Uang pertamaku dari Internet..... 0

Deddy Gunawan | 1:29 PM |

Ceritanya aku ini iseng-iseng ikutan daftar di kumpulbloger.com, sekitar dua bulan yang lalu aku pasang iklan kumpulbloger.com di blogku, hari demi hari recehan yang dikumpulkan dari kumpulbloger.com semakin bertamah hingga kemarin tepatnya tgl. 22 agustus 2008 sekitar pukul 11:03:35 pemilik kumpulbloger.com membayar ke rekeningku.
Rasa tak percaya menghantuiku, akhirnya aku putuskan untuk melihat rekeningku dan ternyata memang benar ada sejumlah rupiah masuk ke rekeningku, wah... lumayan neh buat pasif income. saya menyarankan buat teman-teman yang masih punya space kosong di blognya ayo cepat ikutan kumpulbloger.com
neh bukti pembayaran dari kumpulbloger.com :

ayo buruan gabung disini kumpulbloger.com dan tingkatkan lagi pengunjung ke blog anda agar kesempatan meraih duit dari internet semakin besar...

Salam sukses selalu.
Dedmax1711



Adobe Photoshop CS3 for Photographers: A Professional Image Editor's Guide to the Creative use of Photoshop for the Macintosh and PC 0

Deddy Gunawan | 2:23 PM |

eBOOK Details
Publisher Focal Press
Release Date May 28, 2007
ISBN 0240520289

eBOOK Description
Get the preeminent advice from one photographer to another as Martin completely updates you on the core aspects of working with Photoshop, digital workflow, and improving accessibility. Real-life examples, diagrams, illustrations, and step-by-step explanations ensure that youre up to speed with the next generation of digital photography in no time!

Adobes Photoshop CS3 comes with powerful new features with huge payoffs. But it can be overwhelming to learn, even for professional photographers, graphic designers, keen amateurs, and others who already have an initial grasp of Photoshop. Acclaimed photographer Martin Evening, who wrote the best-selling previous books, 'Adobe Photoshop for Photographers', makes it easy with this new, thoroughly updated edition.

* Illustrated throughout with before-and-after pictures more than 750 professional, color illustrations!
* Practical techniques and real-life assignments
* Step-by-step tutorials
* Keyboard shortcut reference guide

Part 1
Part 2
source : http://ebookhelper.blogspot.com


Wireless Networks 0

Deddy Gunawan | 2:06 PM |

Wireless networks
Authors: P. Nicopolitidis, M. S. Obaidat, G. I. Papadimitriou, A. S. Pomportsis
Publisher: John Wiley & Sons
PDF | 422 pages | 3,0mb | English language | ISBN 0470845295

Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path and the network is the totality of switches, transmission links and terminals used for the generation, handling and receiving of telecoms traffic. Wireless networks are rapidly evolving, and are playing an increasing role in the lives of people throughout the world and ever-larger numbers of people are relying on the technology directly or indirectly.

The area of wireless communications is an extremely rich field for research, due to the difficulties posed by the wireless medium and the increasing demand for better and cheaper services. As the wireless market evolves, it is likely to increase in size and possibly integrate with other wireless technologies, in order to offer support for mobile computing applications, of perceived performance equal to those of wired communication networks.
Wireless Networks aims to provide an excellent introductory text covering the wireless technological alternatives offered today. It will include old analog cellular systems, current second generation (2G) systems architectures supporting voice and data transfer and also the upcoming world of third generation mobile networks. Moreover, the book features modern wireless technology topics, such as Wireless Local Loops (WLL), Wireless LANs, Wireless ATM and Personal Area Networks (such as Bluetooth).

Provides an easy to use reference which presents a clear set of technologies per chapter.
Features modern wireless technology topics, such as Wireless Local Loops (WLL), Wireless LANs, Wireless ATM, Personal Area Networks (such as Bluetooth) and Ad-hoc wireless networks. Progresses through the developments of first, second, third, fourth generation cellular systems and beyond. Includes helpful simulation examples and examples of algorithms and systems. Essential reading for Senior undergraduate and graduate students studying computer science, telecommunications and engineering, engineers and researchers in the field of wireless communications and technical managers and consultants.

Provides an easy to use reference which presents a clear set of technologies per chapter. Features modern wireless technology topics, such as Wireless Local Loops (WLL), Wireless LANs, Wireless ATM, Personal Area Networks (such as Bluetooth) and Ad-hoc wireless networks. Progresses through the developments of first, second, third, fourth generation cellular systems and beyond. Includes helpful simulation examples and examples of algorithms and systems. Essential reading for Senior undergraduate and graduate students studying computer science, telecommunications and engineering, engineers and researchers in the field of wireless communications and technical managers and consultants.

More and more people now have a wireless network - a network which is not connected by cables. The data is transferred through the air, by means of radio signals. The advantage is that you can sit on the sofa and use a laptop without the risk of tripping over network cables.

Wireless networks are more vulnerable than ordinary networks. They require extra security, which is why particular attention is devoted to wireless networks on the security pages.

Discovered!
There is a growing group of hobbyists who regularly search for wireless networks. They tour an area with a laptop, scanning for signals from wireless networks. This is known as war-driving, war-walking or war-cycling, depending on the means of transport used. Some people then mark the networks they find; this is known as 'War-chalking'.
There are even websites with maps of areas that have been 'sniffed'. Entire cities are being mapped in this way. War-chalking is not illegal, but penetrating someone's network without permission is.
There are countless tools that can be used to trace a wireless network. These are fairly easy to find and use. Any laptop with a wireless network card and a sniffer program can be used for war-driving.

Risks
Once your wireless network has been discovered, it is very likely to be abused.
For example, people may make free use of your bandwidth while you are paying for the data traffic. Moreover, the data on your network will not be secure if your wireless network is not secured, which means your privacy can easily be infringed. Read about the associated risks, for example in connection with spyware and phishing.
All kinds of other harmful practices also take place. For example, spam may be sent through your connection. Or your network may be used to break into other computers. Fraud may also be committed, such as phishing.

If abuse takes place via your connection, it will not be possible to trace it back any further than your computer. Hence you cannot prove that you yourself are not the culprit. Victims of internet abuse may take legal action, so make sure you are not blamed for other people's misdeeds.

Secure your wireless network
An unprotected wireless network is even more vulnerable than an ordinary network. Prevent abuse being perpetrated on or through your wireless network. Details are given below of how this can be done in two stages.

1. Restrict access to your network
Anyone who wishes to use your network must have your permission. Technical settings can be used to grant or deny access.

In order to establish a connection with a wireless network, a computer must have a wireless network card. Such a network card has its own unique number known as a 'MAC address'. You can set your wireless router in such a way that only computers with a known MAC address can access your network. You enter these addresses manually. The helpdesk pages (NL) show how to secure a Thomson SpeedTouch 580 wireless modem. The left-hand column explains how to find out the MAC address of a card. Make sure you use the address of the wireless card and not the address of another network card.

Only allowing 'known' computers onto your network does not constitute sufficient security. It provides a very thin layer of protection which can easily be circumvented. Because just like ordinary mail, internet traffic operates with an addressee and a sender's address. Each piece of traffic, or data packet, which you send therefore contains your MAC address. In their standard form, your data packets can be read by others. Anyone with a wireless network card in the vicinity of your wireless modem can pick up and read your internet traffic. That is how they find your MAC address.
To gain access to your network, intruders replace their MAC address with yours. They make their laptop appear to be a known computer by spoofing your MAC address. XS4ALL therefore recommends that you encrypt your data.

2. Make your messages unreadable
Encrypt all the data that passes between your computer and your wireless modem by encoding it. This type of security is known as encryption. Only computers which have the correct decryption key can then receive readable packets and send them to your wireless modem. Conversely, your wireless modem can only decrypt packets which have been packed with your unique key. Other traffic will not be processed.
You can choose from two standard ways of encrypting data for wireless networks: the now obsolete WEP (Wired Equivalent Privacy) and the new and more effective WPA (Wi-Fi Protected Access). One of these protocols, or possibly both, will usually be present on your computer and router. You will find them on your computer in the configuration screen, in your wireless network settings.
You enter the WEP or WPA settings yourself. In fact, all you have to do is set your own key. You set this on the router, and on every individual computer you wish to allow to access your wireless network. The key should be the same on all systems. Do not make your key too easy.

If you find all this too complicated, ask for help. The security of your network is worth the effort. If you do not secure your network, it will only be a question of time before someone abuses it.

Download Rapidshare
password = www.AvaxHome.ru
source : http://ebookhelper.blogspot.com/


Cukup Klik Rupiah Mengalir 0

Deddy Gunawan | 12:16 PM | ,


Daftarkan diri anda disini...



Bagaimana Klikrupiah.com bekerja
Klikrupiah.com is BUKAN Autosurf, Multi-Level Marketing, Pyramid, Ponzi, Matrix or "Get Rich Quick" skema.

Klikrupiah.com inovasi terbaru,dan hanya untuk orang indonesia disini kami membantu pemilik website yang ingin mendapatkan pengunjung yang banyak dan berkualitas dan iklan anda akan kami pasang di halaman , "Klik Iklan ". Persentase paket iklan yang anda bayarkan kepada kami,sebagian akan kami berikan kepada anggota kami.

Bagaimana anda mendapatkan uang
Anda lihat iklan dihalaman "Lihat Iklan ". Setelah waktu 45 detik sudah tercapai maka anda akan melihat tanda "cek list" atau tanda "X". Jika tanda "cek list"muncul maka anda akan mendapatkan uang Rp 100 (Rp 150 Premium) tapi jika anda melihat tanda "X"maka anda tidak mendapatkan uang. Anda mendapatkan tanda "X"dikarenakan anda buka iklan yang sama atau buka beberapa iklan dalam waktu bersamaan.
Anda hanya diijinkan melihat iklan yang sama setelah 24 jam.

Contoh Pendapatan (Berdasarkan rata-rata)
» Anda klik 10 iklan = Rp 1.000
» 20 referrals klik 10 iklan = Rp 10.000
» Pendapatan Harian= Rp 11.000
» Pendapatan Mingguan= Rp 77.000
» Pendapatan Bulanan=Rp 330.000

Member FAQ

Apakah Klikrupiah.com?
Klikrupiah.com inovasi terbaru,dan hanya untuk orang indonesia.

Bagaimana menghubungi kami Klikrupiah.com?
Anda bisa gunakan contact form.

Jam kerja ?
24 jam penuh.

Cara kerjanya ?
Lihat website dalam 30 detik dihalaman"surf ads".Setelah 30 detik selesai anda akan melihat tanda warna hijau ok atau merah 'X'.Jika tanda hijau berarti anda mendapatnya Rp 100 dan jika anda premium mendapatkan Rp 150,untuk yang warna merah'X' anda tidak mendapatkan apa-apa.

Dapatkan saya mengajak orang serumah untuk ikutan?
Selama alamat E-mail beda dan No rekening Bank beda,tidak masalah,tapi tidak boleh jadi referral anda.

Dapatkan saya membuat account lagi?
Tidak.

Orang sekantor,sekolah dapat mengikuti program ini?
Dapat,lihat pertanyaan sebelumnya.

Berapa uang yang saya dapat ?
Kami bayar Rp 100 untuk free anggota dan referralnya Rp 50 , jika anda premium anggota anda mendapatkan Rp 150 dan referralnya Rp 100.

Dimana saya melihat kode untuk mereferensikan?
Bisa dilihat di statistikku.

Bagaimana cara saya berhenti jadi anggota?
Anggota tidak aktif akan kami hapus dari database.

Saya tidak bisa melihat iklan !
Coba bersihkan cookie,temp,cache dan jika tetap tidak bisa coba ganti browser atau restart komputer anda.

Kenapa statistik saya tidak uptodate !
Coba refresh halaman (pencet F5) atau Coba bersihkan cookie,temp,cache dan jika tetap tidak bisa coba ganti browser atau restart komputer anda.

Kenapa setiap login atau register kode keamanan selalu salah!
Coba refresh halaman (pencet F5) atau Coba bersihkan cookie,temp,cache dan jika tetap tidak bisa coba ganti browser atau restart komputer anda. .

Kapan statistik saya update ?
saat itu juga.

Bagaimana saya mendapatkan pembayaran ?
Setelah Account anda mencapai Rp 10.000

kapan?
Setelah account anda mencapai Rp 10.000,anda bisa meminta untuk dibayarkan

Advertiser FAQ

Bagaimana cara kerjanya?
Jika anda memesan paket iklan dikami dan sudah kami setujui maka anda bisa melihat di halaman "Surf Ads" page. Iklan yang anda pesan akan berada ditempat berdasarkan kategorinya dan kami jamin anda mendapatkan unik IP (hanya dari anggota). Semua pengunjung dari bukan anggota adalah gratis,contohnya jika anda pesan iklan 1000 bisa saja anda mendapatkan 1300,karena ada klik dari bukan anggota di halaman "Surf Ads" . Anda mendapatkan banyak uang.

Apakah pengunjung website saya terjamin ?
Ya. Kami menjamin anda mendapatkan trafik sejumlah yang anda pesan,bahkan lebih banyak.

Setiap pengunjung adalah unik IP ?
Setiap pengunjung unik dihitung berdasarkan waktu 24 jam.. Karena itu anda hanya bayar sebanyak unik IP saja dihalaman "Surf Ads" , dan "Member Visits" dihitung berdasarkan unik IP (member) dan "Outside Visits" dihitung dari buka anggota kami..

Apakah ada yang terlarang ?
Anda tidak diperkenankan iklan dikami situs porn,dll.

Bergabunglah bersama kami...






 
Welcome Deddy's blog Copyright © 2010 Prozine Theme is Designed by Lasantha Home | RSS Feed | Comment RSS