Marhaban Ya Ramadhan

Terkadang kerinduan yang begitu besar terkikis oleh waktu dan kesibukan yang terus mengalir tak tertahankan. Tetapi janji pertemuan yang semakin dekat selalu mengingatkan kembali nostalgia yang terpendam di memori, terungkit lagi kenangan-kenangan indah sebelum perpisahan menjurang lebar menumbuhkan kerinduan yang melambungkan angan dan menantang asa, akankah waktu mempertemukan kembali jiwa perindu pada kekasihnya?

Tertatih aku mengejar bulan
Mengais sisa-sisa Ramadhan
Terjatuh terpuruk di keheningan
Ramadhanku telah pergi
Syawal tlah menjelang
Tinggalkan arti tujuh puluh tingkatan
Pahala bagi orang beriman

(suara persaudaraan–album balada sebuah dangau)

Masih kuingat lamat-lamat nasyid itu kulantunkan pada detik-detik akhir Ramadhan penuh berkah, ketika bulan yang begitu dirindukan itu tanpa bisa ditolak pergi meninggalkan. Terasa sekali jiwa ketakwaan yang masih rapuh, saat Ramadhan pergi. Sadar banyak sekali kesempatan terlewatkan tanpa pencerahan. Ingin Ramadhan tetap menjadi hari-hari yang panjang.

Nun di sana
Masih ada jalan putih
Peluang kebaikan
Sebulan di Bulan Ramadhan…
(Now See Heart)

“Allahumma barik lana fi Rajab wa Sya’ban wabalighna Ramadhan”

Happy B’Day 19 th My “Lovely Girl”

Sebelumnya maaf buat chayangku klo ngasih kadonya telat… emang sih nggak bisa ngasih kado apa-apa, tapi mudah-mudahan adek seneng… 🙂

Satu hal yang perlu adek inget…!!! dengan bertambahnya usia, berarti semakin berkurang jatah usia adek, untuk itu saat ini sudah waktunya buat adek menjadi sosok yang lebih dewasa, lebih bisa menyelesaikan masalah sendiri, lebih bisa memilih mana yang benar mana yang salah, bukan lagi waktunya manja-manjaan (apalagi ma ibu 🙂 ) masa dah 19 tahun masih dikit-dikit Ibu…. :p, bukan lagi waktunya main-main, hura-hura… dll.

Buat adek: “Semoga panjang umur, tambah pinter, tambah dewasa, dan tambah berbakti ma orang tua, diberikan rezeki yang banyak, yg halal dan berkah. Amiien…!!!”

“I Love You & Happy Bithday”

I hope you will be happy with the life that has the Lord gave to you (bener nggak ya bhs inggrisnya…hehehehe..)

Important Linux Directories

There are many variants of Linux used in different computer systems today. Luckily, most Linux developers employ a common naming and utilization scheme that makes different variants of Linux easy to use and maintain. This article will discuss some important and common directories in many popular Linux distributions.

  • /home
  • Each user of a Linux system is assigned a special directory, called “home” direectory, that represents their private space on the system. For example, if a user of the system is called tom, the home directory of tom will be /home/tom. Tom has the right to create any files and directories under his home directory. This is also the default location when tom logs into the system.

  • /root
  • This is the home directory of the adminstrator or super user.

  • /tmp
  • In addition to personal hard disk space in the home directories, users are also given special access to shared temporary space in the /tmp directory. Linux systems often implement quotas on user accounts to prevent anyone from using too much disk space. The /tmp directory allows all users access to additional space to meet short term needs without charging the space against their quota. All files placed in this directory are deleted automatically after a few days.

  • /etc
  • This directory stores all the configuration files needed for the operating system. For example, startup configuration scripts are found in /etc/rc.d and network configuration scripts are found in /etc/sysconfig. Normal users cannot modify the files in /etc.

  • /bin and /usr/bin
  • Most system commands are stored as binary files only in machine readable format. Commands appropriate for use by ordinary users are either placed in the /bin or /usr/bin directory. Core commands like rm, mv, ls, cd go into /bin while supplementary utilities like compilers, firefox browser and openoffice go into /usr/bin.

  • /sbin and /usr/sbin
  • Like /bin and /usr/bin, /sbin and /usr/sbin store commands to be used only by the super user, ie root user. These include commands for attaching and removing hardware, starting and stopping the system…etc.

  • /var
  • This directory stores all the frequently changed files in the system. For example, incoming, outgoing mails, system logs, websites, ftp file archives…etc. very


There are only a few directories to know to really start using Linux. If you understand what the main directories are, then exploring the subdirectories becomes much easier. If you are lost while navigating the directories, always use “cd /” to return back the the root, “cd ..” to go up one level or use “pwd” to find out where you are. Another command “which xxx” tells you where certain commands are located

NTFS with read/write support using the NEW ntfs-3g (Ubuntu)

Warning : ntfs-3g is still in beta. You should not use it on production machines.
If you can, it’s always better to prefer ext3 to share file between windows & linux using

Introduction :

Support of NTFS partition for linux has always been a problem. Projects exist since many years but was always experimental, and was claim to be not safe. But here come a new project ntfs-3g which claim to be capable for unlimited file creation and deletion.

The status of the different projects:

  1. The kernel’s NTFS driver exist since 2001, but write support is experimental and could lead to crash.
  2. The idea was then, because the driver wasn’t safe enough, to put it in an higher level (to be simple, kernel is the low level, and the user space is in high level (depend on the lower level)) in that way, we can easily stop it if he is doing something wrong.
  3. It’s the ntfsmount idea (part of ntfsprogs, in ubuntu repo). write support is still a pain (succes in 50% of the case) but because it use fuse, it reside in the user space, and error no more lead to a crash and leat the disk safe.
  4. Paragon also create an NTFS driver, but non-free.
    Captive NTFS come after with an other good idea, emulate the original Microsoft Windows ntfs.sys driver using wine and doing that in the usespace with FUSE. It lead to a 100% compatible driver but the wrapper itself is known to have some bug, and is really really slow.
  5. And here we are with the last project, ntfs-3g, which is base on ntfsmount (use also fuse) but with lots of improvement in functionality, quality, performance and reliability. This project started by Szakacsits Szabolcs, member of the linux-ntfs team, is actually in beta.

For more information:

But now you probably want to test this great new feature. So let’s start.
(note : a frensh traduction is available here :

Read More Installation Howto…

List Command for XP, Home; Running with Command Prompt

Command2 untuk Windows XP Pro dan Windows XP Home yg bisa dijalanlan langsung dari menu Command Prompt

Accessibility Controls :

Add Hardware Wizard :

Add/Remove Programs :

Administrative Tools :
control.exe admintools

Automatic Updates :

Bluetooth Transfer Wizard :

Calculator :

Certificate Manager :

Character Map :

Check Disk Utility :

Clipboard Viewer :

Command Prompt :

Component Services :

Computer Management :

Date and Time Properties :

DDE Shares :

Device Manager :

Direct X Control Panel (if installed) :

Direct X Troubleshooter :

Disk Cleanup Utility :

Disk Defragment :

Disk Management :

Disk Partition Manager :

Display Properties :
control.exe desktop

Display Properties :

Display Properties (w/Appearance Tab Preselected) :
control.exe color

Dr. Watson System Troubleshooting Utility :

Driver Verifier Utility :

Event Viewer :

File Signature Verification Tool :

Findfast :

Folders Properties :
control.exe folders

Fonts :
control.exe fonts

Fonts Folder :

Free Cell Card Game :

Game Controllers :

Group Policy Editor (XP Prof) :

Hearts Card Game :

Iexpress Wizard :

Indexing Service :

Internet Properties :

Java Control Panel (if installed) :

Java Control Panel (if installed) :

Keyboard Properties :
control.exe keyboard

Local Security Settings :

Local Users and Groups :

Logs You Out Of Windows :

Mcft Chat :

Minesweeper Game :

Mouse Properties :
control.exe mouse

Mouse Properties :

Network Connections :
control.exe netconnections

Network Connections :

Network Setup Wizard :

Nview Desktop Manager (if installed) :

Object Packager :

ODBC Data Source Administrator :

On Screen Keyboard :

Opens AC3 Filter (if installed) :

Password Properties :

Performance Monitor :

Performance Monitor :

Phone and Modem Options :

Power Configuration :

Printers and Faxes :
control.exe printers

Printers Folder :

Private Character Editor :

Quicktime (If Installed) :

Regional Settings :

Registry Editor :

Registry Editor :

Removable Storage :

Removable Storage Operator Requests :

Resultant Set of Policy :

Resultant Set of Policy (XP Prof) :

Scanners and Cameras :

Scheduled Tasks :
control.exe schedtasks

Security Center :

Services :

Shared Folders :

Shuts Down Windows :

Sounds and Audio :

Spider Solitare Card Game :

SQL Client Configuration :

System Configuration Editor :

System Configuration Utility :

System File Checker Utility :

System Properties :

Task Manager :

Telnet Client :

User Account Management :

Utility Manager :

Windows Firewall :

Windows Magnifier :

Windows Management Infrastructure :

Windows System Security Tool :

Windows Update Launches :

Windows XP Tour Wizard :

Wordpad :

Wireless Network Security in 6 Easy Steps

Connecting your home and office computers with a wireless network sure makes things convenient … BUT the very feature that makes them so popular is also their biggest weakness! Anyone with the knowledge can intercept your signal and gain access to your network if it is not secure. The technicians at offer the following six easy steps to wireless security for your home or office.

  1. Change the System ID: Devices come with a default system ID called the SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). It is easy for a hacker to find out what the default identifier is for each manufacturer of wireless equipment so you need to change this to something else. Use something unique- not your name or something easily guessed.
  2. Disable Identifier Broadcasting: Announcing that you have a wireless connection to the world is an invitation for hackers. You already know you have one so you don’t need to broadcast it. Check the manual for your hardware and figure out how to disable broadcasting.
  3. Enable WEP (Wired Equivalent Privacy): WEP encrypts your data so that only the intended recipient is supposed to be able to read it. As with all security measures there are ways around it, but by using encryption you will keep the novice hackers out of your systems. It is best to use 128bit rather than 40bit encryption (it is exponentially harder to crack).
  4. Restrict Unnecessary Traffic: Many wired and wireless routers have built-in firewalls. They are not the most technically advanced firewalls, but they help create one more line of defense. Read the manual for your hardware and learn how to configure your router to only allow incoming or outgoing traffic that you have approved.
  5. Change the Default Administrator Password: This is just good practice for ALL hardware and software. The default passwords are easily obtained and because so many people don’t bother to take the simple step of changing them they are usually what hackers try first. Make sure you change the default password on your wireless router / access point to something that is not easily guessed like your last name.
  6. Patch and Protect Your PC’s: As a last line of defense you should have personal firewall software such as Zone Alarm Pro and anti-virus software installed on your computer. As important as installing the anti-virus software, you must keep it up to date. New viruses are discovered daily and anti-virus software vendors generally release updates at least once a week. You also must keep up to date with patches for known security vulnerabilities. For Microsoft operating systems you can use Windows Update to try and help keep your computer current with patches.

Following these steps will insure that hackers and hitchhikers don’t surf on your wireless network, or more importantly, these steps help block unwanted access into your computer network, and your valuable data.

Copyright 2006 Chris Kaminski