Marhaban Ya Ramadhan

Terkadang kerinduan yang begitu besar terkikis oleh waktu dan kesibukan yang terus mengalir tak tertahankan. Tetapi janji pertemuan yang semakin dekat selalu mengingatkan kembali nostalgia yang terpendam di memori, terungkit lagi kenangan-kenangan indah sebelum perpisahan menjurang lebar menumbuhkan kerinduan yang melambungkan angan dan menantang asa, akankah waktu mempertemukan kembali jiwa perindu pada kekasihnya?

Tertatih aku mengejar bulan
Mengais sisa-sisa Ramadhan
Terjatuh terpuruk di keheningan
Ramadhanku telah pergi
Syawal tlah menjelang
Tinggalkan arti tujuh puluh tingkatan
Pahala bagi orang beriman
….

(suara persaudaraan–album balada sebuah dangau)

Masih kuingat lamat-lamat nasyid itu kulantunkan pada detik-detik akhir Ramadhan penuh berkah, ketika bulan yang begitu dirindukan itu tanpa bisa ditolak pergi meninggalkan. Terasa sekali jiwa ketakwaan yang masih rapuh, saat Ramadhan pergi. Sadar banyak sekali kesempatan terlewatkan tanpa pencerahan. Ingin Ramadhan tetap menjadi hari-hari yang panjang.

Nun di sana
Masih ada jalan putih
Peluang kebaikan
Sebulan di Bulan Ramadhan…
(Now See Heart)

“Allahumma barik lana fi Rajab wa Sya’ban wabalighna Ramadhan”

Share it now...
Share on FacebookTweet about this on TwitterEmail this to someoneShare on Google+

Happy B’Day 19 th My “Lovely Girl”

Sebelumnya maaf buat chayangku klo ngasih kadonya telat… emang sih nggak bisa ngasih kado apa-apa, tapi mudah-mudahan adek seneng… 🙂

Satu hal yang perlu adek inget…!!! dengan bertambahnya usia, berarti semakin berkurang jatah usia adek, untuk itu saat ini sudah waktunya buat adek menjadi sosok yang lebih dewasa, lebih bisa menyelesaikan masalah sendiri, lebih bisa memilih mana yang benar mana yang salah, bukan lagi waktunya manja-manjaan (apalagi ma ibu 🙂 ) masa dah 19 tahun masih dikit-dikit Ibu…. :p, bukan lagi waktunya main-main, hura-hura… dll.

Buat adek: “Semoga panjang umur, tambah pinter, tambah dewasa, dan tambah berbakti ma orang tua, diberikan rezeki yang banyak, yg halal dan berkah. Amiien…!!!”

“I Love You & Happy Bithday”

I hope you will be happy with the life that has the Lord gave to you (bener nggak ya bhs inggrisnya…hehehehe..)

Share it now...
Share on FacebookTweet about this on TwitterEmail this to someoneShare on Google+

Important Linux Directories

There are many variants of Linux used in different computer systems today. Luckily, most Linux developers employ a common naming and utilization scheme that makes different variants of Linux easy to use and maintain. This article will discuss some important and common directories in many popular Linux distributions.

  • /home
  • Each user of a Linux system is assigned a special directory, called “home” direectory, that represents their private space on the system. For example, if a user of the system is called tom, the home directory of tom will be /home/tom. Tom has the right to create any files and directories under his home directory. This is also the default location when tom logs into the system.

  • /root
  • This is the home directory of the adminstrator or super user.

  • /tmp
  • In addition to personal hard disk space in the home directories, users are also given special access to shared temporary space in the /tmp directory. Linux systems often implement quotas on user accounts to prevent anyone from using too much disk space. The /tmp directory allows all users access to additional space to meet short term needs without charging the space against their quota. All files placed in this directory are deleted automatically after a few days.

  • /etc
  • This directory stores all the configuration files needed for the operating system. For example, startup configuration scripts are found in /etc/rc.d and network configuration scripts are found in /etc/sysconfig. Normal users cannot modify the files in /etc.

  • /bin and /usr/bin
  • Most system commands are stored as binary files only in machine readable format. Commands appropriate for use by ordinary users are either placed in the /bin or /usr/bin directory. Core commands like rm, mv, ls, cd go into /bin while supplementary utilities like compilers, firefox browser and openoffice go into /usr/bin.

  • /sbin and /usr/sbin
  • Like /bin and /usr/bin, /sbin and /usr/sbin store commands to be used only by the super user, ie root user. These include commands for attaching and removing hardware, starting and stopping the system…etc.

  • /var
  • This directory stores all the frequently changed files in the system. For example, incoming, outgoing mails, system logs, websites, ftp file archives…etc. very

Conclusion

There are only a few directories to know to really start using Linux. If you understand what the main directories are, then exploring the subdirectories becomes much easier. If you are lost while navigating the directories, always use “cd /” to return back the the root, “cd ..” to go up one level or use “pwd” to find out where you are. Another command “which xxx” tells you where certain commands are located

Share it now...
Share on FacebookTweet about this on TwitterEmail this to someoneShare on Google+

NTFS with read/write support using the NEW ntfs-3g (Ubuntu)

Warning : ntfs-3g is still in beta. You should not use it on production machines.
If you can, it’s always better to prefer ext3 to share file between windows & linux using http://fs-driver.org/

Introduction :

Support of NTFS partition for linux has always been a problem. Projects exist since many years but was always experimental, and was claim to be not safe. But here come a new project ntfs-3g which claim to be capable for unlimited file creation and deletion.

The status of the different projects:

  1. The kernel’s NTFS driver exist since 2001, but write support is experimental and could lead to crash.
  2. The idea was then, because the driver wasn’t safe enough, to put it in an higher level (to be simple, kernel is the low level, and the user space is in high level (depend on the lower level)) in that way, we can easily stop it if he is doing something wrong.
  3. It’s the ntfsmount idea (part of ntfsprogs, in ubuntu repo). write support is still a pain (succes in 50% of the case) but because it use fuse, it reside in the user space, and error no more lead to a crash and leat the disk safe.
  4. Paragon also create an NTFS driver, but non-free.
    Captive NTFS come after with an other good idea, emulate the original Microsoft Windows ntfs.sys driver using wine and doing that in the usespace with FUSE. It lead to a 100% compatible driver but the wrapper itself is known to have some bug, and is really really slow.
  5. And here we are with the last project, ntfs-3g, which is base on ntfsmount (use also fuse) but with lots of improvement in functionality, quality, performance and reliability. This project started by Szakacsits Szabolcs, member of the linux-ntfs team, is actually in beta.

For more information:

But now you probably want to test this great new feature. So let’s start.
(note : a frensh traduction is available here : http://doc.ubuntu-fr.org/systeme/ntfs-3g)

Read More Installation Howto…

Share it now...
Share on FacebookTweet about this on TwitterEmail this to someoneShare on Google+

List Command for XP, Home; Running with Command Prompt

Command2 untuk Windows XP Pro dan Windows XP Home yg bisa dijalanlan langsung dari menu Command Prompt

Accessibility Controls :
access.cpl

Add Hardware Wizard :
hdwwiz.cpl

Add/Remove Programs :
appwiz.cpl

Administrative Tools :
control.exe admintools

Automatic Updates :
wuaucpl.cpl

Bluetooth Transfer Wizard :
fsquirt

Calculator :
calc

Certificate Manager :
certmgr.msc

Character Map :
charmap

Check Disk Utility :
chkdsk

Clipboard Viewer :
clipbrd

Command Prompt :
cmd

Component Services :
dcomcnfg

Computer Management :
compmgmt.msc

Date and Time Properties :
timedate.cpl

DDE Shares :
ddeshare

Device Manager :
devmgmt.msc

Direct X Control Panel (if installed) :
directx.cpl

Direct X Troubleshooter :
dxdiag

Disk Cleanup Utility :
cleanmgr

Disk Defragment :
dfrg.msc

Disk Management :
diskmgmt.msc

Disk Partition Manager :
diskpart

Display Properties :
control.exe desktop

Display Properties :
desk.cpl

Display Properties (w/Appearance Tab Preselected) :
control.exe color

Dr. Watson System Troubleshooting Utility :
drwtsn32

Driver Verifier Utility :
verifier

Event Viewer :
eventvwr.msc

File Signature Verification Tool :
sigverif

Findfast :
findfast.cpl

Folders Properties :
control.exe folders

Fonts :
control.exe fonts

Fonts Folder :
fonts

Free Cell Card Game :
freecell

Game Controllers :
joy.cpl

Group Policy Editor (XP Prof) :
gpedit.msc

Hearts Card Game :
mshearts

Iexpress Wizard :
iexpress

Indexing Service :
ciadv.msc

Internet Properties :
inetcpl.cpl

Java Control Panel (if installed) :
jpicpl32.cpl

Java Control Panel (if installed) :
javaws

Keyboard Properties :
control.exe keyboard

Local Security Settings :
secpol.msc

Local Users and Groups :
lusrmgr.msc

Logs You Out Of Windows :
logoff

Mcft Chat :
winchat

Minesweeper Game :
winmine

Mouse Properties :
control.exe mouse

Mouse Properties :
main.cpl

Network Connections :
control.exe netconnections

Network Connections :
ncpa.cpl

Network Setup Wizard :
netsetup.cpl

Nview Desktop Manager (if installed) :
nvtuicpl.cpl

Object Packager :
packager

ODBC Data Source Administrator :
odbccp32.cpl

On Screen Keyboard :
osk

Opens AC3 Filter (if installed) :
ac3filter.cpl

Password Properties :
password.cpl

Performance Monitor :
perfmon.msc

Performance Monitor :
perfmon

Phone and Modem Options :
telephon.cpl

Power Configuration :
powercfg.cpl

Printers and Faxes :
control.exe printers

Printers Folder :
printers

Private Character Editor :
eudcedit

Quicktime (If Installed) :
QuickTime.cpl

Regional Settings :
intl.cpl

Registry Editor :
regedit

Registry Editor :
regedit32

Removable Storage :
ntmsmgr.msc

Removable Storage Operator Requests :
ntmsoprq.msc

Resultant Set of Policy :
rsop.msc

Resultant Set of Policy (XP Prof) :
rsop.msc

Scanners and Cameras :
sticpl.cpl

Scheduled Tasks :
control.exe schedtasks

Security Center :
wscui.cpl

Services :
services.msc

Shared Folders :
fsmgmt.msc

Shuts Down Windows :
shutdown

Sounds and Audio :
mmsys.cpl

Spider Solitare Card Game :
spider

SQL Client Configuration :
cliconfg

System Configuration Editor :
sysedit

System Configuration Utility :
msconfig

System File Checker Utility :
sfc

System Properties :
sysdm.cpl

Task Manager :
taskmgr

Telnet Client :
telnet

User Account Management :
nusrmgr.cpl

Utility Manager :
utilman

Windows Firewall :
firewall.cpl

Windows Magnifier :
magnify

Windows Management Infrastructure :
wmimgmt.msc

Windows System Security Tool :
syskey

Windows Update Launches :
wupdmgr

Windows XP Tour Wizard :
tourstart

Wordpad :
write

Share it now...
Share on FacebookTweet about this on TwitterEmail this to someoneShare on Google+

Wireless Network Security in 6 Easy Steps

Connecting your home and office computers with a wireless network sure makes things convenient … BUT the very feature that makes them so popular is also their biggest weakness! Anyone with the knowledge can intercept your signal and gain access to your network if it is not secure. The technicians at computerguyslive.com offer the following six easy steps to wireless security for your home or office.

  1. Change the System ID: Devices come with a default system ID called the SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). It is easy for a hacker to find out what the default identifier is for each manufacturer of wireless equipment so you need to change this to something else. Use something unique- not your name or something easily guessed.
  2. Disable Identifier Broadcasting: Announcing that you have a wireless connection to the world is an invitation for hackers. You already know you have one so you don’t need to broadcast it. Check the manual for your hardware and figure out how to disable broadcasting.
  3. Enable WEP (Wired Equivalent Privacy): WEP encrypts your data so that only the intended recipient is supposed to be able to read it. As with all security measures there are ways around it, but by using encryption you will keep the novice hackers out of your systems. It is best to use 128bit rather than 40bit encryption (it is exponentially harder to crack).
  4. Restrict Unnecessary Traffic: Many wired and wireless routers have built-in firewalls. They are not the most technically advanced firewalls, but they help create one more line of defense. Read the manual for your hardware and learn how to configure your router to only allow incoming or outgoing traffic that you have approved.
  5. Change the Default Administrator Password: This is just good practice for ALL hardware and software. The default passwords are easily obtained and because so many people don’t bother to take the simple step of changing them they are usually what hackers try first. Make sure you change the default password on your wireless router / access point to something that is not easily guessed like your last name.
  6. Patch and Protect Your PC’s: As a last line of defense you should have personal firewall software such as Zone Alarm Pro and anti-virus software installed on your computer. As important as installing the anti-virus software, you must keep it up to date. New viruses are discovered daily and anti-virus software vendors generally release updates at least once a week. You also must keep up to date with patches for known security vulnerabilities. For Microsoft operating systems you can use Windows Update to try and help keep your computer current with patches.

Following these steps will insure that hackers and hitchhikers don’t surf on your wireless network, or more importantly, these steps help block unwanted access into your computer network, and your valuable data.

Copyright 2006 Chris Kaminski

Share it now...
Share on FacebookTweet about this on TwitterEmail this to someoneShare on Google+