Sabtu, 21 April 2012

How to Create or Making USB Power Injector

How to Make, Making Power Injector USB Modem, Wi-Fi. USB Extender with a length of more than 8 feet is often an error when used to connect the USB Air Card Modem and Wireless LAN. Actually, this error does not always occur in any type of device that uses USB Extender with over 8 feet long. For example, a USB Extended through 12 meters, usually no error will occur during their use of Flash Disk Device, but this does not guarantee that the 12-meter USB Extended earlier can be used for the Device in the form of Wi-Fi LAN or Air Card Modem. 
So we should not be surprised if the 12-meter USB Extender that we can use for Flash Disk did not work when we use the LAN or Wireless Air Card Modem. How this could happen?This happens because of lack of supply of delivery resources that go into Device power. Each conductor / cable resistance, the type and the longer the cable the greater the prisoner. Therefore, when there is current flowing in the USB cable Extender, there will be a voltage loss along the cable so that the voltage falls to the load (Device) will be equal to the voltage source voltage is reduced losses in the cable. 
The amount of voltage loss would be directly proportional to the strong current flowing in the Extended USB cable. Thus on each load / device will be different in different voltage losses because each device has a different current consumption. A Flash Disk has a much smaller current consumption than the Air Card Modem or Wi-fi. So did most of the Wi-fi has a smaller current consumption of the modem.That's why the 12-meter USB Extender can be used for error or Flash Disk often can not even be used for Air Card Modem or Wi-fi that has a greater current consumption. Even in extreme conditions the device is not detected at all. 
To overcome this is to build Power Injector USB modem or Wi-fi is a way to raise the voltage fall / get the device to match the value that should be the 5 Volt DC. In standard conditions, the voltage is 5 VDC from the USB connector on the CPU with the black cable to Ground (Zero) and the color Red for Positive (+) its 5Volt. To raise external power supply is used as commonly applied to the Access Point or often called USB Power Injector. You need to prepare are:• 1 piece Box / Small Box kira2 size 10 x 15 x 5 cm as Injector Power USB box. Can be of plastic or of the plate. Used as a mounting box with its Wi-Fi LAN can also be provided that enough• AN7805 IC or AN7805F and cooling plate. Remember ..!! do not use AN78L05.• Cable to taste• Solder and Lead Solder 
Do the following:Prepare the USB Extender that has been extended (eg 12 meters), making USB Extender can be Read Here. Then dismantle the connection between the UTP cable with its connector and USB connector on both ends (of the CPU or the Device).Once unloaded, for the first part we are working on a device that is connected to the stabilizer. Extended Cut the USB cable connection to the combined red-orange cable orangeputih of UTP ... and rangkailah USB Power Injector like the following scheme:
 








Do not forget to install the cooler on its AN7805 IC ComponentsAfter that we're working on that part of the USB on the CPU resources. Extended Cut the USB cable connection to the combined red-orange wires of UTP and rangkailah orangeputih USB Power Injector like the picture above. Take a piece of wire and connect it to the yellow wire (+12 V) on the PS CPU.Red wire coming from the left USB CPU and is not used, cap / Isolate to be safe from a short circuit.Before you use a USB power injector, it would not hurt if you Test-tengangan first voltage at the measurement point as shown schemes with Volt-meter (AVO). Keep tension on the leg AN7805 IC no.1 is +12 V and +5.0 V is the No. 3 feet (Stable) in practice is usually close to 5.0 VDC, approximately 4.8 s / d 4.9 V. 

Do not forget to close the connections back to isolation!Furthermore you try to load plug its USB Power Injector. Try to use the Flash Disk and do access, including transfer and copy data to and from Flashdiks. OK then if you put the Air Card Modem Device or Wi-Fi LAN. Make a connection and browsing. Perform repeated measurements of work stress on the leg AN7805 IC no.1 should range from 11 VDC.Built in USB Power Injector, sometimes hard to get good quality IC AN7805 IC so easy to heat and easily broken. For that you can use another type KA78T05xx with nominal currents up to 3 Amp. or fixed AN7805 with a transistor amplifier circuit currents TIP41C as follows:


The size of the voltage drop can also result from the type (brand) UTP cable is used to build USB Power Injector.


Rabu, 18 April 2012

YAHOO! rise to new applications


YAHOO! increase the quality of services to the user by presenting a new application on its web pages, which is Yahoo Mail, TV widget and Zimbra. The addition of these new applications is part of inistiatif Yahoo! To make its services more rich.

As announced in December last year, Yahoo is now paving the way for outside developers and integrate with the features of social networking sites.

Yahoo also adds to the application of blogging wordpress site so that users could post or update their blog without having to exit from the yahoo page first.

Users can also edit and share photos with Picnik and e-mail storage capacity will be larger with a capacity of 100 MB free from the Zumo. For widgets that allow to see the video or television broadcasts, Yahoo has added a Youtube channel to broadcast and some cable TV. They both provide access to the video and their site.

Most interestingly, Yahoo Zimbra also add content, the e-mail and open source software in collaboration with Yahoo!. With this application users can automatically save e-mail in the form of the document.

Anti malicious websites

The Chinese government wants all personal computers sold in the country must have software that can block dangerous situ-site.

Site blocking software is intended to cover the sites, especially pornography. This rule is an effort to protect the younger generation of content that is considered harmful

Software
called "Green Dam Youth Escort" will block access to sites banned by the government by plugging it into the database. The developed software company Jinhui Computer System Engineering Co. in cooperation with the Beijing Dazheng Human Language Technology Academy Co. Ministry of Industry and Information Technology Ministry of China has decided to take this step on May 19 last, but until now the policy is not yet implemented the Chinese government.

Proxy Server on Squid

Is it transparent cache?
Explanation of terms transparent and transparent proxy cache depends on the instance, but we assume here that the context of HTTP Proxy / cache with transparent hijacking of port 80 which is an HTTP path that failed in the internet. The difference is that the cache include cache, but the proxy only proxies without caching. Transparent Overload has different meanings depending on the situation. The word can mean a plow setup port path 80 where klientnya try to go to another server, can also mean a transparent proxy which can not change the meaning / content of the request. there is no tool like transparent proxy, only the semi-transparent and there is no such tool trasnparan cache. Squid can be configured to act in a transparent. In this mode the client is not required to configure their browser to access the cache but squid will pick the right package and request a transparent cache.

Thing that can solve the biggest problem with using caching: encourage the users to use the cache server.

Advantages transparent caching:
Advantages and disadvantages of transparent caching completely the opposite of all that has been mentioned in the example for proxy caching. Advantage, the administration made easy to understand browser does not have to be configured to talk to the cache. Control center, users can not change the browser to complete the cache.

Losses transparent caching:
Not strong, because transparent caching depends on a stable path routed between the client with the original serveryang, in terms of path through the cache. This is the internet easily influenced to change - change in routing. In other words, if a relationship between the client with the cache set and routing changes occur which cause the client to take a path that no longer flows through a network of diverting, periods will stop and the user must fill out the page, if the routes in the internet then the result is uncertain will be more unpredictable.

User control,
Transparent caching takes away control from the user. Some users have biases are very strong and will change the ISP caching too late to avoid it.


Dependencies browser,
For transparent many successful operation depends on the browser cache provides a number of the original server name in the HTTP request header. This is necessary because the cache was not able to access the destination server IP address from the IP address of the original package, for that reason the cache disappeared. They could not determine the address of the original server to send permintaan.Beberapa initial browser / previously not provide this information and therefore will not work properly with transparent cache, but 90% of the browser puas.Dalam fact, many have observed that complement the network number HTTP is a significant demand for non cachetable fill (35-45%). Occurrence rate is proportional to the amount of cache contents are sent to non cachetable cache.