Selasa, 11 September 2012

Configuration User Manager Hotspot In MikroTik

Mikrotik User Manager is a web-shaped management system, which is integrated with mikrotik which can be used for user-user meminage both internal mikrotik mikrotik itself or from outside the base system mikrotik itself, or often in short UserManager also with this Userman most much in use to manage users as follows:
User Hotspot billing system
PPP or PPPoE Client
DHCP Server
Wereles users, and much more
 

In this paper we will try a little review about the User Manager for HotSpot Billing. Previous package hotspot and dhcp server must already be set / enabled and configured prior to configuration on Mikrotik RouterOS you can read it here. The assumption in this paper RouterOS consists of two (2) interface ethernat. Ether 1 (one) as the interface is connected to the internet while ethernat 2 (two) as the client interface is connected to the hotspot.



* In Ethernat 1 (one) here I give ip 192.168.0.2 (assuming gamtway of the modem 192.168.0.1)
* And on ethernat 2 (two) with ip 192.168.1.1/24.

The steps are as follows:

1. Set DHCP on ethernat 2 (two), can be found in my article "Setup Mikrotik Hotspot For Gatway"
2. Turn Radius Server on frofil hotspot and check the HTTP login tap CHAP.


3. Set the Radius server to handle the hotspot usermanager go to System >> Radius >> Add, check on the service = hotspot, then enter the address = 192.168.1.1, and the Secret (important free later together with the settings for the router userman) in this article I fill 123456

4. For the record the first time hotspot user authentication will read the database / ip hotspot user. Remove the data in this directory (if any) to authenticate to the radius.

5. Installation usermanager;
Open system packages from Winbox, if no package is installed in the user manager package list, you can install it first. Because the user-manager is a separate package from RouterOS mikrotik.Anda can download packages mikrotik in http://www.delta.net.id/software/mikrotik/ or here http://www.mikrotik.com/download.html select one package. npk by adjusting mikrotik version currently in use (eg in use RouterOS V.4.3 on x86 then npk package in the download also V.4.3 on x86.npk) then exstrat files via a PC windows to retrieve the user-manager package file only.
Shares open Winbox Files list, copy the package user-manager.npk from windows folder and paste the file list in Winbox. Once the upload is complete, please reboot your mikrotik menu by clicking System -> Reboot so that the package we just upload directly installed by mikrotik.
To ensure the user manager already installed what has not happened in our proxy, click the menu System -> Packages on your Winbox window. Make sure the user-manager package is already on your RouterOS Package List. (See picture packages list)
To configure user manager which we have installed, we can by way of proxy IP calling our browser Firefox or Google Chrome. Suppose the proxy IP 192.168.0.2 or 192.168.1.1 article
http://192.168.1.1/userman or http://192.168.0.2/userman
Manager on the user login page, enter the admin user and password blank, as shown below.
  
 

Minggu, 24 Juni 2012

Billing Setting Hotspot Mikrotik Router Integration

Billing Setting Hotspot Mikrotik Router integration is easy, after the install mikrotik correctly, run the application "Winbox Loader" so that you can configure the Mikrotik Router from the Windows Desktop to easily and quickly without having to memorize the command line Mikrotik. After double-click the Winbox application will appear as follows:
 
After that click on the sign ... it will display the MAC address Mikrotik was active in this double-click the Mac Address 00:0 B: CD: 64: D9: 22 and enter the user admin and default password is blank and click "Connect"
 
IP ==> Address ListClick the plus sign | + | then on the "Address" then input the desired number eg IP 192.168.1.110/24 (slash 24 means later will automatically fill in the Network and Broadcast). Then in the "Interface" select ether1 where ether1 to be connected to the modem / ISP.
 
IP ==> Route ListClick the plus sign | + | then on the "Gateway" fill your Gateway IP, eg 192.168.1.1 Then click "OK"
 
New TerminalThen the console will appear as follows, and then do a ping to your Internet Gateway, type ping 192.168.1.1 If this works then it will look like the picture below and that means a network of Mikrotik to the Gateway / Modem has been connected with the normal.
 
Interface ==> Interface ListThis is to see the interface or the Ethernet card which is active (to connect to the network) is in position "Tx" and "Rx" will display traffic xxx bps. In case this is ether1 is connected to a LAN network
 
IP ==> DNSThen click the "Settings" in the "Primary DNS" and enter 202.134.1.10 DNS1 eg on the "Secondary DNS" and enter 202.134.0.155 DNS2 eg if after clicking "OK"
 
New TerminalPerform testing ping out to the internet is such to google.com by typing ping google.com if results like this then you already connect internet connection.
 
IP ==> == Hotspot> Hotspot SetupIn the "Hotspot Interface" ether select which one to be made in to a hotspot, in this case and if there is ether3 wireless wireless antenna you choose. Then click "Next"
 
In the "Local Address of Network" is your Hotspot Gateway, then click "Next"
 
In the "Address Pool of Network" is a DHCP IP Range that will be provided to the user hotspot. You can specify what IP range like in this case is from 10.5.50.2 s / d 10.5.50.254 then click "Next"
 
In the "Select Certificate" select "none" then click "Next"
 
In the "IP Address of SMTP Server" leave it blank and click "Next"
 
In the "DNS Servers" has been filled properly and control your company can click on the "Next"
 
In the "DNS Name" leave it blank and click "Next"
 
Then just click "Next"
 
When finished it will display the following dialog box then click "OK"
 
Then continue with the configuration to connect to the Hotspot Mikrotik Hotspot Billing software as follows:IP ==> Hotspot ==> Server Profiles ==> hsprof1 (2x click)From the tab "General" tab to move to "Login" and then remove the check mark (uncheck) the "Cookies" then click "Apply"
 
Then move to the tab "Radius" and remove the check mark (uncheck) the "Use RADIUS" then click "Apply" then click "OK"
 
RadiusClick the plus sign | + | and on the General tab check the hotspot service later in the "Address" enter the IP Address Billing Hotspot radius server (Linux PC) and "Secret" secret id eg 123 457 890 fill as you fill in Linux, then if finished click "OK"
 
In order for User Login Page Hotspot Billing Hotspot login page appears as shown below
 
IP ==> == HotSpot> Walled GardenClick the plus sign | + | and the position of "Action = allow" select "Dst. Address "enter the IP number Hotspot Billing server, eg 192.168.1.10 then click" OK "
 
If you upload your finished files into mikrotik already in the configuration by Team Hotspot Billing softwareThe next step for Hotspot Billing is integrated with Mikrotik Router, you have to login to the Billing Hotspot Manager. Enter a username, password and Security Code to the right as shown below.
 
After a successful entry into the Hotspot Billing Manager, entered Preference Menu ==> Setting Service ==> Choose / var / www / html / config.client.php then click "Edit" and when finished click "Save"$ IpServer = "192.168.1.2"; ==> insert a Hotspot Billing Server IP number$ IpMikrotik = "192.168.1.10"; ==> enter the IP Router Mikrotik$ UserMikrotik = "admin"; ==> insert a user name Mikrotik Router$ PassMikrotik = "admin"; ==> insert a password Mikrotik Router
 
If you can not be saved into the Konsole as root on Linux and type the command chmod 775 / var / www / html / config.client.phpLogin Preference ==> Service Settings ==> Select the / etc / raddb / clients.conf then click "Edit" pull the scroll to the bottom line and add the following four lines of command and when finished click "Save"client 192.168.1.2 ==> fill in the IP Router Mikrotiksecret = 123457890 ==> insert a RADIUS secret fit in Mikrotikshortname = mikrotik ==> fill in the name of the label 'mikrotik'
 
Login Preference ==> Service Settings ==> Select the / etc / raddb / naslist then click "Edit"
 
If you can not be saved into the Konsole as root on Linux and type the command chmod 775 / etc / raddb / naslist

Rabu, 06 Juni 2012

Yahoo Webmaster Guidelines

Bing is a machine that has a design inovatif.untuk poencari new users (new users interface) will be taken to find the information they want quickly based on what their needs with the various features, such as Quick Tabs.

  Basic SEO Bing

· SEO basically adalahtentanf bagaiamna create a good website. And d Bing, there are several ways you can do to achieve optimal rankings for websites that we have. The way the question is as follows:

· To develop original content that is directed to an audience

· Use artiched code in web pages so users ykita web browser and search engine crawlers can read the content to be indexed

Getting links and high-quality autoratif

SEO and webmaster tasks of work to be done is to be successful. In the Bing itself, SEO will bring improvements in the ranking of the site that we have in other search engines.

And in the end, SEO is still a new SEO.pengguna Bing only provides an opportunity for the searcher to find what users want information faster and easier. And benefits of ebmaster itself has been working for the quality of the content itself, arsitekturnua, and productivity of businesses in some high-quality inbound links.

  Locks and Tools for Performing SEO by Bing

To keep abreast of the latest and greatest information dating from the center of Bing Webmaster, there beebrapa things to note:

     Review of official guidelines on Bing for successful indexing of documents for advice on various technical issues and content, and also know the problems that can affect the ranking of our situ
     Visit the webmaster central blog for the latest information follow / subscribe to the RSS feed to our blog to automate this process
     List all of our website with Bing Webmaster central

     reference: Bing.com

Guidelines GOOGLE WEBMASTER

If your site has been completed, then we have to input the site to http://www.google/submityour content /. Submit sitemap to Google Webmaster Tools. It is used Google to learn and know about the structure of the site that we have.
In to design the site, would be better if we create a site that is clear and text links. Each page must be familiar, at least with a text link. It would be better if the writing page, we write clearly and accurately describes the existing content. And besides, we harusmneggunakan "the users" who can get the information seekers memudahakan ktia site. The use of text penggunakaan akakn better than the picture, because Google Crawler can not detect text in images. If you still want to use images for text content, whether to use "ALT" to enter a few words of descriptive text. And it must be ensured that the elements and ALT attributes are accurate.
Lnk is broken and check the correct HTML to be done. If you want to use dynamic pages (which contains the character '?'). For images and video, there are important things to consider. Use a text browser such as Lynx to memriksa site that we have. And let the bot to search our website go to the sign ID or arguments that track their path through the site.
In addition, we must ensure that our web server mendukuk If-Modified-Sine HTTP header, which memungknkan our web server for Google memberigtahu Konen whether we have changed since the last time the reader to enter our website. This feature saves you bandwidth and overhead. Utilizing robots file. Txt on the web server we have. With menggunala this file will tell crawlers which directories can or can not be crawled. To better understand how the machine will automatically bring into our website, then can visit http://code.google.com.web.controlcrawlindex/docs/faq.html. and to test it, ktia can use Google Webmaster Tools.
Advertisement in a web does not affect the rankings in the search. And to prevent crawling of pages pencariam then we can use the robots.txt.
Test site appears on different browsers
This is useful for monitoring and providing to the user-gasil relevant results than Google itself. Fast site search can also increase user satisfaction and improve the quality of overall we b. Google as a search engine recommends that webmasters can memonito site performance by using the "Page Speed. YSlow, WebPAgeTest, or other tools.
Guidelines for maintaining quality. These guidelines will make Goolg ememberikan negative response in case of fraudulent behavior arau other negative practices. If we feel that other sites have been abusing the quality guidelines (negative practice), then this can be reported to the https://www.google.com/webmasters/tools/spamreport.
The basic principle in maintaining the quality of site.
In making the pages we should not deceive the user is often called "cloaking". And we also do not participate in link schemes designed to improve the ranking of sites / Page Rank. And also avoid links to web spammers or "bad neighborhoods" on the web, which will probably influence negattif member by that link. And keep in mind that do not use unauthorized kompuer rogram to send the page, rating, etc because Goole produck not recommend the use of such Web Position, Gold that send automatic or programmatic to Google. There are some things that should be used as guidelines in maintaining quality, such as:

     
Avoid hidden text or links
    
Do not use cloaking or sneaky redirects
    
Do not send automated queries to Google
    
Do not load pages with irrelevant keywords
     
Do not create pages subdomains or domains with substantially duplicate content
    
Do not create pages with malicious behavior, such as phishing or installing viruses, Troja, or other badware
     
Pages Avoid "doorway" created just for search engines or other "cookie cutter" approaches such as affiliate programs with little or no real contest there

 
reference: google.com

Facilities Control Panel

E-MAIL:

    
E-Mail Account pengelolahan (to add, delete, edit or change the password) 3 Webmail for each email address. Webmail is a free E-Mail that allows us to read an email where & anytime: at home, at work or anywhere.
    
POP3 account to add, edit and delete POP3 e-mail we can use in Outlook Expres
    
E-Mail Forwarding to add, edit and delete the e-mail forwarding. We may transfer such as e-mail: sales@domainkita.com to agus@domainkita.com & andi@domainkita.com, dstnya
    
Auto Responder to add, edit and delete the e-mail Auto Responder We are able to be used as an automatic response
    
Mailing List to create a group discussion as http://www.yahoogroups.com
    
Custom mail filtering
    
DNS / MX Management to change the DNS, MX, CNAME, etc.. Is necessary if we use a free web mail like Gawab.com, BigMailBox.com or OemMail.com.
    
Domain Forwarding to redirect all mail from one domain to another domain. For example: if we shift from toko.com to rumah.com email, all emails sent to nama@toko.com will be sent to nama@rumah.com (eg: agus@toko.com will be sent to agus @ home. com).
    
Default Address Manager which allows us to transfer all email addresses that have not been made to an email address. For example: if we only make "agus@domainkita.com", then all email sent to apasaja@domainkita.com (besides agus@domainkita.com) will fit inside a mailbox (for example in: default@domainkita.com)
    
Catch All that can be used to apasaja@domainkita.com sent to one of the main mailbox You.
    
POP3 Mail Password Changer to change the password POP3 Email our own without having to contact the webmaster / admin we are replacing it for us because we are very confidential email password.
SITE TOOLS:

    
File Manager to upload, edit, delete, protect and change the permissions on our file.
    
Change Password to change the password & Frontpage website
    
Install / Uninstall FrontPage Extensions
    
General Account Information to see the amount of website space, database space, bandwidth, subdomains and mailing list are still available. So that we can determine when we should upgrade our hosting package
    
General Server Information to see the version of Operating System, apache, php, database, perl and module, sendmail, bind and ftpd.
    
Custom Error Pages to organize what the page will be displayed if one link of our website (Error 404) or if the script We error. (Error 500)
    
Redirects to transfer the website address, eg a visitor goes to http://www.domainkita.com/divisi will automatically be routed to: http://www.divisi.com \
    
Image Manager functions to create a thumbnail image (small image), resize photos and convert images from one format to another.
    
MIME Types Manager
    
Apache Handlers
FTP (UPLOAD / DOWNLOAD):

    
FTP Accounts Manager to add, delete and change the FTP password.
    
Anonymous FTP controls to create a public access FTP.
    
Anonymous FTP Message
    
Control FTP Sessions
FILE ACCESS PROTECTION & E-MAIL:

    
ClamAV Virus Scan, anti-virus which is used to analyze E-Mail, our home directory, the contents of the website We and Public FTP.
    
Spam Filtering (Spam Assassin) to control email spam coming into the mailbox.
    
Box Trapper serves to counteract the e-mail from senders that do not exist in our white list (We do not know the sender, or often called spam). With the Box Trapper, before the sender (which is not in the White List You) We can send an email, the sender is required to reply to a verification email is sent automatically by e-mail account We.
    
Web Protect (. Htaccess editor) to protect a specific folder on our website by using the "username" and "password" certain.
    
Leech Protect function to protect the "Web Protect" above. If we give the username and password specific folder (eg http://domainkita.com/folder) to our friends and then friends we give the username + password to open to the public (for example to a forum or mailing list), then the likelihood is Leech Protect can help. We can determine how many users are allowed to enter the username and password is within 2 hours (eg 2 users). We can also arrange to get an email alert whenever there are more than two users who try to enter using the username and password page. We can also specify to address what the user is transferred.
    
Hot Link Protection allows to specify what file extension (eg. Jpg) which can not be by any other website Direct Link (Direct Link = file can be downloaded directly from another website without having to open a HTML website Kita). Other websites are still able to access our files with others such as file extension:. Html,. Php and so on, depending on how we setup.
    
IP Deny Manager IP Address function to determine what we are not allowed to access our website. Very useful for protecting privacy
    
Index Manager allows you to turn (on) and off (off) the function of "indexes" in a folder. If the function indexes in a folder is turned off (off), so visitors can not see the files contained in the folder (the folder that has no index file, eg index.html)
STATISTICS / COUNTER (SITE VISITOR ANALYSIS):

    
Web Stats Webalizer to analyze the number of visitors to our website in detail. Per day, per month, coming from a website where, from what country and many more. Not just a regular counter.
    
FTP statistics to analyze user activity on our account FTP.
    
AWStats, other software to analyze the number of visitors to our website in detail. Another alternative for those who feel less comfortable with Webalizer.
    
Analog Stats, additional software to analyze the number of visitors to our website. But the version that is simpler and easier to read.
    
Subdomain statistics to analyze the number of visitors on our website subdomain.
    
Latest Visitors to display the last 300 visitors on our website and some interesting information about them.
    
Bandwidth Usage to find out how many bytes are transferred by our website.
    
Error Log to display the error messages generated our website, such as image files that do not appear, a file is missing and so forth. Very useful for us to use programming languages ​​such as CGI Scripts, PHP and so on.
    
Raw Access Logs to download the raw log our website.


BACKUP:

    
Backup consists of: Full Backup, Backup & Database Home Directory backup. Now we can have the computer hard drive backups at home website.
    
Restore to restore the backups that exist on our computer to the website owned. Backup and Restore can do your own website with easy and convenient, anytime. Data security is guaranteed and our website is in our hands
PHP / CGI AUTO-INSTALLER (not including additional 50-over scripts from Fantastico):

    
Allows us to install the following script in a matter of seconds and with just 1 click (without having to edit any file)
    
phpBB forum (Bulletin Board) to display the forum discussion at our website, so that we can interact with visitors on our website.
    
Agora Shopping Cart shopping cart functions to manage our website visitors so that the product we easily selected and paid more.
    
Simple Guestbook for a simple guestbook.
    
Advanced Guestbook to book a larger room, run by PHP and mySQL Database.
    
Counter website to display the number of visitors on our website.
    
Mail Form which allows visitors to our website fill out a form on our website, then the message they will be converted to email and sent to the email address we (visitors do not need to know your e-mail us)
    
CGI Email, software alternatives. Form Mail is almost the same as above.
    
Banner Rotator function to display randomized banner ads (automatically switched) on our website.
    
HTML Chat for adding a chat facility on our website.
    
PhpMyChat to add a chat facility on our website, but backed by a mySQL database.
    
Random HTML Generator to display the message / text at random (automatic switch) on the website We. For example, to create: "Tips Today" or "Humor Day".
    
Java Real Time Clock to display the clock in a "live" on our website.
    
Countdown Date to display the clock back to the time specified.
    
Entropy Search function to display the search engine on our website
    
CGI Wrapper for non-suexec installation
DATABASE MANAGEMENT:

    
MySQL Databases Manager to create / modify / drop / insert tables in our database
    
PhpMyAdmin access
SubDomains:

    
Sub Domain Manager to add and remove the subdomain (http://namasubdomain.domainkita.com). Each equipped with its own password FTP uploads.
    
Subdomain Redirects serves to divert a subdomain to another website. For example http://namasubdomain.domainkita.com transferred to http://domainlain.com
    
Subdomain statistics to analyze the number of visitors on our website subdomain.
ADVANCED TOOLS:

    
SSH access, similar to telnet, but encrypted. Safer than regular telnet access. Generally very useful for web programming and installation scripts. While this account can not be used for the ssh server security
    
PGP Keys Manager
NETWORK TOOLS:

    
DNS Lookup
    
Traceroute to check domain, IP, ping, whois, DNS records and so forth.
References:
www.wikipedia.com
www.multiarteimpresiones.com

On how to use Cpanel Hosting

Control Panel or the Web Manager is the most popular tool to manage our website. With the Control Panel, we do not need to use more manual methods to manage our website. We also do not need to contact the hosting staff for making new email addresses, subdomains, backups, creating a new database, change passwords FTP / Control Panel and so on. Everything we can do yourself by logging into the Control Panel with place an address bar browser your domain etc: http://www.mydomain.com/cpanel.

Understanding Web Hosting

Web Hosting is an internet hosting service that allows individuals and organizations to create Web sites that are accessible through the World Wide Web (www). Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet to another server located in their data center.

The scope of hosting services varies widely. The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) or Web. Files are usually sent to the Web "as is" or with minimal processing. Many internet service provider / Internet Service Providers (ISPs) offer this free service to customers. Individuals and organizations can also obtain Web page hosting from alternative service providers. Personal web site hosting is typically free, advertisement-sponsored, or cheap. Business web site hosting often has a higher expense.

Sabtu, 21 April 2012

How to Create or Making USB Power Injector

How to Make, Making Power Injector USB Modem, Wi-Fi. USB Extender with a length of more than 8 feet is often an error when used to connect the USB Air Card Modem and Wireless LAN. Actually, this error does not always occur in any type of device that uses USB Extender with over 8 feet long. For example, a USB Extended through 12 meters, usually no error will occur during their use of Flash Disk Device, but this does not guarantee that the 12-meter USB Extended earlier can be used for the Device in the form of Wi-Fi LAN or Air Card Modem. 
So we should not be surprised if the 12-meter USB Extender that we can use for Flash Disk did not work when we use the LAN or Wireless Air Card Modem. How this could happen?This happens because of lack of supply of delivery resources that go into Device power. Each conductor / cable resistance, the type and the longer the cable the greater the prisoner. Therefore, when there is current flowing in the USB cable Extender, there will be a voltage loss along the cable so that the voltage falls to the load (Device) will be equal to the voltage source voltage is reduced losses in the cable. 
The amount of voltage loss would be directly proportional to the strong current flowing in the Extended USB cable. Thus on each load / device will be different in different voltage losses because each device has a different current consumption. A Flash Disk has a much smaller current consumption than the Air Card Modem or Wi-fi. So did most of the Wi-fi has a smaller current consumption of the modem.That's why the 12-meter USB Extender can be used for error or Flash Disk often can not even be used for Air Card Modem or Wi-fi that has a greater current consumption. Even in extreme conditions the device is not detected at all. 
To overcome this is to build Power Injector USB modem or Wi-fi is a way to raise the voltage fall / get the device to match the value that should be the 5 Volt DC. In standard conditions, the voltage is 5 VDC from the USB connector on the CPU with the black cable to Ground (Zero) and the color Red for Positive (+) its 5Volt. To raise external power supply is used as commonly applied to the Access Point or often called USB Power Injector. You need to prepare are:• 1 piece Box / Small Box kira2 size 10 x 15 x 5 cm as Injector Power USB box. Can be of plastic or of the plate. Used as a mounting box with its Wi-Fi LAN can also be provided that enough• AN7805 IC or AN7805F and cooling plate. Remember ..!! do not use AN78L05.• Cable to taste• Solder and Lead Solder 
Do the following:Prepare the USB Extender that has been extended (eg 12 meters), making USB Extender can be Read Here. Then dismantle the connection between the UTP cable with its connector and USB connector on both ends (of the CPU or the Device).Once unloaded, for the first part we are working on a device that is connected to the stabilizer. Extended Cut the USB cable connection to the combined red-orange cable orangeputih of UTP ... and rangkailah USB Power Injector like the following scheme:
 








Do not forget to install the cooler on its AN7805 IC ComponentsAfter that we're working on that part of the USB on the CPU resources. Extended Cut the USB cable connection to the combined red-orange wires of UTP and rangkailah orangeputih USB Power Injector like the picture above. Take a piece of wire and connect it to the yellow wire (+12 V) on the PS CPU.Red wire coming from the left USB CPU and is not used, cap / Isolate to be safe from a short circuit.Before you use a USB power injector, it would not hurt if you Test-tengangan first voltage at the measurement point as shown schemes with Volt-meter (AVO). Keep tension on the leg AN7805 IC no.1 is +12 V and +5.0 V is the No. 3 feet (Stable) in practice is usually close to 5.0 VDC, approximately 4.8 s / d 4.9 V. 

Do not forget to close the connections back to isolation!Furthermore you try to load plug its USB Power Injector. Try to use the Flash Disk and do access, including transfer and copy data to and from Flashdiks. OK then if you put the Air Card Modem Device or Wi-Fi LAN. Make a connection and browsing. Perform repeated measurements of work stress on the leg AN7805 IC no.1 should range from 11 VDC.Built in USB Power Injector, sometimes hard to get good quality IC AN7805 IC so easy to heat and easily broken. For that you can use another type KA78T05xx with nominal currents up to 3 Amp. or fixed AN7805 with a transistor amplifier circuit currents TIP41C as follows:


The size of the voltage drop can also result from the type (brand) UTP cable is used to build USB Power Injector.


Rabu, 18 April 2012

YAHOO! rise to new applications


YAHOO! increase the quality of services to the user by presenting a new application on its web pages, which is Yahoo Mail, TV widget and Zimbra. The addition of these new applications is part of inistiatif Yahoo! To make its services more rich.

As announced in December last year, Yahoo is now paving the way for outside developers and integrate with the features of social networking sites.

Yahoo also adds to the application of blogging wordpress site so that users could post or update their blog without having to exit from the yahoo page first.

Users can also edit and share photos with Picnik and e-mail storage capacity will be larger with a capacity of 100 MB free from the Zumo. For widgets that allow to see the video or television broadcasts, Yahoo has added a Youtube channel to broadcast and some cable TV. They both provide access to the video and their site.

Most interestingly, Yahoo Zimbra also add content, the e-mail and open source software in collaboration with Yahoo!. With this application users can automatically save e-mail in the form of the document.

Anti malicious websites

The Chinese government wants all personal computers sold in the country must have software that can block dangerous situ-site.

Site blocking software is intended to cover the sites, especially pornography. This rule is an effort to protect the younger generation of content that is considered harmful

Software
called "Green Dam Youth Escort" will block access to sites banned by the government by plugging it into the database. The developed software company Jinhui Computer System Engineering Co. in cooperation with the Beijing Dazheng Human Language Technology Academy Co. Ministry of Industry and Information Technology Ministry of China has decided to take this step on May 19 last, but until now the policy is not yet implemented the Chinese government.

Proxy Server on Squid

Is it transparent cache?
Explanation of terms transparent and transparent proxy cache depends on the instance, but we assume here that the context of HTTP Proxy / cache with transparent hijacking of port 80 which is an HTTP path that failed in the internet. The difference is that the cache include cache, but the proxy only proxies without caching. Transparent Overload has different meanings depending on the situation. The word can mean a plow setup port path 80 where klientnya try to go to another server, can also mean a transparent proxy which can not change the meaning / content of the request. there is no tool like transparent proxy, only the semi-transparent and there is no such tool trasnparan cache. Squid can be configured to act in a transparent. In this mode the client is not required to configure their browser to access the cache but squid will pick the right package and request a transparent cache.

Thing that can solve the biggest problem with using caching: encourage the users to use the cache server.

Advantages transparent caching:
Advantages and disadvantages of transparent caching completely the opposite of all that has been mentioned in the example for proxy caching. Advantage, the administration made easy to understand browser does not have to be configured to talk to the cache. Control center, users can not change the browser to complete the cache.

Losses transparent caching:
Not strong, because transparent caching depends on a stable path routed between the client with the original serveryang, in terms of path through the cache. This is the internet easily influenced to change - change in routing. In other words, if a relationship between the client with the cache set and routing changes occur which cause the client to take a path that no longer flows through a network of diverting, periods will stop and the user must fill out the page, if the routes in the internet then the result is uncertain will be more unpredictable.

User control,
Transparent caching takes away control from the user. Some users have biases are very strong and will change the ISP caching too late to avoid it.


Dependencies browser,
For transparent many successful operation depends on the browser cache provides a number of the original server name in the HTTP request header. This is necessary because the cache was not able to access the destination server IP address from the IP address of the original package, for that reason the cache disappeared. They could not determine the address of the original server to send permintaan.Beberapa initial browser / previously not provide this information and therefore will not work properly with transparent cache, but 90% of the browser puas.Dalam fact, many have observed that complement the network number HTTP is a significant demand for non cachetable fill (35-45%). Occurrence rate is proportional to the amount of cache contents are sent to non cachetable cache.