Speed-start your Linux app 2003 initiative offers a free Linux Software Evaluation Kit (SEK) which includes DB2 Universal Database, WebSphere Application Server, WebSphere Studio Site Developer, WebSphere MQ, Lotus Domino, Tivoli Access Manager -- and more!


About the author
Chris Walden is an e-business Architect for IBM Developer Relations Technical Consulting in Austin, Texas, providing education, enablement, and consulting to IBM Business Partners. He is the official Linux fanatic on his hallway and does his best to spread the good news to all who will hear it. In addition to his architect duties, he manages the area's all-Linux infrastructure servers, which include file, print, and other application services in a mixed-platform user environment. Chris has ten years of experience in the computer industry ranging from field support to Web application development and consulting.



Rate this page
1Windows-to-Linux roadmap: Part 9. Installing softwareLinuxhttp://www.ibm.com/developerworks/thankyou/feedback-thankyou.html1135711112003dwinfo@us.ibm.comfile:///home/client06/Documents/New Folder/Windows-to-Linux roadmap: Part 9. Installing software.htmlhttp://www.ibm.com/developerworks/linux/library/l-roadmap9/
Please take a moment to complete this form to help us better serve you.

Did the information help you to achieve your goal?

Yes YesNo NoDon't know Don't know


Please provide us with comments to help improve this page:



How useful is the information?

1 12 23 34 45 5
Not
useful Extremely
useful
Selengkapnya...

Setup Modem ADSL Speedy Sebagai Bridge di Linux

Telkomspeedy lauching pertama kali di Jember, kota di mana saya bekerja, sekitar bulan Juli 2006. Saat itu saya belum pernah merasakan internet dengan speedy, tahu-tahu diminta bos untuk membantu men-setup modem adsl di Kopegtel (Koperasi Pegawai Telkom) di jalan Kartini. Modemnya merek linksys, tipenya mungkin
ADSL2MUE, pada link tersebut terdapat manual untuk konfigure modem tersebut untuk mode bridge (winxp).Modem ADSL Linksys ADSL2MUE Pertama, saya minta manualnya, kemudian baca2 sebentar dan akhirnya tahu bahwa modem adsl ini berfungsi sebagai router dan bisa dicolokkan langsung ke swicth/hub untuk melayani koneksi internet bagi semua komputer yang terhubung ke swicth/hub, asal fungsi dhcp clientnya diaktifkan.
Berhubung cukup lama mainan iptables di mesin linux, saya coba lihat apakah ada fungsi firewall di modem tsb. Setelah login melalui web configuration, saya lihat banyak sekali fitur yang ditampilkan sampai saya bingung sendiri :-)
Yang pertama saya baca-baca adalah seting koneksi untuk speedy, tidak ada yang saya mengerti di sini :-? , kecuali login speedy dan ini dia fungsi bridge, jadi modemnya bisa berfungsi sebagai bridge mirip modem eksternal yang biasa dipakai untuk dial ke isp. Pokoknya diterima apa adanya dulu deh. Lantas saya lihat fungsi firewall, nah ini dia yang bisa saya otak-atik. Yang diinginkan pertama adalah mencegah icmp dan smtp keluar dari client karena virus brontok suka ping ke domain internet dan mencegah virus dari client kirim email. Selain itu juga saya batasi hanya beberapa ip client yang bisa konek internet. Setelah save dan reboot modem, ternyata hasilnya mengecewakan, beberapa client bisa konek dan ada yang tidak. Saya masih belum tahu salahnya dimana, lagian keisengan setup modem linksys tsb terbatas waktunya karena saya harus balik ke kantor dan lagipula saya tidak mau direpotkan apabila dapat keluhan dari pengguna. Jadi saya balikin deh seting modem tsb ke default.
Sejak saat itu saya terobsesi bagaimana membuat modem adsl bisa jalan sebagai bridge di mesin linux. Khusus modem linksys ADSL2MUE ini rupanya sudah ada driver bridge untuk mesin windows. Kesempatan itu akhirnya datang setelah kantor saya jadi berlangganan speedy, itu pun setelah saya provokasi agar pakai speedy daripada pakai telkomnet instan (tni) yang koneksinya tidak bisa dijamin, sudah konek tapi tidak bisa browsing internet, baru bisa browsing setelah beberapa kali konek :-( . Yang datang ke kantor bawa modem speedy rupanya orang telkom yang dulu saya temui sewaktu di Kopegtel Kartini, karena sudah mengenal saya, dia memberikan saya modem adsl yang masih terbungkus agar disetup sendiri.
Sewaktu dibongkar, ternyata modemnya adalah DareGlobal model DB108-E. Padahal saya pingin dapat yang linksys , alasannya keren karena keluaran Cisco :) . Modem ADSL DareGlobal DB108-ESaya baca sekilas di manualnya bahwa modem ini mempunyai ip default 192.168.1.1, akhirnya server linux yang biasa pakai modem eksternal untuk konek ke tni dikonfigurasikan untuk client modem tsb. Modem dikonekkan ke link adsl dan ke server linux pakai cross cable, terus dinyalakan. Waktu itu saya belum setup login speedy di modemnya, iseng-iseng nge-ping dns telkom, eh kok ternyata tembus, wah dapat koneksi speedy gratis nich :d .
Masa gratisnya cukup lama, dua minggu lebih. Selama itu saya belum sempat mencoba setup modemnya sebagai bridge, keasyikan download macam-macam, mumpung gratis. Akhirnya masa foya-foya lewat sudah sekarang waktunya bekerja. Berikut ini prosedur setup modem adsl DareGlobal untuk mode bridge:
Login ke web configuration modem adsl.
Tampilan pertama kali adalah Device Info seperti gambar di bawah (ini saat mode router dan status konek ke internet):
device info mode router
Tampilan DSL Status seperti pada gambar di bawah:DSL Status Modem ADSL Speedy
Klik WAN akan menampilkan default WAN Setup (mode router), untuk mengubah ke mode bridge, baris yang mengandung Protocol PPPoE dicawang lantas klik tombol Remove:
Wan Setup Modem ADSL DareGlobal
Lalu klik Add akan muncul isian untuk ATM PVC Configuration, isikan seperti contoh di bawah, kemudian klik Next.
VPI:[0-255] 0
VCI:[0-65535] 35
Untuk tipe network protocol pilih Bridging dan untuk encapsulation mode pilih LLC/SNAP-BRIDGING, klik Next.
Beri cawang pada Enable Bridge Service dan kasih nama br_0_35 untuk Service Name, klik Next.
Berikut WAN Setup - Summary seperti pada gambar di bawah, klik Save apabila konfigurasinya sudah benar dan reboot modem adsl-nya:
Wan Setup Summary Modem ADSL DareGlobal
Tampilan WAN Setup (mode bridge) yang baru akan seperti gambar di bawah:
Wan Setup Modem ADSL DareGlobal (mode bridge)

Klik Save dan Reboot modem.
Modem adsl telah selesai disetup sebagai bridge, sekarang kita akan membuat koneksi pppoe di linux. Untuk linux redhat 9, nama paketnya rp-pppoe-3.5-2.rpm, untuk slackware 10.2 rp-pppoe-3.6-i486-1.tgz, jika ingin install dari source silahkan download di RP-PPPoE | Roaring Penguin.
Mungkin ada yang bertanya bagaimana mengakses web configuration modem apabila telah diset mode bridge ? Caranya mudah, untuk ini kita perlu komputer dengan OS windows, install driver yang dibutuhkan untuk koneksi ke modem melalui port usb, kemudian konfigur ip address windows dengan ip addres selain 192.168.1.1. Jadi meski modem tersebut sedang konek ke speedy dan user-user sedang browsing internet kita bisa monitor dsl statusnya.
Selengkapnya...

Setup Linux untuk Speedy

Berikut ini akan saya tulis pengalaman setup linux RedHat 9 untuk koneksi adsl speedy. Modem yang digunakan adalah DareGlobal model DB108-E dan dikonfigur sebagai mode bridge, untuk setup modemnya silahkan baca Setup Modem ADSL Speedy Sebagai Bridge di Linux. Distro linux yang pernah saya coba adalah Redhat 9 dan Slackware 10.2. Untuk koneksi ke modem adsl (bridged mode) menggunakan tool rp-pppoe, dan kebetulan sudah menjadi paket default distro yang disebutkan di atas. Kalau ingin install dari source code, download di sini RP-PPPoE | Roaring Penguin. Pastikan bahwa komputer linux telah diinstall network card, apabila kita ingin meng-sharing koneksi speedy dengan yang lain maka perlu install satu network card lagi. Satu network untuk LAN dan satunya untuk koneksi bridge ke modem adsl speedy. Selanjutnya penamaan network card untuk LAN adalah eth0 dan untuk bridge adalah eth1.
Asumsi linux telah diinstall satu buah network card, dan sekarang kita pasang satu network card lagi. Saat komputer diboot maka kudzu - pastikan kudzu telah jalan sebagai service - secara otomatis akan mendeteksi adanya penambahan hardware baru, lompati atau skip pertanyaan untuk konfigurasi networking. Apabila kudzu gagal mendeteksi, maka lihat devicenya melalui lspci. Contoh nyata adalah kejadian yang saya alami setelah selesai pasang network card 3Com 3c905B, ternyata kudzu gagal mendeteksi dan tampilan dmesg juga tidak menghasilkan deteksi untuk lan card ini, akhirnya saya melihat dengan lspci:
# lspci
00:00.0 Host bridge: VIA Technologies, Inc. P4M266 Host Bridge
00:01.0 PCI bridge: VIA Technologies, Inc. VT8633 [Apollo Pro266 AGP]
00:0a.0 Ethernet controller: 3Com Corporation 3c905B 100BaseTX [Cyclone] (rev 30)
00:10.0 USB Controller: VIA Technologies, Inc. USB (rev 80)
00:10.1 USB Controller: VIA Technologies, Inc. USB (rev 80)
00:10.2 USB Controller: VIA Technologies, Inc. USB (rev 80)
00:10.3 USB Controller: VIA Technologies, Inc. USB 2.0 (rev 82)
00:11.0 ISA bridge: VIA Technologies, Inc. VT8235 ISA Bridge
00:11.1 IDE interface: VIA Technologies, Inc. VT82C586/B/686A/B PIPC Bus Master IDE (rev 06)
00:12.0 Ethernet controller: VIA Technologies, Inc. VT6102 [Rhine-II] (rev 74)
01:00.0 VGA compatible controller: S3 Inc. [ProSavageDDR K4M266]
Terlihat bahwa networknya ada. Sekarang kita mencari driver atau module untuk 3c509B, berdasarkan /usr/src/linux/Documentation/networking/vortex.txt, modulenya adalah 3c59x.o. Sebagian besar lancard sekarang sudah bisa dideteksi dan diload modulenya secara otomatis saat boot, jadi tidak usah khawatir kalau lan cardnya tidak bisa dideteksi. Setelah itu load modulenya dengan modprobe 3c59x (huruf-huruf yang dicetak tebal itu merupakan perintah yang dijalankan root atau argumen yang diisi root di command prompt). Lihat hasilnya dengan lsmod.
# lsmod

3c59x 29488 1 (autoclean)

Saat ini device tersebut belum dikonfigur untuk networking, ini akan dilakukan secara otomatis saat koneksi ke adsl berlangsung. Setelah itu edit file /etc/modules.conf, lihat contoh di bawah:
# cd /etc
# cat modules.conf
alias eth0 via-rhine
alias usb-controller usb-uhci
alias usb-controller1 ehci-hcd
# echo “alias eth1 3c59x” >> modules.conf
Setelah ini kita install paket rp-pppoe dan menjalankan adsl setup untuk koneksi speedy:
Cek apakah rp-pppoe sudah terinstall dengan rpm -qi rp-pppoe, jika belum install dengan rpm -ivh rp-pppoe-3.5-2.rpm
Jalankan adsl-setup:
Pertama kali akan ditanya Login Name, masukkan PPPoE username, misal 1525xxxx@telkom.net
Masukkan eth1 untuk nama device network card yang terhubung ke modem adsl.
Masukkan no untuk demand value.
Untuk informasi dns server, tekan , kita akan mengisinya nanti.
Masukkan PPPoE password.
Untuk USERCTRL masukkan yes agar user biasa bisa start dan stop koneksi dsl.
Masukkan eth1 untuk nama device network card yang terhubung ke modem adsl. Selanjutnya untuk firewall, pilih 0 untuk NONE, kita akan membuat firewall sendiri nanti. Jika kita tidak menginginkan linux start koneksi adsl saat boot time maka tekan untuk no. Ringkasan hasil setup atau konfigurasi adalah sebagai berikut, masukkan y untuk menerima seting ini:
* Summary of what you entered **
Ethernet Interface: eth1
User name: 15250xxxxx@telkom.net
Activate-on-demand: No
DNS: Do not adjust
Firewalling: NONE
User Control: yes
Lihat isi /etc/ppp/pap-secrets
# cd /etc/ppp/
# cat pap-secrets
“15250xxxxx@telkom.net” * “password”
Isi /etc/ppp/chap-secrets sama dengan /etc/ppp/pap-secrets
Untuk menjalankan adsl, perintahnya adalah adsl-start. Apabila dijalankan tanpa argumen, maka adsl-start akan mencari file konfigurasi /etc/sysconfig/network-scripts/ifcfg-ppp0. Kini kita lihat isi konfigurasi /etc/sysconfig/network-scripts/ifcfg-ppp0, untuk penjelasannya bisa man pppoe.conf:
# cat /etc/sysconfig/network-scripts/ifcfg-ppp0
USERCTL=yes
BOOTPROTO=dialup
NAME=DSLppp0
DEVICE=ppp0
TYPE=xDSL
ONBOOT=no
PIDFILE=/var/run/pppoe-adsl.pid
FIREWALL=NONE
PING=.
PPPOE_TIMEOUT=300
LCP_FAILURE=3
LCP_INTERVAL=80
CLAMPMSS=1412
CONNECT_POLL=6
CONNECT_TIMEOUT=30
DEFROUTE=yes
SYNCHRONOUS=no
ETH=eth1
PROVIDER=DSLppp0
USER=15250xxxxx@telkom.net
PEERDNS=no
Masukkan DNS telkom ke /etc/resolv.conf:
# cd /etc
echo “nameserver 202.134.0.155″ >> resolv.conf
echo “nameserver 202.134.1.10″ >> resolv.conf
echo “nameserver 202.134.2.5″ >> resolv.conf
Untuk install name server dan dns caching, penulis biasanya memakai djbdns karena dijamin oleh pembuatnya lebih secure (lihat The djbdns security guarantee), untuk instalasinya kebetulan rekan milis tanya-jawab@linux.or.id telah membuat blog Install and Configure DJBDNS. Jadi untuk menggunakan dns lokal tinggal menjalankan perintah ini echo “nameserver 192.168.0.254″ > /etc/resolv.conf di mana 192.168.0.254 adalah ip address linux server.
Konfigurasikan firewall /etc/rc.d/rc.firewall.ppp0, silahkan download script firewall koneksi adsl speedy. Ubah nama filenya menjadi rc.firewall.ppp0 dan simpan di direktori /etc/rc.d dan lakukan chmod 755 rc.firewall.ppp0. Script firewall ini akan dieksekusi saat konek ke internet.
Buat file /etc/ppp/ip-up.local, lihat contoh di bawah, lakukan chmod 755 /etc/ppp/ip-up.local, script ini akan dieksekusi otomatis sesaat setelah koneksi adsl speedy berhasil.
#!/bin/sh
PATH=/bin:/usr/sbin
echo “1″ > /proc/sys/net/ipv4/ip_forward
echo “1″ > /proc/sys/net/ipv4/ip_dynaddr
# Firewall
/etc/rc.d/rc.firewall.ppp0
# update time
ntpdate id.pool.ntp.org
# kirim email jika sudah konek
date +’%Y-%m-%d %H:%M:%S’ | mail -s “Konek Speedy” root
Buat file /etc/ppp/ip-down.local, lihat contoh di bawah, lakukan chmod 755 /etc/ppp/ip-down.local, script ini akan dieksekusi otomatis sesaat setelah pemutusan koneksi adsl speedy (download file /etc/rc.d/rc.flush, ubah namanya ke rc.flush, jangan lupa untuk chmod 755 /etc/rc.d/rc.flush dahulu):
#!/bin/sh
PATH=/bin:/usr/sbin:/sbin
echo “0″ > /proc/sys/net/ipv4/ip_forward
echo “0″ > /proc/sys/net/ipv4/ip_dynaddr
# flush iptables
/etc/rc.d/rc.flush
# kirim email jika diskonek
date +’%Y-%m-%d %H:%M:%S’ | mail -s “Diskonek Speedy” root
Setelah ini selesai kita bisa mencoba speedy dengan menjalankan adsl-start
Untuk melihat apakah linux sudah konek ke internet kita bisa ping ke dns telkom dengan hostname agar kita bisa mengetahui dnsnya bekerja. Selain itu kita bisa lihat status dari ppp0 dengan ifconfig ppp0, akan terlihat linux sudah memperoleh ip dinamik:
# ping nsjkt1.telkom.net.id
PING nsjkt1.telkom.net.id (202.134.0.155) 56(84) bytes of data.
64 bytes from nsjkt1.telkom.net.id (202.134.0.155): icmp_seq=1 ttl=250 time=76.0 ms
64 bytes from nsjkt1.telkom.net.id (202.134.0.155): icmp_seq=2 ttl=250 time=75.2 ms
— nsjkt1.telkom.net.id ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 1015ms
rtt min/avg/max/mdev = 75.208/75.607/76.006/0.399 ms# ping ns3.telkom.net.id
PING ns3.telkom.net.id (202.134.1.10) 56(84) bytes of data.
64 bytes from ns3.telkom.net.id (202.134.1.10): icmp_seq=1 ttl=251 time=59.4 ms
64 bytes from ns3.telkom.net.id (202.134.1.10): icmp_seq=2 ttl=251 time=62.3 ms
— ns3.telkom.net.id ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 1010ms
rtt min/avg/max/mdev = 59.494/60.934/62.375/1.461 ms
# ping ns2.telkom.net.id
PING ns2.telkom.net.id (202.134.2.5) 56(84) bytes of data.
64 bytes from ns2.telkom.net.id (202.134.2.5): icmp_seq=1 ttl=248 time=77.2 ms
64 bytes from ns2.telkom.net.id (202.134.2.5): icmp_seq=2 ttl=248 time=77.2 ms
— ns2.telkom.net.id ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 1008ms
rtt min/avg/max/mdev = 77.218/77.240/77.263/0.278 ms
# ifconfig ppp0
ppp0 Link encap:Point-to-Point Protocol
inet addr:125.164.241.2 P-t-P:125.164.240.1 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1492 Metric:1
RX packets:7355 errors:0 dropped:0 overruns:0 frame:0
TX packets:7859 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:4765097 (4.5 Mb) TX bytes:688637 (672.4 Kb)
Tentu kita ingat bahwa kita sudah load module lan card (eth1) - tetapi belum konfigur networknya dengan ifconfig - sesaat setelah eksekusi adsl, interface eth1 akan terkonfigur networknya secara otomatis:
# ifconfig eth1
eth1 Link encap:Ethernet HWaddr 00:10:5A:A2:76:F1
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:7929 errors:0 dropped:0 overruns:0 frame:0
TX packets:8431 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:4968164 (4.7 Mb) TX bytes:896249 (875.2 Kb)
Interrupt:5 Base address:0xe080
Log koneksi adsl speedy lebih detail bisa dibaca di /var/log/messages. Untuk memutus koneksi adsl, jalankan perintah adsl-stop.
Agar client-client dalam satu jaringan bisa memanfaatkan koneksi speedy, isi ip gateway dan dns server dengan ip linux.

Selengkapnya...

Cara menginstall Slackware di Linux

Installing software can be confusing. Make this, run that, download this, display that. At first glance, it doesn't make sense. In reality, there are only a few techniques. These techniques are used in different ways, or called in a different order, but once you know the main techniques you can recognize them and make sense of software installation.
Packages
Most Linux distributions use package systems, which contain programs ready for installation and a record of what else those programs rely on.
When a package is installed, the installer checks whether the other files the program will need are present. Each installer handles missing files differently.
There are two major types of packages for Linux systems. .rpm, used by Red Hat Linux and distributions based on Red Hat (such as SuSE and Mandrake); and .deb, used by Debian Linux and distributions based on Debian.
Package managers can also be used to remove or upgrade software.
.rpm and rpm: To install a .rpm on a Linux system that uses rpms, first download the file then use the rpm package manager. The graphical versions are gnorpm for Gnome systems, and KPackage for KDE. If you use neither, the command line version is rpm --install (package file) .
On the command line, run rpm --install --test (package file) to determine which packages are needed by the package you're trying to install, and any other conflicts that the new software may cause. If this shows packages that aren't installed on your system, rpm may need to install those as well.
You can also find out which packages are required with rpm --query --requires -p (package file).
apt, deb and dpkg
deb packages are designed for Debian Linux. The apt system is the simplest way to retrieve and install packages for Debian Linux.
apt: apt is a system for installing packages. It can be used for both types of package, and is primarily used on Debian systems.
To use apt, you need to set up an apt source. On Debian systems, the debian-config program sets up the sources during the installation process. Apt sources are locations where packages and package information can be downloaded. Once you have an apt source set up, the command apt-get install (package name) will install the package for you, and also install anything the package requires.
If you do not know the package name, the command apt-cache search (keywords) will search package names, file names and package descriptions for the keywords; and present a list of matching packages.

$ apt-cache search cervisia
cervisia - KDE based CVS frontend

The command apt-get update will automatically update the source and package lists, and should be used if you want the latest version of a package.
dpkg: The Debian package manager is another way to install .deb packages. dselect is a graphic front end to dpkg, and can be called by running the command dselect from the command line.
dpkg can be run directly from the command line, if desired.
alien: alien will convert one sort of package to the other. It works on rpm (Red Hat), deb (Debian), slp (Stampede), pkg (Solaris) and tgz (archived and compressed) files.
The alien manual explicitly states not to use it for system-critical programs, only for applications.
Unpackaged software
If a program is not packaged, it will usually come as a compressed archive. The archive may contain source code, precompiled binaries, and/or scripts.
All of these will need to be installed before they can be run. Source code will need to be compiled. Precompiled binaries and scripts will just need to be installed into the correct locations.
Scripts need an interpreter to be installed on the system they will run on -- most Linux systems will already have interpreters for the most common scripting languages. Some scripts can be interpreted by a Linux shell.
Preparing the software: Software that isn't in a package is usually in some sort of archive. The most common archiving system is tar. Archives are then usually compressed, with one of the zip family of compression tools.
Download the archive file, and put it in its own directory in /tmp. Then cd to that directory, and run the appropriate un-archive and decompress commands. Run the last extension first, so if a file is called filename.tar.gz, you should ungzip it before you untar it.
Note: While the zip family of tools bear the same name as the Windows zip compression tools, they are only loosely related.
Tarred archives have the file extension .tar. To untar a file, run the command: tar -xvf (file name)
Zipped compressions have the file extension .zip. To unzip a file, run the command: unzip (file name)
Gzipped compressions have the file extension .gz, .Z, .z, .taz and .tgz. To ungzip a file, run the command: gunzip (file name)
Bzipped compressions have the file extensions .bz, .bz2, .tbz or .tbz2. To unbzip a file, run the command: bunzip2 (file name)
There may be other archive formats, or other things to be done before compiling or installing the software. If there is anything unusual to be done, there should be instructions on the site where you found the software, or with the downloaded file.
Compiling: Most developers provide README or INSTALL files in the program archive. These are text files that include instructions on compiling and installing the program.
Linux provides a developer's utility called make. This utility allows the developer to provide a script called a Makefile, which, when run through make, will compile the program automatically. The Makefile can also include installation instructions.
In most cases, change to the directory containing the source code, then run the command make, followed by the command make install. There might also a configure script that needs to be run with ./configure before the make command.

Some software, usually CVS snapshots of open source code, comes without a configure script but with an autogen.sh file. If the documentation is unavailable or unclear, leave this for a more experienced user.
Binaries and scripts: As with compiled software, most developers provide files called README and INSTALL, in the program archive. These files should provide installation instructions. Many programs will have an installation script, that installs the software automatically.
The most common form of installation script uses the program make. These are usually called with the command make install.
Script interpreters: Programs that are distributed as source code, but do not require compilation, are dependent on special programs called interpreters. If the interpreter is not available on your system, the script will not run.
To fix this, install the appropriate interpreter. The most common interpreters are available as both .rpm and .deb packages.
Final Words
These are just general guidelines. If the instructions with the software tell you to do something different, trust those instructions rather than this article. If you have a package manager that you like that works for your distribution, use that.
If the software fails to install on your system and neither the instructions with the software nor this article helped, file a bug report with the maintainer of the software. Include everything they ask for, and be sure to include the distribution and version of your operating system.
Further reading
man and info pages for alien, apt, bzip2, dpkg, dselect, gnorpm, gzip, KPackage, rpm, tar and zip.
The instructions with the software you want to install.
The bug reporting instructions with the software you want to install.
Selengkapnya...

Cara Memilih Laptop

Laptop sepertinya sudah bukan menjadi barang mewah lagi. Mereka yang mobilitasnya tinggi dan sering bepergian, memilih laptop sebagai 'teman sejati' yang menemani setiap pekerjaan mereka kemanapun mereka pergi.

Namun tak sedikit konsumen yang bimbang dan kebingungan saat ingin membeli laptop baru mengingat laptop bukanlah barang murah. Terlebih lagi saat ini bermunculan berbagai jenis laptop dengan beragam spesifikasi dan merk, pun harganya bervariasi. Tak jarang pula konsumen membeli laptop dengan spesifikasi yang 'wah' tanpa memikirkan kegunaannya.

Bagaimana memilih laptop yang sesuai dengan kebutuhan? Simak beberapa tips singkat yang diramu detikINET.

1. Tentukan dulu kegunaannya, apakah laptop akan dipakai untuk disain dan gaming, men-develop sistem, atau mobile.
- Jika laptop dipakai untuk tujuan disain dan gaming, sebaiknya Anda memilih spesifikasi laptop dengan menitikberatkan pada kartu VGA (Video Graphics Array) dan memori yang handal. Jika Anda ingin laptop dengan kemampuan lebih tinggi, memilih teknologi multi-core dan arsitektur 64-bit sangat disarankan.

Untuk penggunaan disain grafis ataupun bermain game, sebaiknya pilih laptop dengan VGA yang tinggi kekuatannya dan memori yang besar agar disain dan bermain game terasa lebih 'ringan'. Kartu VGA sendiri berguna untuk menerjemahkan output komputer ke monitor. Sedangkan memori merupakan sebuat alat penyimpan data digital sementara yang biasanya mempunyai kapasitas ukuran berdasarkan standard bit digital yaitu 16MB, 32MB,64MB, 128MB, 256MB dan seterusnya (kelipatan dua).

- Untuk developing, biasanya dibutuhkan software develop yang membutuhkan resource tinggi. Anda bisa memilih laptop dengan mempertimbangkan prosesor dan memori dengan spesifikasi tinggi agar bisa mengimbangi perkembangan piranti lunak dan developing tools yang kian hari kian 'rakus' memori. Teknologi multi-core dan arsitektur 64-bit juga disarankan.

- Untuk mobile, Anda bisa menekankan pilihan pada umur baterai, berat laptop, ukuran layar, serta beberapa fitur internal konektifitas seperti wifi, bluetooth, IrDA, NetworkCard, Modem.

2. Terlepas dari pemilihan penggunaan, beberapa yang harus dipertimbangkan dalam memilih laptop adalah soal besar layar, berat laptop dan umur baterai. Jika Anda akan sering memakai laptop di perjalanan, sebaiknya pilih laptop yang ringan, dengan ukuran layar yang tidak terlalu besar agar tidak kesulitan membawanya.

Umur baterai juga patut dipertimbangkan. Umumnya baterai laptop paling tidak bisa bertahan 2 hingga 3 jam tanpa terhubung ke adapter. Jika Anda ingin menghemat penggunaan baterai, matikan fungsi konektifitas seperti Wifi atau Bluetooth karena fungsi tersebut akan memperbanyak konsumsi baterai.

3. Pertimbangkan layanan purna jualnya.
Saat hendak membeli laptop, jangan lupa untuk mempertimbangkan layanan purna jualnya mulai dari gerai service (banyak atau tidak, mudah dijangkau atau tidak), ketersediaan spare parts serta harga jual kembali. Jangan memilih laptop yang spare parts-nya sulit dicari. Disarankan, jangan membeli laptop yang spare parts-nya sulit dicari.
Selengkapnya...

Cara Praktis Menghemat Hardisk

Seiring dengan bertambahnya data dan aplikasi yang disimpan, lambat laun “ruang kosong” dalam hard disk tentu akan berkurang. Dan kalau ruang tersebut makin sempit, penggunaan komputer akan dihadapkan pada beberapa pilihan:

* Menambah/mengganti hard disk dengan kapasitas yang lebih besar
* Memback-up data pada CD/media penyimpan yang lain
* Atau menghapus beberapa data atau aplikasi yang sudah ada

Namun disamping cara-cara tersebut diatas, ada cara lain yang dapat dilakukan untuk menghemat pemakaian ruang hard disk, yaitu :

1. Mengggunakan fasilitas kompresi yang kini menjadi fasilitas standar dalam sebuah komputer.
Dengan cara ini ukuran file bisa dipadatkan dan tentu menghemat hard disk. Fasilitas ini bisa didapat dengan mudah lewat internet atau dalam CD perangkat lunak.
2. Menghapus semua file yang ada dalam recycle bin.
Beberapa pengguna Komputer tidak menyadari bahwa data-data yang sudah dihapus dan masuk ke dalam recycle bin masih memiliki ukuran data yang memakan hard disk. Oleh karenanya kalau yakin data dalam recycle bin sudah tidak digunakan lagi, lebih baik dihapus. Kemudian akan lebih baik kalau alokasi untuk tempat sampah ini diatur sedemikian rupa sesuai dengan kebutuhan.
3. Kemudian seringkali komputer membuat file-file baru, misalnya file yang dibuat untuk mengcover ketika komputer hang, crash, atau sekedar memback up saat pengguna membuka sebuah data misalnya dengan extensi*.tmp.
File-file yang sudah tidak diperlukan ini lebih baik dihapus. Dalam sistem operasi Windows, langkah ini bisa dilakukan dengan fasilitas Scandisk.
4. Melakukan defragment secara teratur paling tidak sebulan atau dua bulan sekali menjadi langkah yang dapat dilakukan agar file-file dalam komputer tertata dengan rapi.
Ini memang tidak akan menambah ruang kosong hard disk, namun selain lebih efisien cara ini akan mempercepat akses data.
Selengkapnya...

Cara Menjalankan Account YM secara bersamaan

Hanya dengan cara sederhana Anda bisa menjalankan dua account Yahoo Messager secara bersamaan, hanya dengan sedikit mengedit registry Anda sudah bisa melakukannya, untuk itu ikutilah langka-langkah berikut ini :

1. Start ->Run lalu ketik regedit
2. pilih HKEY_CURRENT_USER/Software/yahoo/pager/Test
3. Klik kanan pilih new -> DWORD value lalu rename menjadi Plural lalu sesudah di rename klik ganda dan kasih value 1

Tutuplah registry editor lalu jalankan YM Anda sesudah login pertama lalu klik ganda icon Ym lagi untuk Login kedua dengan user yang berbeda.
Selengkapnya...

Menjahili Orang Pake Netbus

NetBus merupakan backdoor yang berjalan di sistem operasi Windows 9x dan NT. Dengan Netbus tersebut banyak hal menyenangkan yang bisa Anda lakukan, diantaranya adalah :

1. Membuka dan menutup CD-ROM Drive.
2. Melakukan shut down, log off, reboot dan power off.
3. Mengontrol gerakan mouse dan keyboard.
4. Menutup program.
5. Mengirimkan pesan atau text.
6. Memata-matai komputer “korban”.
7. Mengarahkan komputer “korban” sehingga membuka URL tertentu.

Untuk menjalankan NetBus dibutuhkan 2 buah file, yaitu NetBus.exe dan Patch.exe (tapi nama file tersebut bisa saja diganti dengan nama yang lain). NetBus.exe merupakan file yang diletakkan di komputer kita, sedangkan Patch.exe diletakkan di komputer “korban”.

Ada beberapa cara untuk “menanam” file Patch.exe di komputer “korban”. Misalnya dengan mengirimkan sebagai attachment saat Anda mengirim email. Jika penerima email tersebut mengeksekusi file Patch.exe maka file tersebut akan ter-copy ke directory Windows ( pada komputer “korban”). Cara lain adalah (ini yang lebih asyik) letakkan file tersebut di semua komputer pada suatu warnet.

Jika berhasil Anda tinggal jalankan file NetBus.exe. Pada kolom Host name/IP Address isi dengan host name/ip address pada komputer si “korban”. Kalau Anda bingung, gunakan fasilitas Scan yang akan memeriksa komputer mana saja yang telah terdapat file Patch.exe. Selesai mengisi ip address klik tombol Connect. Tunggu beberapa saat. Jika koneksi berhasil tombol Connect akan berganti menjadi tombol Cancel dan setelah itu Anda bisa melakukan apa yang Anda sukai, termasuk menyadap password email orang lain.

Untuk mendapatkan NetBus Anda bisa mendownloadnya dari HackersClub.

Peringatan :
Gunakan artikel ini untuk menambah pengetahuan Anda. Jangan melakukan hal-hal yang dapat merugikan orang lain.
Selengkapnya...

Zoiper Softphone

ZOIPER SOFTPHONE NOW SUPPORTS T.38 FAX OVER IP

Zoiper 2,0 IAX & SIP softphone (dulunya dikenal sebagai Idefisk) sekarang menyangga T.38 Fax di seberang IP. Zoiper VoIP halus pelanggan, bermaksud bekerja dengan Tanda Aster dan sistem komunikasi yang berbasis di IP yang SESAPAN-cakap dan prasarana.
Zoiper bisa melakukan Jendela, Mac OS X dan Linux.

Click here to buy Zoiper Biz
Zoiper
Softphone - Free Edition Zoiper for Linux
Anda juga bisa mendownload itu untuk:
Zoiper for Windows Zoiper for Mac OS

Untuk menyimpan terbaru dengan paling baru berganti/tambahan di ZoIPer IAX & SIP telepon untuk Linux,
berbunyi klik di sini untuk melihat/bersembunyi kami changelog untuk versi terakhir.
Terakhir version

DownloadVersi Baru ZoIPer 2,02 bagi Linux - 07.02.2008
Zoiper2.02-linux.tar.gz - 4 413 KB
Klik disini untuk melihat/menyembunyikan perintah untuk memasang ZoIPer
DownloadVersi Baru ZoIPer 2,01 bagi Linux - 21.11.2007
Zoiper2.01-linux.tar.gz - 4 180 KB
Klik disini untuk melihat/menyembunyikan perintah untuk memasang ZoIPer.
Selengkapnya...

Installasi di Slackware 1.7

1) Requirements

Semua bungkus anda perlu bisa ditemukan di Slackware memasang cakra.
Untuk mengelola bungkus memakai alat asli Slackware pkgtool dan
installpkg.

Standard compilation tools:

* gcc
* make
* diffutils
* binutils

Required packages for the Asterisk compilation:
* Linux kernel header files.
* bison
* ncurses
* zlib
* openssl
* subversion (optional: if you want the latest source code) - this is missing on Slackware 10.1 and the older versions.

2) mendapat Asterisk

Download tarballs

Pada saat tulisan ini pengeluaran resmi ialah:
Jika anda memerlukan beberapa bungkus ekstra mereka bisa didapatkan dari Situs Web Slackware -> Bungkus bagian, atau anda bisa menggeledah mereka dengan nama - disini.

1,1) Subversi susunan.
Jika anda tidak mempunyai Subversi terpasang, download bungkus Slackware dari sini.

Subversi-1,2,3 memerlukan glibc > = 2,3,3.
Jika Slackware anda ialah versi 10,1 atau lebih hebat ketergantungan ini puas.
Jika tidak, anda bisa menggunakan glibc-2.3.4-i486-1 atau glibc-2.3.6-i486-1

Untuk memasang Subversi dan/atau glibc menggunakan installpkg:
# installpkg subversi-1,2,3-i486-1.tgz
# installpkg glibc-2,3,4-i486-1.tgz atau glibc-2,3,6-i486-1.tgz

2) mendapat Asterisk

Download tarballs

Pada saat tulisan ini pengeluaran resmi ialah:

Asterisk 1.2.4
Zaptel 1.2.3
LibPRI 1.2.2

Karena lebih banyak download berbunyi klik disini
Kode sumber bisa didapatkan juga dari gudang SVN.
Ikuti langkah di bawah:

# mkdir /usr/src/asterisk

# cd /usr/src/asterisk

For the latest SVN Head version:

# svn checkout http://svn.digium.com/svn/libpri/trunk libpri

# svn checkout http://svn.digium.com/svn/zaptel/trunk zaptel

# svn checkout http://svn.digium.com/svn/asterisk/trunk asterisk

For the latest stable version 1.2:

# svn checkout http://svn.digium.com/svn/libpri/branches/1.2 libpri-1.2

# svn checkout http://svn.digium.com/svn/zaptel/branches/1.2 zaptel-1.2

# svn checkout http://svn.digium.com/svn/asterisk/branches/1.2 asterisk-1.2

3) menyusun Asterisk

Silahkan, mengikuti perintah dan membaca dengan cermat petunjuk.
Juga gagasan baik melihat di semua READMEs di masing-masing petunjuk
bungkus.
Jika anda pilih untuk download tarballs, lalu membuat petunjuk berikut:
/usr/src/asterisk
# mkdir /usr/src/asterisk
Dan menaruh tarballs di dalam.
Lalu mendekompres arsip dengan memakai perintah berikut:
# tar zxvf package_name-version.tar.gz

PENTING: mengikuti perintah instalasi ini: 1.Libpri, 2.Zaptel dan
3.Asterisk.
Terlebih dulu menyusun libpri:
# cd /usr/src/asterisk/libpri-1.2.2
# make clean
# make
# make install

Terus dengan zaptel bungkus:
# cd /usr/src/asterisk/zaptel-1.2.3
# make clean
# make linux26 (optional) - if you are using kernel 2.6
# make
# make install

Akhirnya menyusun Asterisk
Apa anda ingin ke optimize himpunan Tanda Aster, melihat di atas Makefile.

Pergi ke petunjuk sumber tanda aster -
# CD /usr/src/asterisk/asterisk-1,2,4

Jika anda sedang memakai VIA motherboards, Tanda Aster mungkin mengetahui pengolah anda sebagai i686 lebih baik daripada i586.
Di kasus ini anda harus untuk menyunting Makefile.
Hilangkan komentar (#) dari garis berikut PROC:
# Pentium & VIA processors optimize
# PROC=i586

Sekarang melaksanakan mengikuti commands:
# membuat clean
# membuat mpg123 (Mengamati: Memasang hanya mpg123 bungkus yang sedang terdapat dengan bungkus Tanda Aster!
(ver.
0.59r) )
# make
# membuat memasang
Jika ini menjadi instalasi pertama anda anda mesti melaksanakan 'sampel buatan' menguasai untuk memasang berkas konfigurasi sampel.
Ada startup naskah bagi Slackware.
Anda bisa menirunya ke dalam/dll/rc.d:

# cp /usr/src/asterisk/contrib/init.d/rc.slackware.asterisk /etc/rc.d/rc.asterisk

4) Idefisk
Idefisk adalah sehelai lamaran grafis.
Oleh sebab itu anda memerlukan server bekerja X dengan suatu manajer jendela dilantik.Misalnya Jembalang atau KDE.

Idefisk mengandalkan GTK (GTK 2,6 atau nanti) dan menepuk perpustakaan.
Oleh sebab itu anda mesti melantik mereka.
Menggunakan installpkg:
# installpkg /path/to/package/pkg-name.tgz

Misalnya, jika anda sandaran 1-St Slackware memasang cakra di/Mnt/cdrom, perpustakaan eks-tepukan di/Mnt/cdrom/slackware/l/petunjuk.
Oleh sebab itu anda bisa melantiknya dengan ini command:
# installpkg /mnt/cdrom/slackware/l/expat-1,95,7-i486-1.tgz

4,1) Download dan Install

Untuk mendapat versi lebih baik Idefisk, silahkan mengikuti hubungan ini.
Untuk instalasi, memakai petunjuk, di mana anda mempunyai hak-hak ke write!.
Di dalam, membuat sub-petunjuk.
Misalnya kami akan memakai petunjuk rumah seorang pemakai biasa Linux.

$ cd ~
$ mkdir idefisk - put the Idefisk archive inside
$ tar zxvf idefisk.tar.gz
$ sudo cp libiaxclient.so /usr/lib
or
$ su <>
# cp libiaxclient.so /usr/lib - you may copy libiaxclient.so in /usr/local/lib if you prefer
# ldconfig
# exit
$ ./idefisk

4,2) kesalahan Mungkin dan solutions

4,2,1) Jika anda mendapat kesalahan like:
"libexpat.so.1: Tak Ada Seperti Itu menyimpan atau petunjuk"
Coba periksa untuk libexpat petunjuk di/usr/lib

# cd /usr/lib
# ls -l libexpat*

Anda harus suka melihat sesuatu :

-rw-r–r– 1 root root 160636 2005-09-09 18:58 libexpat.a
-rw-r–r– 1 root root 706 2005-09-09 18:58 libexpat.la
lrwxrwxrwx 1 root root 17 2006-01-13 12:26 libexpat.so -> libexpat.so.0.5.0
lrwxrwxrwx 1 root root 17 2006-01-13 12:26 libexpat.so.0 -> libexpat.so.0.5.0
-rwxr-xr-x 1 root root 127428 2005-09-09 18:58 libexpat.so.0.5.0

Jika anda tidak mempunyai libexpat.so. <> berbaris, mencoba "lagi" memasang eks-tepukan.

Berikutnya langkah: menciptakan symlink menamai libexpat.so.1 yang mempunyai untuk menunjukkan ke libexpat.so.0.5.0 menyimpan (nomor versi mungkin berbeda).
Untuk melakukan penggunaan ini:
# cd /usr/lib
# ln -s libexpat.so.0.5.0 libexpat.so.1

4,2,2) kesalahan alat Audio
idefisk_dsp_permissions_error.png

atau

idefisk_permission_error2.png

Periksa izin. Menggunakan:
ls -l , /dev/dsp
atau
/dev/mixer

Untuk ditentukan thepermissions alat baik anda menggunakan:
# chmod 660 /dev/dsp
atau
# chmod 666 /dev/dsp

Untuk alat mikser mengganti/dev/dsp dengan/dev/mikser

5) References
Versi Linux Idefisk
Tutor di sekitar Idefisk Softphone
Halaman Tanda Aster resmi
Slackware situs web
Instalasi tanda aster dari luka garukan (oleh astGUIclient kelompok)
Selengkapnya...

Cara Melacak No HP yang Private Number

Untuk Nokia :
Melihat nomor / nomer private number yang menghubungi ponsel anda
Caranya tekan * # 3 0 #, kemudian tekan tombol Call (Warna hijau)
Kode di atas fungsinya untuk memunculkan nomor penelepon dengan private number. Jadi pada lain kali jika nomor tersebut menghubungi anda, anda akan mengetahui peneleponnya, tidak lagi berupa Private Number. Selengkapnya...

Setting GPRS IM3

Khusus untuk operator indosatM3 / IM3 tidak memerlukan pengaktifan pada operator karena sudah aktif sejak awal nomor diaktifkan. Yang anda perlukan hanyalah melakukan konfigurasi dan seting pada handset / handphone anda sehigga bisa terhubung dengan server gprs IM3.
Setting Manual Parameter Untuk Dapat Terhubung Internet GPRS Indosat M3 / IM3 :- Connection name : M3-GPRS- APN / Access point name : www.indosat-m3.net- User name : gprs- Password : im3- Authentication : Normal- Homepage : http://wap.indosat-m3.net- IP address : 010.019.019.019- Port : 9201 (standard), 8080 (proxy)
Setting Otomatis Parameter Melalui SMS Untuk Dapat Terhubung Internet GPRS Indosat M3 / IM3 :- Ketik GPRS[spasi]merk hp[spasi]tipe hpContoh : GPRS NOKIA 6600 atau GPRS SE P800- Kirim ke nomor 3939- Anda akan mendapat sms konfirmasi balasan dari IM3
* operator telepon
Selengkapnya...

Do You Want Audio on Your Website? Consider These Points

Have you been thinking about adding audio to your website? Here are a few things to consider before you do.First, a word of warning...There are several inexpensive programs making the rounds that allow you to record your audio, add background music, even redirect your listener to a different page at the end of the recording. Do they work as promised? Yes, and no. Yes, you can easily produce a very acceptable audio. Getting it to work on your web site is an entirely different matter. You had better be familiar with FTPing and have at least a basic knowledge of HTML, or you can end up wasting days, even weeks, before you are through. For example, what works on Mozilla Firefox doesn't always work on Internet Explorer and visa versa.* Do you really have something to say? Adding audio to your website, just because you can, is like adding extra salt to the soup, just because you have a lot of salt. It may be too much of a good thing.* Don't just read the content on your web page. Use your audio as an introduction to your web site. Use it to emphasize the main points on your so your visitor will have a reason to read the content. Of course, you can do it the other way. Have your audio be the content. This can be very effective on a short squeeze page. Good graphics, a great audio and very little text can FORCE your visitor to listen to you, but you better get it right, orCLICK! They are outta there.* Will an audio message add to your website, or be a distraction? Personally, I like audio-websites, but sometimes they are downright annoying. When some guy is yapping away at me, competing with his own background music, while I am trying to concentrate on the content of his sales letter,CLICK! I'm outta there.* Should you "do it yourself", or should you use a "professional" voice? I want to sound like Hugh Grant. I want to sound as if I never lose my cool, never sweat. Unfortunately, I am a mid-westerner. I have that flat, nasal twang that is common where I come from. When I hear a playback of my voice it reminds me of a gaggle of geese crossing a highway. Is it really that important? Let's just say that I would never hire me to record an audio message. On the other hand, most people don't like the sound of their own voice and while a professional narrator will sound cool, he, or she, will never sound as authentic and personal as you will. When I hear something too slick,CLICK! I'm outta there.So, what should you do?* Use a decent microphone. Used correctly, the mike on your web cam may be good enough. If not, beg, borrow, or buy one. A unidirectional microphone is your best bet. A headset mike, even an inexpensive one, is probably the best choice because, once you get the sound level right, the mike will always be the same distance from your mouth. This will produce a very consistent sound level.* Get the sound level right. Tweak it until it is right. Don't have the volume so high that the listener goes into cardiac arrest, or has to crank the volume up, just to hear you. After you upload your audio, go to your web site and listen to it there. That is where it has to sound right.* Don't have the dog barking, or the baby crying in the background. Don't bump the mike while you are recording. Don't cough into the mike. Don't rattle paper while you are recording. Pay attention to all the little details. They are important.* Use appropriate background music, or none at all. Your visitor wants to hear your message, not your favorite song.* Your message is ALL important. Unless you are accustomed to doing so, don't try to ad-lib. Follow a script, but if your audio sounds too much like you are reading it, try using just an outline and ad-lib the content. Don't try to do it in one take. Do it over and over until you have it right. Got it?CLICK! I'm outta here.Free web design, free audio/video programs and free list building tools are some of the subjects David Hardin covers in his "Write Yourself Rich" program at The Ugly Web Site at http://www.davehardinonline.com Go sign up for his FREE "Not Just A Sales pitch" newsletter.Article Source: http://EzineArticles.com/?expert=David_Hardin Selengkapnya...

Adding Audio to Your Site - "Why" and "How" Answered

For those of you that surf the 'net often, you might be noticing audio clips that are popping up. Some will start playing as soon as you enter a site, and others you are beckoned to click "play" to hear their message.Adding an audio clip to your website gives a personal touch where reading text is hard to portray. It puts a voice to you representing your product or service and can make a big effect on how you are perceived. It assists your website visitors so they can gain a better understanding of what you offer - just as a face-to-face meeting would - having an audio clip helps your web audience build that important relationship with you.Audio also enhances your professional presentation - in most circumstances. In my opinion, having an audio clip (whether it is music or a voice-over) automatically play when a web page is opened is not a good idea. It is forcing the visitor to listen to something they may not have cared to hear and more importantly, it interferes with the music or radio program they are playing while surfing. It is best to provide an invitation to listen to the audio clip when it is appropriate to introduce it in your website content. This way, you are making your visitors feel comfortable and you appear professional and trustworthy at the same time.From a marketing perspective, audio can act as an "attention grabber". You have the ability to guide your website visitor through your site and talk about the product or service you have to offer. The audio clip can also be a powerful motivator to explore and discover your site.There are several ways to utilize audio on your website:*Personal Messages: Add a personal greeting by means of introducing yourself, your products or your services. This is a quick way to capture their attention as opposed to counting on them to read all of the text you have provided. In fact, simply do that - read what you already have written on your site! This will give your visitors a lasting impression once they hear your voice.*Promotional Message: Promote a sale, special give-away, or announce a brand new product you want to let everyone know about. Your passionate message speaking about how much you truly believe in your product or service will be sure to catch people's interest.*Audio Testimonials: Ask your clients to record a quick sound byte for you and post this audio message, along with their name and website address (or contact information) and it becomes a powerful way to tell others of your credibility. Your visitors will be more apt to believe the testimonial if it's attached with a live voice of your client. Your client also wins by giving them some extra exposure of their business.*Audio Instructions: If you offer a product that needs some instruction, provide an audio clip that explains the steps involved. You can accompany it with a picture of what you're talking about. Seeing and hearing how something works is very powerful and will give people the confidence they need to purchase what you have to offer.* Audio Invitation: If you have a free e-newsletter, it's important to try and get as many people to sign up for it as possible - they are your target market just waiting to hear more from you! By using an audio message inviting people to sign and explain what they will get for their efforts (answering the "what's in it for me" question), can be very effective. Be sure to mention that you are giving away a free item to anyone signing up - such as a free article, e-book, or piece of artwork etc - people love receiving something free!How to Put Audio on Your SiteDigital audio can come in many different formats, but the most common and safe format to use is MP3. There are several ways to going about creating these MP3 files - some more expensive than others. I'll detail a few here:*Recording the audio on your home PC: There are lots of audio recording software available for you to install and start recording your message. All you need is a good quality computer microphone, a quiet room and you're good to go. Here are a couple of software suggestions:- Audacity is a free, open source audio software program you download and install yourself.- Web Audio Plus 1.0 is another free software program. I found instructions to use it here: How to put audio on your website- Sony Sound Forge is a software package that you purchase. Sony Sound Forge enables you to create CD tracks and web audio files. You can even capture audio from an analog source and digitize it onto CD's and MP3's.- Internet Audio-Video. These guys offer several different pieces of software in one bundle - which includes creating your own video as well. But be careful making your own video clips, if not done professionally, they could work against you. I'll be talking more about video next month.* Using an on-line service:- BYOAudio is an audio recording service where you can use your computer microphone or call in via the telephone. The MP3 sound clip is produced for you. They have a sale on right now for a 30-day trial for $1 and after that, it costs $19.95 a month.- Audio Generator is also a monthly fee-based audio generating service. Beware - you have to sign up to get any information on them and then it is a very intense marketing campaign you need to endure. I was turned off right away - but that's just me.* Hiring a Professional: With this option, you hire a local audio recording company and go into their studio where they record your voice-over, do edits to make it sound professional and perfect, add some background music and then your audio file is ready to be burned to CD or uploaded to your website.As you can see, there are many options to consider on how to go about adding audio to your website; in my opinion, give the free open source software a try first and see how that works. If you find it's too difficult to manage and you want an easier way, try the services offered. Once you have your audio clip created, simply contact me or your web developer to have it added to your site.PS. The resources mentioned above are sites I have found in my Internet searches - I do not make any guarantees; I'm just sharing my research results and do not endorse any of them personally.Kind regards,Susan Friesen, B.B.A.eVision Media ~ Definitive eBusiness Solutionsevisionmedia.caAbout the Author: Susan is a professional website developer with over eight year's experience in the industry. With a bachelor's degree in Business Administration, concentration in Computer Information Systems, she is able to provide a unique and caring service to her clients not only as a website designer, but also an eBusiness Advisor; assisting individuals, businesses and organizations establish and brand product or service effectively on the World Wide Web. Contact Susan today for your free consultation on building your website presence to the effective marketing tool is can be. susan@evisionmedia.ca or visit http://www.evisionmedia.caArticle Source: http://EzineArticles.com/?expert=Susan_Friesen Selengkapnya...

Tips For Owning Boxer Puppies

Boxer puppies are famous for their energetic and lively nature and are ideal pets for companionship. Not only are they very fond of humans but also are very attentive to their master's commands. But, boxer puppies, like the young ones of most breed of dogs, have a tendency to bite anything and everything. This habit can prove to be very annoying and become cause of nuisance to others. Thus, never leave your boxer puppies unattended in the outdoors. Due to their curious nature and penchant to explore their surroundings, they can either hurt themselves or someone else, unintentionally.In order to ensure the safety your boxer puppies as well as others', it would be helpful to put them in a crate, rather than leave them unsupervised. Put some toys also in the crate, so that they don't get bored. However, you cannot rule out the possibility that they may start biting and chewing on the toys too. If the problem is not checked, the situation can aggravate and the biting may progress and develop into a habitual routine. Biting and chewing clearly point out that your boxer puppies are getting bored and need some exercise. Thus, to keep such disagreeable behavior from developing into a worse problem, make sure that they get enough exercise and attention.Intelligence and smartness are a characteristic trait of all boxer puppies. So, there is no need for you to scold or yell at them. You merely need to provide them with obedience training and teach them the difference between right and wrong at an early age. You need to be firm and consistent when dealing with them. Put the boxer puppies back in the crate, to let them know that this kind of behavior is unacceptable. Doing this every time, he bites will give him an idea that you do not like it. Praise it when he obeys. Boxer puppies love being appreciated and will obey just to see their master happy. Rearing boxer puppies can prove to be quite an expensive affair not only because of their medical expenses, dog treats, toys and food, but also because they require constant attention and care.One word of advice before you get boxer puppies as pets, inquire about their lineage and parents for undesirable traits like extreme shyness, aggression or hyperactivity. This is the best possible way of gaining an insight into what your boxer puppies will grow into and at the same time, will also eliminate the risk of any future problems. Owing to their exuberant nature, it is advisable to socialize and play with your boxer puppies before you start any training session. This tires them a bit and makes for a more cooperative pup. Draining them walking them is another good way of curbing their impulsive tendency. Group obedience training classes are strictly out of the question.Experts suggest using positive reinforcement training techniques for your boxer puppies. This is one of the four types of Operant conditioning. Positive reinforces like dog treats, like toys, stroke or a hug are known to receive better response than training based on corrections.Do you want to know more about training and caring for boxer puppies? If so you will need some basic training tips to get you started. Save your time and energy searching the internet looking for magical solutions and check out my 5 essential training tips (click the blue link). You'll discover some ultra useful tips for training your boxer quickly and easily, and most importantly you'll save time by not having to scour through the junk that's out there! Visit http://www.boxerdogessentials.comArticle Source: http://EzineArticles.com/?expert=Jason_Jr_Rusch Selengkapnya...

Post Nasal Drip - Is Nasal Irrigation a Safe Solution?

Post nasal drip is an unpleasant topic. But if you struggle with it on a regular basis, you'd probably do just about anything for relief. That's certainly how I felt before learning about nasal irrigation. I still experience post nasal drip, but it's nowhere near as terrible as it used to be.Does This Happen to You?Post nasal drip is a nightmare. Those of you who experience it know what I mean. Sometimes it makes you feel like you need to gag or vomit. And when you're trying to sleep, post nasal drip drains down the back of your throat. This often causes a choking sensation that makes it impossible to sleep.You can't swallow it (not that you'd want to) or cough it up easily. Drinking or eating also doesn't dislodge it, but usually makes it feel worse. Post nasal drip just sits in the back of your throat until you find a way to get it out.The good news is this nightmare can have a happy ending. Thanks to nasal irrigation, my post nasal drip isn't a big problem anymore. It still bothers me from time to time, but I've been sleeping much better these days.How Does Nasal Irrigation Relieve Post Nasal Drip?Nasal irrigation rinses excess mucus and gunk out of your sinuses. This in turn reduces post nasal drip.Using a Neti Pot or squirt bottle, you squirt warm water mixed with a saline solution into your nostrils. You have to do one nostril at a time. The water enters your nostril, travels through your nasal passage, and exits the opposite nostril. It's easy, painless, and quick.I rinse at least an hour before going to bed. As a result, I don't suffer with post nasal drip during the night. I also rinse in the morning to help control my chronic sinusitis during the day. Yes, I do experience post nasal drip occasionally. But is it as bad as before? The answer is no.And here's a tip: If you feel yourself about to get a sinus headache, irrigate your sinuses immediately. I find that this helps relieve the pain.Is Nasal Irrigation Safe?Nasal irrigation is safe when done correctly. Like most people, I was afraid to try it at first. I imagined horrible things resulting from squirting water up my nose. Thankfully, I didn't drown or get water stuck in some awful place.My one negative experience was getting water stuck in my inner ear. This was my own fault because I didn't follow instructions. Instead of gently blowing the remaining water from my nose before blowing forcefully, I blew my nose like a foghorn right after the rinse. That was a bad idea. If you follow the instructions, you won't have any problems.After you get past the first-time jitters, nasal irrigation is easy. And it's worth it, especially if you're tired of having your throat clogged with post nasal drip. So if you're tired of sinus problems, give nasal irrigation a try. The results will surprise you.Put an end to your post nasal drip problems. Visit http://nasalirrigationreviews.com to learn how nasal irrigation can provide long-lasting relief.Article Source: http://EzineArticlMempublikasikan Postinges.com/?expert=Michelle_Strait Selengkapnya...

Five Facts to Convince You to Stop Using Soap and Start Using Olive Oil Face Cleansers

Olive oil face cleansers are very good for your skin. In fact, it's an understatement. They are very, very good for your skin. I'm sure a lot people might not have heard of olive oil cleansers and their effect on human skin. The reason is not hard to find. People still believe that using soap is the best way to wash their face. Unfortunately, it's not. Soaps, at least most of them, are harsh and they simply leave your skin dry. In other words, your skin is deprived of its essential moisture after you wash it with soap. So, what should be done? Let's see.First of all, stop using soap to wash your face. This is the first and foremost step in moving towards your goal of soft and supple skin. Soap is harsh and it simply wipes off the moisture from your facial skin. And since your facial skin is more sensitive than any other parts of your body, it becomes very dry. The next thing you see is cracks, wrinkles, and fine lines all over your face. So, stop using soap right away. Olive oil cleansers can act as more than just a substitute for soap. They can improve your skin tone to a great extent. There are a lot of special qualities about olive oil which make it a great cleanser. Let's take a look at them.1. Olive oil is rich in antioxidants. When you use an olive oil face cleanser, it destroys the free radicals in your skin which are responsible for premature aging and gives you softer and younger looking skin.2. It doesn't dry out your skin like soap does. It removes the dirt and the excess sebum from your face ever so gently and cleanses your face completely. Yet at the same time, it retains the essential moisture required for your face. So, as a result, even after cleansing with olive oil based products, your skin doesn't feel dry.3. It can remove the toxins from your skin pretty effectively and rejuvenates your skin. This is why the Greeks used to bathe in olive oil several centuries back. By using an olive oil face cleanser regularly, you can see that your facial skin looks much brighter and feels healthier.4. Olive oil is rich in polyphenol, a compound which has great antibacterial and antifungal properties. So, it can help your skin fight against skin infections and other such problems.5. Petroleum based artificial skin care products tend to form a layer on your skin and make your skin's breathing process tougher. On the other hand, olive oil face cleansers are gentle by nature and they don't interfere in your skin's breathing process.Now, if I were to condense this entire article into one sentence, this would be it. Using olive oil face cleansers is probably the best way to treat your facial skin. So, stop torturing your skin with harsh soap and artificial cosmetic stuff and start using natural olive oil cleansers today.Pamela Brooks has been studying the skin care industry for over 15 years. She is a regular contributor to http://www.skin-and-health-care.com, a site covering the very best quality skin care products on the market today.Article Source: http://EzineArticles.com/?expert=Pamela_Brooks Selengkapnya...

Unique Memorable Gifts For Newborn Babies

An expectant mom is soon to give birth, having a new baby is a life changing event for her. Family member and friends are expecting too, and perhaps they want to give memorable gifts for the coming of the newborn child. However, it isn't always as easy to find ideal gifts - especially for an infant - that are not common, or shall we say "unique" that can make a favorable impact. With so many varieties to choose from, it is a real challenge as to how and what to pick. Consider the following helpful gift ideas:Personalized GiftsPersonalized infant products and supplies are always best. Most parents as well as parents' friends and other family members think of giving personalized items to welcome a child, because of the fact that these gifts are not just practical, but can also give a sense of thoughtfulness and adoration. You may think that finding personalized gifts can be very tough, but if you find fun and enjoyment while shopping for cute and clever newborn pieces, chances are you will find what you are looking for. Most of personalized babies' stuff are found at specialty stores, but you could also shop at online stores for a wider selection.Different choices for personalized items await you, from very simple to very exquisite. You may find personalized newborn clothing like shirts, beddings and blankets, bibs, socks, hats and other layettes. Consider a Personalized Organic Thermal Baby Blanket that can make a beautiful, healthy and personalized blanket, and a sweet gift to warm your precious one. Other clothing options are personalized infant caps, monogram sweaters, burp cloth sets, pillow and blanket sets and more.Another personalized gifts for newborn babies are personalized furniture like theme flip stools, personalized stuffed and teething toys, picture frames, feeding wares and the like.Baby Gift BasketA baby gift basket is another great option to welcome a child with a more fun and festive atmosphere. Gift baskets are abundant surprises not just for the baby alone but also for the parents. A usual baby gift basket is filled with different products and supplies for infants. It can have a compilation of clothing, baby food, toys and the like. Although gift baskets are known to be made from a real basket, you could also use other container options to hold numerous gift items, such as laundry baskets, medium size plastic jars, pail or a baby bath tub, or even a bucket.Gift baskets can also include special treats for mom and dad. Apart from their infant's supplies, you can also add spa products to pamper the strained body of the new mom. Also, books and magazines for good parenting are ideal, where new parents are guided with reliable articles and advices for their new role in raising their child - an ideal new mom gift. You may opt for a Maie Baby Girl Gift Basket to greet a baby girl! A festive present with a delicate floral design that gives classy and upscale appeal for your pretty little girl. It features different unique essentials from popular Baby Dry Goods line.Janet is an author for a variety of lifestyle issues and topics. If you're looking for personalized gifts for babies, visit the website Prettybabygifts.com and browse their collection. Shop for unique gifts for baby online!Article Source: http://EzineArticles.com/?expert=Janet_Verra Selengkapnya...

Your Blissful Life - Your Discovery

Now that you understand that you are made up of various parts and have identified those parts and what they mean to you, it is time to focus on them and yourself on a deeper level. This is where the real fun begins!It is important to note that some individuals have found that their spiritual and religious selves are one and the same, while others feel they are separate. Both views are perfectly acceptable, as they are unique to each individual.It is now time for you to take some time to discover your own, personal parts. There are many layers of parts, and just when you think you have identified all of them, you will discover more.This process is like peeling an onion. It is quite easy at first just like like peeling back the dry, outer layers of the onion. The deeper and more detailed you get, the juicier it becomes. Just like peeling the onion, you will experience many different emotions. You will laugh, cry, wonder aloud and ultimately amaze yourself. This is okay; keep moving. You will get closer and closer to defining your blissful life with every step you take and with every emotion you allow yourself to experience. This is why I call this step of your journey Your Discovery. You are discovering more about yourself than you have ever allowed before or even taken the time to discover about yourself. Embrace your discoveries. They are uniquely you!You may even want to walk away, take a stroll in the park, listen to the birds and relax with your favorite music. Your mind will continue to discover newer and deeper parts that you have unconsciously pushed aside for years. Allow yourself to do this. Your mind is incredibly powerful. Tap into the power that is uniquely you.Many of my clients have been overcome by various emotions they discover inside of themselves such as happiness, fear, joy and sadness. They experience these emotions to such an extent that they need to stop to rest. I have even had clients completely walk away from the process for months while they take the time to fully understand their discoveries. Sooner or later, though, they always return to continue on their journey. I compare this time to walking away from the onion because it has become so overpowering that you must rest your eyes until you can see clearly enough to continue peeling. During this time, your mind, body and spirit are also rejuvenated.You will continue to learn and grow during these rest periods. So take your time, discover, grow and continue your journey at your own pace. You are getting closer to what you want.As you move through your discovery, you may identify even more parts. This is okay! It signifies your growth. If you do discover more parts after completing this section, simply stop where you are and come back to this chapter and define the new parts. Then walk through the process again until you reach your stopping point.It is now time to define what your parts mean to you. This process is quite simple. What could possibly be easier or more fun than defining you to yourself? No one knows you better than you.The discovery of my parts was a very exciting time for me and I immediately embarked upon a journey to understand all of them. This journey led me to various self-help and coaching certifications from various industry leaders around the world. Though I didn't realize it at the time, this was my journey to discover all of my parts. I finally realized what phase I was in during my time in a Neuro Linguistic Programming (NLP) Certification course I was taking in Sedona, Arizona. It was during this class that we had to go through an exercise in identifying all of our parts. Little did I know at the time that his course would change me forever. I also didn't realize that I would continue to discover more parts even today!For each part you identified in the previous chapters, answer each of the following questions. They will help you to define what you want so that you will know exactly when you have reached your blissful life.-Is there any part that you have pushed aside even though it is truly important to you?-What does each part that you have identified mean to you?-Are there specific parts of your life in which you desire greater satisfaction? If so, what are they?-How does each of the parts you identified fit into your life?For each part, consider your previous answers above to answer the following for each of your parts.What do you want in this specific part of your life? Be very specific with the details in answering this question. For example: How much money do you want? Where you do want to live? What does your home look like? What do you hear? What feelings do you want to experience? How soon do you want these things in your life?How will you know when you have satisfied this specific part? How will you measure your success? When, and by what methods, will you determine that you have achieved your goal? Will you be living somewhere different, have more money in the bank, feel loved and accepted by someone or yourself? Will you finally be sober? How will others know that you have satisfied this specific part?What will those around you be able to see, hear or feel once you have achieved your goal for this specific part? Will they see a new car, hear you laughing, or feel better after being around you? These can be friends, lovers, relatives, acquaintances or co-workers. Everyone you come in contact with will notice the difference.What changes will take place in your life if you get what you want for each part? As compared to the present moment, what will be different in your life? What impact will getting what you want have on your life? How will your life be different than it is today?What changes will occur if you don't get what you want for this part? If you achieve only a part of the overall goal, what impact will this have on your life? What impact does getting only portions of what you want have on your life?Is your goal for this part going to be worth the effort it will take to get it? The time and effort spent on reaching your goal speaks directly toward the effort required by you in order to achieve it. Are you willing to do what it takes, whatever it takes, no matter what, to reach your goal?What does getting what you want for this part mean to your other parts? This is your ecological test. How does getting what you want in this part, impact your other parts? Is it congruent with the rest of your desires? Can your other parts accept this part if you get what you want? If not, do you need to adjust anything? If so, how do you feel about it? Can you accept and live with the adjustment?Now that you have named and clearly defined all of your parts, you now need to rank them in order of importance to yourself. Knowing your parts and what they are is important, but knowing what they mean to you is even more important!Rank all of your parts in order of importance to yourself. The most important part should be at the top of your list. This process will take time and negotiation. You must be totally open and honest in regard to which parts are really belong at the top of your list. You will be surprised by your results!This is an important step because it forms the foundation for your pathway to your blissful life. It is the basis on which the remainder of your journey stands!Focus and take your time on this. There is no need to hurry. You will repeat this part of the process many times before creating your final list. This step may take hours, days, weeks or even months. Why? Because we all place varying degrees of importance on our parts. It is also during this leg of your journey that you will identify what you are willing to compromise for each part. Remember, you are only negotiating with yourself, so there are only winners here!This was a very enlightening and exciting leg of my journey. I had finally given myself permission to rank my parts according to their importance to me, as opposed to their importance to others. I had finally unlearned old habits and was now about to draw the map for the rest of my life as I saw it today. Wow! This was another "Ah-Ha!" moment for me. It was very freeing.Once I had completed my rankings, I was pleasantly surprised at some of the results. I was not surprised that certain parts ranked so highly but, rather, I finally recognized what I really wanted versus how I had been living my life. I am confident that this exercise will be just as freeing for you.List your parts in order of importance to you.Mr. Timothy A. McGinty is the published co-author of the highly regarded Wake Up... Live the Life You Love® series. This series is a collaborative effort with such inspirational leaders as Tony Robbins, Dr. Wayne Dyer, Brian Tracey, Steven E, and Lee Beard.Mr. McGinty is also the author of "Your Blissful Life", a book which takes the reader by the hand and walks them through a process for defining their "Blissful Life" and the action plan for achieving it.Imagine Yourself... is an organization focused on enabling clients "breakthrough" in achieving their success. Mr. McGinty has helped many organizations and individuals discover their passion, define the life balance they seek, develop strategies for achieving that balance, and held them accountable for reaching their goals. His clients have been so successful that Mr. McGinty is known as "The Breakthrough Guy"Imagine Yourself...13477 Prospect Rd. Suite 204Strongsville, Ohio 44149Telephone: 440-236-6519Web: http://www.timothymcginty.comE-mail: tim@timothymcginty.comArticle Source: http://EzineArticles.com/?expert=Timothy_A_McGinty Selengkapnya...
Template by : lismah lismah.blogspot.com