Showing posts with label Komputer. Show all posts
Showing posts with label Komputer. Show all posts

25.5.14

Akibat sering instal ulang Sistem Operasi



gambar instal ulang OS



 Akibat sering instal ulang Sistem Operasi


      Akibat sering instal ulang Sistem Operasi - Kali ini Mas Tekno akan berbagi tips dan sedikit cerita mengapa banyak orang yang seringkali instal ulang OS.  Untuk mengatasi masalah-masalah berat pada komputer,  menginstall ulang Sistem Operasi seringkali di jadikan jalan keluar . Tetapi yang perlu di ingat bahwa install ulang bukanlah jalan keluar terbaik yang bisa dilakukan untuk mengatasi masalah pada komputer, bahkan terlalu sering melakukan install ulang terkadang akan menjadi masalah rumit di kemudian hari. Berikut ini adalah beberapa konsekuensi yang mungkin dialami jika terlalu sering melakukan install ulang OS komputer Anda.
  • Dependence reinstall OS 

     Terlalu sering melakukan install ulang bisa membuat kamu ketergantungan. Sedikit-sedikit install ulang, ada masalah sedikit langsung install ulang, kinerja PC / laptop terasa lemot sedikit langsung install ulang, dan seterusnya. Tentu saja hal ini tidak baik bagi PC / laptop Anda, khususnya bagi komponen penting seperti hardisk.
  • Shortened Battery Life 

     Proses instalasi OS pada laptop sebaiknya menggunakan charger sampai proses instalasi itu selesai. Menginstal OS dalam kondisi baterai dilepas adalah cara yang salah karena tegangan listrik yang masuk kurang stabil dan jika melakukan install OS dalam kondisi baterai terpasang tanpa charger jika terlalu sering akan membuat umur baterai berkurang tanpa Anda sadari.
  • Hardware Damage Risk

    Instalasi OS yang terlalu sering juga dapat menyebabkan meningkatnya resiko kerusakan hardware karena proses ini merupakan proses yang cukup berat.
  • Data Loss Risk

    Setiap proses install ulang membawa resiko kehilangan data, terutama jika tidak dilakukan dengan benar. Proses format saat install ulang jika terlalu sering dilakukan juga berpotensi membuat hardisk lebih cepat bermasalah hingga data-data didalamnya bisa terancam.
Dari efek terlalu seringnya menginstall ulang OS tersebut, untuk itu Anda perlu berhati-hati dan selektif dalam melakukan install ulang OS jika tidak benar-benar diperlukan.
Tips sebelum kalian memutuskan untuk instal ulang sistem operasi 
·         Perlu kalian ketahui masalah yang dihadapi dan cari jalan keluarnya,  entah itu masalah yang ditimbulkan oleh virus,  human error,  atau  permasalahan sistem.  Sebaiknya kamu berusaha menyelesaikannya terlebih dahulu sebelum memutuskan untuk melakukan install ulang.

·         Gunakan System Restore jika semua masalah sulit diatasi.  System Restore merupakan tool ampuh yang bisa kamu gunaka untuk mengembalikan OS menjadi seperti sebelum terjadinya masalah.  
       
           Kemudian  ketahui spesifikasi software yang nantinya akan digunakan. Dari sekian pengalaman saya, banyak orang yang tidak mengetahui bahwa software yang nantinya mereka butuhkan ternyata tidak mendukung OS yang dia install. Akhirnya software tersebut tidak bisa digunakan dan mereka terpaksa melakukan install ulang lagi.

·         Dan ketahui spesifikasi Hardware yang  dimiliki, Ini bertujuan untuk menghindari hal-hal yang tidak diinginkan saat melakukan proses install ulang OS. Jadi jika hardware yang kamu gunakan tidak mensupport OS yang ingin kamu install, sebaiknya tidak perlu nekat untuk melanjutkan proses install ulang tersebut daripada terjadi masalah dan akhirnya terpaska harus melakukan install ulang lagi.

    Kesimpulannya adalah bahwa install ulang OS hanya diperlukan jika suatu masalah yang dihadapi sudah benar-benar tidak bisa diatasi sama sekali, baik itu berupa karena virus, human error, maupun sistem error. Jika masalah tersebut masih bisa diselesaikan tanpa harus install ulang OS, tidak disarankan untuk install ulang OS pada komputer Anda.


27.11.13

download software pembuat virus terbaru

Software Pembuat Virus

 alhamdulilah yah kali ini saya memiliki ilmu baru dan ini bukan sembarang ilmu yang bisa disembarangkan gunakan atau digunakan sembaranagn hehehe... yah kali ini saya akan membagikan software nih ya biasa digunakan untuk membuat virus ini gan.. haha . oh yah tentang penginstalan mudah kok tinggal klik next" aja yah oke.. :D nih bagi kalian yang udah nggak sabar mau bikin virus nya download langsung  ajah deh ni softwarenya  di bawah ini.

DOWNLOAD software Pembuat Virus

oz jangan di salah gunakan yah bray.. hhehe.
by @slamsupersudrun

19.5.13

Workshop Firewall

Workshop Firewall
Drop port scanners
/ip firewall filter
add chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-list address-list="port scanners"
address-list-timeout=2w comment="Port scanners to list " disabled=no
add chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
action=add-src-to-address-list address-list="port scanners"
address-list-timeout=2w comment="NMAP FIN Stealth scan"
add chain=input protocol=tcp tcp-flags=fin,syn
action=add-src-to-address-list address-list="port scanners"
address-list-timeout=2w comment="SYN/FIN scan"
add chain=input protocol=tcp tcp-flags=syn,rst
action=add-src-to-address-list address-list="port scanners"
address-list-timeout=2w comment="SYN/RST scan"
add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
action=add-src-to-address-list address-list="port scanners"
address-list-timeout=2w comment="FIN/PSH/URG scan"
add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
action=add-src-to-address-list address-list="port scanners"
address-list-timeout=2w comment="ALL/ALL scan"
add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
action=add-src-to-address-list address-list="port scanners"
address-list-timeout=2w comment="NMAP NULL scan"
add chain=input src-address-list="port scanners" action=drop comment="dropping port scanners" disabled=no
Redirect mail traffic to a specified server
p firewall nat add chain=dstnat protocol=tcp dst-port=25 action=dst-nat to-addresses=10.0.0.1( ip server email ) to-ports=25
Block Websites & Stop Downloading Using Proxy
/ip proxy
enabled: yes
src-address: 0.0.0.0
port: 8080
parent-proxy: 0.0.0.0:0
cache-drive: system
cache-administrator: "webmaster"
max-disk-cache-size: none
max-ram-cache-size: none
cache-only-on-disk: no
maximal-client-connections: 1000
maximal-server-connections: 1000
max-object-size: 512KiB
max-fresh-time: 3d
Now, Make it Transparent
/ip firewall nat
chain=dstnat protocol=tcp dst-port=80 action=redirect to-ports=8080
Make sure that your proxy is NOT a Open Proxy
/ip firewall filter
chain=input in-interface=<Your WAN Port> src-address=0.0.0.0/0 protocol=tcp dst-port=8080 action=drop
Now for Blocking Websites
/ip proxy access
dst-host=www.vansol27.com action=deny
We can also stop downloading files like.mp3, .exe, .dat, .avi,…etc.
/ip proxy access
path=*.exe action=deny
path=*.mp3 action=deny
path=*.zip action=deny
path=*.rar action=deny.
/ip proxy access
dst-host=:mail action=deny
How to autodetect infected or spammer users and temporary block the SMTP output
/ip firewall filter
add chain=forward protocol=tcp dst-port=25 src-address-list=spammer
action=drop comment="BLOCK SPAMMERS OR INFECTED USERS"
add chain=forward protocol=tcp dst-port=25 connection-limit=30,32 limit=50,5 action=add-src-to-address-list
address-list=spammer address-list-timeout=1d comment="Detect and add-list SMTP virus or spammers"
/system script
add name="spammers" source=":log error \"----------Users detected like \
SPAMMERS -------------\";
\n:foreach i in \[/ip firewall address-list find \
list=spammer\] do={:set usser \[/ip firewall address-list get \$i \
address\];
\n:foreach j in=\[/ip hotspot active find address=\$usser\] \
do={:set ip \[/ip hotspot active get \$j user\];
\n:log error \$ip;
\n:log \
error \$usser} };" policy=ftp,read,write,policy,test,winbox
Protect customer
/ip firewall filter
add chain=forward connection-state=established comment="allow established connections"
add chain=forward connection-state=related comment="allow related connections"
add chain=forward connection-state=invalid action=drop comment="drop invalid connections"
add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=udp dst-port=135-139 action=drop comment="Drop Messenger Worm"
add chain=virus protocol=tcp dst-port=445 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=udp dst-port=445 action=drop comment="Drop Blaster Worm"
add chain=virus protocol=tcp dst-port=593 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom"
add chain=virus protocol=tcp dst-port=1214 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester"
add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server"
add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast"
add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx"
add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid"
add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment="Worm"
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus"
add chain=virus protocol=tcp dst-port=2283 action=drop comment="Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=2535 action=drop comment="Drop Beagle"
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Drop Beagle.C-K"
add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment="Drop MyDoom"
add chain=virus protocol=tcp dst-port=3410 action=drop comment="Drop Backdoor OptixPro"
add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser"
add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B"
add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B"
add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B"
add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus"
add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2"
add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven"
add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot, Agobot, Gaobot"
add chain=forward action=jump jump-target=virus comment="jump to the virus chain"
add chain=forward action=accept protocol=tcp dst-port=80 comment="Allow HTTP"
add chain=forward action=accept protocol=tcp dst-port=25 comment="Allow SMTP"
add chain=forward protocol=tcp comment="allow TCP"
add chain=forward protocol=icmp comment="allow ping"
add chain=forward protocol=udp comment="allow udp"
add chain=forward action=drop comment="drop everything else"
Firewall Komplit
Components of the filter
• protocol classifier
• invalid packet filter
• port-scan detector
• policy classifier
• application protocol filter
• TCP-specific filters
• application protocol specific filters
/ ip firewall mangle
add chain=prerouting protocol=tcp connection-state=new action=jump jump-target=tcp-services
add chain=prerouting protocol=udp connection-state=new action=jump jump-target=udp-services
add chain=prerouting connection-state=new action=jump jump-target=other-services
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=20-21 action=mark-connection new-connection-mark=ftp passthrough=no
add chain=tcp-services protocol=tcp src-port=513-65535 dst-port=22 action=mark-connection new-connection-mark=ssh passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=23 action=mark-connection new-connection-mark=telnet passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=25 action=mark-connection new-connection-mark=smtp passthrough=no
add chain=tcp-services protocol=tcp src-port=53 dst-port=53 action=mark-connection new-connection-mark=dns passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=53 action=mark-connection new-connection-mark=dns passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=80 action=mark-connection new-connection-mark=http passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=110 action=mark-connection new-connection-mark=pop3 passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=113 action=mark-connection new-connection-mark=auth passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=119 action=mark-connection new-connection-mark=nntp passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=143 action=mark-connection new-connection-mark=imap passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=161-162 action=mark-connection new-connection-mark=snmp passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=443 action=mark-connection new-connection-mark=https passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=465 action=mark-connection new-connection-mark=smtps passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=993 action=mark-connection new-connection-mark=imaps passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=995 action=mark-connection new-connection-mark=pop3s passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=1723 action=mark-connection new-connection-mark=pptp passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=2379 action=mark-connection new-connection-mark=kgs passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=3128 action=mark-connection new-connection-mark=proxy passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=3389 action=mark-connection new-connection-mark=win-ts passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=4242-4243 action=mark-connection new-connection-mark=emule passthrough=no
add chain=tcp-services protocol=tcp src-port=4661-4662 dst-port=1024-65535 action=mark-connection new-connection-mark=overnet passthrough=no
add chain=tcp-services protocol=tcp src-port=4711 dst-port=1024-65535 action=mark-connection new-connection-mark=emule passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=5900-5901 action=mark-connection new-connection-mark=vnc passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=6667-6669 action=mark-connection new-connection-mark=irc passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=6881-6889 action=mark-connection new-connection-mark=bittorrent passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=8080 action=mark-connection new-connection-mark=http passthrough=no
add chain=tcp-services protocol=tcp src-port=1024-65535 dst-port=8291 action=mark-connection new-connection-mark=winbox passthrough=no
add chain=tcp-services protocol=tcp action=mark-connection new-connection-mark=other-tcp passthrough=no
add chain=udp-services protocol=udp src-port=1024-65535 dst-port=53 action=mark-connection new-connection-mark=dns passthrough=no
add chain=udp-services protocol=udp src-port=1024-65535 dst-port=123 action=mark-connection new-connection-mark=ntp passthrough=no
add chain=udp-services protocol=udp src-port=1024-65535 dst-port=1701 action=mark-connection new-connection-mark=l2tp passthrough=no
add chain=udp-services protocol=udp src-port=1024-65535 dst-port=4665 action=mark-connection new-connection-mark=emule passthrough=no
add chain=udp-services protocol=udp src-port=1024-65535 dst-port=4672 action=mark-connection new-connection-mark=emule passthrough=no
add chain=udp-services protocol=udp src-port=4672 dst-port=1024-65535 action=mark-connection new-connection-mark=emule passthrough=no
add chain=udp-services protocol=udp src-port=1024-65535 dst-port=12053 action=mark-connection new-connection-mark=overnet passthrough=no
add chain=udp-services protocol=udp src-port=12053 dst-port=1024-65535 action=mark-connection new-connection-mark=overnet passthrough=no
add chain=udp-services protocol=udp src-port=36725 dst-port=1024-65535 action=mark-connection new-connection-mark=skype passthrough=no
add chain=udp-services protocol=udp connection-state=new action=mark-connection new-connection-mark=other-udp passthrough=no
add chain=other-services protocol=icmp icmp-options=8:0-255 action=mark-connection new-connection-mark=ping passthrough=no
add chain=other-services protocol=gre action=mark-connection new-connection-mark=gre passthrough=no
add chain=other-services action=mark-connection new-connection-mark=other passthrough=no
Most generic invalid packet and port-scan detection techniques
/ip firewall mangle
add chain=prerouting in-interface=Public dst-address-list=nat-addr action=mark-packet new-packet-mark=nat-traversal passthrough=no
/ ip firewall address-list
add list=illegal-addr address=0.0.0.0/8 comment="illegal addresses"
add list=illegal-addr address=127.0.0.0/8
add list=illegal-addr address=224.0.0.0/3
add list=illegal-addr address=10.0.0.0/8
add list=illegal-addr address=172.16.0.0/12
add list=illegal-addr address=192.168.0.0/16
add list=local-addr address=172.31.255.0/29 comment="my local network"
add list=nat-addr address=172.31.255.0/29 comment="my local network"
/ ip firewall filter
add chain=forward in-interface=Local out-interface=Local action=accept comment="Allow traffic between wired and wireless networks"
/ ip firewall filter
add chain=forward action=jump jump-target=sanity-check comment="Sanity Check"
add chain=sanity-check packet-mark=nat-traversal action=jump jump-target=drop comment="Deny illegal NAT traversal"
add chain=sanity-check protocol=tcp psd=20,3s,3,1 action=add-src-to-address-list address-list=blocked-addr address-list-timeout=1d comment="Block port scans"
add chain=sanity-check protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-to-address-list address-list=blocked-addr address-list-timeout=1d comment="Block TCP Null scan"
add chain=sanity-check protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list=blocked-addr address-list-timeout=1d comment="Block TCP Xmas scan"
add chain=sanity-check protocol=tcp src-address-list=blocked-addr action=jump jump-target=drop
add chain=sanity-check protocol=tcp tcp-flags=rst action=jump jump-target=drop comment="Drop TCP RST"
add chain=sanity-check protocol=tcp tcp-flags=fin,syn action=jump jump-target=drop comment="Drop TCP SYN+FIN"
add chain=sanity-check connection-state=invalid action=jump jump-target=drop comment="Dropping invalid connections at once"
add chain=sanity-check connection-state=established action=accept comment="Accepting already established connections"
add chain=sanity-check connection-state=related action=accept comment="Also accepting related connections"
add chain=sanity-check dst-address-type=broadcast,multicast action=jump jump-target=drop comment="Drop all traffic that goes to multicast or broadcast addresses"
add chain=sanity-check in-interface=Local dst-address-list=illegal-addr dst-address-type=!local action=jump jump-target=drop comment="Drop illegal destination addresses"
add chain=sanity-check in-interface=Local src-address-list=!local-addr action=jump jump-target=drop comment="Drop everything that goes from local interface but not from local address"
add chain=sanity-check in-interface=Public src-address-list=illegal-addr action=jump jump-target=drop comment="Drop illegal source addresses"
add chain=sanity-check in-interface=Public dst-address-list=!local-addr action=jump jump-target=drop comment="Drop everything that goes from public interface but not to local address"
add chain=sanity-check src-address-type=broadcast,multicast action=jump jump-target=drop comment="Drop all traffic that goes from multicast or broadcast addresses"
/ ip firewall filter
add chain=forward protocol=tcp action=jump jump-target=restrict-tcp
add chain=forward protocol=udp action=jump jump-target=restrict-udp
add chain=forward action=jump jump-target=restrict-ip
add chain=restrict-tcp connection-mark=auth action=reject
add chain=restrict-tcp connection-mark=smtp action=jump jump-target=smtp-first-drop comment="anti-spam policy"
add chain=smtp-first-drop src-address-list=first-smtp action=add-src-to-address-list address-list=approved-smtp
add chain=smtp-first-drop src-address-list=approved-smtp action=return
add chain=smtp-first-drop action=add-src-to-address-list address-list=first-smtp
add chain=smtp-first-drop action=reject reject-with=icmp-network-unreachable
/ ip firewall filter
add chain=restrict-tcp connection-mark=other-tcp action=jump jump-target=drop
add chain=restrict-udp connection-mark=other-udp action=jump jump-target=drop
add chain=restrict-ip connection-mark=other action=jump jump-target=drop
/ ip firewall filter
add chain=input src-address-type=local dst-address-type=local action=accept comment="Allow local traffic \(between router applications\)"
add chain=input in-interface=Local protocol=udp src-port=68 dst-port=67 action=jump jump-target=dhcp comment="DHCP protocol would not pass sanity checking, so enabling it explicitly before other checks"
add chain=input action=jump jump-target=sanity-check comment="Sanity Check"
add chain=input dst-address-type=!local action=jump jump-target=drop comment="Dropping packets not destined to the router itself, including all broadcast traffic"
add chain=input connection-mark=ping limit=5,5 action=accept comment="Allow pings, but at a very limited rate \(5 per sec\)"
add chain=input in-interface=Local action=jump jump-target=local-services comment="Allowing some services to be accessible from the local network"
add chain=input in-interface=Public action=jump jump-target=public-services comment="Allowing some services to be accessible from the Internet"
add chain=input action=jump jump-target=drop
add chain=dhcp src-address=0.0.0.0 dst-address=255.255.255.255 action=accept
add chain=dhcp src-address=0.0.0.0 dst-address-type=local action=accept
add chain=dhcp src-address-list=local-addr dst-address-type=local action=accept
add chain=local-services connection-mark=ssh action=accept comment="SSH \(22/TCP\)"
add chain=local-services connection-mark=dns action=accept comment="DNS"
add chain=local-services connection-mark=proxy action=accept comment="HTTP Proxy \(3128/TCP\)"
add chain=local-services connection-mark=winbox comment="Winbox \(8291/TCP\)" disabled=no
add chain=local-services action=drop comment="Drop Other Local Services"
add chain=public-services connection-mark=ssh action=accept comment="SSH \(22/TCP\)"
add chain=public-services connection-mark=pptp action=accept comment="PPTP \(1723/TCP\)"
add chain=public-services connection-mark=gre action=accept comment="GRE for PPTP"
add chain=public-services action=drop comment="Drop Other Public Services"
Proxying everything
/ ip firewall nat
add chain=dstnat in-interface=Local connection-mark=dns action=redirect comment="proxy for DNS requests"
add chain=dstnat in-interface=Local connection-mark=http protocol=tcp action=redirect to-ports=3128 comment="proxy for HTTP requests"
add chain=dstnat in-interface=Local connection-mark=ntp action=redirect comment="proxy for NTP requests"
Enable Proxy servers
/ system ntp server
set enabled=yes broadcast=no multicast=no manycast=no
/ system ntp client
set enabled=yes mode=unicast primary-ntp=xxx.xxx.xxx.xxx secondary-ntp=0.0.0.0
/ ip proxy
set enabled=yes port=3128 parent-proxy=0.0.0.0:1 maximal-client-connections=1000 maximal-server-connections=1000
/ ip dns
set primary-dns=yyy.yyy.yyy.yyy secondary-dns=0.0.0.0 allow-remote-requests=yes cache-size=2048KiB cache-max-ttl=1w
Bruteforce login prevention (FTP & SSH)
/ip firewall filter
add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop
add chain=output action=accept protocol=tcp content="530 Login incorrect" dst-limit=1/1m,9,dst-address/1m
add chain=output action=add-dst-to-address-list protocol=tcp content="530 Login incorrect" \
address-list=ftp_blacklist address-list-timeout=3h
add chain=input protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop \
comment="drop ssh brute forcers" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new \
src-address-list=ssh_stage3 action=add-src-to-address-list address-list=ssh_blacklist \
address-list-timeout=10d comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new \
src-address-list=ssh_stage2 action=add-src-to-address-list address-list=ssh_stage3 \
address-list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage1 \
action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=1m comment="" disabled=no
add chain=input protocol=tcp dst-port=22 connection-state=new action=add-src-to-address-list \
address-list=ssh_stage1 address-list-timeout=1m comment="" disabled=no

3.5.13

pembelajaran prinsip kerja HOSTPOT 2013


ASSLMUALAIKUM...
:)
senyumlah kawan dalam mengawali semua kegiatan kita...
:D
saya di sini akan membagi lah ilmu kuliah saya tentang HOSTPOT oke..eko.. :D
Karena mungki masih banyak orang yng belum mengenal atau mengerti apa sih itu hostpot..
heheh ....
di sini mbah mata akan menjelaskan atau menshare sedikit ilmu yg mbah mata ketahui..
:D
nah bagi anda atau semuanya yang ingin mengetahui tutorial atau jalan ceritanya lah yah...
wkwkwk..
silahkan klik di link ini http://sudrun.tk/2013/05/tutorial-pembelajaran-rangkaian-hostpot/

14.4.13

CARA MENGHAPUS ANTIVIRUS AVIRA 2013

yahhh disini saya akan berbagi ilmu tentang bagaimana menghapus antivirus avira sampai bersih.. ...
ozzz....biasanya klo hanya dengan cara uninstal di control panel itu belum tentu terhapus semua teman-teman..

karena itu saya akan kasih tau bagaimana sih cara supaya menghapus bersih antivirus avira..
nah inih langsung aja yah pada intingya..

bagi anda yang masih belum tau bagaimana cara menghapus atau uninstal antivirus avira sampai bersih...



Disini juga ada cara menghapus antivirus Avast sampai bersih kunjungi  Cara menghapus avast terbaru
                                   
                                              ........SELAMAT MENCOBA...........

12.4.13

tutorial membuat program method

KONSTRUKTOR DAN OVERLOADING
sudrunbenks Page 1
KONSTRUKTOR DAN OVERLOADING
Tujuan :
 Mampu membuat Method Konstruktor.
 Mampu membuat Method Overloading pada konstruktor
1. KONSTRUKTOR
Konstruktor adalah bagian dari
definisi suatu kelas yang berfungsi menciptakan instans dari kelas tersebut. Konstruktor ini bisa kita buat sendiri, atau bila kita tidak mendefinisikannya, maka kompiler Java akan membuatkan konstruktor default untuk kelas tersebut pada saat kompilasi. Yang perlu diperhatikan adalah bahwa suatu konstrukor tidak termasuk anggota suatu kelas seperti metode dan variabel dan bahwa konstruktor bisa dibuat lebih dari satu.
Metode konstruktor ini akan dipanggil secara otomatis oleh java ketika new dipakai untuk menciptakan instant kelas.Konstruktor mempunyai sifat:
a. Namanya sama dengan nama kelas
b. Tidak memiliki nilai balik ( termasuk tidak boleh ada kata-kunci void).
c. Dipanggil dengan keyword new
MODUL PRAKTIKUM II
sudrunbenks Page 2
Contoh Program Konstruktor 1


sudrunbenks Page 3
Contoh Program Konstruktor 2



sudrunbenks Page 4
2. OVERLOADING
Dua buah metode dalam sebuah class diperbolehkan memiliki nama yang sama dengan signature yang berbeda.
CONTOH PROGRAM OVERLOADING SEDERHANA




sudrunbenks Page 5
CONTOH OVERLOADING PADA KONSTRUKTOR


CONTOH PROGRAM OVERLOADING PADA METHOD






11.4.13

CARA MENDAPATKAN UANG DENGAN MUDAH

selamat pagi/siang/malam sobat .....  :) :D
yah di sini saya akan memberikan cara bagai mana anda dapat menata atau memperbaharuih hidup anda..
..emmm kalian guk perlu kuatir atau pusing - pusing mikirin uang datang kepada kita ...
disini kita akan belajar mencoba cara bagaimana uang datang pada kita dengan cara software online yaitu software forex .
FOREX ini berguna untuk penukaran mata uang asing ya sering kali orang jaman sekarang menggunakan bisnis itu untuk mencari peruntungan/malah sebagai pekerjaan mereka sehari-hari.
:D
nah disini saya akan memberikan software tersebut dengan cuma-cuma bagi kalian yang masih awam..

silahkan download software ini http://sudrun.tk/2013/03/cara-mendapatkan-uang-dengan-mudah/
lali instal software trsbt..
jadi dah.. :D :D
uang pun akan ber bondong - bondong pada kita.....
.
:) :) :)

9.4.13

remot control


PowerPoint Remote Cont.

The PowerPointer Pen offers convenience & simplicity.

It fits conveniently in your pocket like a whiteboard pen. And, when you need to advance to the next slide, or go back to a previous slide, or point to something on the screen, it simply works as expected, with no complicated buttons to figure out while the spotlight is on you.

As far as features go, it has the important things you've come to expect from a PowerPoint remote: a bright red laser and, of course, the Next Slide and Previous Slide buttons you need to control PowerPoint. And it works across the room, even through most obstacles, with a reliable operational range of up to 45 ft or 60 ft (depending on the model you select).

And, conveniently, it benefits from the simplicity of Plug and Play technology. So, all you have to do is plug the remote's receiver (which looks a lot like one of those handy memory sticks) into any available USB port of the computer you are presenting with and you are ready to go. Nothing to initialize and no software to install.

It also (optionally) includes 2 GB of RAM memory to allow you to conveniently store your presentations and other files in the remote's USB port receiver. That should be enough RAM for just about any occasion.

Let the PowerPointer Pen point the way through your next presentation!
http://www.crystalgraphics.com/presentations/images/bluesquare8.gifFeatures at a Glance

http://www.crystalgraphics.com/presentations/images/bluesquare8.gif
Very affordable and simple to use PowerPoint remote that conveniently fits in your pocket like a pen
http://www.crystalgraphics.com/presentations/images/bluesquare8.gif
Includes buttons for: Next Slide and Previous Slide and red laser pointer
http://www.crystalgraphics.com/presentations/images/bluesquare8.gif
Works in any direction, and through obstacles thanks to 315 MHz RF (radio frequency) technology
http://www.crystalgraphics.com/presentations/images/bluesquare8.gif
Up to 45 ft operational range for "Basic" (0 GB) model and up to 60 ft for "Premium" (2 GB) model
http://www.crystalgraphics.com/presentations/images/bluesquare8.gif
Very low power consumption provides long life to (included) 12 volt battery
http://www.crystalgraphics.com/presentations/images/bluesquare8.gif
Unique IDs for each remote virtually eliminate multi-user interference
http://www.crystalgraphics.com/presentations/images/bluesquare8.gif
Compatible with Microsoft PowerPoint and all of our PowerPlugs software
http://www.crystalgraphics.com/presentations/images/bluesquare8.gif
Optional 2 GB of flash RAM memory with write-protect function built into USB port receiver
http://www.crystalgraphics.com/presentations/images/bluesquare8.gifWhat's included
• PowerPointer Pen remote control
• Built in red laser pointer
• USB Receiver
• 12 volt battery (already installed)
• Convenient black carrying case
Optional: 2 GB RAM
http://www.crystalgraphics.com/presentations/images/bluesquare8.gifRange, Memory, Size and Weight (Basic Model)
• Operational Range: 45 feet
• Built in File Memory: None
• Size: 67mm x 8mm x 20mm
• Weight 10 g

http://www.crystalgraphics.com/presentations/images/bluesquare8.gifRange, Memory, Size and Weight (Premium Model):
• Operational Range: 60 feet
• Built in File Memory: 2 GB
• Size: 115mm x 18mm x 19mm
• Weight 20 g

http://www.crystalgraphics.com/presentations/images/bluesquare8.gifSystem requirements
• Available USB 2.0 port
• Win 98/se/Me/2000/XP/Vista/Windows 7/Mac/Linux
• Microsoft PowerPoint or Apple Keynote

http://www.crystalgraphics.com/presentations/images/bluesquare8.gifWarranty
• 30-day money-back guarantee
• 1-year limited warranty
• On line and toll free telephone technical support available

http://www.crystalgraphics.com/presentations/images/bluesquare8.gifAdditional Information
If you have questions about RemotePoint Jade, we have answers at our FAQs web page.

http://www.crystalgraphics.com/presentations/images/bluesquare8.gif
Order Today!
It's easy! Simply click the order button below to proceed through our secure online checkout. If you prefer to shop by phone, one of our sales representatives will gladly assist you. Please call (408) 496-6175. To order by fax, or mail, please click here for instructions.




PowerPoint Remote Control
PowerPointer Pen
Hadir dengan keyakinan dengan baru dan mudah digunakan jauh.

Pena PowerPointer menawarkan kenyamanan & kesederhanaan.

Ini cocok dengan nyaman di saku Anda seperti pena papan tulis. Dan, ketika Anda harus maju ke slide berikutnya, atau kembali ke slide sebelumnya, atau menunjuk sesuatu pada layar, itu hanya bekerja seperti yang diharapkan, dengan tidak ada tombol yang rumit untuk mengetahui sedangkan lampu sorot pada Anda.

Sejauh fitur pergi, ia memiliki hal penting yang telah datang ke harapkan dari PowerPoint remote: laser merah cerah dan, tentu saja, Slide Next dan tombol Previous Slide Anda perlu mengendalikan PowerPoint. Dan bekerja di seluruh ruangan, bahkan melalui rintangan yang paling, dengan berbagai operasional yang handal hingga 45 ft atau 60 ft (tergantung pada model yang Anda pilih).

Dan, mudah, itu manfaat dari kesederhanaan teknologi Plug and Play. Jadi, yang harus Anda lakukan adalah steker receiver remote (yang terlihat sangat mirip salah satu memori berguna batang) ke port USB yang tersedia dari komputer Anda sedang melakukan presentasi dengan dan Anda siap untuk pergi. Tidak dapat menginisialisasi dan perangkat lunak tidak untuk menginstal.

Ini juga (opsional) termasuk 2 GB RAM memori untuk memungkinkan Anda untuk menyimpan presentasi Anda dan file lainnya dalam receiver remote port USB. Yang harus RAM yang cukup untuk hampir setiap kesempatan.

Biarkan PowerPointer Pen titik jalan melalui presentasi anda selanjutnya!
Fitur Sekilas

Sangat terjangkau dan mudah digunakan jauh PowerPoint yang nyaman pas di saku Anda seperti pena
Termasuk tombol untuk: Sebelumnya Berikutnya Slide dan Slide laser pointer dan merah
Bekerja dalam segala arah, dan melalui berkat hambatan untuk 315 MHz RF (frekuensi radio) teknologi
Sampai dengan 45 ft jangkauan operasional untuk "Basic" (0 GB) model dan sampai dengan 60 ft untuk "Premium" (2 GB) Model
Sangat konsumsi daya yang rendah memberikan panjang umur kepada (termasuk) 12 volt baterai
ID unik untuk setiap remote hampir menghilangkan gangguan multi-user
Kompatibel dengan Microsoft PowerPoint dan semua perangkat lunak PowerPlugs kami
Opsional 2 GB flash memory RAM dengan write-melindungi fungsi dibangun ke penerima port USB

Apa termasuk
• PowerPointer Pen remote control
• Dibangun pada laser pointer merah
• USB Receiver

• 12 volt baterai (sudah terpasang)
• Nyaman kasus hitam tercatat
Opsional •: 2 GB RAM

Range, Memory, Ukuran dan Berat (Model Dasar)
• Operasional Range: 45 kaki
• Built in Memory Berkas: Tidak ada
• Ukuran: 67mm x 8mm x 20mm
• Berat 10 g

Range, Memory, Ukuran dan Berat (Model Premium):
• Operasional Range: 60 kaki
• Built in Memory Berkas: 2 GB
• Ukuran: 115mm x 18mm x 19mm
• Berat 20 g

Persyaratan sistem
• Tersedia port USB 2.0
• Win 7/Mac/Linux 98/se/Me/2000/XP/Vista/Windows
• Microsoft PowerPoint atau Keynote Apple

Jaminan
• jaminan uang kembali 30-hari
• Garansi terbatas 1 tahun
• Di telepon bebas pulsa line dan dukungan teknis yang tersedia

Informasi Tambahan
Jika Anda memiliki pertanyaan tentang RemotePoint Jade, kita memiliki jawaban-jawaban di halaman web kami Tanya Jawab.

Order Today!
Sangat mudah! Cukup klik tombol di bawah perintah untuk melanjutkan melalui kasir aman online kami. Jika Anda lebih memilih untuk berbelanja melalui telepon, salah satu perwakilan penjualan kami dengan senang hati akan membantu Anda. Silahkan hubungi (408) 496-6175. Untuk memesan melalui fax, atau surat, silakan klik di sini untuk petunjuk.
 
 
All Right Reserved - Tekno Liberty
Design by sudrunbenks | Powered By Blogger.com