Followers

Powered by Blogger.
Thursday, September 30, 2010

How Firewall Protection Work

how firewall work image
Firewall is a fence that protects computers from destructive forces. This may prevent viruses and pop-ups, advertisements, and other programs embedded with them to effortlessly break into a property. A firewall’s protection also depends on how the user has set it to be, which usually varies from low to high.

Firewall protection works by blocking certain types of traffic between a source and a destination.All network traffic has a source, a destination, and a Glossary Link protocol. This protocol is usually TCP, UDP, or ICMP.

If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port is a random port and the destination port is a well-known port number. For example, the destination port for HTTP is 80 and the destination port for DNS is 53.

If the protocol is Glossary Link ICMP, there is also an ICMP message type. The most common ICMP message types are Echo Request and Echo Reply.
Firewall protection works by allowing the Glossary Link network security administrator to choose which protocols and ports or message types to allow -- and which ones to deny.

Firewall Protection: Denying Inbound

Most firewall configurations should deny all inbound traffic to all internal Glossary Link IP addresses.

Servers which must accept incoming connections should be placed on a DMZ network.

Modern firewalls will allow packets to come into the network which are responses to outbound traffic. What this means is that if you connect to a web server across the Internet, the firewall will automatically allow the responses from the web server to return to you.
how firewall work image
Inbound restrictions are the main security value provided by firewalls.
Firewall Protection: Denying Outbound

Some network security administrators deny outbound traffic.

This is most often done to restrict users to approved protocols and prevent them from using unapproved protocols. This usually means preventing users from using online chat systems or preventing them from sending outbound e-mail.

Outbound restrictions are often vulnerable to work-arounds. These work-arounds require time and effort on the part of the network user, which limits the number of users who can utilize unapproved protocols. Outbound restrictions seldom, if ever, work entirely as designed.
Example Firewall Protection: Denying Inbound `ping`

The `ping` command sends out ICMP Echo Request messages and expects ICMP Echo Reply messages in response.

If you configure a firewall between the source and the destination to block ICMP Echo Request messages from the source to the destination, the `ping` command will fail.

Similarly, if you configure a firewall between the source and the destination to block ICMP Echo Reply messages from the destination to the source, the `ping` command will also fail.

The `ping` command can allow a potential attacker to map your network. Disabling inbound Echo Request messages prevents the use of the `ping` command to map your network.
Example Firewall Protection: Blocking Outbound E-mail

Internet e-mail uses the SMTP protocol. SMTP servers answer on TCP port 25.

If you block outbound TCP port 25 from your network, users will not be able to send outbound e-mail -- except through your approved e-mail servers.

However, a sophisticated user who operates their own mail server could configure their mail server to respond on another port, in addition to port 25. This would be an effective work-around your security policy.

If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term firewall used.
Wednesday, September 29, 2010

Downgrade XP SP 3 in Dell N4010 64 bit

downgrade xp sp3 dell n4010Dell N4010 come to the market with OS microsoft Windows 7 Home Basic, but some of people feel anoying with it, windows 7 so strange than Windows XP, more familiar and simple.
i will show any one who want to downgrade their Inspiron 14R / N4010, below is the set of drivers that I collected and tested working well, and follow step by step this guide.

first think needed for this guide work is Windows XP SP 3 64 bit installation,then you must download compatible drivers need for windows XP.

Inspiron_14R_N4010_XP_Drivers_Full_Set.part1.rar
Inspiron_14R_N4010_XP_Drivers_Full_Set.part2.rar
Inspiron_14R_N4010_XP_Drivers_Full_Set.part3.rar
Inspiron_14R_N4010_XP_Drivers_Full_Set.part4.rar
Inspiron_14R_N4010_XP_Drivers_Full_Set.part5.rar
Inspiron_14R_N4010_XP_Drivers_Full_Set.part6.rar

after downloaded, extract it all in one.

Driver Group below can be installed manually after OS install:
Atheros AR813-AR815x-v1.0.0.41_WHQL LAN Adapter
SX2210-Monitor_Webcam SW RC1.1 WebCam Driver & Applications
R255591 Synaptics TouchPad
Realtek RTS5138 Card Reader 6.1.7600
DW1501 5.60.48.35 WiFi Adapter
Realtek ALC269Q-GR WDM_HD Audio R249 5.10.0.6132
ATI Display Apps & Utilities
ATI Catalyst 10.6 Drivers Modified for Mobility HD 5470
ATI HDMI DP Audio Driver 10.6_XP32-64
BT365 Bluetooth Driver & Application

and Splitstearm this data into Windows XP Installation CD:
Intel HM57 AHCI
Intel HM57 Chipset
Intel HM57 Management Engine Interface
Intel HM57 Turbo Boost Technology

Download driver sata from ftp://ftp.ins.dell.com/sata/R254174.exe , run, and extract it to C:\dell\drivers\R254174\, keep it.

download Nlite software for make a bootable CD Windows XP SP 3 64 bit.

Install Nlite, do step by step, and put Folder "C:\dell\drivers\R254174\f6flpy-x86" to cd win xp. file "iaAHCI.inf"

do Nlite till proccess finish, and Dell N4010 Downgrade XP SP 3 64 bit ready t burn to Blank CD - ROM.

after OS had installed, don't forget to install drivers needed.
for install VGA driver, First extract the ATI Catalyst 10.6 Drivers then enter Device Manager and use the "Have Disk" method to update the display driver. Have disk method is a way to install a driver that does not have any setup program to install itself automatically. In principle what you are doing is showing Windows where drivers are located. Driver installation scripts are written in *.inf files so a driver must have these files, and this file is located inside:

Drivers\Display\XP_INF\

of the extracted directory.

To access the driver update follow the steps below:
1)Click Start, right-click My Computer, and then click Properties.

2)The System Properties window will open. Click the Hardware tab, and then click Device Manager.

3)The Device Manager window will open. Double-click Display adapters.

4)Right-click on whatever display adapter it shown and click "Update Driver"

5)Select the following option when the Hardware Update Wizard asks to connect to Windows Update: No, not this time. Click Next.

6)Select the following option: Install from a list or specific location (Advanced), and then click Next.

7)Select the Don’t search, I will choose the driver to install option, and then Next

7.1) UNCheck "Show compatible hardware"

8)Click on the Have Disk... button, and then click the Browse button.

9)Browse to the directory where you extracted the driver above i.e. the Drivers\Display\XP_INF subdirectory.

10)Locate and highlight the the CX100944.inf file then Click the Open button

11)Click the OK button. A window listing all of the available display types should open. Select the "ATI Mobility Radeon HD 5470", and then click the Next button.

12)The operating system will install the driver. Click the Finish button when done.

enjoy your new XP SP 3 64 bit on your Dell N4010.
Tuesday, September 28, 2010

Download torrent tanpa torrent client software

download torrent tanpa software clientDownload torrent merupakan salah satu alternatif download yang banyak digunakan oleh para netter, terutama yang doyan sekali download file berukuran besar. Apa itu torrent? torrent merupakan metafile kecil yang berisi informasi tentang file yang ingin anda download. Biasanya kita harus menggunakan software atau torrent client untuk dapat mengunduh file yang asli. Tanpa software torrent mana mungkin kita bisa mendownloadnya. Software Client Torrent (bittorrent, utorrent, dsb) akan menghubungkan kita dengan banyak pc yang sedang online (seeder) yang menyediakan file yang ingin kita download sehingga proses download menjadi lebih cepat.

Namun, tidak semuanya berjalan lancar. Entah kenapa saya sendiri hampir selalu gagal mendownload file torrent via Software client torrent seperti bittorrent, utorrent, dsb. Hampir semua software client torrent populer sudah pernah saya coba tapi masih saja gagal untuk mendownload file. Apakah ada solusi untuk download torrent tanpa client software? Mungkin kita berpikir tidak ada. Tapi untungnya ada torrent2exe.com yang menjadikan proses download file torrent menjadi lebih mudah. Dengan torrent2exe.com kita tidak perlu menginstall software client torrent untuk mendownload file torrent karena proses download bisa dilakukan via web torrent2exe.com.

Caranya sangat mudah:

1. Copy Paste link file torrent pada web torrent2exe.com dan klik tombol “Start Download”

2. Anda akan menerima file dengan extensi .exe, misal 123456.exe yang berukuran kecil

3. Double klik file tersebut yang akan menampilkan windows proses download file yang Anda inginkan, tunggu hingga proses download selesai

4. Setelah download selesai maka akan muncul window ke 2 yang akan memberitahu supaya jangan menutup koneksi torrent yang sedang berlangsung. Hal ini berguna agar Anda tidak dianggap sebagai leecher sehingga menjadikan Anda diblack list dan Anda tidak bisa mendownload torrent lagi.

Perlu diingat bahwa cara kerja torrent adalah berbagi. Jadi kita perlu tetap membuka koneksi agar orang lain juga dapat mendownload file yang baru saja kita download melalui komputer kita. Lama koneksi ini bisa kita set, misalnya 1 jam setelah itu koneksi akan terputus secara otomatis. Namun apa salahnya kita mencoba trik download torrent tanpa client software tersebut.

Microsoft Windows 8 Releases

windows 8 releases image
Microsft Windows 8(next generation of Microsoft Windows 7) is starting to take a OS market. Windows 7 is only 10 months old, but it's never too early to glance on down the road at Windows 8. Microsoft’s next version of Windows client is far enough along that the Windows team seems to have begun sharing details about its goals with Microsoft’s PC partners. A leaked slide deck — excerpts of which first appeared on the Web site of blogger Francisco Martin Garcia — don’t reveal a whole lot in terms of specific features. But they do look like the real deal, as Microsoft Kitchen blogger Stephen Chapman — who pulled out even more of the slides in his post — noted.

The leaked slides (dating from April 2010) reference “Windows 8,” not “Windows v.Next” (the Windows client team’s preferred codename these days). They indicate that the next version of Windows, which is expected by many to ship in 2012, will possibly offer some of these features:

- Fast startup (Huzzah!): A new feature combining Logoff and Hibernate to result will give the look and feel of boot/shutdown be faster

- Slates mentioned specifically as a target form factor: It will be interesting to see how Microsoft distinguishes between slates running Windows Embedded Compact and slates running Windows 8

- Push-button reset: A button “that will essentially reinstall Windows while maintaining all of your personal files, applications, settings, etc. without the need for the user to back all of that stuff up,” as Stephen Chapman of Microsoft Kitchen describes it

- Support for facial recognition as one of the ways identity management/log in will be handled

- IE 9 (no surprise there): With another confirmation of August as being the target for the first beta (though I could see this possibly slipping a bit)

- More thorough help and support, enabling users to do more fixing of issues on their own

- A Windows App Store (mentioned in the section on push-button reset)

Microsoft isn’t commenting (so far) on the slides and isn’t even confirming that they are “Genuine” Windows 8 PowerPoints — or how much they reflect current reality. However, I’d note the date on these slides is April 2010 and they sure have the vague look and feel of early Windows documentation.
Monday, September 27, 2010

Exclude Blacklist from Google Search Results

exclude blacklist serp google imagesGoogle is often regarded as the best search engine in the world, which often returns the best matching web pages that users are looking for in the search results. However, with the amazing and overwhelming amount of blogs and websites been created everyday, where much of it is of spam, useless, plagiarist, blunt copy and paste or even autoblog which automatically pull and post duplicating contents from various sources, Google may allow some of these sites to slip into its search results.

Google search engine does not have built-in capability to filter or remove unwanted websites or domains from the search results. However, Google does provide Google Custom Search Engine service under Google Co-op which allows anyone to create their own search engine by themselves. Google Custom Search Engine allows user to exclude domains that user does not want to appear in search results, or include only selected domains.

Use the following Google Custom Search Engine trick to blacklist or exclude domains or websites from the Google search engine.

1. Register or sign into the Google Account.
2. Visit Google Custom Search Engine homepage.
3. click on Create a Custom Search Engine button
4 Set up your search engine by giving the name and description, selecting language and Standard edition (free and no charge), and tick check box of I have read and agree to the Terms of Service.
5. Click Next.
6. Choose or customize a style.
7. Click Next.
8. Under “Next steps” section, click on Include more sites.
9 .Remove any domain the listed under the Included sites section, by selecting the domain, and clicking Delete button.
10.Under “Excluded Sites” section, click on Exclude sites.
11.Enter the web page URL or domain name of the site that you want to exclude from the search results. User can choose to exclude all pages whose address contains the URL, exclude just this specific page or URL pattern entered, or dynamically extract links from this page and exclude them from the search engine based on the rule of exclude all pages the page links to, exclude all partial sites the page links to, or exclude all sites the page links to.

Tip: Click on Exclude sites in bulk to enter the blacklisted sites or URLs of web pages in bulk. For bulk entry, user can exclude all pages on these sites or exclude just the specific pages entered.
12.Click on Save when done.
13.The custom search engine which excludes blacklisted or unwanted sites, domains or web pages is now ready for use.

To preview and test the search engine, click on Preview link under the Control Panel.

To get the URL of the custom search engine, right click on the name title of the search engine, and select Copy Link Location or Copy Shortcut (IE). The URL of the custom search engine can be bookmarked, made favorite or homepage for easy access.

W.32.Changeup.C removing guide

W32.Changeup.C is a malicious computer worm that infect via removable USB drives and unsecured shared drives. This worm is known for exploiting the Microsoft .lnk file vulnerability. One thing you want to keep in mind, regardless of what antivirus software you feel most comfortable with, keep it updated…ALWAYS.

removing w.32.changeup.c guide image

Having your antivirus updated can mean the difference between running a virus scan and cleaning it off successfully, or having to take your computer to the local shop to be worked on and potentially losing precious pictures and files.
So if you’re here, and you haven’t kept your antivirus software up to date, you can still try to remove W32.Changeup.C in SAFE MODE with what you have.

Safe Mode is basically a “safe” way to boot your computer so that the virus doesn’t load, nor do a lot of other applications that you normally see when you’re on your computer. This prevents device drivers and unwanted software from running, so that you can run your antivirus scan. However, Safe Mode doesn’t always work since I have seen some viruses that even disable it too.

But let’s see what we can do with this W32.Changeup.C.

To boot your computer into Safe Mode:
- Turn off your computer
- Turn it back on, and when you see the first “signs of life” (anything on the screen), start tapping the F8 key on your keyboard..about once per second (if your computer beeps at you, then you can stop tapping).
- You will be given a list to choose from. Choose the one with SAFE MODE only.
- You will then receive a YES/NO prompt, click Yes.

You’ve now successfully booted your computer into Safe Mode, so go ahead and run a full system scan with your current antivirus software.

but, if your computer still infected, you should do it by self or manual.
This step-by-step manual guide completely removes W32.Changeup.C. If you have any problem during the removal process, please contact Tee Support agent 24/7 online for more detailed instructions.

1. Delete files:

%UserProfile%\[RANDOM].exe, %DriveLetter%\[RANDOM].exe
%DriveLetter%\[RANDOM].scr, %DriveLetter%\autorun.inf
%DriveLetter%\x.exe, %DriveLetter%\New Folder.lnk
%DriveLetter%\Passwords.lnk, %DriveLetter%\Documents.lnk
%DriveLetter%\Pictures.lnk, %DriveLetter%\Music.lnk
%DriveLetter%\Video.lnk, %DriveLetter%\[RANDOM FILE NAME].dll
%DriveLetter%\[RANDOM FILE NAME].lnk

2. Delete registry entries

(Take Note: Back up the Windows registry before editing it, so that you can quickly restore it later if something goes wrong.)

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\”[RANDOM FILE NAME]” = “%UserProfile%\[RANDOM FILE NAME].exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\”ShowSuperHidden” = “1″


and last way to remove the virus you could use Online Virus Scanner, another way to remove a virus from a computer without the need to install additional anti-virus application is to perform a thorough scan with free Online Virus Scanner that can be found on websites of legitimate computer security provider.
Sunday, September 26, 2010

Google Doodle for 12th birthday of Google

google 12th anniversary imageGOOGLE Inc. is the owner of the Google brand, whose it's main product is search engine "giant" GOOGLE. As one visits the homepage of Google, four colored balls at the top of the Google logo can be seen and as the balls are clicked, it leads to a birthday cake with Google written on it,

Manifesting the 12th birthday of Google

During the early years after its inception, Google celebrated its birthday on the 7th of September. However, for past few years, the date has shifted to 27th September.

Google started an interesting trend of celebrating various occasions via Google Doodles, the changed Google logo that gets redesigned by Google and shown on Google.com on special days to mark their significance. With the help of creative Doodles, many personalities are honored and several events are commemorated.

Within 12 years, Google has proved itself to be the internet giant introducing innovations in its search engine as well as email. Google will celebrate tomorrow September 27 the 12th anniversary for witch occasion Execte News wish to send a worm “Happy Birthday Google”.
Saturday, September 25, 2010

What is AJAX ( Asynchronous Java Script )

what's ajax imageAJAX, web applications are fun to build. They are like the fancy sportscar of Websites. Web applications allow the designer and developer to get together and solve a problem for their customers that the customers might not have even know they had. That's how the blogging tools like MovableType and Blogger came about after all. I mean, before Blogger, did you know you needed an online tool to build your Web site blog? But most Web applications are slow and tedious. Even the fastest of them has lots of free time for your customers to go get a coffee, work on their dog training, or (worst of all) head off to a faster Web site. It's that dreaded hourglass! You click a link and the hourglass appears as the Web application consults the server and the server thinks about what it's going to send back to you.

Ajax is Here to Change That
Ajax (sometimes called Asynchronous JavaScript and XML) is a way of programming for the Web that gets rid of the hourglass. Data, content, and design are merged together into a seamless whole. When your customer clicks on something on an Ajax driven application, there is very little lag time. The page simply displays what they're asking for. If you don't believe me, try out Google Maps for a few seconds. Scroll around and watch as the map updates almost before your eyes. There is very little lag and you don't have to wait for pages to refresh or reload.
What is Ajax?

Ajax is a way of developing Web applications that combines:

* XHTML and CSS standards based presentation
* Interaction with the page through the DOM
* Data interchange with XML and XSLT
* Asynchronous data retrieval with XMLHttpRequest
* JavaScript to tie it all together


In the traditional Web application, the interaction between the customer and the server goes like this:

1. Customer accesses Web application
2. Server processes request and sends data to the browser while the customer waits
3. Customer clicks on a link or interacts with the application
4. Server processes request and sends data back to the browser while the customer waits

There is a lot of customer waiting.

Ajax Acts as an Intermediary
The Ajax engine works within the Web browser (through JavaScript and the DOM) to render the Web application and handle any requests that the customer might have of the Web server. The beauty of it is that because the Ajax engine is handling the requests, it can hold most information in the engine itself, while allowing the interaction with the application and the customer to happen asynchronously and independently of any interaction with the server.
Asynchronous

This is the key. In standard Web applications, the interaction between the customer and the server is synchronous. This means that one has to happen after the other. If a customer clicks a link, the request is sent to the server, which then sends the results back.

With Ajax, the JavaScript that is loaded when the page loads handles most of the basic tasks such as data validation and manipulation, as well as display rendering the Ajax engine handles without a trip to the server. At the same time that it is making display changes for the customer, it is sending data back and forth to the server. But the data transfer is not dependent upon actions of the customer.
Friday, September 24, 2010

About 32 Bit and 64 bit OS

32 bit and 64 bit processor difference image32 bit and 64 bit operating system? what are the difference between both of them? A 32 bit processor is faster than a 64 bit processor, 64 bit processors are very commonly used that you can find it easily in any home pc but the main difference is the hardware you are having on your machine. For 32 bits there isn't any need of any wide main bus to carry 32 bits at a time but for 64 bits its must that you should have a wider bus to carry 64bits.

The main difference between a 32 bit and 64 is that 32 bit system has 4gb(gigabytes) of space for addressing means that the 32 bit system has a limit of 4GB RAM to process data where as the 64 bit operating system has 2^64 bits of space to address and supports 16 hexabytes of RAM to process data.

In simple words an operating system of 32 bit has a 4GB limit to process any data depending upon the sizes of files and RAM. A person who does not care about the category will find 64 bit more beneficial than 32 bit because he can use 64 bit OS with 32 bit OS and software. If we compare 64 bit with 32 bit OS, 64 bit processor is faster and performs more upgraded silicon processes and have more no of transistors which proves it to be more advantageous than 32 bit.

Now most of the software companies are developing their software in accordance to the 64 bit environment, it's really hard for the consumers to run a 64 bit application in 32 bit environment, in this case they have to upgrade their hardware's such as RAM which is also a big issue because most of the computer users have less than 1Gb in their systems.

So instead of changing your hardware often I would recommend 32 bit OS over 64 bit which is more user friendly and enables its user to run applications of 64 bit in 32 bit environment.
Wednesday, September 22, 2010

Perbedaan Stand by, Hibernate, dan Shutdown

perbedaan stand by, hibernate, shut down
windows memliki tiga fitur unique stand by, hibernate, dan turn off pada yang terdapat pada menu shut down, tapi apakah anda tahu apa perbedaan diantara ketiganya? berikut prinsip dasarnya yang akan saya jelaskan.

1. Shutdown
Kalau yang ini sudah jelas, yaitu mematikan komputer secara keseluruhan. Saat kita memilih shutdown, semua komponen komputer (RAM, hardisk, prosesor, dll) akan dinonaktifkan, yaitu diputus aliran listriknya. Pada saat ini memori komputer (RAM) dikosongkan, sehingga jika hendak menghidupkan komputer kembali, butuh waktu cukup lama untuk me-load sistem operasi (misal Windows) kembali ke RAM. Ini terkait dengan pentingnya memori bagi komputer dan cara kerja sistem operasi.

2. Hibernate
Pada hibernate, komponen komputer juga dimatikan secara keseluruhan, sama seperti shutdown. Bedanya, sebelum dimatikan (sebelum mengosongkan RAM), isi dari memori atau RAM tersebut disalin ke harddisk terlebih dahulu, sehingga saat hendak dihidupkan kembali, tidak membutuhkan waktu terlalu lama karena isi RAM sudah ada di harddisk (tinggal dikembalikan seperti sediakala).

Hibernate dapat menyimpan konfigurasi komputer sebelum dimatikan. Jadi jika misalkan Anda membuka banyak aplikasi kemudian meng-hibernate komputer, saat komputer dihidupkan kembali aplikasi-aplikasi itu masih terbuka seperti kondisi semula (tidak perlu takut kehilangan data). Ini berbeda dengan shutdown yang akan menghapus data Anda jika belum sempat disimpan. Cocok jika Anda hendak meninggalkan komputer dalam waktu yang agak lama.

Namun tidak semua sistem operasi menyediakan fitur hibernate ini. Tidak semua komputer juga dapat di-hibernate oleh sistem operasi.

3. Stand by
Pada kondisi stand by (kalau di Linux disebut suspend), komputer tidak dimatikan secara keseluruhan. Semua komponen komputer mati kecuali memori (RAM). Jadi, semua komponen diputus aliran listriknya kecuali RAM (dan prosesor mungkin). Karena itu, modus stand by masih menggunakan listrik untuk memberi daya pada RAM, berbeda dengan shutdown atau hibernate yang benar-benar mematikan komputer. Untuk menghidupkan komputer kembali dari modus stand by jauh lebih cepat dibandingkan hibernate (bisa dibilang instan), karena isi RAM masih dipertahankan.

Sama seperti hibernate, stand by juga menyimpan konfigurasi komputer sebelum di-stand by. Stand by dapat diibaratkan seperti “pause” saat bermain game. Cocok jika Anda hendak meninggalkan komputer dalam waktu singkat.

Kesimpulan
Apapun pilihan anda untuk menon-aktifkan komputer anda, stand by, hibernate, dan shutdown bisa disesuaikan dengan kebutuhan anda.

About Microsoft Smartphone(Windows phone 7)

about windows phone 7 series imageMicrosoft have released a new product, Windows Phone 7 Series. Get used to the name, because it's now a part of the smartphone vernacular... however verbose it may seem. Today Microsoft launches one of its most ambitious (if not most ambitious) projects: the rebranding of Windows Mobile(You must be familiar with it :D). The company is introducing the new mobile OS at Mobile World Congress 2010, in Barcelona, and if the press is anything to be believed, this is just the beginning.


The phone operating system does away with pretty much every scrap of previous mobile efforts from Microsoft, from the look and feel down to the underlying code -- everything is brand new. Windows phone 7 Series has rebuilt Windows Mobile from the ground up, featuring a completely altered home screen and user interface experience, robust Xbox LIVE and Zune integration, and vastly new and improved social networking tools. Gone is the familiar Start screen, now replaced with "tiles" which scroll vertically and can be customized as quick launches, links to contacts, or self contained widgets. The look of the OS has also been radically upended, mirroring the Zune HD experience closely, replete with that large, iconic text for menus, and content transitions which elegantly (and dimensionally) slide a user into and out of different views. The OS is also heavily focused on social networking, providing integrated contact pages which show status updates from multiple services and allow fast jumps to richer cloud content (such as photo galleries). The Xbox integration will include LIVE games, avatars, and profiles, while the Zune end of things appears to be a carbon copy of the standalone device's features (including FM radio).

Besides just flipping the script on the brand, the company seems to be taking a much more vertical approach with hardware and user experience, dictating rigid specs for Windows Phone 7 Series devices (a specific CPU and speed, screen aspect ratio and resolution, memory, and even button configuration), and doing away with carrier or partner UI customizations such as Sense or TouchWiz. That's right -- there will be a single Windows Phone identity regardless of carrier or device brand. Those new phones will likely look similar at first, featuring a high res touchscreen, three front-facing buttons (back, start, and perhaps not shockingly, a Bing key), and little else.

Carrier partnerships are far and wide, including AT&T, Deutsche Telekom AG, Orange, SFR, Sprint, Telecom Italia, Telefónica, Telstra, T-Mobile USA, Verizon Wireless and Vodafone, while hardware partners include Dell, Garmin-Asus, HTC, HP, LG, Samsung, Sony Ericsson, Toshiba and Qualcomm. We're told that we likely won't get to see any third-party devices at MWC, though Microsoft is showing off dev units of unknown origin, and the first handsets are supposed to hit the market by the holidays of this year.
Monday, September 20, 2010

Menghilangkan Windows Genuine Advantage (WGA) Notification

menghilangkan windows genuine advantage imageWindows Genuine Advantage(WGA) adalah fitur validasi keaslian windows yang akan memunculkan peringatan jika windows kita tidak asli. Fitur ini akan muncul jika kita rajin online, makanya yang paling sering kena WGA ini adalah laptop yang sering digunakan untuk online. Jika tidak pernah online, maka tentu microsoft tidak akan dapat mengetahui apakah windows anda asli atau tidak.

Windows yang terdeteksi WGA ini dapat menyebabkan antara lain background desktop menjadi hitam, wallpaper tidak muncul dan selalu terdapat peringatan Windows Genuine Advantage. Memang apabila anda menginstall ulang, peringatan WGA bisa saja hilang. Tapi tentu sangat merepotkan karena semua program harus anda install kembali. Namun hanya dengan menginstall ulang windows bukan berarti WGA notification itu tidak muncul lagi.

Ada cara mudah untuk menghilangkan Windows Genuine Advantage, anda cukup me-rename extension dari wgalogon dan wgatray. Selain itu, sebenarnya untuk membuat genuine windows XP sangat mudah, namun berhubung kini XP sudah tidak laku lagi, berikut langkah-langkahnya untuk Windows 7.

- Buka folder system32 yang terdapat di C:\Windows\System32
- Cari file wgalogon.dll & ganti namanya menjadi wgalogon.dll.bak
- Klik kanan pada bagian kosong (folder System32) & pilih New » Text Document dan simpan dengan nama wgalogon.dll
- Cari file wgatray.exe & ganti namanya menjadi wgatray.txt
- Klik kanan pada bagian kosong & pilih New » Text Document dan simpan dengan nama wgatray.exe
- Ganti LegitCheckControl.dll menjadi LegitCheckControl.dll.bak & buat Text Document dengan nama legitcheckcontrol.dll dan simpan di folder System32
- Restart komputer anda!
- Jangan lupa menonaktifkan automatic updatenya dengan klik kanan MyComputer » Klik tab Automatic Update » Pilih Turn Off

1. Manual Method

- Matikan automatic update nya > klik kanan My Computer > properties > klik tab automatic update > klik turn off > OK
- Masuk ke regedit > HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify.
- hapus folder ‘WgaLogon’ dan semua isi nya
- Restart komputer, kemudian masuk pada safe mode dengan menekan tombol F8 saat booting.
- Cari dan hapus file-file dibawah ini

C:\WINDOWS\system32\WgaLogon.dll
C: \WINDOWS\system32\WgaTray.exe
C:\WINDOWS\system32\LegitCheckControl.dll


- selesai. restart windows anda.

2. Cara Otomatis(Menggunakan Software)

Khusus untuk win 7 tidak perlu repot, cukup download software windows 7 loader activator remOVEWAT. Kemudian instal dan jalankan, setelah running dia akan minta restart. jangan lupa non-active kan update windowsnya agar tidak ada lagi Windows Genuine Advantage Notification.
Saturday, September 18, 2010

Toshiba Flashdisk Not Responding Fix

toshiba flashdrive not responding fix imageYour Flashdisk didn't responding? i think it's really annoying. Someone ask me about his Toshiba Flashdisk which won't work properly, it just show report disk drive and not responding in any PC. I don't say that Toshiba flash drive is bad, but many people meets that problem. Here i'll explain how to fix it, Try to follow the instructions on this page, it might the Flashdisk is infected by any malicious file.

Follow this guide :

  • Go to Toshiba Downloads, navigate to your model and look for updated flash card oand the Toshiba Value Added Package. Good time to update other drivers while there.


  • Download the one you need - SAVE - go to where you put them - RIGHT CLICK - RUN AS ADMIN - REBOOT

  • after each installation - you should check in Device Manager to make sure the drivers were updated as some (such as sound)
  • You might need to be run more than once as they Roll Back until finally the current driver is installed. Other things you can try include removing possible corruption from system.
  • Start - type this in Search Box -> COMMAND find at top and RIGHT CLICK - RUN AS ADMIN
  • Enter this at the prompt - sfc /scannow
  • How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
  • generates in Windows Vista cbs.log

  • Try running checkdisk - schedule it to run at next start and then Apply OK your way out then restart.
  • How to Run Check Disk at Startup in Vista

Hope this help your Toshiba Flashdisk Not Responding.
Friday, September 17, 2010

VPN (Virtual Private Network)

What's VPN? VPN(Virtual Private Network)technology included in Windows Server 2003 helps enable cost-effective, secure remote access to private networks. VPN allows administrators to take advantage of the Internet to help provide the functionality and security of private WAN connections at a lower cost. In Windows Server 2003, VPN is enabled using the Routing and Remote Access service. VPN is part of a comprehensive network access solution that includes support for authentication and authorization services, and advanced network security technologies.

There are two main strategies that help provide secure connectivity between private networks and enabling network access for remote users.

Dial-up or leased line connections
A dial-up or leased line connection creates a physical connection to a port on a remote access server on a private network. However, using dial-up or leased lines to provide network access is expensive when compared to the cost of providing network access using a VPN connection.

VPN connections
VPN connections use either Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol/Internet Protocol security (L2TP/IPSec) over an intermediate network, such as the Internet. By using the Internet as a connection medium, VPN saves the cost of long-distance phone service and hardware costs associated with using dial-up or leased line connections. A VPN solution includes advanced security technologies such as data encryption, authentication, authorization, and Network Access Quarantine Control.

Note *Network Access Quarantine Control is used to delay remote access to a private network until the configuration of the remote access computer has been examined and validated.

Using VPN, administrators can connect remote or mobile workers (VPN clients) to private networks. Remote users can work as if their computers are physically connected to the network. To accomplish this, VPN clients can use a Connection Manager profile to initiate a connection to a VPN server. The VPN server can communicate with an Internet Authentication Service (IAS) server to authenticate and authorize a user session and maintain the connection until it is terminated by the VPN client or by the VPN server. All services typically available to a LAN-connected client (including file and print sharing, Web server access, and messaging) are enabled by VPN.

VPN clients can use standard tools to access resources. For example, clients can use Windows Explorer to make drive connections and to connect to printers. Connections are persistent: Users do not need to reconnect to network resources during their VPN sessions. Because drive letters and universal naming convention (UNC) names are fully supported by VPN, most commercial and custom applications work without modification.

VPN Scenarios
Virtual private networks are point-to-point connections across a private or public network such as the Internet. A VPN client uses special TCP/IP-based protocols, called tunneling protocols, to make a virtual call to a virtual port on a VPN server. In a typical VPN deployment, a client initiates a virtual point-to-point connection to a remote access server over the Internet. The remote access server answers the call, authenticates the caller, and transfers data between the VPN client and the organization’s private network.

To emulate a point-to-point link, data is encapsulated, or wrapped, with a header. The header provides routing information that enables the data to traverse the shared or public network to reach its endpoint. To emulate a private link, the data being sent is encrypted for confidentiality. Packets that are intercepted on the shared or public network are indecipherable without the encryption keys. The link in which the private data is encapsulated and encrypted is known as a VPN connection.



Remote Access VPN
Remote access VPN connections enable users working at home or on the road to access a server on a private network using the infrastructure provided by a public network, such as the Internet. From the user’s perspective, the VPN is a point-to-point connection between the computer (the VPN client) and an organization’s server. The exact infrastructure of the shared or public network is irrelevant because it appears logically as if the data is sent over a dedicated private link.

Site-to-Site VPN
Site-to-site VPN connections (also known as router-to-router VPN connections) enable organizations to have routed connections between separate offices or with other organizations over a public network while helping to maintain secure communications. A routed VPN connection across the Internet logically operates as a dedicated WAN link. When networks are connected over the Internet, as shown in the following figure, a router forwards packets to another router across a VPN connection. To the routers, the VPN connection operates as a data-link layer link.

A site-to-site VPN connection connects two portions of a private network. The VPN server provides a routed connection to the network to which the VPN server is attached. The calling router (the VPN client) authenticates itself to the answering router (the VPN server), and, for mutual authentication, the answering router authenticates itself to the calling router. In a site-to site VPN connection, the packets sent from either router across the VPN connection typically do not originate at the routers.
Tuesday, September 14, 2010

Windows 7 Wireless Setup

windows 7 wireless setupWindows 7 wireless, setting up, defining features of this network will be the lack of network passwords for local connections(both wirelessly or wired) and no single “boss” computer. Devices on the network will act as peers – no computer will rely on another computer to be present on the network – in order to reach the Internet, but it won’t be an ad-hoc network. File and folder sharing, of course, will depend on other computers being present, but we’ll look at specifying what folders we’ll share with others and these we will share and share alike.

Router Configurations
The most boss-like object in the network is the wireless router. For our purposes, we’ll presuppose that each computer can connect to the router. In our test network, the Vista desktop computer has the wired connection to the router and was used to set the router up. It’s very important that the router is not left at defaults and is set up properly because the security of the simplified network is based on the router and on having both a strong network password and an encrypted connection. By strong password, we mean a mix of letters and numbers that can’t be guessed or easily “cracked” by brute force. Your router setup program may suggest a pseudo-random password based on the encryption you selected. This is very safe to use. By encryption, we mean Wi-Fi Protected Access, or WPA-PSK. The “PSK” part stands for “pre-shared key,” which is that secure password.

Since setup varies and you’ll need to use the documentation for your router to perform it, we’ll only briefly touch further on this. You want to set it to broadcast your network name or service set identifier (SSID). You’ll want to make sure that each computer on the network can reach the Internet. A somewhat common problem you may encounter is that a PC can connect wirelessly to the router and seems to be passing some data when you view “Status” for the device, but the web browser can’t reach any web pages.

This can mean that the computer was set up by default for wireless networking(with Microsoft networks, of course), but not for Internet access. It is, however, easy to fix.
Monday, September 13, 2010

Increase traffic with SEO

increase traffic with SEO imageSEO learning for increasing traffic which really important for optimizing your site. By increasing traffic to your site you will get the other parts of your site increase. They can be your Alexa rank and the more important is your online earning that automatically will increase too. So you must able to find the ways that can effect to your traffic ascendant. If you are disable to find the ways, doing tips and tricks from another webmaster who are willing to share their experiences freely.

In connection with topic of this post, I would like to share my little knowledge about SEO that you can use to get huge traffic. But actually there are many choices for us to get it and all of you own better knowledge and experience about it than me. Beside using my SEO technique what I want to show you here is about the way to write title and the way to write first page of your post.

What I have done to most of my post titles is composing them from some keywords that usually searched by people. Maybe you ever found there are some titles that false to be said as a title. This might caused by I am not the expert in combining these keywords. But what you need to underlined is make your post title contained with multiple keywords.

Then the second is about writing your first page of your post. I am not forcing you to do this but I this is what I always do to my first line of my post. I rewrite my post title and combine it with the other word until appropriately, it become a sentence.

This is my habit in writing. I don’t have any goal, I don’t mean to become a guru. I know that all of you have better knowledge than me. It is up to you if to use this tips when you interested. But if you are not interested to this post, think that this only an proof really use SEO to write. I am sorry, I just an online farmer who farming through this blog. Once more I really sorry for all mistakes I have made accidentally. Hope my trick can increase your website traffic.

Get Facebook Texas Hold Em Chip for Free

Get Facebook Texas Hold Em Chip for Free imageFacebook Texas Hold'Em are most favourite game for some peoles facebook user. Here, in this page will inform you of various poker cheats on Facebook as they become available. A number of cheats come up for Facebook Zynga poker from time to time, and although these are periodically caught and blocked by Facebook, new ones are developed frequently.

Since cheats are developed frequently, the methods for gaining chips can vary. Sometimes, these cheats are simple methods to employ, while other times a hack can be used to add money to your poker account or make certain cards available more often. This page will provide links to current cheats and will provide information on the availability and consequences of using these cheats.

Aside from Facebook, Zynga Poker can also be played on MySpace and MyYahoo. The actual game is Texas Hold Em. In order to play Zynga Poker, players must have Adobe Flash. Players can acquire extra poker chips by accepting daily bonus chips sent by friends. The game also features contests like the Shoutout Grand Prize of the Week as well as a Weekly Tournament. In July of 2010 Facebook's Zynga Poker offered free chips and prizes during a "Summer Fun" hourly contest. Other prizes included items like a Zynga Poker t-shirt.

Facebook Poker Cheats
A common cheat used is the "ghost" cheat, whereby a player uses an alternate Facebook account to create a ghost player on his or her table. This way, the player has a higher chance of winning by playing as two or more players at the same time on the same table.

Several cheats and hacks have been developed to help players acquire poker chips more quickly than they are earned through normal gameplay. Be advised that these cheats are against the terms of service of each game, and using them puts your gaming account at risk. This page contains links to available cheats, but because the community and game developer monitor illicit activity, the cheats available may be limited and changed often.
Sunday, September 12, 2010

Backlink berkualitas untuk meningkatkan pagerank

backlink berkualitas image
Backlink berkualitas tentunya sangat dibutuhkan untuk meningkatkan pagerank, semua orang sudah tahu. Apalagi bagi para blogger yang terjun dalam bisnis paid review yang memang menggunakan pagerank sebagai syarat wajib untuk menuju kesuksesan. Tidak panjang lebar, karena backlink dan pagerank sudah saya bahas sebelumnya. Saya hanya akan menjelaskan sedikit apa yang saya tahu dan tentunya semuanya berdasarkan pendapat saya sendiri. Pertama - tama, kita harus tahu, apakah backlink berkualitas itu? kenapa banyak orang rela mengeluarkan banyak uang hanya untuk mendapatkan backlink berkualitas tersebut? Apakah untuk menaikkan PR atau cuma untuk menaikkan hasil tertinggi di SERP seperti yang dilakukan oleh para kontestan SEO dalam memperebutkan posisi atas. Karena kalau kita ketahui ternyata ada perbedaan diantara keduanya.

Backlink untuk meningkatkan pagerank

Untuk kita blogger pemula, backlink yang berkualitas mempunyai tujuan untuk meningkatkan pagerank google. Kalau ini yang kita cari tentunya backlink yang bagus dan berkualitas adalah backlink dari blog atau website yang mempunyai pagerank tinggi. Begini gambarannya, dibandingkan backlink dari blog PR1 sebanyak 6 kali dengan blog PR6 sebanyak 1 kali, masih bagus yang PR6. Dengan harapan website kita akan ikut terangkat pagerank-nya. Lalu, Bagaimana cara mendapatkan backlink tersebut? Tentu banyak cara yang salah satunya adalah berkomentar di blog dofolow dengan meningalkan link kita. Kalau kita hanya ingin menaikkan Pagerank, kita tidak usah memandang blog inggris ataupun indonesia. Asal mendapat backlink dengan page rank tinggi maka blog kita juga akan semakin naik page rank-nya.

Backlink untuk SERP

jika mencari backlink berkualitas dengan tujuan mendapatkan posisi atas di SERP. Mungkin bisa dikatakan banyak sekali perbedaan. Tapi saya akan memberikan perbedaan tersebut sesuai yang saya ketahui. Kalau untuk menaikkan PR kita membutuhkan backlink dengan PR tinggi, walaupun cuma sedikit, maka untuk menaikkan SERP kebalikannya. Walaupun PR kecil tapi banyak, maka posisi SERP akan lebih bagus dibanding PR tinggi tapi sedikit. Dan juga target mesin pencari harus kita perhatikan. Kalau masalah menaikkan PR tadi kita tidak peduli walaupun itu blog ingris atau indonesia dan lainnya. Tapi kalau SERP, jika target kita google indonesia, maka usahakan mencari backlink dari blog indonesia juga. Jika target adalah blog inggris, maka usahakan backlink dari blog berbahasa inggris. Namun, akan lebih baik jika kita juga melihat kualitas backlink kita.

Selamat mencoba, tutorial ini saya dapat berdasarkan pengalaman saya sebagai SEO pemula, get more and more quality backlink.

The right online promotion method

online promotion and link buiding imageWebsite are the basic tools for us to share on the internet, especially for online promotion. Links from the inside (called internal links) of your site will get you to the top of search engine rankings, but if internal linking isn’t getting you where you need to go, then it’s time to bring in some help from outside of your site. Over time, your link building efforts will increase your ability to do things with internal links as well.

Please remember, link building is the only method to increase our website search engine ranking. If we can do link building well, we have done the right online promotion method. With each planning cycle, take stock of your links, and the effectiveness of your link building activities. Activities that have been particularly successful are worth pursuing further or expanding. Those that haven’t delivered need to be improved or removed from your plan.

Because I put a strong emphasis on profitable promotions, I like to try something new with every planning cycle. I always want to have at least one new type of promotion going on, with the goal in mind of creating a profitable marketing activity that will create links as a side benefit.

If you have paid for advertising from vertical directories, take a look at the traffic these links are bringing in, and how well it converts into leads and sales. If you find a particularly profitable type of advertising, then look for ways to expand it, possibly reducing the budget in other areas where you aren’t generating a profit.

In the long run, we want our link building campaign to pay for itself. That’s not an easy goal to reach right away, but it is possible to get there over time. So, don;t think the other way with our online promotion method, just focus for the link building campaign.
Friday, September 10, 2010

SEO Keyword Learning Guide

seo keyword learning guide imageSEO are the most important thing when we have a site, one of the worst mistakes that novices make is trying to focus on a single word or phrase for SEO keyword, and attempt to build a good website that will rank well. Extremely general terms such as these are very competitive, difficult for search engines to handle well (in terms of giving good results to searchers), and hardly worth the trouble in the first place.

Let’s imagine that, after spending hundreds of hours tweaking, perfecting, and promoting your site, you managed to get a #1 ranking for “real estate.” Unless you sell real estate of all kinds in every part of the world, a substantial amount of the traffic you’ll get will come from people who are looking for something you don’t have to offer.

Although you may not optimize your site for such keywords. SEO keyword learning is very important that you know what they are, as it applies to your site. As you work through this post, make a list of the 5-10 “major” keywords that describe your website. It's named SEO keyword learning.
Friday, September 3, 2010

Intel Proccessor CORE i7, CORE i5, CORE i3

prosesor i7 i5 3 intel imageIntel setelah sukses meluncurkan prosesor handalnya yaitu core 2 duo, Dual Core, dan Core 2 Quad, sekarang intel meluncurkan prosesor versi baru yaitu core i7. tetapi, setelah i7 resmi terbit, ternyata intel akan meluncurkan lagi 2 versi terbaru untuk prosesornya yakni core i3 dan core i5.

dari segi performa bisa dibandingkan jika core i3 adalah sero Low-end, i5 adalah seri Mid-end, dan i7 adalah seri High-end karena ternya core i3 dan i5 adalah versi rendahnya dari i7. yang membedakan diantara ketiganya terletak pada jumlah socket LGA. Core i7 menggunakan socket LGA-1366 sedangkan Core i5 dan i3 menggunakan socket LGA-1156.

Selain itu Core i5 dan i7 sudah memiliki fitur “Intel Turbo Mode Technology” yaitu suatu fitur yang akan mengatur mati/ nyalanya core yang tidak usah dipergunakan ketika kita hanya menjalankan single thread saja. Dengan Turbo Mode, Processor hanya akan mengaktifkan core yang akan digunakan saja, lalu meng-overclock aliran thread data yang lewat diatasnya agar berjalan lebih cepat.

Intel Core i7

Core i7 sendiri merupakan processor pertama dengan teknologi “Nehalem”. Nehalem menggunakan platform baru yang betul-betul berbeda dengan generasi sebelumnya. Salah satunya adalah mengintegrasikan chipset MCH langsung di processor, bukan motherboard. Nehalem juga mengganti fungsi FSB menjadi QPI (Quick Path Interconnect) yang lebih revolusioner.

Intel Core i5

Jika Bloomfield adalah codename untuk Core i7 maka Lynnfield adalah codename untuk Core i5. Core i5 adalah seri value dari Core i7 yang akan berjalan di socket baru Intel yaitu socket LGA-1156. Tertarik begitu mendengar kata value ? Tepat ! Core i5 akan dipasarkan dengan harga sekitar US$186.

Kelebihan Core i5 ini adalah ditanamkannya fungsi chipset Northbridge pada inti processor (dikenal dengan nama MCH pada Motherboard). Maka motherboard Core i5 yang akan menggunakan chipset Intel P55 (dikelas mainstream) ini akan terlihat lowong tanpa kehadiran chipset northbridge. Jika Core i7 menggunakan Triple Channel DDR 3, maka di Core i5 hanya menggunakan Dual Channel DDR 3. Penggunaan dayanya juga diturunkan menjadi 95 Watt. Chipset P55 ini mendukung Triple Graphic Cards (3x) dengan 1×16 PCI-E slot dan 2×8 PCI-E slot. Pada Core i5 cache tetap sama, yaitu 8 MB L3 cache.

Intel juga meluncurkan Clarksfield, yaitu Core i5 versi mobile yang ditujukan untuk notebook. Socket yang akan digunakan adalah mPGA-989 dan membutuhkan daya yang terbilang cukup kecil yaitu sebesar 45-55 Watt.

Intel Core i3

Intel Core i3 merupakan varian paling value dibandingkan dua saudaranya yang lain. Processor ini akan mengintegrasikan GPU (Graphics Processing Unit) alias Graphics On-board didalam processornya. Kemampuan grafisnya diklaim sama dengan Intel GMA pada chipset G45. Selain itu Core i3 nantinya menggunakan manufaktur hybrid, inti processor dengan 32nm, sedangkan memory controller/graphics menggunakan 45nm. Code produk Core i3 adalah “Arrandale”.

Sekian, semoga bermanfaat untuk pengetahuan anda :D
Wednesday, September 1, 2010

WiGig the next generation Wifi


WiFi terbukti andal mentransmisikan data melalui internet secara nirkabel. Kecepatannya pun makin tinggi. Walau saat ini baru hitungan Mbps atau megabit per second, ke depan kecepatannya bisa mencapai 10 kali lipat kecepatan saat ini atau dalam skala Gbps (gigabit per second). WiFi Alliance yang merupakan organisasi pengembang teknologi tersebut telah bergabung dengan Wireless Gigabit Alliance (WiGig) untuk mencapai target tadi. Salah satu manfaat transmisi data kecepatan tinggi yakni bisa menggantikan kabel untuk mengirimkan format video HD dari satu perangkat ke perangkat lainnya. Misalnya, dari Blu-ray player atau kamera langsung ke TV.



Saat ini, sejumlah konsorsium teknologi memang tengah bahu-membahu mengembangkan teknologi serupa. Sebelumnya, kelompok lain yang menamakan WirelessHD Consortium juga mengembangkan teknologi mirip WiGig. Banyak perusahaan yang tergabung dalam kedua konsorsium ini, seperti Samsung, Panasonic, dan Toshiba.

Aliansi Wifi akhirnya menetapkan pengembangan WiGig sebagai generasi koneksi wireless baru. WiGig tidak saja digunakan untuk koneksi nirkabel , tetapi untuk mentranfer data HD Video. Walaupun cepat, WiGig hanya diperuntukan untuk mengirim data sampai jarak maksimum 10m saja.

WiGig mengunakan frekuensi 60Ghz sudah mumpuni untuk kebutuhan tranfer data dengan daya besar. Bila standar baru tersebut disetujui, maka perusahaan pengembang chip akan mulai bekerja untuk membuat perangkat baru dengan koneksi WiGig. Di Inggris sendiri masih menunggu pengesahan pemakaian frekuensi 60Ghz untuk WiGig secara bebas.

WiGig bukanlah sebuah koneksi tanpa pesaing bila digunakan untuk perangkat elektronik. Sony dengan TranferJet mampu mentranfer data dengan kecepatan 560Mbit/s walau jarang jangkau pendek. Atau BlueTooth 3.0 mampu mentranfer data dengan kecepatan 24Mbit/s dan Rival System memiliki perangkat WirelessHD berkemampuan mentranfer data sampai 10Gbit/s

Microsoft research skin input

Microsoft sedang melakukan penelitian terhadap perangkat skin inpit dimana kemungkinan manusia hanya perlu menekan telapak tangan atau lengannya sendiri untuk melakukan panggilan di ponsel di masa depan. Cikal bakalnya sekarang sudah ada, yakni teknologi yang dinamakan Skinput. Skinput (Skin Input) yang dikembangkan Microsoft bersama Carnegie Mellon University di Amerika Serikat ini, memungkinkan kulit manusia dijadikan media touchscreen atau layar sentuh untuk menavigasi gadget.Perangkat Skinput yang dikaitkan di lengan pengguna, mampu mendeteksi level suara yang terjadi kala kulit ditekan, sehingga mampu membedakan perintah yang diberikan. Sebuah proyektor mungil menampilkan layar di kulit pengguna.




Prototipe Skinput ini menggunakan teknologi nirkabel untuk mentransfer komando ke perangkat tertentu, misalnya ponsel, iPod sampai komputer. Saat ini, Skinput bisa digunakan untuk mendeteksi lima lokasi input dengan akurasi 95,5 persen. Namun teknologi ini masih dalam awal perkembangan. Sebanyak 20 relawan saat ini baru mengujicobanya, semuanya dilaporkan puas dengan kemudahan navigasi Skinput. Tampaknya Skinput termasuk teknologi yang cukup menjanjikan.

Microsoft Table Computer

microsoft tablet PCMicrosoft telah menciptakan teknologi Tabletop atau yang dinamakan Microsoft Surface, sebuah coffee-table yang berbentuk seperti komputer, yang mampu merespon sentuhan dan bar code khusus yang dimasukkan dari objek setiap harinya. Mesin tersebut telah dirilis Microsoft pada konferensi teknologi di Carlsbad, Calif, dan nantinya akan diaplikasikan ke T-Mobile USA dan properti-nya akan dipegang oleh Starwood Hotels & Resorts Worldwide Inc.dan Harrah’s Entertainment Inc.

Microsoft Surface menganut prinsip Vista yang kaya akan warna, dibalik dasar meja yang berwarna shinny black. Meja tersebut memiliki ukuran 30 inch dan layar touchscreen dalam frame acrylic yang jernih. Terdapat lima kamera yang memiliki sensitivitas dekat objek yang ada di antara layar. User dapat berinteraksi dengan teknologi Tabletop tersebut dengan menyentuhnya atau men-drag jemarinya dan objek seperti melukis sebuah foto atau gambar dalam layar, atau membuat item di dunia nyata menjadi label bar code spesial di atas meja tersebut.

microsoft tablet PC

Tidak seperti touchscreen lainnya, Microsoft Surface dapat merespon lebih dari satu sentuhan yang dilakukan secara bersamaan. Mark Bolger, Direktur Marketing Surface Computing Group, telah mendemonstrasikan teknologi Tabletop tersebut dengan menekankan satu jarinya ke layar paint palette meja tersebut, lalu men-drag hingga terbentuk wajah yang tersenyum. Kemudian, ia menggunakan 10 jarinya sekali lagi untuk menggambar wajah, lengkap dengan kepala dan rambut.
Kemudian Bolger juga menaruh sebuah kartu kredit dengan bar code yang mengarah ke permukaan layar meja Surface tersebut. Lalu tiba-tiba muncul foto digital yang keluar dari kartu kredit ke layar. Beberapa orang kemudian mendapatkan foto tersebut keluar dari kartu kredit hanya dengan menggunakan jemari-nya, untuk merotasi gambar dalam lingkaran ataupun menarik foto dari sudut untuk memperbesar gambar. Bolger mengungkapkan kelebihan Microsoft Surface yakni interaksi langsung, multi-touch, multi-user, dan Identifikasi objek yang tepat dan akurat.

microsoft tablet PC

Microsoft Surface juga dapat digunakan untuk para pelanggan yang ingin membeli ponsel. Hanya dengan meletakkan handphone ke layar meja, Surface akan membaca bar code dan menampilkan informasi mengenai ponsel tersebut. Pelanggan juga dapat memilih nomor telepon yang akan dipanggil dan ringtone dengan men-drag icon menuju ponsel. Para tamu yang ada di Hotel Starwood juga dapat menggunakan Microsoft Surface yang berteknologi Tabletop tersebut untuk membeli lagu yang dibayar via credit card atau reward card dengan bar code. Di hotel, pelanggan juga dapat memesan makanan dan minuman, lalu meletakkan bill pembayaran dengan men-drag kartu kredit atau ruang kunci dan meletakkan menu yang dipesan ke ‘dalam‘ credit card.
Teknologi Tabletop atau yang disebut Microsoft Surface memiliki harga yang cukup mahal yakni antara USD 5.000 hingga USD 10.000 per unit. Untuk sekarang, Microsoft telah membuat hardware Surface sendiri dan hanya memiliki enam software yang diberikan oleh pengembang software sebagai tool yang digunakan untuk membangun aplikasi Surface.

About Me