.:: Jasa Membuat Aplikasi Website,Desktop,Android Order Now..!! | | Order Now..!! Jasa Membuat Project Arduino,Robotic,Print 3D ::.

The Quest for the Absolute

0 komentar

This is the Database Programmer blog, for anybody who wants
practical advice on database use.



There are links to other essays at the bottom of this post.



This blog has two tables of contents, the
Topical Table of Contents and the list
of
Database Skills.




Today I am taking a huge detour from technical matters to lay out the
philosophical groundwork behind this blog. The ideas presented today
lie beneath every essay on this site. It is easy to observe that people
seem driven to formulate absolute truths to guide their pursuits.
Programming is no different, programmers are driven to find the
absolutes that will universally guide their efforts. Those absolutes
are not that hard to find, if you know the method for seeking them
out. Fortunately, we have hundreds and thousands of years
of human efforts, both successes and failures, to draw upon when
embarking upon the task.




Absolutes in the Post-Modern Age



Academics refer to our current stage of history as the "Post-Modern"
age. Thinking in the post-modern age is dominated by a
deep mistrust
of the very concept of absolute truth. Many thinkers have noted
that in the post-modern age the only absolute is that there
are no absolutes. Now, anybody who has not
bothered to read much past what they are handed likely believes
much of this without even thinking about it, they may not know that
in the history of the human race such thinking is less than 60
years old.



But that "no absolutes" stuff is all nonsense at
best and downright cowardice at
worst. If you want an example of an absolute truth, try stepping
off the edge of a cliff: even if you do not believe in gravity,
gravity believes in you. It is an absolute truth for me that if
I do not take care of my customers my life becomes unpleasant.
It is a further absolute truth for me that I constantly obvserve
programmers proclaiming absolutes (always use relational, always
use OO, etc). When I stop observing it, then I suppose it won't
be an absolute anymore (and I suppose then it never was?)



So let us now cheerfully ignore the wailing of those who cry
that there are no absolutes, and ask if we might discover some
elements of software development strategy that hold true always
(ok, maybe mostly always) for the
context of database application development.




Aristotle and Virtue



Nowadays nobody has to read philosophy much anymore, at least not where
I live (in the United States), so most programmers have never heard of
a man named Aristotle, who lived about 2500 years ago. This is a shame,
because Aristotle had a logical way of thinking about things that
would warm the heart of any programmer.



One of Aristotle's major contributions to civilization was his
formulation of what philosophers call "virtue". Philosophers use the
term in a technical sense, and they do not use "virtuous" to mean
"nice" or "pleasant" or "good-natured." To a philosopher (or at least
those that taught me) something is virtuous in Aristotelean terms if
if performs its function well. The standard classroom example
is that a virtuous table serves the function of a table, and a
virtuous table maker is somebody who makes good tables.



This is a very useful concept for programmers. If we want to speak
of a "virtuous" program, we mean simply one that meets its goals.
This takes the whole high-minded theory and philosophy stuff back
to real down-to-earth terms. (This is why I always preferred Aristotle
to Plato).



In the quest for the absolute, if we let the ancient philosophers
guide us, we discover the surprisingly basic idea that our programs
should perform their functions well if they are to be called
virtuous.
This is easy to swallow, easy to understand, and
easy to flesh out.




What is a Virtuous Computer Program?



A virtuous computer program is one that serves its purpose well, and
so we need to flesh out the three purposes that are common to most
programs:



  • To meet some institutional or strategic goal of those who
    sign the checks (or accept the work as charity in some case).
  • To meet the goals of end-users, which almost always comes down
    to performance and ease-of-use.
  • To provide income for the developers (or meet their own goal of
    providing charity work for non-profits).


Notice what is not on the list, things like ensure all data resides
in a relational database
, or implement all code in strictly
object-oriented languages
. We are not nearly ready to consider
such specific strategies as those, they are completely out of place
here in a discussion of the unifying goals of all projects.



So let's review. So far we know that the
absolutes of programming are the pursuit
of virtue, which turns out to be a fancy way of saying that the program
should perform its functions well, which turns out to mean simply that
it should do what the check-signer asked for, in a way that is workable
for the end-users, and at a price that keeps the programmer fed.



This leads us towards strategies for reaching those goals.



The Virtuous Programming Strategy



Continuing with the idea that a virtuous program meets is basic
goals, we can say that a virtuous strategy smooths the way for
a programmer to meet the basic goals.
An unvirtuous (or just plain bad) strategy
litters the path with obstructions or ends up not meeting the
goals of the check-signer, end-users, programmer, or all of the
above.



Before we can begin to formulate a strategy, we must look next
at the reality of the programming world. Some of the fundamental
realities include (but are not limited to):



  • The end-user or check-signer may not fully understand or
    be able to articulate their requirements.
  • The programmer may not correctly understand requirements,
    even when correctly articulated.
  • In a healthy prosperous situation there will be new
    requirements that interact with established requirements
    in ways that range from no interaction at all to
    fiendish incompatibilities.
  • The world will change around you, creating demands that did
    not exist when the system was created (some of us can still
    remember when there was no internet).
  • Staff will come and go.
  • ...and so on.


So even before we begin formulating particular strategies for particular
situations, we recognize that our strategy had underlying goals it
must facilitate, such as:



  • Being easy to change, both for correcting mistakes
    and adding features.
  • Being able to maintain and sort out possibly contradictory
    requirements that arise as the years go by.
  • Requiring little or no "deep magic" that depends on arcance
    knowledge of employees who may depart.
  • Being able to expect the unexpected (like the explosion
    of the web etc.)


Only after we have worked through to this point can we begin to
evaluate specific strategies and technologies. We can now begin
to ask about the proper context of the database server, where to
use object orientation, and if javascript is a good programming
language. Anything that responds to our core goals and realities
can be considered for use, anything which does not play into the
core goals is useless at best and obstructive at worst.



Future essays (and some past essays) in this series will refer
back to these ideas. For example, many developers have observed
over the years that if you "http://database-programmer.blogspot.com/2008/05/minimize-code-maximize-data.html"
>Minimize Code and Maximize Data
then you gain many advantages
in terms of development time, robustness, and feature count.
Other ideas similar to this will come out over and over in future
essays in this series.

Conclusion



The strategies and techniques that you will see on this blog are
all aimed at one way or another towards the goals expressed in
this essay. At the very beginning comes the goals of the
check-signer, the end-users, and the programmer. From there we
seek strategies that will satisfy our need to grow, change,
correct, and adapt. Only then can we ask about the technologies
such as databases and object-oriented languages and see how
well they let us meet all of these goals.





Related Essays




This blog has two tables of contents, the
Topical Table of Contents and the list
of
Database Skills.



Other philosophy essays are:



Suni

Edit host file by Batch File

0 komentar
Update Host file with bath script



Today I got a mail from one of my senior is there a way by which we can add multiple address in host file with out consuming lot of time and my simple reply was we need to use batch file for that. They said ok do it but actually I have never done it before so I had no other option than Google.



I searched for Google but every time I got a lengthy result and comment on those results were not positive it worked for some people and for some people it doesn't. I was wondering If I can have a simplest way for this as my previous backup script.



So I decided if I can print few lines in host file and it worked.Now no need of writing a long batch script for editing host file.



Here is the command



echo 192.168.1.10 test.test.com>>c:\Windows\System32\drivers\etc\hosts



You can add as many line as you want to add and save the file as hostentry.bat

Let me explaint you meaning of each word here



Echo it will print the words written after it

192.168.1.10 Its the ip of the server

Test.test.com Its the dns name of the server

>> it save the printed data in given file

c:\Windows\System32\drivers\etc\hosts Host file location for printg the data



Needless to say that IP and domain name would get change as per your server detail

if your oprating system is not in c driver please chagne the drive latter as per needed.





Just run the batch file and you are done for updating your host entry.





Hope it was usefull for you.





Please let me know if you face any problem in it.

Suni

Feeds now include Media RSS thumbnails

0 komentar
With the most recent release of Blogger we�ve added Media RSS <media:thumbnail> elements to both Atom and RSS feeds.

The <media:thumbnail> element links to a 72x72 pixel version of the first image in the post. Only images uploaded through Blogger to PicasaWeb are available as thumbnails.

We hope that you�ll be able to find fun uses for this new element. We�ve added thumbnail support to Blogger�s Blog List page element as a new option: Blog Lists can now display the most recent thumbnail from Blogger and other Media RSS�enabled feeds.
Suni

TRAFFIC SWAMP|GET TRAFFIC TO YOUR SITE

0 komentar
Is it too good to be true?



For most people, getting high-quality targeted visitorsto their site is probably one of the "hardest" things todo ... unfortunately it's also the most important.

The reason it's difficult for most small businesses and online marketers is that the majority of popular site promotion strategies either take up A LOT of time, cost a lot of money, or are too risky. Right?

Well, I tell U because I want to let you know about a new, fully-automated traffic-generationsystem that can send 1000s of targeted prospects toyour site, every single day, absolutely FREE!

Please sign up HERE!

Would you believe that this new system is:


  • -> 100% Free! - Always has been, and always will be
  • -> Automated - 5 minutes to set it up, then forget it
  • -> Targeted - you'll get only real, targeted traffic
  • -> "Viral" - your traffic will increase exponentially

I thought it was too good to be true at first ... but after testing it out, the results have been extremely profitable. And the feedback so far has been great:

"Holy *#@% ... this is really amazing! I never thought something free could bring so much traffic. Truthfully, it seems to be working better than most of my paid ads."

Anyway, do us both a favor and check it out ASAP. It'sstill pretty new and you will benefit even more if youcreate your FREE account now before most people join.

Please sign up HERE!

Give it a try and let me know what you think ...

Suni

Get Firefox 3

0 komentar

Can a browser really make the Web better? Yes ! Download the new Firefox 3
Firefox the award winning Web browser is absolutely free and easy to use. Join the over 500.000.000 million people worldwide enjoying a better and faster web browsing.It's so easy to import your favorites and settings from your old browser and get started.
Download Firefox now and get a faster and safer web.

Pimp Your Firefox Browser with the Firefox Add Ons Find extensions, plug ins and search engines to customize your Firefox browser for a better web experience.

Put a Firefox Buttons & Firefox Banners on your website and help to spread Firefox all over the world.
Download the new Firefox 3.1 Alpha 2 Shiretoko for Windows, Linux and Mac OS. Faster than Google Chrome
Suni

AppGet 0.6.9 Download

0 komentar

An update is available for installed Applications, it will be shown in Appget!


Brothersoft Editor/ Appget is a version-control-program. Appget will show you a list of your installed Applications.When an update is available for one of them, it will be shown in Appget.

There you can update the specific applications in seconds. When appget starts, it will create a list all your installed applications and their corresponding version numbers. The collected data will (anonymously) be submitted and compared to the online Appget database.


License: Freeware Free
OS: Windows Vista, XP, 2000
Requirements: No special requirements
Publisher: Josha van Praag More Products
Homepage: http://www.app-get.com/

Download : Here


Suni

Topical Table of Contents

0 komentar

This posting is updated whenever a new post goes up.



There is a also a
>Skills-oriented Table Of Contents. It is not as complete as this list,
which lists all posts, but it is more centered on links as they relate to skills.




If you want some free analysis, why not >submit your schema to the
Database Programmer? If you are willing to discuss your issues with a bit of public
exposure, I will provide free analysis, and everybody can benefit!



>User-Submitted Analysis Topic: Email





The Application Stack







Table Design Basics: Keys, Normalization, Denormalization




The first group of posts introduces the must-know terms and techniques for table design.



It might be a good idea to start with
>The Relational Model.





Following up on the normal forms are some basic discussions of
normalization and denormalization.








Table Design Patterns




The second subseries details commonly occurring patterns in table design,
how to recognize them and when to use them.



There is a complete "http://database-programmer.blogspot.com/2008/01/table-design-patterns.html"
>List of Table Design Patterns
. The rest of the entries are:







SQL SELECT and Queries







Algorithms and Processes







Server-Side Code







Analysis







Development Cycle








Philosophy








Data Dictionary




Many of these posts are listed elsewhere in this table of contents,
but I wanted to have them altogether in one place as well.






Security








Performance







The Browser




Suni

Membuat Buku dengan Microsoft Word

0 komentar

Trik di bawah ini kami kutip dari http://www.kaskus.us/showthread.php?t=604228.

Tutorial singkat membuat buku dengan Microsoft Word.Mencetak halaman seperti di Surat Kabar.

Langkah I

  1. Open Microsoft Word (jangan tanya gw gimana caranya)
  2. Buka dokumen yg ingin anda cetak dalam model buku atau buat dokumen baru
  3. Klik File -> Page Setup
  4. Pada tab Margins cari bagian Pages
  5. Pada pilihan Multiple Pages ubah dari normal menjadi bookfold
  6. Orientasi otomatis juga berubah dari portrait menjadi landscape.
  7. Jangan lupa juga untuk mensetting margin halaman sesuai dengan keinginan kamu
  8. Klik OK

Dokumen akan berubah menjadi bentuk landscape jadi check ulang dokumen anda.

Langkah II (print)

  1. Klik File -> Print
  2. Beri centang (tick) pada pilihan manual duplex
  3. Klik OK

Setelah itu printer anda akan secara otomatis mencetak halaman anda. Tunggu sampai ada perintah untuk membalik kertas. Setelah itu balik kertas yg sudah dicetak dan masukkan ke dalam printer.

Note: Masukkan kertas dengan benar!!

Catatan Tambahan : Jangan lupa juga untuk memberikan nomor halaman untuk mempermudah. Silahkan mencoba dulu dengan halaman yg sedikit.

Suni

Download PCMAV 1.7

0 komentar
Dengan PCMAV, Anda akan mendapatkan antivirus yang bukan hanya sekadar mendeteksi namun daya basminya yang tangguh mampu memburu 99.9% virus yang dikenal sampai ke akar-akarnya" tanpa menimbulkan kerusakan pada file maupun sistem yang terinfeksi.

Perpaduan keunikan fitur serta keakuratan dan kepedulian terhadap keselamatan sistem, file dan dokumen Anda memberi kesempurnaan sebuah antivirus pada PCMAV

Di setiap edisi Majalah PC Media terbaru yang terbit tiap bulannya, kami senantiasa menyempurnakan PCMAV ini dengan kemampuan dan fitur baru demi menjadikan PCMAV sebagai antivirus yang sesuai kebutuhan Anda, pembaca setia Majalah PC Media. Dan menjadi kebanggaan Indonesia

APA YANG BARU?

  1. Ditambahkan, database pengenal dan pembersih 118 virus lokal/asing/varian baru yang dilaporkan menyebar di Indonesia. Total 2182 virus beserta variannya yang banyak beredar di Indonesia telah dikenal di versi 1.7 ini oleh engine internal PCMAV.
  2. Diperbaiki, kesalahan pada rutin yang bertugas melakukan buffering pada file yang akan di-scan.
  3. Ditambahkan, cleaner khusus untuk virus VBScript FourTwoOne.vbs.
  4. Ditambahkan, cleaner khusus untuk virus Windx-Maxtrox yang dapat menginfeksi file executable.
  5. Ditambahkan, cleaner khusus untuk virus Microso yang dapat melakukan injeksi file .DLL.
  6. Diperbaiki, kesalahan deteksi (false alarm) heuristik pada beberapa program ataupun script.
  7. Diperbarui, perubahan beberapa nama virus mengikuti varian baru yang ditemukan.
  8. Perbaikan beberapa minor bug dan improvisasi kode internal untuk memastikan bahwa PCMAV Cleaner & PCMAV RealTime Protector lebih dari sekadar antivirus biasa.

Download PCMAV 1.7

Suni

How to crack WPA wireless networks

0 komentar

WPA is an encryption algorithm that takes care of a lot of the vunerablities inherent in WEP. WEP is, by design, flawed. No matter how good or crappy, long or short, your WEP key is, it can be cracked. WPA is different. A WPA key can be made good enough to make cracking it unfeasible. WPA is also a little more cracker friendly. By capturing the right type of packets, you can do your cracking offline. This means you only have to be near the AP for a matter of seconds to get what you need. Advantages and disadvantages.

WPA Flavours

WPA basically comes in two flavours RADIUS or PSK. PSK is crackable, RADIUS is not so much.

PSK uses a user defined password to initialize the TKIP, temporal key integrity protocol. There is a password and the user is involved, for the most part that means it is flawed. The TKIP is not really crackable as it is a per-packet key but upon the initialization of the TKIP, like during an authentication, we get the password (well the PMK anyways). A robust dictionary attack will take care of a lot of consumer passwords.

Radius involves physical transferring of the key and encrypted channels blah blah blah, look it up to learn more about it but 90% of commerical APs do not support it, it is more of an enterprise solution then a consumer one.

The Handshake

The WPA handshake was designed to occur over insecure channels and in plaintext so the password is not actually sent across. There are some fancy dancy algorithms in the background that turn it into a primary master key, PMK, and the like but none of that really matters cause the PMK is enough to connect to the network.

The only step we need to do is capture a full authenication handshake from a real client and the AP. This can prove tricky without some packet injection, but if you are lucky to capture a full handshake, then you can leave and do the rest of the cracking at home.

We can force an authenication handshake by launching a Deauthentication Attack, but only if there is a real client already connected (you can tell in airodump). If there are no connected clients, you�re outta luck.

Like for WEP, we want to know the channel the WPA is sitting on, but the airodump command is slightly different. We don�t want just IVs so we don�t specify an IV flag. This will produce �lucid.cap� instead of �lucid.ivs�. Assume WPA is on channel 6 and wireless interface is ath0.

./airodump ath0 lucid 6

Dictionary Brute Force

The most important part of brute forcing a WPA password is a good dictionary. Check out http://www.openwall.com/wordlists/ for a �really� good one. It costs money, but it�s the biggest and best I�ve ever seen (40 Million words, no duplicates, one .txt file). There is also a free reduced version from the same site but i�m sure resourceful people can figure out where to get a good dictionary from.

When you have a good dictionary the crack is a simple brute force attack:

./aircrack -a 2 -b 00:23:1F:55:04:BC -w /path/to/wordlist

Either you�ll get it or you won�t� depends on the strength of the password and if a dictionary attack can crack it.

Source : http://www.coderetard.com


Suni

Backup,compress and rename the folder with current Date by batch file

0 komentar

Automated file backup, renaming with current date & compress using batch file



Sometimes we need to take back up of some particular folder that regularly get updated and very crucial folder too. So what we need to do either use a third party tool or windows backup utility but I do not like both of them because of different reason.



For most of backup thing I love scripts and scheduling to do backup because you plant the tree once and get mangos always.



This time someone asked me to take a vss backup on daily basis but I can�t do this manually daily so I wrote a script and scheduled it to take the backup and rename it with current date. After that I thought if I can compress the folder it will save lot of disk space so I added one more line and it was all done.



For this compression thing you need to download an additional tool called 7zip command line version. That you can download from 7Zip download page here. After downloading it extract the zip file and copy the 7za.exe file in c:\WINDOWS\system32 folder. It�s very important to copy it in this system32 folder else you will need to give the full path of this 7za.exe file.



After this copy the bellow code and paste it in notepad.



xcopy D:\Data\*.* e:\backup\*.* /e /h /r /y

7za a -tzip e:backup.zip "e:\Backup"

rename "E:\backup.zip" %Date:~-10,2%_%Date:~-7,2%_%Date:~-4,4%.zip



Save the above file as backup.bat.



If you will run it by double click it will open a command prompt window immediately and will start processing after execution of all task it will get close and you can see the backup files at backup location.



In the above script fist line will copy the data second line will compress the folder and third line will rename the zip file to current date name.



Now here is next task, scheduling the backup.

For scheduling thing we will use windows scheduler. For this go to Control Panel->Scheduled Tasks and then double click on Add scheduled task. It will open a wizard just follow the wizard and it�s all done when you are at end of wizard.



Things do remember

1) Make sure to change the folder path.

2) Do not do any change other than the folder path

3) make sure to test it on a test environment before putting it live.



I hope it was useful for you please comment if you face any problem or have any suggestion for this.



Thanks for visiting my blog.

Suni

History Internet Protocol

0 komentar

The Internet Protocol Suite resulted from work done by Defense Advanced Research Projects Agency (DARPA) in the early 1970s. After building the pioneering ARPANET in 1969, DARPA started work on a number of other data transmission technologies. In 1972, Robert E. Kahn was hired at the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks, and recognized the value of being able to communicate across them. In the spring of 1973, Vinton Cerf, the developer of the existing ARPANET Network Control Program (NCP) protocol, joined Kahn to work on open-architecture interconnection models with the goal of designing the next protocol generation for the ARPANET.

By the summer of 1973, Kahn and Cerf had worked out a fundamental reformulation, where the differences between network protocols were hidden by using a common internetwork protocol, and instead of the network being responsible for reliability, as in the ARPANET, the hosts became responsible. Cerf credits Hubert Zimmerman and Louis Pouzin, designer of the CYCLADES network, with important influences on this design.

With the role of the network reduced to the bare minimum, it became possible to join almost any networks together, no matter what their characteristics were, thereby solving Kahn's initial problem. One popular saying has it that TCP/IP, the eventual product of Cerf and Kahn's work, will run over "two tin cans and a string." There is even an implementation designed to run using homing pigeons, IP over Avian Carriers, documented in RFC 1149.
A computer called a router (a name changed from gateway to avoid confusion with other types of gateways) is provided with an interface to each network, and forwards packets back and forth between them. Requirements for routers are defined in (Request for Comments 1812).
The idea was worked out in more detailed form by Cerf's networking research group at Stanford in the 1973�74 period, resulting in the first TCP specification (Request for Comments 675) [6] (The early networking work at Xerox PARC, which produced the PARC Universal Packet protocol suite, much of which existed around the same period of time (i.e. contemporaneous), was also a significant technical influence; people moved between the two).

DARPA then contracted with BBN Technologies, Stanford University, and the University College London to develop operational versions of the protocol on different hardware platforms. Four versions were developed: TCP v1, TCP v2, a split into TCP v3 and IP v3 in the spring of 1978, and then stability with TCP/IP v4 � the standard protocol still in use on the Internet today.

In 1975, a two-network TCP/IP communications test was performed between Stanford and University College London (UCL). In November, 1977, a three-network TCP/IP test was conducted between the U.S., UK, and Norway. Between 1978 and 1983, several other TCP/IP prototypes were developed at multiple research centers. A full switchover to TCP/IP on the ARPANET took place January 1, 1983.

In March 1982, the US Department of Defense made TCP/IP the standard for all military computer networking. In 1985, the Internet Architecture Board held a three day workshop on TCP/IP for the computer industry, attended by 250 vendor representatives, helping popularize the protocol and leading to its increasing commercial use.
On November 9, 2005 Kahn and Cerf were presented with the Presidential Medal of Freedom for their contribution to American culture.

Suni

Mempercepat Akses Speedy

0 komentar

Saat anda browsing atau membuka suatu website di internet entah dari warung internet ataupun dari rumah, mungkin anda sering mengeluh akan lambatnya akses untuk menampilkan website tersebut. Padahal akses internet di Indonesia sekarang ini masih terhitung mahal. Sebenarnya ada cara-cara mudah untuk meningkatkan kecepatan akses internat anda tanpa harus membayar biaya lebih mahal. Beberapa diantaranya adalah dengan menyetting browser kita, menggunakan openDNS, dan menggunakan Google Web Accelerator.Untuk menerapkan trik-trik tersebut sangat mudah.

Cara pertama yaitu menyetting browser dapat dilakukan oleh pengguna Internet Explorer dan Mozilla Firefox. Bagi pengguna Internet Explorer klik menu [Tools] [Internet Option], klik tab [General]. Pada opsi �Temperory Internet files�, klik [Settings] lalu Geser slider-nya. Hal itu untuk membuat cache (lokasi penyimpanan sementara) untuk web yang anda buka, sebaliknya disediakan sekitar 5% dari Hard disk.

Bagi pengguna Mozilla Firefox anda dapat mengetikkan �about:config� pada address bar,. setelah itu ubah �network.http.pipelining� dan �network.http.proxy pipelining� menjadi �true�, serta isi �network.http.pipelining.maxrequests� antara 30 �100 ( semakin besar semakin cepat ). Yang terakhir klik kanan dimana saja dan pilih New->Integer , tuliskan �nglayout.initialpaint.delay� lalu isi dengan 0.

Untuk trik kedua, pertama anda harus mendaftar di www.openDNS.com . Setelah itu masuk ke Control Panel dari start menu, pilih network connections lalu pilih koneksi anda dan klik tombol properties. Pada bagian Internet protokol anda bisa pilih TCP/IP dan klik properties. Masukkan angka 208.67.222.222 dan 208.67.220.220 pada opsi DNS dan restart komputer anda.

Setelah melakukan 2 tips di atas sekarang anda pasti akan mendapat kecepatan akses yang lebih kencang. Bagi yang masih belum puas dengan kecepatan aksesnya sekarang dapat menggunakan trik yang ke tiga yaitu Google Web Accelerator. Google Web Accelerator di desain khusus untuk mempercepat akses internet anda, khususnya anda yang menggunakan koneksi broadband (pita lebar) seperti Cable dan DSL. Untuk anda yang menggunakan koneksi lain seperti Dial-up (Telkomnet Instant atau Speedy) maupun satelit atau wave, Google Web Accelerator juga dapat mempercepat aksesnya.

Untuk memakai Google Web Accelerator anda harus memenuhi kriteria antara lain Operating System anda harus Windows XP atau Windows 2000 dan browser anda harus Internet Explorer 5.5+ atau Mozilla Firefox 1.0+. Kalau untuk browser lainnya sebenarnya juga bisa, tetapi anda harus meng-konfigurasi proxy settings dari browser anda dengan menambah 127.0.0.1:9100 pada HTTP. Setelah anda melakukan instalasi, Google Web Accelerator akan menampilkan icon kecil di atas browser anda dan icon tray di pojok bawah layar komputer.

Anda dapat mengunduh Google Web Accelerator di http://webaccelerator.google.com


Suni

Trik untuk meningkatkan kecepatan internet

0 komentar

Secara default Windows (Win XP Pro dan 2000) sebenarnya juga mengurangi bandtwith kita sebesar 20%, 20% ini digunakan window untuk mendownload update untuk window. Berikut langkah untuk menghilangkan pengurangan bandwidth tersebut :

Klik Start->Run->ketik�gpedit.msc� (tanpa tanda �) Ini akan memunculkan tampilan �Windows Policy�. Kemudian masuk ke : Local Computer Policy�>Computer Configuration�>Administrative Templates�>Network�>QOS Packet Scheduler kemudian di tampilan kanan pilih �Limit Reservable Bandwidth�, disitu tertulis �Not Configured� -> doubel klik (ada tampilan baru, �Limit reservable bandwidth Properties�).Jika ingin tahu keterangannya buka di bagian �Explain�. Di situ tertulis keterangan windows secara default menggunakan 20% bandwidth kita. Kembali ke �Setting� dan pilih �Enabled� lalu ganti 20 % menjadi 0%.

Suni

MAPI32.DLL file missing in outlook

0 komentar

MAPI32.DLL file missing in outlook



MAPI32.DLL error running Outlook 2003 - Office Setup



Today morning one of my colleagues asked me to upgrade his mail client from outlook express to MS outlook. I questioned him why you are using outlook express while we have MS outlook and he answered me �all the time I start MS outlook I get some annoying error. I tried to reinstall and did every tweak that was available on net but it�s not working�.



I decided to check it by my own so I started outlook and got the error MAPI.DLL is missing or corrupt. Well after this simply I had to do outlook repair or reinstall but my colleague said he already done that. I said ok let me do it once again. First I repaired but it dint work than uninstall and reinstall but then also result was same.



Now I had no other option that thinking in out of box way. I removed MS office once again and now I went to C:\program files here I looked if traces of MS office installed files are still there and I got the problem. The MS office folder was still there. I removed the MS office folder and then I removed the msocache folder from my c drive that gets created when we install MsOffice.



After this I restarted the computer and re-installed the MS Office and needless to say it worked as if it never had any problem.

So to get rid of this error just uninstall MS office->Remove all the files of installed MS office from program file and temp files now restart the computer and reinstall ms office and your are done.



Hope this was useful for you.

Please let me know if you get any problem in this.

Suni

Tawk.to