Minggu, 17 Januari 2010

Java - Programming Language

          Java is a programming language-based computer to Object Oriented Programming is simple and does not depend on a variety of operating system platforms. Java was created after the C + + and designed such that the small size, modest, and portable (moveable between various platforms and operating systems). The program generated by the Java language can be applets (small application that works on the web browser) or a standalone application that runs with Java Interpreter program. This language developed by Sun Microsystems Corporation. and has many advantages, such as a simple, object oriented, supports the use of distributed, both in the network or the Internet, but it also is open system.Tingkat performance of the resulting system is optimal. Java Programming has been developed for the development of secure web sites and interactive. Besides, by using this programming language, we can include a variety of application programs animation, multimedia, and databases to the Web site. That is why Java became very popular and widely used by system developers and Web Developer.

source:www.beritanet.com

History Hacker and Cracker

Hackers appeared in the early 1960s among the members of student organizations Tech Model Railroad Club in Artifisial Intelligence Laboratory Massachusetts Institute of Technology (MIT). Student group is one of the pioneers of the development of computer technology and they operate with a number of mainframe computers. The word hacker first appeared with a positive sense to refer to a member who has expertise in the field of computers and able to make computer programs better than what has been designed together. Then in 1983, growing hacker analogy to refer to someone who has an obsession to understand and master the computer system. The problem, in that year for the first time the FBI arrested a criminal group of computers The 414s are based in Milwaukee USA. 414 is their local area code. The group that came to be called a hacker was convicted of burglary 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators are getting immunity for TESTIMONIALS, while the other 5 players get probation sentence.

Then, further up other groups to mention themselves hackers, but it's not. They are (especially the men) who have the satisfaction of breaking through computer and phone-jockey (phreaking). True hackers call these people 'crackers' and do not like to hang out with them. True hackers crackers as people look lazy, not
responsible, and not too bright. Real hackers do not agree to say that with a person through the security has become a hacker.

The hackers meeting each year which is held once every mid-July in Las Vegas. A meeting of the world's largest hacker is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.

Understanding Hacker and Cracker

1. Hacker

Hacker is the name for those who provide a useful contribution to the computer network, making a small program and share it with people on the Internet. For example: digigumi (Digital Group) is a group that specializes in the field of games and computers. This Digigumi hexadecimal engineering techniques to change the text contained in the game. For example, the game Chrono Trigger English language can be converted into Indonesian. Therefore, the status is Digigumi hackers, but not as a destroyer. Hacker here means, seek, learn and change things for hobbies and development by following the prescribed legal by game developers. Hackers usually do infiltration-infiltration with the intent to satisfy the knowledge and techniques. Average - the average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction outsiders "crackers", the network testing of possible aperture into an opportunity of a cracker mengobrak - going through the network, for example: insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work to test the security systems of their clients.

2. Cracker

Cracker is a term for those who go into someone else's system and crackers more destructive, usually on a computer network, bypassing passwords or licenses computer programs, intentionally against computer security, to deface (changing the web home page) belonged to someone else even to delete data to other people, steal data and generally do cracking for their own benefit, malice, or for any other reason because there are challenges. Some of the piercing done to show the security weaknesses of the system.

source:wartawarga.gunadharma.ac.id

Graphic Design

Graphic design is a form of visual communication using images to convey information or messages as effectively as possible. In graphic design, text, images are also considered as an abstraction of symbols that can be sounded. Graphic design is applied in communication design and fine art. Like other types of design, graphic design can refer to the process of manufacturing, design methods, the product (design), or any discipline that is used (design).
Graphic design art include cognitive abilities and visual skills, including typography, illustration, photography, image processing, and layout.

Limitation Media

Graphic design was originally applied to static media, such as books, magazines, and brochures. In addition, in line with the times, graphic design is also applied in the electronic media, which are often referred to as interactive design or multimedia design.
One-dimensional boundary has changed over the development of thinking about design. Graphic design can be applied to a design environment that includes the processing space.

Principles and design elements

source:www.google.com

DEFINITIONS AND TYPES OF COMPUTER SOFTWARE

     Most people now divides the computer into two parts. The first part is the hardware that is a physical device in the computer. And the second part is the computer software, hardware informing them about what to do and how to do it. If the computer is likened to that of living things, then the hardware is the body such as eyes for seeing, lungs for breathing and other body parts, while the software or the software equivalent of a genius, such as image processing is seen eyes, ordered his hands to lift objects, and forcing the body to breathe using lungs.

Computer Hardware, became part of the machine, and only understand two basic concepts of light (on) and off (off), the concept of on and off is called binary. Computer software developed for the binary can be a way to tell the computer hardware in doing his job. Computer software translates and directs computer users to understand about what can be done by computer hardware.


Most of the computer software created by programmers using a programming language. Programmers write the instructions in programming languages like the language used by people at large in the conversations. The commands are called "Source Code". Other computer programs called compilers used in the source code, and then change the command to the language that can be understood by computers. And the result is called the program executable (EXE).


Computer software is divided into two main categories of software systems and software applications. System programming software that can allow the hardware running properly. Software applications provide the program that allows the user to do something besides run the hardware.


There are also several types of computer software, including:


Software Games - Type software included in the category of entertainment or entertainment, this software has a variety of types. These kinds such as MMOs (Massive Multiplayer Online games), first-person shooters, action games, Roleplaying games, and gaming adventure.


Software Driver - Program in allowing computers to be able to interact with additional hardware devices such as printers, scanners, and video cards.


Software Education - unlike the previous program, this educational software can teach anything from the computer, perform related activities such as typing or various other types of education such as chemistry.


Media player and other media software development - software designed to be able to play or editing digital media like music or video files.


Software Productivity - this type of software allows users to be more productive both in running a business or running other productive activities. Examples of this software is the letter processing software (Ms. Words), a database manager software, presentation software and other software.


Operating system - software that is the source of the other software that can allow other software to run. Examples of the software operating system is Windows Vista, Mac OS X and Linux

source:www.AsianBrain.com

Hardware

  Hardware, is one element of a computer system, a tool that can be seen and touched by humans directly, which supports the process of computerization. In the Indonesian language is called hardware. Is a tool that we can see and we can physically touch, such as the device input devices, device processing, and output devices. This equipment is generally quite sophisticated. He can work on existing orders to him, which is also called the instruction set. With the commands understood by the machine, then the command to perform various activities that the machine understood by the machine so the machine can work on the command structure obtained by it.

source:www.total.or.id

Computer Networking

Computer network is a system consisting of computers and other network devices that work together to achieve a common goal. The purpose of the computer network are:
Share resources: for example, shared use of printers, CPUs, memory, hard drive
Communication: eg electronic mail, instant messaging, chat
Access to information: for example web browsing

In order to achieve the same goal, each part of the computer network and provide service request (service). Party requesting the service is called a client (client) and that provide services called the servant (the server). This architecture is called client-server systems, and is used in almost all computer network applications.

Classification Based on the scale:
Personal Area Network (PAN)
Campus Area Network (CAN)
Local Area Network (LAN): a computer network that connects a computer to another computer with a limited distance.
Metropolitant Area Network (MAN): principle the same as LAN, only the larger distance, ie 10-50 km.
Wide Area Network (WAN): the distance between cities, countries, and continents. This is the same with the Internet.
Global Area Network (GAN)

Based on the function: Basically every computer network is functioning as a client and server. But there is a network that has a dedicated computer as a server and the other as a client. There is also a computer that has no special function as a server only. Therefore, based on their function there are two types of computer networks:
Client-server

Network is the computer with a dedicated computer as a server. A service / service can be provided by a computer or more. An example is a domain like www.detik.com lots served by the web server computer. Or it could be a lot of service / services provided by a single computer. Examples are jtk.polban.ac.id server that is a multi-service computer with the mail servers, web servers, file servers, database servers and others.
Peer-to-peer

Namely computer networks where each host can be a server and also a client simultaneously. For example in the file sharing between computers on the Windows Network Neighborhood Network have 5 computers (we give the name of A, B, C, D and E) that provide access rights to the files they have. At one time A to access the file share from B named data_nilai.xls and also gives access to the C. soal_uas.doc files When accessing a file from B then A serves as a client and as a give file access to C then A serves as a server. Both functions were performed by the same A network like this is called peer to peer.

Based on network topology, computer networks can be divided into:
Bus topology
Star topology
Ring topology
Mesh topology
Topology tree
Linear topology

Based on the criteria, the computer network can be divided into 4, namely:

1. Based on the distribution of sources of information / data

- This network centralized network consisting of Client and server computers which Client computer that serves as an intermediary to access sources of information / data derived from a single server computer

- Network is a combination of several distributed centralized network so that there are several computer servers that are interconnected with the Client to form a specific network system.


2. Based on geographic coverage can be divided into:

- Network LAN is a network that connects 2 computers or more in coverage such as laboratories, offices, and in 1 cafe.

- MAN network is a network that includes a big city and its local area. Examples of local telephone networks, cellular telephone systems, as well as some ISPs relay network Internet.

- Network WAN is a network with coverage throughout the world. PT network example. Telkom, PT. Indosat, as well as GSM networks such as Cellular Satelindo, Telkomsel, and much more.


3. Based on the roles and relationships of each computer in the data processing.

- Network Client-Server In this network there are 1 or more server computers and client computers. Computers will be computers or servers to client computers and altered through the protocol software on the network. Client computer as an intermediary to be able to access data on a server computer and the server computer to provide information needed by the client computer.

-Network Peer-to-peer in this network there are no client computer or server computer because all computers can make sending and receiving information so that all computers function as clients as well as a server.


4. Based on the data transmission media

- Wired Network (Wired Network) In this network, to connect one computer to another computer in the form of necessary liaison network cable. Function in the network cable to send information in the form of electrical signals between the network computer.

- Wireless Network (Wireless Network) is a network with the medium of electromagnetic waves. In this network does not need a cable to connect between computers that use electromagnetic waves to send signals between the computer information network

source: id.wikipedia.org

Understanding Computers

     Computers are tools used to process the data according to the procedures that have been formulated. Computer word originally used to describe the work people do arithmetic calculations, with or without tools, but the meaning of this word and then transferred to the machine itself. Their origins, processing information almost exclusively related to arithmetical problems, but modern computers are used for many tasks unrelated to mathematics.
In such a definition is a tool like a slide rule, mechanical calculator types ranging from abacus, and so on, until all contemporary electronic computers. Better terms suitable for a broad sense such as "computer" is "that process information" or "information-processing system."
According to the history of computers, computer generation is divided into 5 parts.


source: id.wikipedia.org