Diberdayakan oleh Blogger.

Total Tayangan Halaman

About

Popular Posts

Blogger news

Blogroll

Blogger templates

IP Adresses

Stands for Internet Protocol Address of the IP address. Definition of IP address is a numerical identification that is labeled to a device such as a computer, router or printer contained in a computer network that uses the Internet protocol as a means of communication. IP address has two functions, namely:
As a means of identification in the host or network interface.
This function is illustrated as the person's name as a method to identify who the person is. in computer networks apply the same thing.
As the location address of the network.
This function is illustrated as our home address that shows exactly where we are. To facilitate the transmission of data packets, the IP address contains information of its existence. There is a service that must be passed so that the data can get to the destination computer.
IP address using 32-bit numbers. This system is known as Internet Protocol version 4 or IPv4. Currently IPv4 is still used despite existing IPv6 was introduced in 1995. This is due to the high growth in the number of computers connected to the internet. It is necessary to address more of being able to identify many members of the network.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

History of Computer's Viruses

1981, the virus 'in the wild' first discovered. Virus called Elk Cloner spread via floppy disk on an Apple II.

1983, Fred Cohen in his paper entitled 'Computer Viruses - Theory and Experiments' gives the first definition of the computer virus and describes experiments that have been done to prove the concept of a computer virus. Together with Len Adelman, he created an example of a computer virus on a VAX 11/750 with Unix operating systems.

1986 A pair of brothers from Pakistan, Basit and Amjad, creating a first boot sector virus called Brain. Brain is often referred to as the world's first computer virus. PC-based Trojan was first created in the form of a shareware program called PC-Write. In some reports mentioned that the first virus file, Virdem, jugamditemukan in the same year. Virdem created by Ralf Burger.

, 1987, file infector viruses like Leigh began to appear, mostly attacking COM file like COMMAND.COM. In the same year the virus attacker EXE files first, Suriv 01 and 02 as well as Jerusalem. IBM Mainframe IBM worm attack speed replication Christmas Worm with a half million copies per hour.

1988, the first virus to attack the Macintosh computer, MacMag and Scores, appeared. In the same year established CERT (Computer Emergency Response Team) by DARPA with the initial objective to address the Morris Worm attack created by Robert Morris.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Wireless Network

Wired or Wireless network without (WiFi) in Indonesian called wireless, is a technology that connects two devices to exchange data without the cable media. Data exchanged through the medium of a particular wavelength of light (such as infrared technology on remote TV) or radio waves (such as bluetooth on the computer and mobile phone) with a certain frequency.

The advantages of this technology is to eliminate the use of wires, which can be quite disturbing the aesthetics, and also the complexity of installation to connect more than 2 devices simultaneously. For example: 1 computer to connect a server with 100 client computers, it takes a minimum of 100 pieces of cable, the length varies according to the distance from the client computer server. If kabel2 is not covered through a special lane (such as cable tray or conduit), it can interfere with the eye sight or interior of a building. This unpleasant sight does not exist on the relationship between devices in wireless technology.

Disadvantages of this technology is the possibility of interference of neighbor relations other wireless devices.

Type - the type of wireless:
WAP (Wireless Application Protocol)

Is a standard for wireless application protocol (as used in mobile phones). WAP is the result of collaboration between the industry to create an open standard (open standard). WAP is based on Internet standards, and some of the protocols that have been optimized for wireless environments, such as the need for data compression, long latency and bandwidth limitations, and the limitations of wireless devices. Design of information transmitted via WAP usually use format WML (Wireless Markup Language). WML is similar to HTML, just more specific to wireless devices that have limitations as above.

WBMP (Wireless Bitmap)

Format charts contained in WAP. WBMP is a similar format to BMP format. WBMP format images with the standard is divided into two parts, namely: q The header section, a place for the characteristics of image information, such as height, width and type of image. q The contents of the so-called Type dependent, is part of the image information.

WBMP format is the standard arrangement can be made with expanded its usefulness. Type part or content can be transformed into formats that can be accessed bare. Although WBMP will slow down the data transfer because the size is not small, but using images can provide more information on a small screen like the handhone.

Wireless LAN (Wireless Local Area Network)

Data communication technology by not using a cable to connect between the client and the server. Wireless LAN technology is generally similar to computer networking technology that uses cable (Wire LAN or Local Area Network). Wireless LAN technology is using radio frequencies to transmit and receive data that would reduce the need for or dependency relationship through cable. As a result, users have a high mobility or flexibility and does not depend on a place or location. Wireless LAN technology also makes it possible to establish a computer network may not be accessible by a computer network that uses cables.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Types Of Computer Network


Computer Networking Miscellaneous determined:
1. Based on scale:
Local Area Network (LAN): A computer network that connects a computer to another computer with a distance.
Metropolitant Area Network (MAN): the same principle to the LAN, it's just that the distance is greater, which is 10-50 km.
Wide Area Network (WAN): the distance between cities, countries, and continents. The same with the internet.
2. Based on function:
Client-server
Namely computer network with a dedicated computer as a server. A service / service can be provided by a computer or more. An example is a domain such www.detik.com served by many computer web server. Or it could be a lot of service / services provided by a single computer. An example is a multi-service server with the mail server, web server, file server, database server and others.
Peer-to-peer

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Types of computers

Computers have penetrated into the various sectors of our lives, not just used by the office, academics, students, The children are familiar with this computer. Simply put, the computer can be defined as an electronic device that accepts input (can be input from the keyboard, mouse, fingerprint, retina, etc.) later in the process by the processor and displayed on the monitor or in hardcopy (printer). Lots of sharing or criteria attached to the computer, we discuss the following 8 types of computers.

1. PC or Personal Computer
As the name implies the personal computer, the PC is a computer that is intended for the use of one person or privately owned. Before this PC appears, formerly tangible computer is very large, so that only owned by certain companies. The first PC was named the diproduki by MITS Altair 1975.

2. Desktop Computers
Computer that is designed to not be able to be moved are moved, or specifically designed to be put on the table somewhere like work. This type of computer is very much in the market, especially among colleges, and corporate offices.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

13 Most Popular Social Media Site

Social Media has now become an indispensable part of their daily lives. With the presence of many social media channels such as Facebook and Twitter, making communication with relatives become increasingly easy and unrestricted. Here are 13 Sites Most Popular Social Media is more than

01. Facebook



Originally made only a liaison channel between Harvard students, then more famous to deal directly with friendster. With innovations make facebook not only as a bridge of communication but also a means of having fun with hundreds of online games are worth a try, eventually making facebook cruised undefeated to this day.

02. Twitter


Welcome to the microblog era. Twitter with 140 character managed to make the world of blogs and social media become more and more practical, but still interesting and powerful. With so many world class celebrities Justin Bieber, Lady Gaga, American President Barack Obama to use twitter as a means of communication to the public, reinforces twitter as the most influential social media sites today.

03. Google+


Google+ is made king of internet social media, google inc. Created to rival facebook popularity, with almost similar features, Google+ offers the advantages of integration with all Google accounts like Gmail, Blogger, and Youtube.

04. Tumblr

Tumblr is present for you who want to have a personal blog, but sometimes difficult to find interesting stories to tell. Tumblr blogging offers a new method that not only just text, but also moving images, music, and video. Everything can easily be shared with just one upload.

05. Friendster

Friendster may be the only social media that will not be forgotten until whenever. Had been at the forefront for many years, because he is the only portal best friendship in cyberspace, make friendster still awaited return glory.

06. My Space
Myspace is the number one social media site that focuses on the music business. Many communities, indie band, to celebrities who have myspace, social media makes it one of the most popular ever.

07. Instagram


Instagram is the most popular photo-sharing portal today. Provides a variety of vintage photo effects like never before, making instagram quickly loved by the crowds. Currently only available in the iStore and Google Play.

08. Path


Path is a private social media, which lets you share stories, photos, music, and movies you are listening and watching, to 150 friends of friends who are connected in the path. Path is currently only available in the iStore and Google Play.

09. Pinterest


Pinterest is where you collect interesting pictures and photos that can be found anywhere on the internet, into one folder terorgarnisir album. Wherever whenever you come across an interesting image, just pin it, and even then stored neatly picture album you.

10. Foursquare

Foursquare is a social media site based folder location, which will tell you the position of the friends of friends who also connected on foursquare. Here you can check in at any spot in the world, providing recommendations entertainment, interesting photos to photo-sharing at each place you visit.

11. Formspring

Formspring is a place where everyone can throw a question about any to you. And vice versa. Fun side, here we can offer people stylish like a celebrity to ask anything to us.

12. LinkedIn

LinkedIn is the world's outline Social Media Professional. Here you can display a profession and where you work. And you can meet with friends in the profession you're a different company. Here you can also meet the Headhunters are ready to hijack you from companies that now, if your skill is great.

13. Plurk


Plurk been popular a few years ago, and many say the embryo merupaka plurk twitter because its only a status update with minimal character. What distinguishes, here there is karma points, which would further increase if you are active here.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Social Network

Social networking sites is a web-based service that allows users to create profiles, see the list of available users, as well as invite or accept a friend to join the site. Basic display social networking site featuring user profile page, which consists of a user ID and photo.

The emergence of social networking sites has started from the initiative to connect people from all over the world. The first social networking site, which Sixdegrees.com began appearing in 1997. This site has an application to create a profile, add friends, and send messages. In 1999 and 2000, appearing lunarstorm social site, live journal, Cyword which serves to expand the information in the same direction. In 2001, appeared Ryze.com whose role is to enlarge the business networking. 2002, emerged as a site myspace young first place originally reserved for mate search. In keanjutannya, myspace is more attractive young people to become acquainted with other users. In 2003, another emerging interactive social site following the emergence friendster, Flick R, You Tube, Myspace. Until the end of 2005, Friendster and Myspace is a social networking site is most preferred.

Entering the year 2006, the use of friendster and Myspace began shifting with facebook. Facebook with a more modern look allow people to meet and access information as possible. In 2009, the emergence of Twitter turned out to increase the number of social websites for young children. Twitter uses the system to follow - do not follow (follow-unfollow), where we can see the latest status of the people we follow (follow). In 2012, appeared again and add back the social networking site for all ages called Ketiker. Ketiker is a website that offers a microblogging social network that allows users to send and read messages called post.

The existence of these social networking sites allow us to interact easily with people from all over the world at a cost that is cheaper than using the telephone. In addition, the presence of social networking sites, the dissemination of information can take place quickly.

The emergence of social networking sites led to face-to-face interpersonal interaction (face-to-face) tends to decrease. People prefer to use social networking sites because it is more practical. On the other hand, the emergence of social networking sites make young people can not not access the internet. In excessive levels, social networking sites are not directly have a negative impact, such as addiction (addiksi) overload and disruption of a person's privacy.

Actually a lot of social networks out there and each has its own segment of society. Here are some of the famous social networking in cyberspace, aka popular there. For the full list of social networking, you can visit this wikipedia page.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Back Up Operating System with "GHOST"


Many different ways to save the operating system from damage due to viruses, corrupted programs (corrupted), partition problems, or problems with the operating system (blue screen) and so on. Resolve these issues quickly and easily, so that later on there will not be having problems again at the criteria on PC dude. The following will discuss the criteria on how to backup the Windows operating system by using the "ghost" (version under DOS). Why are the criteria on using the DOS version, because in addition to backing up other operating systems (Linux, Mac OS, Windows itself, etc.) if there is a problem with the operating system and can not get into the operating system as broken, dude can still restore the criteria on anniversary of DOS and it only takes a few minutes (depending on the size of the OS image). To prepare please follow the step below :


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Make a Computer faster

How to make a Computer faster

 

 

By following a few simple guidelines, you can maintain your computer, help increase its speed, and help keep it running smoothly. This article discusses how to use the tools available in Windows 8, Windows 7, Windows Vista, and Windows XP Service Pack 3 to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you're online.
Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren't logged on as an administrator, you can only change settings that apply to your user account.

1. Remove spyware, and help protect your computer from viruses

Spyware collects personal information without asking for permission. From the websites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to compromising your privacy, spyware can hamper your computer's performance. Fortunately, there are a couple of easy ways to combat spyware.
Download Microsoft Security Essentials for free to help guard your system from viruses, spyware, adware, and other malicious software (also known as malware). Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system protected from emerging threats.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

10 Ways to care for your Computer




A computer or laptop represents a significant investment, so it’s a good idea to know how to take care of it. Regular maintenance and care will ensure you get many years of good service. Check out our tips below!

1.  This one isn’t hard to understand: keep your drinks away, and don’t eat directly over the computer. Liquids and electronics never mix, and crumbs under the keys are an open invitation for insects.

2.  Protect your computer during lightning storms by installing surge protectors. Surge protector strips prevent your electronic appliances from blowing out when lightning strikes.

3.  The computer keyboard is the 3rd dirtiest surface in the household. Clean beneath the keys using a can of compressed air, and spray a cloth with disinfectant to wipe down the key surfaces. Never spray disinfectant directly onto the keyboard as the liquid could damage the components beneath the keys.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Install Windows 8



Windows 8 is Microsoft's latest operating system which is completely redesigned. It moves away from the traditional interface to a completely new interface known as Metro User Interface. The familiar start menu is now gone. Icons and windows are replaced with live tiles and magazine styled interface. Unlike any previous versions, Windows 8 and its variation RT works across multiple architectures and has been optimized for touch screen. So it will work on Intel based PCs or an ARM based tablet.

This step-by-step guide demonstrates how to install Microsoft Windows 8 Professional. You can follow this guide if you have Windows 8 basic edition or any other version as the steps are very similar.

The best way to install Windows 8 is to do a clean install. Before you start the installation process I recommend that you check Windows 8 System Requirements to ensure that your hardware is supported by Windows 8. If you don't have Windows 8 drivers for all your hardware, it is a good idea to download all the drivers from the hardware manufacturers web site and save all the necessary drivers on a CD/DVD or a USB drive before you start the installation.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

FTP (File Transfer Protocol)

FTP stands for File Transfer Protocol. Such as the definition of their own FTP, FTP has a function to transfer files between computers / devices connected to a TCP / IP network (LAN / Internet). FTP (File Transfer Protocol) is an Internet protocol that runs on the application layer which is a standard for transferring files (files) between the computer machines in an internetwork. This protocol is still used to this day to make downloading (downloading) and penggugahan (upload) files between your computer and the FTP client FTP server. An FTP server is accessed by using a Universal Resource Identifier (URI) using ftp://namaserver format. FTP client can contact the FTP server by opening a URI tersebut.Mungkin some of my friends have heard or may already know about FTP.


How FTP Works 

  1. After learning a little about what it FTP and also basic functions, I will write here the workings of FTP in general.
  2. Standard FTP port is 21 (on the server).
  3. On the server side, ftp server waiting for incoming connection on port 21 (the default).
  4. FTP client attempts to connect to the ftp server (daemon) with the user entering his or her password (usually FTP does have a separate authentication.)
  5. FTP server checks the whether the user and his password is valid, if valid it will continue to the next step, if not valid then be asked to enter a user / password to another several times, if it remains invalid then the connection will be disconnected.
  6. Once the user is validated then ftp client can men-download/men-upload or delete any files contained in the server, depending on user access.

Before making connections, TCP port number 21 on the server will "listen" connection attempt from an FTP client and then be used as a control port (control port) to

make a connection between client and server,

to allow the client to send a command to the FTP server and also

returns the server response to the command. Once the control connection has been made, then the server will start to open the TCP port number 20 to establish a new connection to the client to transfer the actual data that is being exchanged during the download and penggugahan.

FTP uses only standard authentication methods, namely using the username and password are sent in unencrypted form. Registered users can use the username and password to access, download, and upload files he wants. Generally, registered users have full access to multiple directories, so that they can create files, create directories, and even delete files. Non-registered users may also be able to login using anonymous methods, namely by using the anonymous user name and password are filled in using the e-mail address.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

History of Internet

History of the Internet began in the '60s, when Levi C. Finch and Robert W. Taylor began to conduct research on the global network and interoperability issues. Furthermore, some research programs underway to determine the mechanisms linking different networks physically. One of the solutions that emerge from these studies is a packet switching technique. In the packet switching technique, data or large files to be sent over a computer network first cut into small packets that are easier to handle and more Andal. Principal investigator in the development of packet switching is Donald Davies (NPL), Paul Baran (RAND Corporation), Leonard Kleinrock and his colleagues (MIT) and the UCLA Research Programs.



 In 1969, Robert Taylor who has been promoted as the head of the information processing office at DARPA (Army Research Agency United States) intends mengimplementaskan idea to create a system of interconnected networks. Larry Robert of MIT, Robert Taylor began a project that later became known as the ARPANET. The first ARPANET connection was formed between the University of California, Los Angeles (UCLA) and Stanford Research Institute (SRI) at 22:30 on October 29, 1969. On December 5, 1969, there are two more that are joining the network, the University of Utah and University of California, Santa Barbara so there are a total of four (4) node networks. ARPANET was based on ALOHAnet technology is developing very fast. In 1981, the number of nodes that are connected to 213.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

15 Ways to Extend Your Laptop’s Battery Life!


laptop Top 15 Ways to Extend Your Laptops Battery Life
Laptops tend to lose their charm quickly when you’re constantly looking for the nearest power outlet to charge up.  How do you keep your battery going for as long as possible?  Here are 15 easy ways to do so.
1. Defrag regularly -  The faster your hard drive does its work – less demand you are going to put on the hard drive and your battery.  Make your hard drive as efficient as possible bydefragging it regularly. (but not while it’s on battery of course!) Mac OSX is better built to handle fragmentation so it may not be very applicable for Apple systems.
2. Dim your screen – Most laptops come with the ability to dim your laptop screen.  Some even come with ways to modify CPU and cooling performance.  Cut them down to the lowest level you can tolerate to squeeze out some extra battery juice.
3. Cut down on programs running in the background.  Itunes, Desktop Search, etc.  All these add to the CPU load and cut down battery life.  Shut down everything that isn’t crucial when you’re on battery.
4. Cut down external devices – USB devices (including your mouse) & WiFi drain down your laptop battery.  Remove or shut them down when not in use.  It goes without saying that charging other devices (like your iPod) with your laptop when on battery is a surefire way of quickly wiping out the charge on your laptop battery.
5. Add more RAM - This will allow you to process more with the memory your laptop has, rather than relying on virtual memory.  Virtual memory results in hard drive use, and is much less power efficient. Note that adding more RAM will consume more energy, so this is most applicable if you do need to run memory intensive programs which actually require heavy usage of virtual memory.
dvd Top 15 Ways to Extend Your Laptops Battery Life
6. Run off a hard drive rather than CD/DVD - As power consuming as hard drives are, CD and DVD drives are worse.  Even having one in the drive can be power consuming.  They spin, taking power, even when they?re not actively being used.  Wherever possible, try to run on virtual drives using programs like Alcohol 120% rather than optical ones.
7.  Keep the battery contacts clean:  Clean your battery’s metal contacts every couple of months with a cloth moistened with rubbing alcohol.  This keeps the transfer of power from your battery more efficient.
8. Take care of your battery – Exercise the Battery.  Do not leave a charged battery dormant for long periods of time.  Once charged, you should at least use the battery at least once every two to three weeks. Also, do not let a Li-On battery completely discharge. (Discharing is only for older batteries with memory effects)
9. Hibernate not standby – Although placing a laptop in standby mode saves some power and you can instantly resume where you left off, it doesn’t save anywhere as much power as the hibernate function does.  Hibernating a PC will actually save your PC’s state as it is, and completely shut itself down.
temp Top 15 Ways to Extend Your Laptops Battery Life
10. Keep operating temperature down - Your laptop operates more efficiently when it’s cooler.  Clean out your air vents with a cloth or keyboard cleaner, or refer to some extra tips by LapTopMag.com.
11. Set up and optimize your power options – Go to ‘Power Options’ in your windows control panel and set it up so that power usage is optimized (Select the ‘max battery’ for maximum effect).
12. Don’t multitask – Do one thing at a time when you’re on battery.  Rather than working on a spreadsheet, letting your email client run in the background and listening to your latest set of MP3′s, set your mind to one thing only.  If you don’t you’ll only drain out your batteries before anything gets completed!
13. Go easy on the PC demands – The more you demand from your PC.  Passive activities like email and word processing consume much less power than gaming or playing a DVD.  If you’ve got a single battery charge – pick your priorities wisely.
14Get yourself a more efficient laptop -  Laptops are getting more and more efficient in nature to the point where some manufacturers are talking about all day long batteries.  Picking up a newer more efficient laptop to replace an aging one is usually a quick fix.
15. Prevent the Memory Effect - If you’re using a very old laptop, you’ll want to prevent the ‘memory effect’ – Keep the battery healthy by fully charging and then fully discharging it at least once every two to three weeks. Exceptions to the rule are Li-Ion batteries (which most laptops have) which do not suffer from the memory effect.
Bonus Tip #1: Turn off the autosave function.  MS-Word’s and Excel’s autosave functions are great but because they keep saving regular intervals, they work your hard driver harder than it may have to. If you plan to do this, you may want to turn it back on as the battery runs low. While it saves battery life in the beginning, you will want to make sure your work is saved when your battery dies.
 to give caution about turning off autosave, tip #8 to change information about discharging batteries – thanks to all who pointed it out. Added Bonus tip #2, Tip #1 to add in clause in regards to Mac OSX, Tip #1 about the spinning of hard drives – thanks to all who pointed it out
Bonus Tip #2: Lower the graphics use. You can do this by changing the screen resolution and shutting off fancy graphic drivers. Graphics cards (video cards) use as much or more power today as hard disks – Thanks Andrew

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Computer Operating Systems

The times, requires the development of science and technology as well. Including the operating system on the computer. With all the shortcomings and advantages, computer users are trying to condition the computer to be as comfortable as possible and support the performance. Here is some information related to the three types of operating systems are widely used

1. UNIX
UNIX is an operating system that is used as the default operating system on different types of computers, especially the mini computer either as a workstation or server (system that provides a service on the network). Due to a unix server, move work from one computer to another kind of easy.
Unix operating system is designed as a portable, multi-tasking, multi-user, hierarchical file system and utilities.
Pros:
a. Sharing computer resources

  • CPU and memory allocation,
  • Data storage / disk,
  • Printer / printer and program / utility

b. Increased reliability.
Computers in a network is more reliable than the stand-alone computer. If there is a computer that does not work, its role was replaced by another computer. The system can be set / controlled by computer users do not know that the commonly used being replaced by another computer. Disk storage systems can be set up security degrees. Such as CPU, disk system was replaced by a non-functioning system to another without being noticed by the user.
c. Savings.
Improved reliability and the use of resources with the operating cost savings. Price 10 10 MIPS computer is much cheaper than 1 100 MIPS computer. However, the ability of the tenth 10 MIPS computer can be almost equal to 100 MIPS computer skills if done high utilization. Other savings come from the use of the printer server and file server (1 system disk to a lot of data or computer).
The types of UNIX:
UNIX is an operating system developed by numerous parties. Each party yangmengembangkan UNIX, adding its proprietary technology into UNIX, which although it is outside the standard, able to make the UNIX operating system is stronger or more reliable. Type - the type of Unix, among others:

  1. A / UX
  2. Domain / X
  3. Darwin
  4. CTIX
  5. Distrix
  6. UNICOS


2. Windows
Windows is an operating system for servers operasinnya 32 bit system from Microsoft is an ancestor of the operating system Windows 2000, Windows XP, and Windows Server 2003 Operating Vista.Sistem is on awalnnya supports multiple platforms Mikroprosesor.Windows NT Server is not built on MS-Dos (not like Windows 95) Being able to observe 4 Gb.
Version:
Since its launch, Windows NT version has undergone several improvements, which are as follows.

  1. Windows NT version 3.1.
  2. Windows NT version 3:50.
  3. Windows NT version 3.51.
  4. Windows NT version 4.0.
  5. Windows NT version 5.0 (or known as Windows 2000, version 5.0 build 2195 internal).
  6. Windows NT version 5.1 (or known as Windows XP, version 5.1 build 2600 internal).
  7. Windows NT version 5.2 (or known as Windows Server 2003, internal version 5.2 build 3790).
  8. Windows NT version 6.0 (or known as Windows Vista).
  9. Windows NT version 7.0 (code name "Vienna").
  10. Windows NT version 8.0 (code name "Metro")
  11. Windows NT version 6.1 (or known as Windows Server 2008, which has the codename Longhorn Server

Advantages:

  1. Server Capacity to serve more Simultaneous Koneksinnya.
  2. Fault tolerant disk driver which supports disk mirroring and disk stripping with parity (RAID 1 and RAID 5)
  3. Free from Code 16 Bit MS-Dos belonging, support 32-bit operation and all features offered by 32-bit microprocessor as can be observed up to 4 GB of memory and Protected.
  4. In design to be compatible with previous OS like MS-Dos, IBM OS / 2.

Disadvantages:

  1. Changing the basic configuration can be done rarely succeed. This applies to the default value, log file format which is also the default option propritary and-index, all of which are standard should always be stored on drive C. Administrator in this case should not have to do the job, until the entire system is running as it should, before you can make changes.
  2. From the above cases, it takes a very complex configuration changes to ISS Server, which can be said to be very difficult and inconvenient. From the administrator believes the Registry file change activity is relatively heavy work for systems using Windows NT as the operating system.

3. LINUX
Pros:

  • Linux is relatively stable. Computers that run on top of the UNIX operating system are well known stable running nonstop. Linux, which is a variant of UNIX, also inherit this stability. Rarely encountered, the computer suddenly hangs and have to press Ctrl-Alt-Del or Restart to end the incident.
  • Linux has backwards compatibility better (better backward-compatibilty). Hardware has been aged longer, it is still very useful and can run well on Linux. In addition, never met a more documents can not be read on the new Linux version is longer. On Windows, if we are required to keep abreast of the development of hardware, such as the case file. Docx (Word 2007-2010) which can not be opened with Microsoft Word 2003 or later below.
  • Support diverse communities and spread around the world.
  • Linux in addition to a free to use, it's free to be modified and redistributed. Even we can develop our own distro.

Disadvantages:

  • The installation software / applications that are not as easy in Windows. Installing software on Linux, it will become easier when connected to the internet or if have a CD / DVD repository him. If not, then we have to download one by one package is needed along with its dependencies.
  • For system administrators who are not familiar with Unix-like (such as Linux), then inevitably have to learn this. So the requirement is to be a human administrator who likes to learn new things and continually learning.
  • Applications in Linux not as efficacious application in Windows.
  • Directory structure and access rights are confusing for those who are familiar with Windows and are not familiar with UNIX / Linux at all.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

First Post in First Blog!

Bismillah... Yeah! It's my first blog. and this is first post too... hahahaha seems so awkward.
But i'll start "blogging" for sharing many information for me and people. I hope this blog will be Useful for us so there will be many visitor came to this blog.
By the way sorry for my english :p

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS