Computer With Dial-up

Koneksi internet itu dapat kamu tingkatkan, tinggan ganti beberapa setting tertentu pada Windows. kamu tidak akan rugi untuk mencoba cara mempercepat secara manual meskipun sekarang ini banyak software - software untuk meningkatkan performa koneksi internet kita. tapi ga ada salahnya kalian ikuti cara di bawah ini:

1. (pertama)
Klik Control Panel ===> klik icon Modem.
Pada kotak dialog Modem Properties, pilih modem yang akan disetting ==> klik pada tombol Properties
Pilih tab General, ubah Maximum Speed menjadi 115200.
Pilih ke tab Connection ==> klik tombol Port Setting.
Dari kotak dialog Advanced Port Setting, tandai / check pada Use FIFO buffers. lau ubah Receive Buffer menjadi 14 dan Transmit Buffer jadi 16. ==> Lalu klik OK.
Klik button Advanced, tandai / check pada Use Flow Control. Lalu pilihlah radio button Hardware. Pada bagian Extra Setting, isi dengan &C1&D2E1Q0V1X4%C0 S7=55 S11=55 S0=0.

2. (dua)
Klik Control Panel ==> klik icon System.
Pilih ke tab Device Manager.
Pada bagian Ports (COM & LPT), pilih port yang dipakai oleh modem kamu ==> klik tombol Properties.
Pilih ke tab Port Settings.
Pada bagian Bits per second, isi 921600.

3. (tiga)
Buka file system.ini yang terletak di C:Windows.
Pada bagian [386Enh], tambahkan dengan COM1Buffer=16384. Ubah COM1 dengan port yang digunakan oleh modem.
Ga ada salahnya kan kalian coba Tips & Trick ini... kalo bisa pake cara ini kenapa harus beli software yang mahal...

Selamat Mencoba....

How Linux boots ???

How Linux boots

As it turns out, there isn't much to the boot process:

1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
2. The kernel initializes the devices and its drivers.
3. The kernel mounts the root filesystem.
4. The kernel starts a program called init.
5. init sets the rest of the processes in motion.
6. The last processes that init starts as part of the boot sequence allow you to log in.

Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. To start, zero in on the boot loader, which is the initial screen or prompt you get after the computer does its power-on self-test, asking which operating system to run. After you make a choice, the boot loader runs the Linux kernel, handing control of the system to the kernel.

There is a detailed discussion of the kernel elsewhere in this book from which this article is excerpted. This article covers the kernel initialization stage, the stage when the kernel prints a bunch of messages about the hardware present on the system. The kernel starts init just after it displays a message proclaiming that the kernel has mounted the root filesystem:

VFS: Mounted root (ext2 filesystem) readonly.

Soon after, you will see a message about init starting, followed by system service startup messages, and finally you get a login prompt of some sort.

NOTE On Red Hat Linux, the init note is especially obvious, because it "welcomes" you to "Red Hat Linux." All messages thereafter show success or failure in brackets at the right-hand side of the screen.



Most of this chapter deals with init, because it is the part of the boot sequence where you have the most control.
init

There is nothing special about init. It is a program just like any other on the Linux system, and you'll find it in /sbin along with other system binaries. The main purpose of init is to start and stop other programs in a particular sequence. All you have to know is how this sequence works.

There are a few different variations, but most Linux distributions use the System V style discussed here. Some distributions use a simpler version that resembles the BSD init, but you are unlikely to encounter this.

Runlevels

At any given time on a Linux system, a certain base set of processes is running. This state of the machine is called its runlevel, and it is denoted with a number from 0 through 6. The system spends most of its time in a single runlevel. However, when you shut the machine down, init switches to a different runlevel in order to terminate the system services in an orderly fashion and to tell the kernel to stop. Yet another runlevel is for single-user mode, discussed later.

The easiest way to get a handle on runlevels is to examine the init configuration file, /etc/inittab. Look for a line like the following:

id:5:initdefault:

This line means that the default runlevel on the system is 5. All lines in the inittab file take this form, with four fields separated by colons occurring in the following order:
# A unique identifier (a short string, such as id in the preceding example)
# The applicable runlevel number(s)
# The action that init should take (in the preceding example, the action is to set the default runlevel to 5)
# A command to execute (optional)

There is no command to execute in the preceding initdefault example because a command doesn't make sense in the context of setting the default runlevel. Look a little further down in inittab, until you see a line like this:

l5:5:wait:/etc/rc.d/rc 5

This line triggers most of the system configuration and services through the rc*.d and init.d directories. You can see that init is set to execute a command called /etc/rc.d/rc 5 when in runlevel 5. The wait action tells when and how init runs the command: run rc 5 once when entering runlevel 5, and then wait for this command to finish before doing anything else.

There are several different actions in addition to initdefault and wait, especially pertaining to power management, and the inittab(5) manual page tells you all about them. The ones that you're most likely to encounter are explained in the following sections.

respawn

The respawn action causes init to run the command that follows, and if the command finishes executing, to run it again. You're likely to see something similar to this line in your inittab file:

1:2345:respawn:/sbin/mingetty tty1

The getty programs provide login prompts. The preceding line is for the first virtual console (/dev/tty1), the one you see when you press ALT-F1 or CONTROL-ALT-F1. The respawn action brings the login prompt back after you log out.

ctrlaltdel

The ctrlaltdel action controls what the system does when you press CONTROL-ALT-DELETE on a virtual console. On most systems, this is some sort of reboot command using the shutdown command.

sysinit

The sysinit action is the very first thing that init should run when it starts up, before entering any runlevels.

How processes in runlevels start

You are now ready to learn how init starts the system services, just before it lets you log in. Recall this inittab line from earlier:

l5:5:wait:/etc/rc.d/rc 5

This small line triggers many other programs. rc stands for run commands, and you will hear people refer to the commands as scripts, programs, or services. So, where are these commands, anyway?

For runlevel 5, in this example, the commands are probably either in /etc/rc.d/rc5.d or /etc/rc5.d. Runlevel 1 uses rc1.d, runlevel 2 uses rc2.d, and so on. You might find the following items in the rc5.d directory:

S10sysklogd S20ppp S99gpm
S12kerneld S25netstd_nfs S99httpd
S15netstd_init S30netstd_misc S99rmnologin
S18netbase S45pcmcia S99sshd
S20acct S89atd
S20logoutd S89cron

The rc 5 command starts programs in this runlevel directory by running the following commands:

S10sysklogd start
S12kerneld start
S15netstd_init start
S18netbase start
...
S99sshd start

Notice the start argument in each command. The S in a command name means that the command should run in start mode, and the number (00 through 99) determines where in the sequence rc starts the command.

The rc*.d commands are usually shell scripts that start programs in /sbin or /usr/sbin. Normally, you can figure out what one of the commands actually does by looking at the script with less or another pager program.

You can start one of these services by hand. For example, if you want to start the httpd Web server program manually, run S99httpd start. Similarly, if you ever need to kill one of the services when the machine is on, you can run the command in the rc*.d directory with the stop argument (S99httpd stop, for instance).

Some rc*.d directories contain commands that start with K (for "kill," or stop mode). In this case, rc runs the command with the stop argument instead of start. You are most likely to encounter K commands in runlevels that shut the system down.

Adding and removing services

If you want to add, delete, or modify services in the rc*.d directories, you need to take a closer look at the files inside. A long listing reveals a structure like this:

lrwxrwxrwx . . . S10sysklogd -> ../init.d/sysklogd
lrwxrwxrwx . . . S12kerneld -> ../init.d/kerneld
lrwxrwxrwx . . . S15netstd_init -> ../init.d/netstd_init
lrwxrwxrwx . . . S18netbase -> ../init.d/netbase
...

The commands in an rc*.d directory are actually symbolic links to files in an init.d directory, usually in /etc or /etc/rc.d. Linux distributions contain these links so that they can use the same startup scripts for all runlevels. This convention is by no means a requirement, but it often makes organization a little easier.

To prevent one of the commands in the init.d directory from running in a particular runlevel, you might think of removing the symbolic link in the appropriate rc*.d directory. This does work, but if you make a mistake and ever need to put the link back in place, you might have trouble remembering the exact name of the link. Therefore, you shouldn't remove links in the rc*.d directories, but rather, add an underscore (_) to the beginning of the link name like this:

mv S99httpd _S99httpd

At boot time, rc ignores _S99httpd because it doesn't start with S or K. Furthermore, the original name is still obvious, and you have quick access to the command if you're in a pinch and need to start it by hand.

To add a service, you must create a script like the others in the init.d directory and then make a symbolic link in the correct rc*.d directory. The easiest way to write a script is to examine the scripts already in init.d, make a copy of one that you understand, and modify the copy.

When adding a service, make sure that you choose an appropriate place in the boot sequence to start the service. If the service starts too soon, it may not work, due to a dependency on some other service. For non-essential services, most systems administrators prefer numbers in the 90s, after most of the services that came with the system.

Linux distributions usually come with a command to enable and disable services in the rc*.d directories. For example, in Debian, the command is update-rc.d, and in Red Hat Linux, the command is chkconfig. Graphical user interfaces are also available. Using these programs helps keep the startup directories consistent and helps with upgrades.

HINT: One of the most common Linux installation problems is an improperly configured XFree86 server that flicks on and off, making the system unusable on console. To stop this behavior, boot into single-user mode and alter your runlevel or runlevel services. Look for something containing xdm, gdm, or kdm in your rc*.d directories, or your /etc/inittab.

Controlling init

Occasionally, you need to give init a little kick to tell it to switch runlevels, to re-read the inittab file, or just to shut down the system. Because init is always the first process on a system, its process ID is always 1.

You can control init with telinit. For example, if you want to switch to runlevel 3, use this command:

telinit 3

When switching runlevels, init tries to kill off any processes that aren't in the inittab file for the new runlevel. Therefore, you should be careful about changing runlevels.

When you need to add or remove respawning jobs or make any other change to the inittab file, you must tell init about the change and cause it to re-read the file. Some people use kill -HUP 1 to tell init to do this. This traditional method works on most versions of Unix, as long as you type it correctly. However, you can also run this telinit command:

telinit q

You can also use telinit s to switch to single-user mode.

Shutting down

init also controls how the system shuts down and reboots. The proper way to shut down a Linux machine is to use the shutdown command.

There are two basic ways to use shutdown. If you halt the system, it shuts the machine down and keeps it down. To make the machine halt immediately, use this command:

shutdown -h now

On most modern machines with reasonably recent versions of Linux, a halt cuts the power to the machine. You can also reboot the machine. For a reboot, use -r instead of -h.

The shutdown process takes several seconds. You should never reset or power off a machine during this stage.

In the preceding example, now is the time to shut down. This argument is mandatory, but there are many ways of specifying it. If you want the machine to go down sometime in the future, one way is to use +n, where n is the number of minutes shutdown should wait before doing its work. For other options, look at the shutdown(8) manual page.

To make the system reboot in 10 minutes, run this command:

shutdown -r +10

On Linux, shutdown notifies anyone logged on that the machine is going down, but it does little real work. If you specify a time other than now, shutdown creates a file called /etc/nologin. When this file is present, the system prohibits logins by anyone except the superuser.

When system shutdown time finally arrives, shutdown tells init to switch to runlevel 0 for a halt and runlevel 6 for a reboot. When init enters runlevel 0 or 6, all of the following takes place, which you can verify by looking at the scripts inside rc0.d and rc6.d:

1. init kills every process that it can (as it would when switching to any other runlevel).

# The initial rc0.d/rc6.d commands run, locking system files into place and making other preparations for shutdown.
# The next rc0.d/rc6.d commands unmount all filesystems other than the root.
# Further rc0.d/rc6.d commands remount the root filesystem read-only.
# Still more rc0.d/rc6.d commands write all buffered data out to the filesystem with the sync program.
# The final rc0.d/rc6.d commands tell the kernel to reboot or stop with the reboot, halt, or poweroff program.

The reboot and halt programs behave differently for each runlevel, potentially causing confusion. By default, these programs call shutdown with the -r or -h options, but if the system is already at the halt or reboot runlevel, the programs tell the kernel to shut itself off immediately. If you really want to shut your machine down in a hurry (disregarding any possible damage from a disorderly shutdown), use the -f option.
good luck ^_^

Delete An "undeletable" File

It' s little tutorial for you, for delete an undeleteable file
Open a Command Prompt window and leave it open.
Close all open programs.
Click Start, Run and enter TASKMGR.EXE
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.
At the command prompt type DEL where is the file you wish to delete.
Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Close Task Manager.


Or you can try this

Open Notepad.exe

Click File>Save As..>

locate the folder where ur undeletable file is

Choose 'All files' from the file type box


click once on the file u wanna delete so its name appears in the 'filename' box

put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)

click save,

It should ask u to overwrite the existing file, choose yes and u can delete it as normal


Here's a manual way of doing it. I'll take this off once you put into your first post zain.

1. Start
2. Run

3. Type: command
4. To move into a directory type: cd c:\*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

good luck ^_^

Securing WinXP Pro (with what win-xp has to offer)

Note: These are just notes of the changes i made to win-xp pro using win-xp options
after my default install. These changes will not secure your box 100% but they
make a good couple of 1st steps. They are in no specific order other than the
order that I performed them. I have only spent a couple of hours working on
this operating system at the time of this text so please bare with me and
understand that there is much more to securing your box than this.

1. NTFS Partition.
2. Disable Error Reporting
3. Disable Automatic Updates (only if your XP copy is pirated)
4. Disable "Recent Documents" Viewed
5. Setup XP Firewall
6. Setup screensaver password
7. Setup BIOS password
8. Setup "AfterBios" login password
9. Account Modifications
-Rename Admin Account
-Disable Guest Account
-Disable Help_Assistant Account
-Disable Support Account
10. Install a virus scanner.
11. Change Login Screen (default shows usernames)
12. Disable Remote Registry (and other services)
13. Disable/Change Auto-Search settings in IE.


1. -----------------------------------------------------------------------------------------
NTFS Partition (I like being God over system users)
-----------------------------------------------------------------------------------------

Be sure to install XP onto an NTFS partition so that you (the admin) can take advantage
of file permissions. You want this option so that "you" can decide who reads, writes,
executes what files.

If you didnt install XP onto an NTFS partition. Convert It. To convert to NTFS follow
the instructions below.

Open a command prompt and type "convert c: /FT:NTFS /v"

This command will convert your c: partition from FAT to NTFS in verbose mode.


2. -----------------------------------------------------------------------------------------
Disable Error Reporting - we dont want microsoft to know everytime we fuck up.
especially if we didnt pay for winxp.
-----------------------------------------------------------------------------------------

control panel >> performance and maintenance >> system >> advanced >> error reporting
(disable all)

right click "my computer" >> manage >> services and applications >> services >> " stop
and disable" Error Reporting.

3. -----------------------------------------------------------------------------------------
Disable automatic updates - to update, they must know what we have. thats a NO NO!
-----------------------------------------------------------------------------------------

NOTE: DO THIS ONLY IF YOUR COPY OF XP IS PIRATED!! I suggest "auto update" if your copy
of XP is legal. If your copy is pirated then i suggest that you stay updated with
the latest fixes and patches manually.

control panel >> performance and maintenance >> system >> automatic updates
(disable updates)

right click "my computer" >> manage >> services and applications >> services >> " stop
and disable" Automatic Updates.

4. -----------------------------------------------------------------------------------------
Quit listing most recent documents opened under the start button - Dont want the
girlfriend or the parents to find that pr0n you being viewing.
-----------------------------------------------------------------------------------------

control panel >> appearance and themes >> task bar and start menu >> start menu >>
customize >> advanced

remove the checkmark next to "List my most recently opened documents".

5. -----------------------------------------------------------------------------------------
Block incoming traffic to your winxp box. - Before this change, i scanned my xp box and
found it to have many ports wide open. After this change, I found nothing and xp logged
the attempts in c:\windows\pfirewall.log.
-----------------------------------------------------------------------------------------

control panel >> network connections >> right click "local area connection" >> properties
>> advanced >> check the box under "Internet Connection Firewall" then choose "settings".

Services Tab - leave all unchecked unless there is a service you are running that people
must be able to access.

Logging Options - Log everything.

ICMP - I left all these unchecked for the time being. (allowing nothing)

(this does not protect you from "Spy Ware". This only stops traffic from coming into
your win-xp box (not all traffic). It does not stop traffic from going out.) If you
need to stop traffic from going out and need a more secure firewall then download a real
firewall like "zone alarm or black ice".

6. -----------------------------------------------------------------------------------------
Setting a screensaver password incase you leave some of that secret pr0n open when you
walk away.
-----------------------------------------------------------------------------------------
right click on the desktop >> properties >> screen saver >> check the box next to " On
Resume, Password Protect."

If you dont have a password set on your user account, you can do so in control panel >>
user accounts >> change account.

7. -----------------------------------------------------------------------------------------
Setting a BIOS password - We dont want anyone rebooting the computer or trying to sneak
into our pr0n while we are away at school or work.
-----------------------------------------------------------------------------------------

I cant explain to one how this is done due to the differences between all computers and
how the BIOS settings are entered. If you know what Im talking about then do it. If you
dont know what Im talking bout then learn how to do it. A screensaver password is useless
unless you setup a BIOS password.

8. ------------------------------------------------------------------------------------------
Setting up the "AfterBios" password. Sometimes bios passwords are easily cracked. This
password will add extra local login security incase your bios pass is crax0red. I dont
know bout you but i love having to type in 3 passwds and a username to login to my box.
------------------------------------------------------------------------------------------

Start >> run >> type "syskey" >> choose "update" >> choose "Password Startup" >> enter a
password and choose ok.

9. ------------------------------------------------------------------------------------------
Renaming and Disabling Accounts for adminstrator, guest, help_assistant and support.
------------------------------------------------------------------------------------------
Right click my_computer >> manage >> local users and groups

rename administrator account
disable guest account
disable help_assistant account
disable support account

10. -------------------------------------------------------------------------------------------
Install Virus Protection............. (We like our uncorrupted data and trojan free system)
-------------------------------------------------------------------------------------------

Install a virus scanner. Your firewall might protect your system from unwanted hackers but
what about an unwanted virus or trojan?. I recommend installing a virus scanner such as
"Nortons" or "McAfee".

11. -------------------------------------------------------------------------------------------
Change Default Login Screen............ (why do we want to share usernames with anyone?)
-------------------------------------------------------------------------------------------

Xp uses the "welcome screen" by default. This screen has the names of all accounts on the
system so that the user only has to click on their name and type a password. Come on now....
We arent that damn lazy. If we change this screen to the normal login, then prying eyes
will have to know a username and password to get in. Follow the instruction below to change
this.

control panel >> user accounts >> change the way users log on or off

uncheck the box next to "Use Welcome Screen" and choose "apply options".

12. -------------------------------------------------------------------------------------------
Disable Remote Registry..........(why would I need to edit my registry remotely anyway?)
-------------------------------------------------------------------------------------------

right click "my computer" >> manage >> services and applications >> services >> " stop
and disable" Remote Registry.

NOTE: disable any services running in this area that you arent using.

13. -------------------------------------------------------------------------------------------
Disable/Change Auto-search in Internet Explorer. This is not really a security risk but it
is important to some people that prefer to keep their internet surfing to themselves and
away from microsoft.
-------------------------------------------------------------------------------------------

Open Internet Explorer >> Click the "search" button >> click the "customize" button >> click
"autosearch settings" >> FOLLOW INSTRUCTIONS BELOW...........

DISABLE: In the "When Searching" drop down menu, select "Do not search from the address bar".
>> click "ok" >> "ok". Type an invalid address in your address bar and see if it
takes you to the msn search page or if it gives a "page not found" error. In this
case, the "page not found" error is what we want.

CHANGE: If you wish not to disable, but you wish to change it to your favorite "google.com"
search page. Instead of following the "DISABLE" instructions, follow the instructions
below. Choose "Google Sites (or whatever you prefer)" from the "choose a search provider
to search from address bar" drop down menu >> click "ok" >> "ok"

good luck ^_^

Kode Ponsel Untuk Semua Jenis

Kode Rahasia Ponsel

Tahukah anda bahwa informasi dan kinerja beberapa fitur ponsel bisa diketahui atau dijalankan menggunakan kode-kode tertentu?

Banyak kode yang bisa digunakan untuk memunculkan informasi tersembunyi dalam sebuah ponsel. Banyak gunanya. Contohnya, ketika tengah memilih ponsel, kita dapat melihat tanggal pembelian dan kapan terakhir ponsel diperbaiki. Atau bisa juga untuk melihat versi software yang digunakan dan identitas pribadi ponsel.

Berbagai kode akses tersembunyi tersebut bisa dijalankan dengan mengetik kode-kode yang diinginkan dalam posisi standby. Untuk perintah yang terkait jaringan operator, setelah menekan kode, lanjutkan dengan menekan tombol 'call' (biasanya bergambar gagang telepon berwarna hijau).

Kode akses Nokia :

*#30# : Menampilkan 'private number' yang menghubungi anda.
*#73# : Mereset timer ponsel dan skor game (pada beberapa ponsel).
*#7780# : Mengembalikan ke setting pabrik (factory setting).
*#2820# : Alamat IP perangkat Bluetooth (untuk ponsel yang mempunyai Bluetooth).
xx# : Akses cepat ke nama/nomer telepon di phone book ponsel, misalnya 20#.
Tombol off : Menekan dengan singkat, untuk berpindah antar profile.
*3370# : Mengaktifkan EFR(Enhanced Full Rate) Codec (tidak berlaku di ponsel Symbian).
#3370# : Menonaktifkan EFR Codec.
*#4270# : Mengaktifkan Half Rate Codec.
*#4270# : Menonaktifkan Half Rate Codec.
*#0000# : Menampilkan versi software ponsel.
*#9999# : Kode alternatif jika *#0000# tidak bekerja.
*#06# : Melihat nomor IMEI (Internasional Mobile Equipment Identity).
*#21# : Mengecek nomor pengalihan "All Call" yang digunakan.
*#2640# : Menampilkan kode keamanan ponsel yang digunakan.
*#43# : Mengecek status "Call Waiting".
*#61# : Untuk mengecek nomor pemanggil yang dialihkan ketika tak anda jawab.
*#62# : Mengecek nomor pemanggil yang dialihkan ketika ponsel anda di luar jangkauan.
*#67# : Mengecek nomor pemanggil yang dialihkan ketika ponsel anda sedang sibuk.
**21*number# : Menghidupkan pengalihan "All Call" pada nomor yang diisi.
**61*number# : Menghidupkan pengalihan "No Reply" pada nomor yang diisi.
**67*number# : Menghidupkan pengalihan "On Bussy" pada nomor yang diisi.
*#67705646# : Mengganti logo operator logo pada Nokia 3310 dan 3330.
*#746025625# : Menampilkan status SIM Clock.
*#7760# : Menampilkan kode pabrikan (sebagian besar ponsel tipe lama).
*#92702689# : Memunculkan : 1. Serial Number, 2. Date Made, 3. Purchase Date, 4. Date of last repair, 5.Transfer user data. Keluar dari mode ini harus merestart ponsel ( pada beberapa ponsel ).

Kode akses Sony Ericsson :

*#06# : Melihat nomor IMEI (Internasional Mobile Equipment Identity).
*#0000# : Mereset bahasa kembali ke English.
> * < < * < * : Service Menu - menampilkan versi software ponsel. Tekan "Yes" berulang-ulang untuk melihat semua data software dan tekan ">" untuk melihat semua teks yang terdapat pada ponsel.
< * * < : Mengunci SIM Card.

Sortcuts :

1. Menyimpan nomor "Missed Call" di direktori ponsel.
Cari menu "Missed Call", tekan "Yes" untuk menampilkan nomor yang dituju. Tekan nomor apa saja ( 0 sampai 9 ), kemudian tekan "clear" sekali untuk memblok nomor tersebut, kemudian tekan dan tahan "<" sampai muncul "Store", tekan "Yes".

2. Menyembunyikan nomor.
Setelah menekan nomor yang dituju dan sebelum menekan "Yes", tekan ' > ' 2 kali untuk memilih "Hide Id?" dan tekan 'Yes'.

3. Mengecek level batere ketika ponsel mati (off ).
Tekan 'No' secara cepat 1 x dan tunggu hingga tampilan baterai terlihat.

4. Menyimpan nomor di memori ponsel (bukan SIM Card).
Ikuti prosedur normal untuk menyimpan nomor. Ketika tampilan untuk menyimpan terlihat tekan '#' sekali dan lokasi yang diinginkan, atau tekan '#' 2 kali untuk melihat posisi lanjutan.

5. Menghubungi nomor dari pesan SMS.
Mengarahkan kursor pada nomor yang tertulis, kemudian tekan "Yes".

Shortcut Penampilan Gambar :
(Berlaku di sebagian besar ponsel Symbian).

Ketika melihat image atau gambar di galeri, tekan :
1 : untuk memutar gambar ke kiri.
2 : untuk memutar gambar ke kanan.
5 atau 7 : untuk memperbesar (zoom) gambar.
* : untuk tampilan fullscreen atau non fullscreen.
Catatan : perintah angka di atas bisa berbeda di setiap ponsel.

Hard Reset :

Peringatan !!! Semua data ponsel akan hilang.
Dalam keadaan ponsel mati (off), tekan secara bersamaan tombol telepon (bicara), angka 3, dan tombol * (bintang). Kemudian dalam keadaan menekan ketiga tombol tersebut, tekan tombol On. Trik ini berlaku di sebagian besar ponsel Nokia.


Semua dapat Bermanfaat !! ^_^

Cara buat Blog !!

Mengenai blog, dulunya blog digunakan sebagai saran untuk menuliskan ide, curhat, unek-unek, dan juga pandangan hidup. Namun, Sekarang blog lebih bersifat sarana untuk menambah penghasilan, berbagi ilmu dan mencari kawan. Blog adalah situs pribadi. Berbeda dg website yg setiap memposting harus susah payah memakai kode ekstensi .html .php, .asp, dll, blog merupakan otomatisasi dari semua ekstensi tsb. Sehingga karena sudah diotomatisasi, maka kita semua yg lugu teknologi bisa dengan mudah dapat memposting apa yg kita inginkan persis seperti kita memposting email ke teman atau ke milis.

karena kemudahan inilah, maka semua orang yg tahu internet dapat membuat blog atau situs pribadi; sama halnya dg memiliki email. Tak heran apabila pemilik blog bervariasi: mulai dari pembantu rumah tangga, ibu rumah tangga, tukang jualan sayur di pasar klewer, cewek-cewek “ramah” di pasar senggol, sampai profesor dan menteri-menteri.

Bagaimana cara membuat blog?

Seperti halnya email, buat account dulu di free blog provider (pemberi hosting/domain blog gratis). Yg paling populer adalah http://www.blogger.com. Bagi Anda yg sudah agak melek-huruf teknologi bisa juga buat account di http://www.wordpress.com dan http://blogsome.com. Selain yg dua ini masih banyak penyedia blog gratis yg bisa Anda ketahui kemudian. Ikuti pentunjuk step-by-step ketika mendaftar.

Setelah selesai register/sign-up di http://blogger.com, anda dapat mulai memposting/mempublish apapun yg Anda inginkan di blog: mulai dari curhat, puisi, cerpen, tulisan serius sampai yg canda.

Blogger Baru

Sejak Januari 2007 proses pembuatan/ registrasi / sign-up blog di blogger.com lebih dipermudah, sbb:

1. Apabila Anda punya email di gmail.com, maka Anda bisa langsung log-in atau sign-in di blogger.com –> new blogger –> masukkan id/usernama plus password gmail Anda. Dan ikuti proses selanjutnya.

2. Apabila Anda belum punya email di gmail.com, silahkan buat (register/ sign-up) dulu di http://gmail.com –> sign-up. Setelah jadi email gmailnya, kunjungi http://blogger.com –> new blogger –> masukkan id / gmail Anda plus password dan ikuti proses pembuatan blog selanjutnya.

Setelah mengikuti tiap tahapan tersebut maka kita tinggal bersiap untuk memasukkan dan menuliskan posting sebagai isi untuk blog kita.

Semoga Bermanfaat....^_^

Cara Belajar Pemrograman

" Pemrograman " adalah suatu kata yang terkadang membawa kita ketingkat imajenasi dan pemikiran yang tinggi. Semua itu karena kejlimetan dan kesulitan didalamnya namun akan terasa puas bila kita bisa mengakhiri peng"coding"an dengan berhasil . Ada metode cepat menguasai bahasa pemrograman, yaitu :

1. Pertama kali dan yang terpenting adalah Anda harus KONSENTRASI. anda harus konsentrasi pada tujuan anda dalam mempelajari program. Apa sih program? Untuk apa sih saya membuat program? Itu adalah pertanyaan yang harus anda cari jawabannya. Tapi ada 2 buah hal pokok jawaban dari pertanyaan ini. Anda harus memberikan jawaban dengan mencari literatur di internet sebagai bahan bakar dan anda harus meresapi arti dari program kedalam otak anda.
2. Sebenarnya, dalam bahasa apapun yang ingin anda kuasai, percayalah, pasti ada hal terpenting dari hal penting dalam bahasa itu. Hal terpenting itulah yang harus anda garis bawahi, itulah yang harus anda pelajari. Dan setelah anda mengetahui hal terpenting itu maka carilah buku yang menjelaskan tuntas tentang itu.
3. Apa sih “hal terpenting” dalam bahasa pemrograman itu? Jawabnya: anda harus mempelajari Struktur Bahasa, Sintak Dasar (cara pengetikan bahasa program), Tipe Data, dan Cara Membuat Prosedur / Fungsi. Sedikit bukan?
4. “Loh bagaimana dengan yang hal penting lainnya?”, jawabnya: Anda harus tahu bahwa pemrograman juga hampir sama dengan kebutuhan manusia, ada kebutuhan Primer, Sekunder dan Tersier. Nah, pada point 3 tadi adalah kebutuhan primernya. Jadi, kalau anda ingin lebih kaya pengetahuan akan bahasa pemrograman tersebut, silakan anda memperluasnya dengan kebutuhan Sekunder dan Tersier melalui literatur, tutorial dan buku yang banyak beredar.
5. Dan terakhir adalah, PRAKTEK. Karena tidak mungkin semua yang ada dimuka bumi ini muncul dengan sendirinya, pasti ada yang membuatnya begitu juga program. Ada pepatah “tak ada kerja tak ada produk“.
6. Produktif,inovatif dan Kreatif lah dalam segala hal di kehidupan…
7. Semoga bermanfaat ... ^_^

Related Posts Plugin for WordPress, Blogger...

Translate

English French German Spain Italian Dutch Russian Portuguese Japanese Korean Arabic Chinese Simplified

 
Powered by Blogger