Sabtu, 27 Juni 2009

Encryption Software

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

Encryption has long been used by militaries and governments to facilitate secret communication. Encryption is now commonly used in protecting information within many kinds of civilian systems. For example, in 2007 the U.S. government reported that 71% of companies surveyed utilized encryption for some of their data in transit. Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers' personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) are another somewhat different example of using encryption on data at rest.

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. There are two common approaches to network encryption.(free article from wikipedia)

Encryption software to protect data is useful and important information from theft of your property the destroyer. This software with the presence of data to be useful not only for the thief and that you need your data. Use encryption software to secure and safety your data from theft. We provide a decryption and encryption software, you can download it for free.

Free Download Encryption Software

Tested Virus and Spyware Free by Norton Internet Security 2008
Title
Licensi
Size
Kruptos 2 3.0.0.33
Encrypt, decrypt, and protect files and folders on your PC or other storage devices.
Free
2.15 mb
KeyGen RC4 Encryption Key Maker 4.0
Create super cryptic passwords using a RC4 Encryption Algorithm using passphrase and password.
Free to try
3.2 Mb
MD5 Checker 2.31
Verify MD5 checksum download codes.
Free
28.58 kb
RoboForm 6.9.95 Reduce multiple passwords to one single item.
Free to try
2.8 mb
Folder Lock 6.2.5
Password-protect, lock, hide, or encrypt files, folders, drives, and USB drive in seconds.
Free to try
2.8 mb
SecureZIP for Windows 12.20.0021
Secure and compress files made in your Microsoft Office applications.
Free
13.7 mb
Hotspot Shield 1.17
Maintain your anonymity and protect your privacy when accessing free Wi-Fi hotspots.
Free
3.4 mb
SuperEncryptor 9.6.0.0
Secure your private and sensitive information from snoopers.
Free to try
4.15 mb
TrueCrypt 6.2
Encrypt your sensitive data with this open-source software.
Free
3.03 mb
WirelessKeyView 1.27
Retrieve and save wireless network keys in your computer.
Free
48 kb
Sygate Personal Firewall 5.6.2808
Protect your PC from hackers, Trojans, and malicious code intrusions.
Free to try
8.8 mb
Folder Access Pro 2
Password-protect your files and folders.
Free to try
4.11 mb
dirLock 1.4
Protect your folders by hiding or locking them.
Free
141 kb
ID Vault 5.0
Log in to all your online accounts securely and with a single PIN.
Free to try
2.73 mb
Secret Keeper 2.0.2
Keep all your confidential info secure & encrypted in one place.
Free to try
10 mb
BlueGem Keystroke Encryption Pro 1.1.0.4
Protect your keystrokes including password with a 128-bit Keystroke Encryption technology.
Free to try
7.49 mb
BSecureZIP Express 12.2
Secure and compress files made in your Microsoft Office applications.
Free
13.7 mb
Signature995 6.1
Digitally sign PDF documents and Office documents.
Free
478 kb

FlyingBit Password Keeper 1.3.0.32

Store your passwords, serial numbers, and codes.
Free
2 mb
EncryptOnClick 1.3.1.3
Secure files with 256-bit AES encryption.
Free
1.48 mb
Cryptainer LE Free 7.2.3.0
128 bit disk encryption software.
Free
3.06 mb
Next


Jumat, 26 Juni 2009

Worm

Worm considered closely associated with the following programs that can mereplikasi himself and send a copy from computer to computer via a network connection. Once arrived, mereplikasi for the worm is activated and propagasi again. In addition propagasi, worms usually do not want that function.

Network worm uses to spread the relationship network of sitem to other systems. Once active on a system, network worms can apply as bacteria or viruses, or trojan horse program paste or a number of actions to annoy or destroy.

Mereplikasi for himself, the network worm uses a network service, such as:
- Electronic mail facilities,
- A remote execution capability,
- The ability to login remotely.

Response :
  1. Always do a Scan for disk into your PC. Although seemingly trivial, but that this will be a small help to protect your computer from viruses transmitted through exchange of floppy disks switch. If a PC infected by a virus, then inserted the disk to them, will most likely be infected as well. Therefore, do not carelessly open the floppy on the computer belonging to your friend, before the floppy disks that pass the selection scandisk.
  2. Scan the CD into your CD drive. Although it seems more exclusive and secure, but also a CD that has the potential are the same as floppy disks, transmit the virus. Therefore, do not dally! Stay do a scan on a CD that will be installed on your computer, even though the CD was recently purchased from the store.
  3. Make a scan of your hard drive, every time you will begin to work with it. As always checked the five health, your PC must also always be whether the healthy or have been infected by the virus. Moreover with the conduct of the hard disk scan before starting a job, you reduce the risk of disruption caused by the virus during the process of your work. In addition, there is the chance occurrence of damage to your files.
  4. Protect your disk, if you include them in your PC to other people. As mentioned above, if you are forced to enter the disk in your computer to other people, then you need to protected floppy first. Consequently, you can not make changes to files stored on floppy disks are.
  5. Do not indiscriminate downloading attachment. Nowadays many types of worm that sends copies of itself in e-mail attachment. For example, worm Miss world. Therefore you should not open any attachment if the sender address does not you know.
  6. Selective in opening e-mail. The same laws that apply to open in the e-mail. a number of viruses and worms duplicate itself and send copies to the entire e-mail address listed on the Microsoft Outlook address book computer diserangnya Express. Thus, the potential victim will not be put with suspicion and will soon open the e-mail is toxic.
  7. Install and to update the antivirus program on your computer. Sometimes, people are still common in the computer, the feel is secure if it is to install Norton or MacAffee program. You are wrong! Antivirus program has also expired the period such as food cans. Therefore, you should always be to update your antivirus program. because antivirus programs that have expired, will not have more teeth to keep out the virus attack on your computer.
  8. Always follow the news about the latest viruses. Period has expired addition, anti-virus program is also always an update with respect to virus-virus, which continues in the new-release. Experts continue to do development for rival who is also the creator of the virus-race competition to create a more vicious virus from day to day.
  9. Download Microsoft Outlook Security Patch into your computer system. As is known, does not have the perfect software program. That is, there are certain weak point or a bug in the software. as well as going to the Microsoft Outlook Express application. Therefore, with download Microsoft Outlook Security Patch into your computer system, means that you have overcome a bug in the program.
  10. Disabling Windows Scripting Host. As known, many new viruses and worms that developed with visual basic scripting system under windows. To minimize attacks, you should disable the program that works for mengotomatisasi a function. However, please note that not all speak vbs virus can disable the program on hold with this

Virus

Meaning the term virus is considered closely associated with the following code that is placed in a program that causes pengkopian inserted himself to one or more other programs. Program menginfeksi other programs to modify the programs. Modify the program including inserting copies of the virus program can then menginfeksi other programs. Besides only propagasi, one of this malicious programs usually perform the function that is not desired.

Like biological viruses, computer virus found on the instruction code that can make perfect copies, such as himself. When the infected computer related (contact) with software that has not been infected, the virus copies to enter the new program. Infection can spread from one computer to another through the use of this disk, or send the program through the network. In the network environment, the ability to access applications and services computer facility is perfect spread of the virus.

A virus can be routine-a routine that diisikan by virus programmers. Routine routine-this could include the destruction or just display a message

Handling virus
To prevent the occurrence of virus attack, antivirus software is usually installed in the operating system such as the Mine did, AVG, PC-Cillin, Norton Symantec, and others. But the use of anti-virus is not the only way to avoid virus attacks. We need to know that the virus constantly growing both in terms of attack and the damage caused. All bekerjanya characteristics of the virus outside of computer users. Therefore, some of the things that computer users should be made in an effort to prevent virus attacks, among others.

  • To update the antivirus through the Internet or from a package file that is distributed. Usually antivirus update with ability to provide programs and update the database because finding a new virus. If the antivirus is not updated, the antivirus is able to prevent the attack of virus-virus generation old, virus-virus sehinngga new generation will be easy to do the distribution. Update process is better done as often as possible, but if it does not enable the update is done in most long range within 2 weeks.
  • Be careful in the transformation of the file either through floppy disk, hard disk, flash disk, network or the other. Before Peng-an-copy files, scanning should be done to the files concerned to ensure that the file will not copy in-bervirus.
  • If the computer connected to the network should be as individual protective firewall. When this virus-the virus usually attacks the network through the TCP / IP or peer-to-peer. In addition the firewall can also provide the password on the folders that are shared. Restriction policy implementation of centralized network systems will create a more secure.
  • Use e-mail client like Microsoft Outlook, Mozilla Thunderbird, Eudora, and others need to pay attention to each incoming email into the inbox. The spread of the virus via email, including methods that often occur. Inclusion on an email attachment to provide opportunities for effective penetration of the virus in the operating system.
  • Surfing the internet memeliki risk is high enough to attack the virus. Many websites that install hidden applications so that when the website is accessible to the application will perform pentarasi virus in the operating system to the unwitting user. Use of web browser software system that has security as a popup blocker is recommended.
  • Microsoft Windows provide a software-software that works to improve the weakness of the system. To update the operating system security system can reduce the risk of virus dissemination.

Next steps to be implemented so that the system can work normally again.
  • When the system is infected, do the backup data.
  • Scan a hard drive infected with a computer virus-free.
  • If damage occurs after scanning the system, so the system can not work, do the re-installation.
  • Scan the data in the backup computer with a virus-free.
  • Install antivirus program or the latest update.
  • Update antivirus database program.
  • Update the system security operating system.

Trojan horse

Meaning the term is considered closely associated with the following Routine not be documented in a secret program useful. Programs that contain useful hidden code that when executed perform a function that is not desired. Execution of the program routine execution of this secret.

Trojan horse program used to perform functions which are not direct the user is not authorized can not do directly. For instance can access files on another system is used together, users can create a trojan horse program. Trojan horse programs executed when this change will permit license-file so that files can be read by any user.

Trojan horse programs that are difficult to detect that the compiler is modified so that the insert additional code to certain programs when compiled, such as the login program. Trapdoor on the code to create programs that allow creators to login to the system log using a special password. Trojan horse is never can be found only if the program source.

Motifasi of trojan horse is crushing data. The program appears to function as a useful function, such as a calculator, but also to secretly remove the files. Trojan horse to the regular program or routine-routine taken from the BBS, the Internet, and so forth.

Trapdoor

Trapdoor considered closely associated with the following entry point not documented in a secret program to access these methods without Authentication normal. Trapdoor has been used correctly for years by programmers to find program errors.

Programmers to create or eliminate the authority of special needs and setup Authentication. Trapdoor is a code that receives a specific input line or triggered by running the user ID or a particular line.

Trapdoor to be used when the threat of malicious programmers to get the initialization is not authorized.

Logic bomb

One of the program that placed the evil computer program that checks a set of conditions in the system. When conditions are found, executing a logic function that produces actions not authorized.

Logic bomb on a stick to the official program that is set explode when certain conditions met. Example of conditions to trigger the logic bomb is there or not there is a certain file, a particular day of the week or date, or the user to run a particular application. Once triggered, bomb or change or delete all data files, the engine stopped, the destruction or other.

Bacteria


One of the bad programs that consume system resources with mereplikasi himself. Bacteria do not destroy the file explicitly. Goal of this program is only one, namely mereplikasi himself. The program is simple bacteria can only execute two copies itself simultaneously on the system or multiprograming create two new files, each copy is a copy program files bacteria. The two copies then copy this two times, and so on.

Bacteria reproduce exponentially in, quickly took over the entire processing capacity, memory or disk space, lead to the rejection of this initialization to resources (resource).

Keylogger

Keylogger is make in 2 types of the Software and Hardware, both of them have different characteristics with the same goal. Example Keylogger software is shaped Invisible Keylogger, KGB Keylogger, Stealth Keylogger and. This software can be installed on the victim computer to automatically and this software will hide himself so as not known by the victim. Victims will not be able to see this program is running, because all the software Keylogger offers Hide mode (Hide mode) that will not display the icon, the name of the program on the task manager and more. Many also used the Trojan hacker who works as a Keylogger like Back Orifice, Netbus, Sub Seven, etc..

The lack of software Keylogger is keberadaanya can be detected by the programs anti-spyware and antivirus like Norton, Spycop, Whoa € ™ s Watching me, etc.. While the form of easy-to-use Keylogger that is not detected and anti-spyware and anti virus is a hardware Keylogger. Hardware Keylogger can also work on any operating system and even the operating system's login password can also be recorded
Basically, any type, anywhere and with any Operating System does not affect the hardware Keylogger. All typing is done first through akan Keylogger hardware that has been inserted before flowed to the computer itself. Because of the form of hardware, then install Keylogger for this type of required physical access to the computer trying to install. If you want to install a computer that is located in Africa, you must be clear to Africa to install the hardware Keylogger is. Inillah reason why many hardware Keylogger is not known in general, and of course this can be an advantage for the hackers, even in Indonesia have not found a shop that sells this product Keylogger hardware.

Some sites, among others, the Keylogger www.keyghost.com, www.amecisco.com, and www.keyloggersdirect.com. Hardware Keylogger usually installed between the original keyboard cable connector and the mouse port on the computer. Because, in general, at this time using the keyboard PS2 and USB connectors, hardware Keylogger is also available in 2 types of the PS2 and USB. Type Keylogger is a kind of relative easily detected by looking at the physical computer keyboard cable is being used. However, sometimes the computer-public computers such as Microsoft to install the locker so that the computer does not enable us to mengeceknya and this makes the play at the internet cafe to be very vulnerable to tapping. With the way this is all the encryption and strong as any serumit become useless and can be easily stolen. According to my hardware Keylogger can not be working on a laptop, a laptop keyboard does not use the PS2 and USB connection alias directly. That I do.

How Overcoming Keylogger

Keylogger offers 2 forms of the Hardware and Software with karakterisitik create a very different technique to detect and prevent also different. First opportunity to hear to avoid Keylogger Software can use the Virtual Keyboard that can be accessed through the Accessories menu â € "Accessibility â €" On-Screen Keyboard. Use the Virtual Keyboard is not useful for the Keylogger Software for Virtual Keyboard still send the text to be displayed on the program and this text will be recorded by Keylogger Software, and Keylogger can also capture the display text is.

However, the virtual keyboard is very powerful and useful to prevent hardware Keylogger, because the text does not diketikkan akan through the keyboard and the original cable and not through a keyboard port that has been Hardware Keylogger. Or to avoid hardware Keylogger, you can use the keyboard that take you from your own home ... ? and to prevent the Software Keylogger, you can use anti-spyware programs or antivirus which always ter-update.

Other steps that can be done is to find the hidden directory, because usually the Keylogger to make a hidden directory that is not known by the user, but this step can also help us to know of the existence of a program that is not desired. To do this, run the command "dir / ah / s" in the Command Prompt will show all files and directories that are hidden.

Here are five ways you can do to detect and prevent spyware:
  1. Installing a filter on the host spyware. Many spyware scanner available in the market. If you find a solution that is not too expensive, try using Microsoft beta tool, Windows Spywares, Spybot, and AdAware. Many commercial anti-virus vendors such as McAfee, spyware filter, also has to be combined in a corporate anti-virus solutions.
  2. Installing an application content filtering gateware with spyware. If the level of host before, so now we see spyware solution that operates on the network level. One of them is Spyware Interceptero Blue coat. If your budget is adequate, consider using this solution.
  3. Create an egress filter on your network. There is no one to create a filter on the network egress. They can help in the spyware that tries to block the "call home".
  4. Monitor Intrusion-detection system (IDS) and keep your signature is still the latest. if you can not block the spyware from a house call, at least you can mendeteksinya with IDS, and use the report to identify the infected system.
  5. Prevent user mengistalasi software download. Most are caused by the installation of spyware that users install the software that is downloaded from the internet. If possible awasi activity.

Spyware authorities and similar data is one of the most important yand challenges faced by information security professionals. It is time to ensure your organization is safe. By following the steps above will help you in achieving that goal.

Malicious Software

Users of computer systems already have the data and information of value for him. Protecting this data from the parties has no right is important for the operating system. This is called the security (security). An operating system has some aspects of security. Aspects of this deal, especially with the loss of data. Computer systems and data in the aspect of the threat risk (threats), aspects of it (intruders), and natural aspects.

Aspects of the threat, the general system face the threat of opening the computer data secrecy, data-conversion data by the person who does not have the right, also with the system pelumpuhan Denial of Service (DoS). Aspects of it, at this time many people trying to enter into an operating system with a variety of purposes. There is simply trying to penetrate the operating system (hacking), who have tried to take advantage of the action penjebolah (cracking). Disusupi not only by humans, the operating system is also facing threats from the security program it, which is called malicious programs or malware. Malicious programs that is to infiltrate in the operating system and have goals such as taking personal data, the computer takes over, and often destructive aims. Including the category is a malicious virus, Keylogger, worm, trojan, and spyware, Trapdoor, Logic bomb bacteria.

Finally, the operating system and data in it is threatened from things non-technical, that is from the natural. Operating system due to the threat of natural disasters (floods, mud, heat, earthquake, etc.), damage to hardware or software, even omission of the users. The development of the internet at this time to bring the consequences of the increased risk of operating system security. Therefore, the operating system must have the resilience of the security. For most developers operating system at this time, security is one of the main problems.

Category of Malicous Software :
1. Keylogger
2. Virus
3. Logic Bomb
4. Trapdoor
5. Trojan horse

Selasa, 23 Juni 2009

MS-DOS

MS-DOS, short for Microsoft Disk Operating System, is an operating system that is widely used by the computer IBM-PC or compatible with it. Microsoft to make MS-DOS as a mainstream operating system, before finally stopping at the MS-DOS support slowly when they make an operating system-based graphical interface (also known as GUI) for the mainstream market, which is called as Microsoft Windows.

MS-DOS was first released in 1981, and over time, Microsoft also launched a new version of MS-DOS. No less than eight times until Microsoft launched new versions of MS-DOS in 1981 to support the Microsoft MS-DOS in 2000. MS-DOS is one of the key in the success of Microsoft to produce software, from a small company at the programming language to become an established software company that seems over the world.

History

MS-DOS was created by a computer manufacturer, named Seattle Computer Products (SCP) which are headed by Tim Patterson - who later recruited by Microsoft to develop DOS - in 1980 as a software operating system with the name of Q-DOS (stands for Quick and Dirty Operating System), which changed its name to 86-DOS, because the Q-DOS is designed to run on computers with the Intel 8086 processor. Microsoft also licenses dengn purchase price of 50,000 U.S. dollars SCP, and change its name to MS-DOS. Later, when IBM launched its personal computer would called the IBM PC, Microsoft also sells licenses MS-DOS to IBM.

Development

IBM and Microsoft released the next version of DOS-version, where a version of IBM dibundel directly with the computer called the IBM PC with the "IBM PC-DOS" (short for International Business Machine Personal Computer Disk Operating System). Initially, IBM only uses what is reasonable use of the MS-DOS released by Microsoft, such as its programs or utilities that disertakannya. Therefore, the IBM version is released more slowly than the version of MS-DOS. However, MS-DOS version 4.0 is a version of MS-DOS is the first really the same as IBM PC-DOS, because Microsoft is being berkonsenstrasi to develop an operating system of DOS, called OS / 2.

Microsoft, when the license DOS to IBM, signed a license agreement that contains one of poinnya that Microsoft could license MS-DOS to the company other than IBM, and the companies are changing the name MS-DOS became the name they use (example: TandyDOS, Compaq DOS , and others). Most versions are of course the same as the version that was developed by Microsoft with MS-DOS it, but began to pull a Microsoft license agreement so that other companies should be using the MS-DOS, not a name that has been customized previously. IBM is only given freedom to continue using the IBM PC-DOS, not MS-DOS.

MS-DOS was developed with quite quickly, with significant features that are taken from some other operating systems such as Microsoft Xenix - a variant of UNIX operating system developed by Microsoft - and the property of DR-DOS Digital Research, and the products other utilities such as Norton Utilities from Symantec Corporation (adopted products such as Microsoft Disk Defragmenter), PC-Tools from Central Points (adopted products such as Microsoft Anti-Virus), or expanded memory manager Emm (expanded Memory Manager) QEMM from Quarterdeck (product adopted as EMM386), compressed disk (or disk compression) DriveSpace from Stac Electronics, and many other products that was adopted.

When the Intel Corporation introduced a new mikroprosesor called with 80,286 Intel, Microsoft and IBM started the project of a new operating system called DOS with OS / 2, which essentially is a version of MS-DOS is running in protected mode (protected mode). But, leaving the project Microsoft OS / 2 is to focus on the development of Microsoft Windows and Microsoft Windows NT. Digital Research to create a graphical interface called the GEM, but is less popular on the IBM PC computer or compatible. GEM market appeared to get on the computer ATARI ST machine, but eventually disalip again by the Microsoft Windows version 3.0.

MS-DOS version

MS-DOS version 1.xx


This is where the early version of MS-DOS was first released by Microsoft. The contents, of course, very primitive and only contains the basic framework are: does not have to manage the display graphics files, no support network. The point, the first DOS version of this net frill. The first version of DOS supports only IBM PC Model 5150 and all supporting hardware, such as floppy disks only support single-side floppy disk with a size of 5 ½ inches with only 160K.

Lapse of approximately one year, in which the public interest will be IBM PC products, Microsoft is also making improvements to msdos, and muncullah DOS version 1.1. In fact, this is caused by the IBM products launched a new floppy disk drive for floppy disks with double-side size 5 ½ inches with a 320K. Use double-side for the floppy disk is very influential, because storage media can store two times more than the floppy diskette single-side. Do not laugh to see capacity floppy disks that are supported by MS-DOS 1.1. You will not get the capacity of tens of megabytes or gigabytes. Even the hard disk is still only rarely found on the microcomputer, and III that only Apple has.

After that, Microsoft appeared to sell MS-DOS to IBM competitors to make such a clone IBM PC 5150. Microsoft gave him a version 1:25. Designed in such a way because with the philosophy of open-architecture, unlike Apple and the Commodore of the IBM PC clone can be made. And because that is the IBM PC and IBM PC clone that is compatible with IBM PC very successful in the market. This is the success of three companies: IBM, Intel, and of course Microsoft. However, the market a while IBM was digerogoti by Compaq, Hewlett-Packard, and Dell Computer Corporation to create the IBM PC clone.

MS-DOS version 2.xx

In early 1983, IBM launched its IBM PC XT (Extended Technology), as the improvement of the IBM PC 5150 version. IBM PC XT equipped with a 10M hard disk, the interface input / output diversiform serial (RS-232 or better known as the COM interface), with a capacity of 128K of RAM, a floppy disk drive double-side 360K and three expansion slots. Of course, the use of some new hardware such as hard disks, floppy disks and drives with 360K (40K is higher than in the double-side version of the IBM PC 5150) requires an operating system, Microsoft and IBM does not disappoint. With their sprightly and quick release MS-DOS version 2.0. Finally dibundel IBM PC XT with IBM PC-DOS 2.0.

MS-DOS version 2.0 has many improvements from the MS-DOS 1.1 which is for the computer IBM PC 5150. These include support for the use of the directory structure hierarkis (fork) like a tree that has a root (root) and branches (branch). In addition, the MS-DOS 2.0 also supports a variety of functions, which was adopted from UNIX, as well as the use of I / O redirection (>,>>, <, <<) and the print spooler. Recommended print spooler is a feature that can save the file to be printed in a memory buffer so that the file will not be printed directly printed, but it saved first. The aim is that the printing process can take place more quickly, and the user does not have to direpotkan to print the entire file if kertasnya out, but just need a new paper and pressing resume button to continue. While I / O redirection function to perform the function input and the output from the command line. In addition to these two features are adopted from the UNIX, DOS version 2.0 also provides flexibility so that you can install the drivers for DOS, with mengintegrasikannya in the configuration file CONFIG.SYS. In fact, IBM PC XT computer is very successful: success even reached Japan. Kanji language support for Japanese, Microsoft decided to launch the MS-DOS version of 2:05. In the same year, IBM launched its IBM PC Jr.. (read: PC Junior). Unfortunately, unlike the sister-sister, IBM PC Jr. failed in the market. When launched, IBM PC Jr. the IBM PC-DOS 2.1. MS-DOS version 3.xx

IBM launched its IBM PC-AT (Advanced Technology) in the summer of 1984. IBM PC AT computer using mikroprosesor Intel 80286 (16-bit) speed 6MHz, with 256K of RAM memory, a floppy drive 1.2m 5 ¼ inches, 20m a hard disk, video card and color (standard CGA). Of course, Microsoft as a business partner who is steadily sprightly support the launch of IBM PC-AT with also launched the latest version, MS-DOS 3.0. MS-DOS 3.0 supports all the capabilities of the IBM PC-AT, except for multi-tasking is provided by the Intel 80286 processor that is capable of running on the protected mode of course.

DOS 3.0 is the version that can support the functions of the network, even though limited to the network with the concept of working group (workgroup) and connected as a client on a server. Users can use network technology created by IBM, Token Ring in the DOS operating system. DOS 3.0 also supports the floppy disk 3 ½-inch low-density capacity of 720K, while the support DOS 3.3 floppy disk 3 ½-inch high-density capacity of 1.44M. In the DOS version 3 also supports a partition on the hard disk that has a capacity of up to 32M, 12M higher than the DOS version 2.0.

MS-DOS version 4.xx

In 1988, the operating system with graphical display start mushroom. Microsoft also launched version 1.0 on Windows 1985 and Windows version 2.0 in 1989. In the DOS version 4.0, the Microsoft program to create a DOS shell with the name of Shell, which has a display property, such as DOS Executive Windows version 1.0. At that time, there is a shell program that is also a popular run in the top of the DOS operating system, with the name of Norton Commander (NC) made by Peter Norton. By using the shell, the user can more easily organize and archive files, and run the program, in one screen only. In addition, because the mouse can simplify the operation of computers, DOS Shell can also support them.

Version 4.0 is the version that most of the changes. Version is the next versions are improvements, and additional utilities.
MS-DOS version 5.xx

IBM already does not make a chop-chop mikrokomputer new in the industry, because the market previously dominated IBM has eaten little by little by its competitors, such as Compaq, Hewlett-Packard, and Dell that also produce mikrokomputer that is compatible with IBM computers, as using the same design, and also the same mikroprosesor made by Intel Corporation. Here is a successful Intel Corporation, which is used as mikroprosesor produced far more, due to demand more. Because the computer uses artificial mikroprosesor Intel Corporation, then found out that Microsoft is successful both with its DOS. Many analysts argued that the case is caused by the failure of IBM when they sell the IBM PC Jr.., And architecture with the IBM P/S2 Micro-Channel Architecture (MCA). MCA bus used by the IBM P/S2 not use the concept of open-architecture as the ISA bus also made by IBM but with open-architecture. In addition, the expansion cards that use the MCA bus prices have relatively more expensive than ISA bus is being used at that time and became a standard, so that slow penyerapannya in the market mikrokomputer.

IBM failed to extend the age of the IBM PC, but Microsoft will continue to develop with the launch DOS MS-DOS version 5.0. Version 5.0 is released in 1991, and has many features that are far better, as well as device driver that can be installed on the memory area in the top 640K (HMA), using the parameters DEVICEHIGH the configuration file and CONFIG.SYS file LOADHIGH on AUTOEXEC. BAT multiply so that the possibility to run a program that requires conventional memory (640K initial memory of the computer) is greater.

For the utility, Microsoft added a lot of utility in the DOS version is 5.0. These include ASCII text file editor, called MS-DOS Editor (EDIT.COM) and the QuickBasic programming language (QBASIC.EXE). This utility is intended to replace the editor-oriented "line per line," EDLIN.EXE in the DOS version 4.0 and the previous one.

In addition to ASCII text file editor, Microsoft also made to create a macro tool to speed up working with computers. The program is called the macro DOSKEY.COM. When loaded, DOSKEY can create a macro and execute the macro. In addition, by using DOSKEY can make it easier pengetikan the same with the previous problem so that "tired typing" command the same to be repeated much more simple and easy. To do so, users can use the arrow keys up and down. Features such as this is owned by Command Prompt on Windows 2000/XP.

Other utilities that are also interesting UNFORMAT.EXE and UNDELETE.EXE. Both are very useful utility to restore files that are deleted and the drive is supplied preformatted. UNDELETE.EXE similar program as well as the Recycle Bin in Windows 95 (and onwards), they just seem a little more complicated than the Recycle Bin that runs on Windows. In addition UNDELETE.EXE that runs in the command line, the DOS version 5.0 is also MWUNDEL.EXE there is a utility that runs on Windows version 3.0, so that the Recycle Bin feature can also be found in Windows 3.0.

MS-DOS version 6.xx

MS-DOS version 6.0 is released in 1993. This version has many additional utilities, such as Antivirus (MSAV.EXE), Virus Protection (VSAFE.COM) adopted from Central Point PC Tools. In addition, there are utilities to do defragmentasi hard disk (DEFRAG.EXE) adopted from the Symantec Norton Utilities, utilities to check hard disk error placement of files and damage (SCANDISK.EXE) CHKDSK.EXE as a replacement, and repair of utility the previous.

In the MS-DOS version 6.0 also include a utility that can create a placement file to be more efficient with the name DoubleSpace. However, a company that has a patent on it to be so angry to the Microsoft table green. Microsoft and even less utility DoubleSpace also revoked from DOS 6:20. Year-end 1994, Microsoft revised the DOS 6:20 similar to the utility but it does not violate the patents of others with the name DriveSpace. MS-DOS is MS-DOS version of 6:22.

MS-DOS version 7.xx

MS-DOS version 7.0 is released only a few months before Microsoft released Windows 95, a version of Windows that is completely independent of the MS-DOS. In fact, Windows 95 is not really 100% free from MS-DOS, only some of the functionality previously handled by the MS-DOS kernel, now handled by Windows. MSDOS.SYS file in the previous versions are binary files (programs), it is only plain text file, which contains the process of booting a computer course, and the various line contains "xxx" with the functions that are not clear.

Not a lot of improvement going on DOS 7:00 this because some functions have been moved to Windows 95. Windows 95 is a version of Windows with Win-32 API and a redesigned desktop. Windows 95 has a control center from the Start Menu button on the bottom left corner of your screen. When the new outstanding 2 weeks, Microsoft seems to get hit very huge, because Windows 95 has been sold to more than 7 million copies.

When Microsoft launched Windows 98, Microsoft also revised the DOS version of 7:10 to be with the support for the FAT32 file system is much more efficient than FAT16 file system. The functionality of the MS-DOS 7:10 trimmed even more. The result, at the end of 1999, Microsoft launched a new version of Windows, code name with the Georgia (Windows Millennium Edition) is truly without DOS!

In fact, the operating system that is completely without DOS ever made by Microsoft before Windows NT, Windows NT only intended for the minicomputer, network server, Mainframe, and workstations. That its use makes it very difficult complex adopted by the beginners in the field of computers.

Summary version of MS-DOS

Version Launched
Program/New Capabilities
1.00 12 Agustus 1981 EDLIN.COM
EXE2BIN.COM
LINK.EXE
DEBUG.COM
CHKDSK.COM
DISKCOMP.COM
DISKCOPY.COM
COMP.COM
SYS.COM
RAMCLEAR.COM
SETCLOCK.COM
MODE.COM
FORMAT.COM
BASIC.COM
BASICA.COM
LABEL.EXE

The first version of MS-DOS
Not support hard disk
Only support 160K floppy disk only.
1.1 May 1982 Support double side floppy disk 320K.
1.25 May 1982 Release for the first IBM PC clone.
2.0 March 1983 TREE.COM
MKDIR/MD
CHDIR/CD
RMDIR/RD
MORE.COM
LESS.COM
SORT.COM
ASSIGN.COM
COLOR.COM
GRAPHICS.COM
GRAFTABL.COM
PARK.COM
PRINT.COM
BACKUP.EXE
RESTORE.EXE

Support for 360K floppy disk.
Support for the directory hierarkis.
some functions of the UNIX operating system: pipe, I / O redirection, print spooling.
2.05 April 1983 Support letter kanji (Japan).
2.10 October 1983
2.11 March 1984
3.00 August 1984 FDISK.EXE
FC.EXE
APEND.COM
RECOVER.COM
NLSFUNC.EXE
Created Partition disc up to 32MB.
Support file system FAT12.
3.10 November 1984 SUBST.EXE
SELECT.COM
FIND.EXE
SHARE.EXE
REPLACE.EXE

Support the local network (LAN) with the MS-NET components.
3.20 January 1986 XCOPY.EXE

Support network topology IBM Token Ring
Support floppy disk 3.5-inch 720K
3.30 April 1987 FASTOPEN.EXE
FASTHELP.EXE
Support floppy disk 1.44M 3.5 inci
4.00 June 1988 MOUSE.COM
HIMEM.SYS
SMARTDRV.EXE
SETVER.EXE
MIRROR.COM
Support for Mouse
Support screen graphics (better than the CGA).
4.01 November 1988 RAMDRIVE.SYS
5.0 June 1991 EDIT.COM
QBASIC.EXE
DOSSHELL.EXE
DOSKEY.EXE
UNDELETE.EXE
UNFORMAT.EXE
MWUNDEL.EXE
EXPAND.EXE
Definited Upper Memory Block (UMB) that can be used by device drivers and programs that are terminate-and-Stay-Resident (tsr).
6.0 March 1993 EMM386.EXE
DBLSPACE.EXE
VSAFE.COM
MSAV.EXE
DEFRAG.EXE
SCANDISK.EXE
Many support utilities to diagnose problems, such as Antivirus, Defragmenter, and SCANDISK (replacement CHKDSK).
6.20 November 1993 Version 6.0 reduced DBLSPACE.EXE, because of patent issues with Stac Technology as patent owners.
6.22 June 1994 DRVSPACE.EXE as DBLSPACE.EXE with the same functionality.
It is the last DOS version of a stand-alone.
7.0 April 1995 LOCK.
Is the integrated DOS in Windows 95.
7.10 August 1997 Support for the FAT32 file system directly on the kernel.
Integrated in Windows 95 OSR 2.0 and Windows 98.

Senin, 22 Juni 2009

Free Download Computer E-book

FREE DOWNLOAD COMPUTER EBOOK

We provide blog EBook Tutorial Guide and on computer science in the form of PDF, if you need please to download it from here for free. If the e-book that you need not try to contact us via e-mail,and we will try to find it for you. Please visit our blog at any time you need e-book and tutorial computer.

E-book Programming Computers

Title
Category
Size
36 JBK Borland Delphi 7
Programming
418 kb
Action Scrift FlashMX 2004
Programming
499 kb
Analisis&Desain Objek dgn Visual Foxpro8
Programming
3.938 Mb
Asyiknya struktur data di Planet C++
Programming
311 kb
Membuat multi aplikasi dgn VB 6
Programming
1.733 mb
DB dgn sql&Crystal Report di VB6
Programming
68 kb
Packaging&deployment pada aplikasi .Net
Programming
10.587 mb
Pembuatan Kontrol ActiveX
Programming
7.651 mb
The Best Source Code Visual Basic
Programming
12.315 mb
Membuat Aplikasi GL dengan Power Builder 9.0 dan SQL Server2000
Programming
1.3 mb
Membangun sistem akuisisi data berbasis database dengan Delphi
Programming
1.732 mb
Next




Jumat, 19 Juni 2009

History of Operating System

History of Operating System DOS, Windows and Linux

Do not forget the history ...!
This sentence is not only applicable in the real world, but also in the computer world, especially the operating system.

Learning the history really interesting, even though history is only the operating system / operating system (OS) of a computer. Most do not learn the history of computer operating systems, we gain insight not only knowledgeable and berkutat on one operating system only.

This article will decipher the history of the operating system of DOS, Mac, Windows, BSD, and Linux.

1980

* QDOS: Paterson Team of Seattle Computer write QDOS made famous from the OS at that time, CP / M. QDOS (Quick and Dirty Operating System) marketed by the name of Seatle Computer 86-DOS because it is designed for the Intel 8086 processor.
* Microsoft: Bill Gates of Microsoft licensed QDOS buy and sell them to various computer companies.

1981

* PC DOS: IBM PC DOS launched purchased from Microsoft for a computer-based Intel 8086 processor.
* MS DOS: Microsoft MS DOS to use the name for this OS, if sold by the company outside of IBM.

1983

* MS DOS 2.0: Version 2.0 of MS DOS was launched on the PC XT.

1984

* System 1.0: Apple launched the Macintosh with OS derived from BSD UNIX. System 1.0 is the first operating system that was based graphics and use the mouse.
* MS DOS 3.0: Microsoft launches MS DOS 3.0 for the PC AT using Intel 80286 chip, and that supports the use of hard disks over 10 MB.
* MS DOS 3.1: Microsoft launches msdos 3.1 which provides support for the network.

1985

* MS Windows 1.0: Microsoft introduces MSWindows, the operating system that was based environment provides a graphical (GUI) and multitasking capabilities. Unfortunately, the operating system is very poor and unable to perform, the success of rival Apple.
* Novell Netware: Novell launched a network-based operating system Netware 86 are made for Intel 8086 processor.

1986

* MS DOS 3.2: Microsoft launches MS DOS 3.2 which adds support for 3.5 inch floppy 720 KB.

1987

* OS / 2: IBM introduced OS / 2 that was based graphics, as a candidate for IBM PC DOS.
* MS DOS 3.3: Microsoft launches MS DOS 3.3 which is the most popular versions of MS DOS.
* Windows 2.0: Windows version 2.0 introduced.
* MINIX: Andrew S. Tanenbaum developed Minix, a Unix-based operating system that is intended for education. MINIX later making Linux Conference.

1988

* MS DOS 4.0: Microsoft issued a msdos 4.0 with graphical environment.
* WWW: Proposal World Wide Web (WWW) by Tim BernersLee.

1989

* NetWare/386 (also known as version 3) released by Novell for the Intel 80386 processor.

1990

* Farewell: Two separate corporate giant, IBM is running the OS / 2 and concentrate on Microsoft Windows.
* Windows 3.0: Microsoft launches Windows version 3.0 that get good enough reception.
* MSOffice: membundel Microsoft Word, Excel, and PowerPoint to remove saingannya such as Lotus 123, WordStar, Word Perfect and Quattro.
* DR DOS: Digital Research introduced the DR DOS 5.0.

1991

Linux * 0:01: Students Helsinki named Linus Torvalds developed a Unix-based OS from the Minix operating system that has Linux.
* MS DOS 5.0: Microsoft launches msdos 5.0 with the addition of facilities full-screen editor, Undelete, unformat and Qbasic.

1992

* Windows 3.1: Microsoft launched Windows 3.1 and Windows for Workgroups and 3:11 in the next year.
* BSD 386: OS-based Open Source from the BSD Unix derivative distributed by Bill Jolitz after leaving Berkeley Software Design, Inc. (BSDI). 386 BSD later became chief of the BSD Open Source projects, such as NetBSD, FreeBSD, and OpenBSD.
* Linux distributions: Linux distro is distributed in the format that is a combination of OS plus application program. The first Linux distribution known as SLS (Softlanding Linux System).

1993

* Windows NT: Microsoft launched Windows NT, OS without first DOS-based graphics on the server for the planned network.
* Web Browser: NCSA introduced the release of the first mosaic, a web browser for the Internet.
* MS DOS 6.0: Microsoft introduces msdos 6.0 Upgrade, which includes disk compression program DoubleSpace.
* Slackware: Patrick Volkerding Slackware Linux distribution which is the first popular distribution among Linux users.
* Debian: Ian Murdock from the Free Software Foundation (FSF) to create Linux-based OS by the name of Debian.
* MS DOS 6.2: Microsoft launches msdos 6.2.
* NetBSD: Project new OS-based Open Source is developed from 386BSD created using the name of NetBSD.
* FreeBSD: Following NetBSD, a project that developed from 386BSD also created with the name of FreeBSD.

1994

* Netscape: Internet big time to reach the popularity of Netscape Navigator as your browser to introduce the Internet.
* Msdos 6:22: Microsoft launches msdos with 6:22 compression program called DriveSpace. This is the last version of MS DOS.
* FreeDOS: Jim Hall, a student from the University of WisconsinRiver develop Falls Development FreeDOS. FreeDOS is made after Microsoft intends to stop its support DOS and replace it with Windows 95.
* SuSE: Linux OS version was developed by German System und Software Entwicklung GmbH (SuSE) and is made of the first Linux distro, SLS.
* Red Hat: Marc Ewing start making Red Hat Linux distribution.

1995

* Windows 95: Microsoft launched Windows 95 with the song Start Me Up from the Rolling Stones and sold more than 1 million copies within 4 days.
* PC DOS 7: IBM introduces the PC DOS 7 that is integrated with the popular program pengkompres data Stacker from Stac Electronics. This is the last version of the IBM PC DOS.
* Windows CE: Windows CE version first introduced to the public.
* PalmOS: Palm became popular with the PalmOS for PDA.
* OpenBSD: Theo de Raadt fuse develop NetBSD OpenBSD.

1996

* Windows NT 4.0: Microsoft launched Windows NT version 4.0

1997

* Mac OS: For the first time Apple introduced the use of the name of the Mac OS on Mac OS 7.6.

1998

* Windows 98: Internet Explorer Web browser into an important part of Windows 98 and successfully subvert domination Netscape Navigator.
* Linux Server: Linux gets support from many big companies, like IBM, Sun Microsystems and Hewlet Packard. Linux-based server start is replacing many Windows NT-based server.
* Google: Best Search Engine on the Internet and present known to use Linux as a server.
* Japan Goes Linux: TurboLinux launched in Japan and soon to be favorite OS in Asia, particularly in Japan, China and Korea.
* Mandrake: Gael Duval of Brazil to develop a Mandrake distribution derived from Red Hat.

1999

* Support: Hewlett Packard announced a service 24 / 7 for the distribution Caldera, Turbo Linux, Red Hat and SuSE.
* Corel Linux: the program Corel Corel Draw, which previously have been providing Linux version of Word Perfect, join to create Linux-based OS by the name of Corel Linux, and later switch the name to Xandros.

2000

* Mac OS / X: Mac OS is replaced with the BSD-based Unix machine with the kernel as Mac OS / X.
* Windows 2000: Microsoft launches Windows 2000 as the successor of Windows NT.
* Windows Me: Microsoft launches Windows Me, the latest version of Windows 95.
China Goes * Linux: Red Flag Linux was launched from the People's Republic of China.
* IBM vs. Microsoft: Microsoft CEO Steve Ballmer called Linux a cancer in an interview with the Chicago SunTimes. On the other hand, IBM CEO Louis Gartsner states with support on the Linux invest $ 1 billion for the development of Linux.

2001

* Windows XP: Microsoft to introduce Windows XP.
* Lindows: Michael Robertson, founder of MP3.com, Lindows start development derived from the Debian. Later Lindows changed its name to Linspire because of a change in the name of a claim by Microsoft.

2002

* Open Office: Program office-based Open Source was launched by Sun Microsystems.
* Local OS: OS made people began to appear based on Linux, including Trustix Merdeka, WinBI, RimbaLinux, Komura.

2003

* Windows 2003: Microsoft released Windows Server 2003.
* Fedora: Redhat Fedora Core distro announced as the successor. Later some local distribution, are made based Fedora, such as 1.0 and BlankOn IGOS Nusantara.
* Novell: Ximian, the Linux-based software developer acquired by Novell, as well as SuSE is acquired by Novell.
* LiveCD: Knoppix is a Linux distro first developed the concept with the LiveCD that can be installed without having to first. Local distributions are made from a Knoppix Linux Waroeng Healthy and IGOS.

2004

* Ubuntu: Ubuntu released the first version and distributed to the world. There are several versions of the distribution is issued, the Ubuntu (Gnome based), Kubuntu (KDE-based), Xubuntu (Xfce-based), and Edubuntu (for education).

2005

* Mandriva: Mandrake merged with Conectiva and changed name to Mandriva.

2006

* Unbreakable Linux: Oracle join to create a Linux-based distribution derived from Red Hat Enterprise.
* CHIPLux: local distributions continue to appear in this year, even Magazines CHIP which provides more discussion of Windows also not make a Linux distro CHIPLux name, derived from the distribution of the local PC LINUX family PCLinuxOS (Mandriva variants). CHIPLux is a local distribution of the first distributed in DVD format.

2007

* Vista: After delayed for some time, Microsoft finally launched Windows Vista. Windows Vista 3D features introduced with the Aero Glass Desktop, Sidebar, and Flip 3D. Unfortunately, all this beauty must be paid to the needs of high specification computer is very high.

2008

* 3D OS: Unlike Vista which requires a high specification, 3D Desktop Linux on the computer appears with the specification that is very lightweight. Era Desktop 3D technology presence in Indonesia by the presence of 3D OS operating system developed by PC LINUX. There are several versions of which are provided, namely the 3D version of the OS to the user and the public version of Linux distro cafe and gaming center Linux.

Selasa, 16 Juni 2009

Computer

Computer is a tool that is used to process data in accordance with the procedures that have been formulated. The word computer is used to describe people who perkerjaannya perform arithmetic calculations, with or without hearing aids, but the meaning of these words and then moved to the machine itself. First of origin, processing information almost exclusively related to the arithmetic problem, but modern computers are used for many tasks not related to mathematics.

In such definition, there are tools like a slide rule, mechanical calculator of the type of abakus and so on, until all contemporary electronic computers. A more appropriate term for the broad sense as "computer" is "to process information" or "information processing system."

How Computers Work

While the technology used in digital computer has changed dramatically since the first computer in the 1940s (see History of the hardware count for more detail), most computers still use Von Neumann architecture, which is proposed in the early 1940's by John von Neumann .

Von Neumann architecture describes a computer with four main areas: arithmetic and Logical Unit (pestle), the control unit, memory, inputs and equipment and the results (collectively called I / O). This section is connected by the wire, "bus"

Memory

In this system, memory is a sequence of bytes be numbered (like "cells" or "hole dove"), each containing a small piece of information. This information may be said to command the computer what to do. Cell may contain data that is required to conduct a computer command. Each slot may contain one, and that now the data may then become a command.

Memory store various forms of information as binary digits. Information that has not solved akan shaped binary (encoded) with a number of instructions into a sequence of numbers or figures. For example: Letter F is stored as a decimal number 70 (or binary digits) using one of the methods of solution. More complex instructions that can be used to store images, sound, video, and all kinds of information. The information can be stored in a sell is called a byte.

In general, memory can be written back over millions of times - the memory can diumpamakan as blackboard and chalk that can be removed and re-written, rather than write a book with a pen that can not be deleted.

The size of each cell, and the number of cells, a great change from computer to computer, and technology in the making of memory is a great change - from Electromechanical relay, to a tube filled with mercury (and spring) in which the acoustic balance established, permanent magnet to the matrix, to each transistor, to integrated circuits with millions of transistor on a single Silicon chip.

Processing


Unit Pemproses Center or CPU (central processing unit) to process berperanan landing, and carry out counting down laluan information menerusi computer system. Unit or peranti akan pemprosesan also communicate with peranti input, output and storan for implementing the referral-related referrals.

In von Neumann architecture of the original, he describes an arithmetic and Logic Unit and a Control Unit. In modern computers, the second unit is located in a single integrated circuit (IC - Integrated Circuit), which is usually referred to as CPU (Central Processing Unit).

Logic and arithmetic units, or Arithmetic Logic Unit (alu), is a tool that make the implementation as the implementation of basic arithmetic (addition, subtraction, and the like), the implementation of logical (AND, OR, NOT), and the implementation of the comparison (for example, compare the contents of two slots for equality). This is done on the units "work" is evident.

Save the command control unit which is now done by computer, ordered the implementation and pestle to get the information back (from memory) that is required to implement the command, and move the results back to a memory location that is appropriate. Once that happens, the control unit to go to the next (usually placed in the next slot, except that the command is the command to jump to inform the computer that the next placed in another location).

Input and Results

I / O allows the computer to get information from the outside world, and put the work there can be physical (hardcopy) or non-physical (softcopy). There are various means of I / O, from the familiar keyboard, monitor and disk drive, to the more unusual such as webcam (web camera, printer, scanner, and so forth.

Owned by all normal means of entry is that they encode to (change) from a range of information in the data can be further processed by a digital computer system. Tool output, men-in to decode the data information which can be understood by the computer. In this sense, the computer system is an example of digital data processing system.

Instructions

Command discussed above is not the rich human languages. Computers have only a limited number of simple commands that properly formulated. The command is understood that most normal computer is the "copy the contents of cell 123, and 456 cells in imitation," "add the contents of the cells 666 to 042 cells, and the result in cell 013", and "if the contents of cell 999 is 0, the next you in 345 cells. "

Instructions represented in the computer as a number - the code for "copy" may be 001, for example. A special set of commands that are supported by a particular computer language known as the engine computer. In practice, people usually do not write commands to the computer directly on the machine language programming language, but the "high level", which was then translated into machine language automatically by special computer programs (interpreters and compilers). Some of the programming language closely related to the language engine, such as assembler (low level languages); on the other hand, languages like Prolog are based on the abstract principles that are far from the actual detail of the engine (high-level language)

Architecture

Contemporary computer and put the pestle to the control unit in a single integrated circuit known as the Central Processing Unit or CPU. Typically, the computer memory is placed in the top few small integrated circuits near the CPU. Tool that occupies most space in the computer system is ancilliary (for example, to provide electrical energy) or device I / O.

Some larger computers differ from the above model in the one main thing - they have several CPU and control unit that works together. Moreover, several computers, used largely for purposes of research and scientific perkomputeran, is significantly different from the model above, but they have found little commercial use.

Function of the computer is actually fairly simple principle. Reach the computer and data from memory. The command is done, the results are stored, and the next reach. This procedure is repeated until the computer is turned off.

Program

Computer program is a list of commands to be done by computer, perhaps with the data in the table. Many computer programs contain millions of commands, and many of the command is carried out repeatedly. A [[Personal computer [PC]] Modern general (in 2003) can do about 2-3 billion in the sedetik. Computers do not have the ability through their extraordinary ability to perform complex commands. However, they do millions of simple commands that are governed by intellect, "programmer." "Both the Programmer elaborate set-set of commands to perform tasks (for example, draw a dot on the screen) and then create a set of command-set is available to other programmers." Nowadays, most computer programs to do some appearances as well. This is usually referred to as multitasking. In fact, make the CPU from one program, then after some time, the CPU switch to the second program, and do some command. A small distance of time is often referred to as time slices (time-slice). This program raises notional fold ganda conducted simultaneously with a CPU time of the program. This is similar to how the film is still just a series of flash frame. Operating system is a program that usually take this time out

Operating System

Operating system is a combination of such a useful code snippet. When such a computer code can be used together by a variety of different computer programs, after many years, programmers finally menmindahkannya the operating system.

Operating system, determine which program is run, when, and where the equipment (such as memory or I / O) that they use. Operating system also provides services to other programs, such as a code (drivers) that allows programmers to write programs for a machine without the need to know the detail of all electronic equipment that is connected.

Computer parts
Computer consists of 2 major parts: Software and hardware.


Senin, 01 Juni 2009

My blog

We avilable for you any tutorial programming computer.