Nov 24, 2009
SOFTWARE LICENSE
What is a license?
Licenses closely related to Copyright.
Licenses are granting permission on the use of something (in this case the computer software) provided by the owner or holder of copyright on such things. Licensing background, of course depending on the respective Copyright holder.
Citing the Law of the Republic of Indonesia Copyright, Article 2, paragraph 2 states as follows:
"Creator and or Copyright Holder of cinematographic works and computer programs have the right to give permission or prohibit another person without his consent to lease the creation of commercial interests ..."
SOME TYPE OF LICENSE IS BETWEEN OTHER
COMMERCIAL LICENSE.
Commercial licensing is a type of license is commonly encountered in the software such as Microsoft with Windows and its Office, Lotus, Oracle and others. Software is created with this license, it made for commercial purposes. So that users who want to use it to purchase or obtain permission from the use of the copyright holder. In the implementation of UUHC this license is very important in protecting the rights of the owner.
TRIAL SOFTWARE LICENSE
Trial Software License is a kind of license is commonly encountered in the software for the purposes of sebua software demo prior to launch to the public. This license allows users to use, or copying mencopy free software. But because they are demos, so often the software with this license does not have complete facilities and functions of commercial versions. Moreover, the demo version of software is usually limited by the particular active period. Examples of such programs as Adobe Photoshop CS Trial Version for 30 days.
Non-Commercial Use License
Non-Commercial Use license is usually reserved for the education or certain foundation in the social sphere. Non-commercial nature, usually free but with limitations on use tertentu.Contoh software is licensed Star Office program that can run under the Linux operating system and Windows as well....
License Shareware
Shareware license allows users to use, copy or duplicate without permission of copyright holders. But unlike Trial Software, the license is not restricted by time limits and have a full feature. Licenses of this type usually found in small software companies. Some examples of small software that has this license such as Winzip, Paint Shop Pro, ACDSee and so forth.
License Freeware
Freeware license is usually found in the software that is supporting or providing additional facilities. Examples include software plug-ins are usually attached to the main software like Eye Candy software embedded in Adobe Photoshop or a program to convert a favorite test-bookmark-IE to Netscape.
Royalty-Free License Binaries
The software has a license License Royalty-Free Binaries similar to the freeware license, only the product being offered is a library that serves to complement the software already exists, not a software that stands alone....
Open Source licenses.
Open souce license is a license that frees users to run, copy, distribute, study, change and improve the software. Various types of open source licenses developed in accordance with the requirements such as the GNU / GPL, The FreeBSD, the MPL. While the types of software using this license as Linux, sendmail, Apache, and FreeBSD.
With the emergence of the license system will make the Open Source as an alternative to the development of computer programs that have the force of law itself.
Read more "SOFTWARE LICENSE..."
Licenses closely related to Copyright.
Licenses are granting permission on the use of something (in this case the computer software) provided by the owner or holder of copyright on such things. Licensing background, of course depending on the respective Copyright holder.
Citing the Law of the Republic of Indonesia Copyright, Article 2, paragraph 2 states as follows:
"Creator and or Copyright Holder of cinematographic works and computer programs have the right to give permission or prohibit another person without his consent to lease the creation of commercial interests ..."
SOME TYPE OF LICENSE IS BETWEEN OTHER
COMMERCIAL LICENSE.
Commercial licensing is a type of license is commonly encountered in the software such as Microsoft with Windows and its Office, Lotus, Oracle and others. Software is created with this license, it made for commercial purposes. So that users who want to use it to purchase or obtain permission from the use of the copyright holder. In the implementation of UUHC this license is very important in protecting the rights of the owner.
TRIAL SOFTWARE LICENSE
Trial Software License is a kind of license is commonly encountered in the software for the purposes of sebua software demo prior to launch to the public. This license allows users to use, or copying mencopy free software. But because they are demos, so often the software with this license does not have complete facilities and functions of commercial versions. Moreover, the demo version of software is usually limited by the particular active period. Examples of such programs as Adobe Photoshop CS Trial Version for 30 days.
Non-Commercial Use License
Non-Commercial Use license is usually reserved for the education or certain foundation in the social sphere. Non-commercial nature, usually free but with limitations on use tertentu.Contoh software is licensed Star Office program that can run under the Linux operating system and Windows as well....
License Shareware
Shareware license allows users to use, copy or duplicate without permission of copyright holders. But unlike Trial Software, the license is not restricted by time limits and have a full feature. Licenses of this type usually found in small software companies. Some examples of small software that has this license such as Winzip, Paint Shop Pro, ACDSee and so forth.
License Freeware
Freeware license is usually found in the software that is supporting or providing additional facilities. Examples include software plug-ins are usually attached to the main software like Eye Candy software embedded in Adobe Photoshop or a program to convert a favorite test-bookmark-IE to Netscape.
Royalty-Free License Binaries
The software has a license License Royalty-Free Binaries similar to the freeware license, only the product being offered is a library that serves to complement the software already exists, not a software that stands alone....
Open Source licenses.
Open souce license is a license that frees users to run, copy, distribute, study, change and improve the software. Various types of open source licenses developed in accordance with the requirements such as the GNU / GPL, The FreeBSD, the MPL. While the types of software using this license as Linux, sendmail, Apache, and FreeBSD.
With the emergence of the license system will make the Open Source as an alternative to the development of computer programs that have the force of law itself.
Read more "SOFTWARE LICENSE..."
Labels:
software
Nov 21, 2009
THE ENTREPRENEUR (23)
When we use the slogan "The People College tie", our college is very small and very simple facilities are becoming known. Long ago when I introduced that I worked in AMIKOM Yogyakarta, so people do not know at all, but when I memperkenlakan myself that I am from AMIKOM that "The College Place tie". The person is then "Oh yes I know". Therefore, we have a simple word that can be entered in the customer's mind is very important. At first he said "The College Place tie" There is a play on the "Place Coolie tie" I just smiled course, is in fact the building is ugly and a college student on a student AMIKOM not accepted everywhere. I even had a car with other people who do not know I was discussing the word "place tie College People" which they said was a strange word and funny, but embedded in their minds. Some of my seniors told to immediately remove or alter other words, because the word is synonymous with the word salesman. Many people think a salesman is a lowly employee, who sell to and fro, into one office and one office and lainmasuk house to another house down the street, carrying merchandise to wear a tie. Sometimes they ask for time and selling a way to force. Such was the impression of a salesman in the eyes of society. Nevertheless such salesman is a salesman who was still a junior. That's the job I've ever tekuni many years and tried to do for the time and sold with no force, but I still get the sap. At one point I stop with the folder that contains the brochures into the house in one housing. Suddenly the door shut, which indicates their homes should not be touched me. Then I came out of the yard and the house next door to the house, not least with the first incident, which closed the window dressing out loud so I left the house. Possible homeowners have bitter experience of the salesman, who still juniors. That is a very valuable lesson and the lesson I have never forgotten to this day. I always remember the event, so I learned to respect the salesman, the other lowlife, so be a more sensitive and more empathetic to others.
I use the word "place tie College People", just want to be known that we were different. We only intend to tie the student has the confidence, not insecure. If they wear a tie for a minimum of three years, we hope that future students when working in the office was used to wearing a tie, influence behavior and can be a person who works professionally. We symbolize the tie as a symbol of professionalism. We must find the word as our corporate identity. We are familiar with the metaphor that "a picture is worth a thousand words", whereas our purposes, must find that "words are a thousand pictures". If it can not be the first company, the company became the first category. If Itupun we can not do then find something simple, unique and attract attention is "the thousand pictures" or in other words be the first company in the memory.
When I was with friends Yogyakarta was founded AMIKOM I use different strategies with others. We were very aware that we are a small college, Academy-shaped with a very simple building and we have not even pay the rent, because they do not have the money. With limited money and simple facilities, then we can only do limited marketing and accept students from the remnants of other universities that are not accepted. Prospective students who feel like a failure from other places and go to college to where we are forced to, because there is no other choice. When we receive all the register at our college. Input prospective students as it forces us to turn the brain to educate them well so that they become successful. In addition, we also have not experienced and inexperienced teachers to educate them. We have little experience of educating students in the Institute of Vocational education who show their skills, rather than conceptual. Our days to think hard to try to provide education appropriate to their abilities.
Dhuhur completed, in front of small mosque, I sat daydreaming, thinking hard to find the best way to educate students whose capacity is limited, and feel they have failed, occurred suddenly an inspiration to educate students in different ways. Usually in universities, students educated with outstanding intellectual abilities, because it has a lecturer who is very good intellectual ability. Instead we were with input from hand to mouth can not be educated in a way like the other universities. We can not educate them with good knowledge, because they are students with the ability to capture the knowledge of a mediocre and inexperienced teachers, then we can not educate in the same way the college was good. We try to educate them to highlight the mental attitude first, then hone their skills and then polished a little knowledge. The first stage, we just want them to no longer feel like a failure, despair, and we hope they bounce back and become a self-confident students. To achieve this purpose we try to educate them by using the Achievement Motivation Training perfected, we call it the Super Superior Training. The training model incorporates Super Camp from Bobby De Potter, Achievement Motivation Training and Training Spiritual Emotional intelligence or intelligence.
The results of this training we hope these students have self-awareness, knowing who she was, able to control emotions, motivated to reach his goals, have empathy and have social skills and have a high spiritual intelligence. Two of the most important thing in education is students have a positive mental attitude and confidence. To maintain a positive mental attitude and confidence is, when college students are required to wear a tie, eventually led to "The College Place tie". My harsh language so that they rise from despair and failure "Stupid is not nothing but confident" that makes you be successful in the future. Strategy using a memorable word, namely "The College Place tie" it turns out we just knew that it was a positioning strateg Read more "THE ENTREPRENEUR (23)..."
I use the word "place tie College People", just want to be known that we were different. We only intend to tie the student has the confidence, not insecure. If they wear a tie for a minimum of three years, we hope that future students when working in the office was used to wearing a tie, influence behavior and can be a person who works professionally. We symbolize the tie as a symbol of professionalism. We must find the word as our corporate identity. We are familiar with the metaphor that "a picture is worth a thousand words", whereas our purposes, must find that "words are a thousand pictures". If it can not be the first company, the company became the first category. If Itupun we can not do then find something simple, unique and attract attention is "the thousand pictures" or in other words be the first company in the memory.
When I was with friends Yogyakarta was founded AMIKOM I use different strategies with others. We were very aware that we are a small college, Academy-shaped with a very simple building and we have not even pay the rent, because they do not have the money. With limited money and simple facilities, then we can only do limited marketing and accept students from the remnants of other universities that are not accepted. Prospective students who feel like a failure from other places and go to college to where we are forced to, because there is no other choice. When we receive all the register at our college. Input prospective students as it forces us to turn the brain to educate them well so that they become successful. In addition, we also have not experienced and inexperienced teachers to educate them. We have little experience of educating students in the Institute of Vocational education who show their skills, rather than conceptual. Our days to think hard to try to provide education appropriate to their abilities.
Dhuhur completed, in front of small mosque, I sat daydreaming, thinking hard to find the best way to educate students whose capacity is limited, and feel they have failed, occurred suddenly an inspiration to educate students in different ways. Usually in universities, students educated with outstanding intellectual abilities, because it has a lecturer who is very good intellectual ability. Instead we were with input from hand to mouth can not be educated in a way like the other universities. We can not educate them with good knowledge, because they are students with the ability to capture the knowledge of a mediocre and inexperienced teachers, then we can not educate in the same way the college was good. We try to educate them to highlight the mental attitude first, then hone their skills and then polished a little knowledge. The first stage, we just want them to no longer feel like a failure, despair, and we hope they bounce back and become a self-confident students. To achieve this purpose we try to educate them by using the Achievement Motivation Training perfected, we call it the Super Superior Training. The training model incorporates Super Camp from Bobby De Potter, Achievement Motivation Training and Training Spiritual Emotional intelligence or intelligence.
The results of this training we hope these students have self-awareness, knowing who she was, able to control emotions, motivated to reach his goals, have empathy and have social skills and have a high spiritual intelligence. Two of the most important thing in education is students have a positive mental attitude and confidence. To maintain a positive mental attitude and confidence is, when college students are required to wear a tie, eventually led to "The College Place tie". My harsh language so that they rise from despair and failure "Stupid is not nothing but confident" that makes you be successful in the future. Strategy using a memorable word, namely "The College Place tie" it turns out we just knew that it was a positioning strateg Read more "THE ENTREPRENEUR (23)..."
Labels:
enterprenuership
THE ENTREPRENEUR (22)
When I was with friends Yogyakarta was founded AMIKOM I use different strategies with others. We were very aware that we are a small college, Academy-shaped with a very simple building and we have not even pay the rent, because they do not have the money. With limited money and simple facilities, then we can only do limited marketing and accept students from the remnants of other universities that are not accepted. Prospective students who feel like a failure from other places and go to college to where we are forced to, because there is no other choice. When we receive all the register at our college. Input prospective students as it forces us to turn the brain to educate them well so that they become successful. In addition, we also have not experienced and inexperienced teachers to educate them. We have little experience of educating students in the Institute of Vocational education who show their skills, rather than conceptual. Our days to think hard to try to provide education appropriate to their abilities.
Dhuhur completed, in front of small mosque, I sat daydreaming, thinking hard to find the best way to educate students whose capacity is limited, and feel they have failed, occurred suddenly an inspiration to educate students in different ways. Usually in universities, students educated with outstanding intellectual abilities, because it has a lecturer who is very good intellectual ability. Instead we were with input from hand to mouth can not be educated in a way like the other universities. We can not educate them with good knowledge, because they are students with the ability to capture the knowledge of a mediocre and inexperienced teachers, then we can not educate in the same way the college was good. We try to educate them to highlight the mental attitude first, then hone their skills and then polished a little knowledge. The first stage, we just want them to no longer feel like a failure, despair, and we hope they bounce back and become a self-confident students. To achieve this purpose we try to educate them by using the Achievement Motivation Training perfected, we call it the Super Superior Training. The training model incorporates Super Camp from Bobby De Potter, Achievement Motivation Training and Training Spiritual Emotional intelligence or intelligence.
The results of this training we hope these students have self-awareness, knowing who she was, able to control emotions, motivated to reach his goals, have empathy and have social skills and have a high spiritual intelligence. Two of the most important thing in education is students have a positive mental attitude and confidence. To maintain a positive mental attitude and confidence is, when college students are required to wear a tie, eventually led to "The College Place tie". My harsh language so that they rise from despair and failure "Stupid is not nothing but confident" that makes you be successful in the future. Strategy using a memorable word, namely "The College Place tie" it turns out we just knew that it was a positioning strategy. Read more "THE ENTREPRENEUR (22)..."
Dhuhur completed, in front of small mosque, I sat daydreaming, thinking hard to find the best way to educate students whose capacity is limited, and feel they have failed, occurred suddenly an inspiration to educate students in different ways. Usually in universities, students educated with outstanding intellectual abilities, because it has a lecturer who is very good intellectual ability. Instead we were with input from hand to mouth can not be educated in a way like the other universities. We can not educate them with good knowledge, because they are students with the ability to capture the knowledge of a mediocre and inexperienced teachers, then we can not educate in the same way the college was good. We try to educate them to highlight the mental attitude first, then hone their skills and then polished a little knowledge. The first stage, we just want them to no longer feel like a failure, despair, and we hope they bounce back and become a self-confident students. To achieve this purpose we try to educate them by using the Achievement Motivation Training perfected, we call it the Super Superior Training. The training model incorporates Super Camp from Bobby De Potter, Achievement Motivation Training and Training Spiritual Emotional intelligence or intelligence.
The results of this training we hope these students have self-awareness, knowing who she was, able to control emotions, motivated to reach his goals, have empathy and have social skills and have a high spiritual intelligence. Two of the most important thing in education is students have a positive mental attitude and confidence. To maintain a positive mental attitude and confidence is, when college students are required to wear a tie, eventually led to "The College Place tie". My harsh language so that they rise from despair and failure "Stupid is not nothing but confident" that makes you be successful in the future. Strategy using a memorable word, namely "The College Place tie" it turns out we just knew that it was a positioning strategy. Read more "THE ENTREPRENEUR (22)..."
Labels:
enterprenuership
THE ENTREPRENEUR (21)
Finally proved, after the test in State College, students can get in close to 90%. Incredibly, because students were already clever-clever, derived from Favorites high school. After that we say "CONGRATULATIONS" to our students received at the State University announced in The Daily People's Sovereignty full page. After that as if little guidance tests such as "explode", students in the following years enormous. Strategies to communicate in the Daily People's Sovereignty, which I now know is called the Strategic Positioning, the strategy has put the product a good position in the minds of consumers.
Positioning concepts as the basis of the marketing strategy put forward by Jack Trout and Ries All the early 1970s and became a popular base of the development of creative strategies. The general idea of positioning is to place a product to get a good position in the minds of consumers. Brand that already has an established position in the minds of would be the impact on the consumer need a solution. Normally oriented market leader.
Company a competitive advantage, in fact are the hallmarks of communication. So the problem is a problem in competing in the communication. Positioning strategy is in fact the communication strategy. Advertising is a form of communication, from the standpoint of recipients, built in a low appreciation. If you succeed in the advertising, you're likely to succeed in business, religion, political or lainyang activity requires mass communication.
Positioning is a concept that changed the authenticity of the ad, a simple concept that makes people face difficulties in understanding its power. Positioning starts with a product, goods, services, companies, or people. But positioning is not something you do with the product. Positioning is something you do to prospective customers mind, which is placing the product on the prospect's mind. So a mistake when calling this concept as "product positioning". Just as you do something about the physical product. Was also wrong if the positioning does not involve a change. But these changes are changes to the name, price and packaging of the product rather than as a whole. Basically there are changes that will be performances with the aim of ensuring sustu more valuable position in the minds of potential customers.
Merupakah also positioning the first body of thought that are designed to hold a hearing problem in our society who flooded information. The only defense a person has in society is a very simple idea. So the best approach to be taken in masysrakat someone is a simple message. In communications, as well as in architecture, less is more. You have to sharpen the message to be entered in the consumer's mind. Even Jack Trout and Al Ries said that the positioning is not done on the product, but that worked against the consumer's mind. Primagama use the word "Leadership In Achievement" as positioning. Read more "THE ENTREPRENEUR (21)..."
Positioning concepts as the basis of the marketing strategy put forward by Jack Trout and Ries All the early 1970s and became a popular base of the development of creative strategies. The general idea of positioning is to place a product to get a good position in the minds of consumers. Brand that already has an established position in the minds of would be the impact on the consumer need a solution. Normally oriented market leader.
Company a competitive advantage, in fact are the hallmarks of communication. So the problem is a problem in competing in the communication. Positioning strategy is in fact the communication strategy. Advertising is a form of communication, from the standpoint of recipients, built in a low appreciation. If you succeed in the advertising, you're likely to succeed in business, religion, political or lainyang activity requires mass communication.
Positioning is a concept that changed the authenticity of the ad, a simple concept that makes people face difficulties in understanding its power. Positioning starts with a product, goods, services, companies, or people. But positioning is not something you do with the product. Positioning is something you do to prospective customers mind, which is placing the product on the prospect's mind. So a mistake when calling this concept as "product positioning". Just as you do something about the physical product. Was also wrong if the positioning does not involve a change. But these changes are changes to the name, price and packaging of the product rather than as a whole. Basically there are changes that will be performances with the aim of ensuring sustu more valuable position in the minds of potential customers.
Merupakah also positioning the first body of thought that are designed to hold a hearing problem in our society who flooded information. The only defense a person has in society is a very simple idea. So the best approach to be taken in masysrakat someone is a simple message. In communications, as well as in architecture, less is more. You have to sharpen the message to be entered in the consumer's mind. Even Jack Trout and Al Ries said that the positioning is not done on the product, but that worked against the consumer's mind. Primagama use the word "Leadership In Achievement" as positioning. Read more "THE ENTREPRENEUR (21)..."
Labels:
enterprenuership
THE ENTREPRENEUR (20)
To bring students to counseling, as it uses shared brochures to schools and through the Test Trial in State Universities as well as through newspaper advertisements. Guarantee Program received the acclaim that was extraordinary, so that students who register Primagama test counseling when it far exceeds the available capacity of the building. To rent a new building, no funds, because only accept registrations for Rp. 10.000, - and the cost of tuition is paid after the student is accepted at the State University. It happens because we are the Guidance Program Accepted Insurance Program, if the student is not accepted at the State University, the students do not pay, but if accepted at State Universities, the students pay according to their promised by students themselves. As I discussed earlier, that any difficulties will bring creativity and innovation is incredible, if we are a positive mental attitude. Proverbial, when God closed one door, God will open another door to more. We're actually willing to accept as many students, but we are poor students are not able to provide the facilities, due to limited capacity. With a positive mental attitude, effort and prayer finally another door that God began to open. Finally we decided to make the selection of students who entered counseling.
After doing a fairly rigorous selection, with a model similar to the test question in State University graduate student who made the selection, there is a sense of pride, because it was already set aside a lot of competition, which makes them have a high motivation for entering the heating State University. Test selection is also a promotional tool is quite powerful. Results of the selection tests, which passed and signed into test counseling students mostly from Favorites SMA, such as NI SMA, SMA N II, N III SMA and other favorite high school, so students were wonderful. They are in school also guided by their teacher great-great. They already have a full stock of their teacher. We are just polishing the proverbial little, which is polished with a special seasoning for Entry Selection Tests State University. If students come from very good high school, rough language "guided not only been able to enter State University, let alone guided". Although only pay registration fee, but we guide them seriously, because we expect them to enter State University. Besides classroom guided by a great teaching style, taught techniques to predict about the exam will be out in State Universities and difahamkan how to do the problems quickly and correctly. Test test enters State Universities and again by involving participants from the outside. Hard work administrators, counselors (tentor) and the students themselves to the accompaniment of prayers ultimately proved fruitless. Education in guidance Primagama tests on end with their mental preparation for a test session. Starting from psychological debriefing to prayer unto the prayer recipients. They were also asked to request prayer for their parents. In the prayer is usually some of them were crying. After the test in State College, students could result in approximately 90%. Incredibly, because students were already clever-clever, derived from Favorites high school. Achievement is one proof that makes our customer's trust. Read more "THE ENTREPRENEUR (20)..."
After doing a fairly rigorous selection, with a model similar to the test question in State University graduate student who made the selection, there is a sense of pride, because it was already set aside a lot of competition, which makes them have a high motivation for entering the heating State University. Test selection is also a promotional tool is quite powerful. Results of the selection tests, which passed and signed into test counseling students mostly from Favorites SMA, such as NI SMA, SMA N II, N III SMA and other favorite high school, so students were wonderful. They are in school also guided by their teacher great-great. They already have a full stock of their teacher. We are just polishing the proverbial little, which is polished with a special seasoning for Entry Selection Tests State University. If students come from very good high school, rough language "guided not only been able to enter State University, let alone guided". Although only pay registration fee, but we guide them seriously, because we expect them to enter State University. Besides classroom guided by a great teaching style, taught techniques to predict about the exam will be out in State Universities and difahamkan how to do the problems quickly and correctly. Test test enters State Universities and again by involving participants from the outside. Hard work administrators, counselors (tentor) and the students themselves to the accompaniment of prayers ultimately proved fruitless. Education in guidance Primagama tests on end with their mental preparation for a test session. Starting from psychological debriefing to prayer unto the prayer recipients. They were also asked to request prayer for their parents. In the prayer is usually some of them were crying. After the test in State College, students could result in approximately 90%. Incredibly, because students were already clever-clever, derived from Favorites high school. Achievement is one proof that makes our customer's trust. Read more "THE ENTREPRENEUR (20)..."
Labels:
enterprenuership
THE ENTREPRENEUR (19)
When Primagama still at an early stage stand, with a touch of unique strategies that have been made, there is still not feeling satisfied. Dissatisfaction with the first strategy, then we think even harder to find a different strategy with others, or as we used to call the strategy a unique touch. The idea went from thinking to ease the burden on parents, parents should not pay the expensive tuition fees, but children as participants in the guidance is not received at State Universities. We think of how to parent after received at State University, then took charge in accordance with the guidance of the promised capabilities. Thus, among participants of the other participants Primagama counseling differ in paying tuition fees. They pay according to the promise.
Based on the strategy of the next unique touch is Accepted Insurance Program. Before launching this strategy, when we examine what difference the Security and Guaranteed. The meaning of the guaranteed accepted at the State University student mentoring students must have received at State Universities. Meanwhile, the meaning of the collateral accepted at the State University student mentoring students may not be or has not been received at the State University, but no guarantee is received with the stipulation that students must follow the guidance on a regular basis and follow what is recommended by the agency. Besides, the purpose of security is acceptable if the student is not accepted at the State University, the students do not pay, but if accepted at State Universities, the students pay according to their promised by students themselves. The only cost that must be paid by the student is only paying enrollment 10,000, -. Even the registration fee, if that student is not capable of, if not accepted at universities should also be taken back, but for students who can we ask these students awareness to not withdrawn, regard it as a "wonderful memory" because we have educated, have provide guidance, has been providing time for consultation and motivate them to enter State University. It's part of the risk that we bear, since launching Accepted Insurance Program.
To handle these special programs is the people know exactly about the insurance program is received and know the ins and outs of coaching test, starting from a good teaching technique and fun, predict problems and techniques to know about how to do quickly. We're not up on the field by installing a special Customer Service in two places. First place in Jalan Kapten Tendean No. 7, customer service was called Purdi E. Chandara and second place at Road Demangan Kidul No. 92, his customer service is handled by the name M. Suyanto. Both the customer service know exactly about Accepted Insurance Program and know all the ins and outs Primagama. This strategy proved very effective. Favorite high school, the term we do not know when it Primagama test counseling, but after starting the program appeared to know and eventually the two buildings that we could not hold them rent, which must hire a new building. Strategy second unique touch is much more powerful than the first strategy. So that we can indeed known, we must create a different strategy, which is considered unique by our customers. Read more "THE ENTREPRENEUR (19)..."
Based on the strategy of the next unique touch is Accepted Insurance Program. Before launching this strategy, when we examine what difference the Security and Guaranteed. The meaning of the guaranteed accepted at the State University student mentoring students must have received at State Universities. Meanwhile, the meaning of the collateral accepted at the State University student mentoring students may not be or has not been received at the State University, but no guarantee is received with the stipulation that students must follow the guidance on a regular basis and follow what is recommended by the agency. Besides, the purpose of security is acceptable if the student is not accepted at the State University, the students do not pay, but if accepted at State Universities, the students pay according to their promised by students themselves. The only cost that must be paid by the student is only paying enrollment 10,000, -. Even the registration fee, if that student is not capable of, if not accepted at universities should also be taken back, but for students who can we ask these students awareness to not withdrawn, regard it as a "wonderful memory" because we have educated, have provide guidance, has been providing time for consultation and motivate them to enter State University. It's part of the risk that we bear, since launching Accepted Insurance Program.
To handle these special programs is the people know exactly about the insurance program is received and know the ins and outs of coaching test, starting from a good teaching technique and fun, predict problems and techniques to know about how to do quickly. We're not up on the field by installing a special Customer Service in two places. First place in Jalan Kapten Tendean No. 7, customer service was called Purdi E. Chandara and second place at Road Demangan Kidul No. 92, his customer service is handled by the name M. Suyanto. Both the customer service know exactly about Accepted Insurance Program and know all the ins and outs Primagama. This strategy proved very effective. Favorite high school, the term we do not know when it Primagama test counseling, but after starting the program appeared to know and eventually the two buildings that we could not hold them rent, which must hire a new building. Strategy second unique touch is much more powerful than the first strategy. So that we can indeed known, we must create a different strategy, which is considered unique by our customers. Read more "THE ENTREPRENEUR (19)..."
Labels:
enterprenuership
THE ENTREPRENEUR (18)
The fourth step, after we have a positive mental attitude, have a dream and has started a business is how to bounce business. For businesses bounce we need to think, try and pray harder for our companies have a better position than other companies. This is what we call by using the strategy. When we do not know how berstrategi, because they do not have the science. What is marketing, what is human resource management, what is financial management and operations management what it is, it does not know. Science is the way we find in managing the business. How can the company continue to run, still can pay employees and still no activity had also a strategy.
When we first started with friends founded Primagama, with only a 2 students, so we tried to find strategies to get more students. I have discussed previously are invited 3 neighbors with certain conditions. Simple language is charity. "You come alone," we asked. "No cost Mas" they said. "Best .. but the conditions brought Speda motors" we give the requirements. "Near kok. The road could be Mas "they replied. "Anyway you have to take motorcycle" we hope. "Oh .. yes .. Mas" they are willing. After they entered counseling, seen in front of the number of motorcycle 6 consisting of 2 of our motorcycle actual students, 3 students free bike and motorcycle instructor 1 (tentor). With eliminate the 3 students are to our charity and is a weapon very powerful marketing. A small tutorial that existing activities. The existence of the activity is part of marketing is very important, although it is still a simple activity. It also makes us more confident, so I myself have come out of the room and in front of the office nampang, because there is activity. In my heart I said "Why .. There's .. There are students who test counseling we did ". Then my friend asked to open on Sundays. Incredibly, there were 14 children mostly come from the Holy register our tutorial. Increasing confidence.
We are constantly trying to make the students more. Strategy in our language we do is do something different with the others. Opportunity we get after the issue that the college entrance test state at the time of matter called IPA / IPS Integrated. All high school students to interpret what confused the matter of IPA / IPS Integrated, including the teacher, too. We are also confused, so we consulted the Department of Education. From the results of these consultations we finally have a little picture of the IPA / IPS Integrated. Then we make about IPA / IPS Integrated think our version that is not necessarily true. We invite high school students by using the Test Trial UPA / IPS Integrated free. Predictable, students interested very much and that's an opportunity to market our test counseling. Before the test trials started, we make promotion to the participants, about one of the benefits Primagama test than any other guidance. From the campaign netted 62 students who follow the guidance Primagama test. Different strategies with assistance from other tests, as we call it a unique touch strategy. Read more "THE ENTREPRENEUR (18)..."
When we first started with friends founded Primagama, with only a 2 students, so we tried to find strategies to get more students. I have discussed previously are invited 3 neighbors with certain conditions. Simple language is charity. "You come alone," we asked. "No cost Mas" they said. "Best .. but the conditions brought Speda motors" we give the requirements. "Near kok. The road could be Mas "they replied. "Anyway you have to take motorcycle" we hope. "Oh .. yes .. Mas" they are willing. After they entered counseling, seen in front of the number of motorcycle 6 consisting of 2 of our motorcycle actual students, 3 students free bike and motorcycle instructor 1 (tentor). With eliminate the 3 students are to our charity and is a weapon very powerful marketing. A small tutorial that existing activities. The existence of the activity is part of marketing is very important, although it is still a simple activity. It also makes us more confident, so I myself have come out of the room and in front of the office nampang, because there is activity. In my heart I said "Why .. There's .. There are students who test counseling we did ". Then my friend asked to open on Sundays. Incredibly, there were 14 children mostly come from the Holy register our tutorial. Increasing confidence.
We are constantly trying to make the students more. Strategy in our language we do is do something different with the others. Opportunity we get after the issue that the college entrance test state at the time of matter called IPA / IPS Integrated. All high school students to interpret what confused the matter of IPA / IPS Integrated, including the teacher, too. We are also confused, so we consulted the Department of Education. From the results of these consultations we finally have a little picture of the IPA / IPS Integrated. Then we make about IPA / IPS Integrated think our version that is not necessarily true. We invite high school students by using the Test Trial UPA / IPS Integrated free. Predictable, students interested very much and that's an opportunity to market our test counseling. Before the test trials started, we make promotion to the participants, about one of the benefits Primagama test than any other guidance. From the campaign netted 62 students who follow the guidance Primagama test. Different strategies with assistance from other tests, as we call it a unique touch strategy. Read more "THE ENTREPRENEUR (18)..."
Labels:
enterprenuership
THE ENTREPRENEUR (17)
Starting a business with no other cash in the field of information technology is when I founded the company PT. Excellindo time, the company engaged in the field of Internet Service Provider (ISP). At the time of hire AMIKOM Yogyakarta internet connection with bandwidth 512 KB (0.5 MB), I call one waiter employees Technical Unit (UPT) which I think can I teach business. As my previous writing, that all people can become entrepreneurs, then saypun also wanted to prove that my employee, who was then just a lowly employee, just graduated from high school, not a scholar, but I'm sure that he can conduct business like a businessman. The employee named Mr Hanafi. "Pak. Can you sell bandwidth? "," As long as I was taught Pak Yanto, Insha Allah be "answered Mr. Hanafi. "The way you sell AMIKOM bandwidth. If there is a new purchase Pak Hanafi additional bandwidth for the message that the organization purchased "I said with a little lecture. "Oh. So yes Pak Yanto. I tried it sir "replied Mr. Hanafi. "Mr. Hanafi should target the market that is not too much trouble, for example, instanti, universities, etc., if the marketing name in the industrial market or business market." I said a little patronizing.
Pak Hanafi then prepare all the equipment in order to sell the bandwidth as well. Despite the makeshift offices and employees from AMIKOM students, but the spirit of Pak Hanafi burning that makes still optimistic.
He berkeling from one institution to another institution of higher education and one to the other universities. "It's hard yes Pak Yanto. I have not succeeded "he said, a little complaining. "My experience. If Mr. Hanafi has come at 100 instanti or college, God willing, will one or two bandwidth messages to Mr. Hanafi "I said, share a bit of experience. "I try again sir. Please prayer "he said, say goodbye to offer bandwidth back. Finally, after many instanti or universities that were visited, there were also requested to submit a proposal bandwidth sales. The first institution, who believe with Mr. Hanafi was PPPG Arts,
In the first year with the business without the cash, it could generate sales of approximately Rp. 200 million. Ahirnya we established PT. which legally accountable, namely PT. Excellindo time. I'm a little dream, that this company would become a company like Time Warner. When Mr. Hanafi meet with friends who also manage the ISP, saying that "It must be large Excellindo Times. Pemodalnya strong. AMIKOM ". "Mr. Hanafi responded with a smile as he said" The strong is not the capital, but the education business. "
In the second year, sales rose sharply, an increase of five times that reached Rp. 1 billion. Pak Hanafi suggested "Mr. Yanto. What if we open a computer store? Sometimes the projects also need a computer ". "Go ahead" I replied. The third year, sales reached Rp. 3 billion, and fourth years have penetrated angaka Rp. 5 billion and now has reached more than Rp. 10 billion. All of which can be built by starting a business without cash. This simple lesson can hopefully give us all inspirisai, although only very small. Read more "THE ENTREPRENEUR (17)..."
Pak Hanafi then prepare all the equipment in order to sell the bandwidth as well. Despite the makeshift offices and employees from AMIKOM students, but the spirit of Pak Hanafi burning that makes still optimistic.
He berkeling from one institution to another institution of higher education and one to the other universities. "It's hard yes Pak Yanto. I have not succeeded "he said, a little complaining. "My experience. If Mr. Hanafi has come at 100 instanti or college, God willing, will one or two bandwidth messages to Mr. Hanafi "I said, share a bit of experience. "I try again sir. Please prayer "he said, say goodbye to offer bandwidth back. Finally, after many instanti or universities that were visited, there were also requested to submit a proposal bandwidth sales. The first institution, who believe with Mr. Hanafi was PPPG Arts,
In the first year with the business without the cash, it could generate sales of approximately Rp. 200 million. Ahirnya we established PT. which legally accountable, namely PT. Excellindo time. I'm a little dream, that this company would become a company like Time Warner. When Mr. Hanafi meet with friends who also manage the ISP, saying that "It must be large Excellindo Times. Pemodalnya strong. AMIKOM ". "Mr. Hanafi responded with a smile as he said" The strong is not the capital, but the education business. "
In the second year, sales rose sharply, an increase of five times that reached Rp. 1 billion. Pak Hanafi suggested "Mr. Yanto. What if we open a computer store? Sometimes the projects also need a computer ". "Go ahead" I replied. The third year, sales reached Rp. 3 billion, and fourth years have penetrated angaka Rp. 5 billion and now has reached more than Rp. 10 billion. All of which can be built by starting a business without cash. This simple lesson can hopefully give us all inspirisai, although only very small. Read more "THE ENTREPRENEUR (17)..."
Labels:
enterprenuership
THE ENTREPRENEUR (16)
After advertising in The Daily People's Sovereignty measuring 20 cm x 3 columns appear. I've said before, building and advertising can be paid at a later date, without having to use cash. A few moments later, the impact of advertising and distribution of brochures in schools began to show results. One by one start registering some computer courses. At the time of starting the course the participants reached 35 students. I gave a public lecture that is motivating to students. After a late finish, I invite students to question everything that relates to the course. One student asked mgacungkan hand as "sir. This computer course or courses what. Why there is no computer? ". The question that really surprised me, because I did not expect that there will be a question like that, as I asked. "My sister had read in the RD loop about this course?". "It's Mr." replied the student. Then I asked again "What does the ad?". "Education has a year computers of practical business and entrepreneurship" the student replied. I explained "One month is our practical business education and kewirausaan. This is important dik. (In my heart to say, but you also have to pay). After one month we begin a new computer course. ". "Oh ... so to sir" the boy said.
Within a month, I give my entrepreneurial education began with an entrepreneurial spirit of education, when it was given the Achievement Motivation Training (AMT), which was conceived by David McLalland. The material is very interesting, because it touches the soul of the students. The contents of these materials ranging from regulations made with the AMT so successful, self-portrait, self description, discussion gap, Johary Window, until the end Goal Setting premises reflection and prayer. Most students will almost certainly cry, regretting his mistake either to others or to both parents and to the Lord. Usually they like being born again and motivated to reach his goals, to be successful. Some comments from them after following AMT include "I feel born again sir" said one student. "I learned my self sir" commented another student. "My goal is very close. Like in my eyelid. Lived to reach "another student said again Once motivated, the students began equipped science and business entrepreneurship. Starting from a positive mental attitude, carving a dream, took the step to be an entrepreneur, a business strategy of driving up to how to deal with failure. Very nice lesson for students. One by one in a month that students begin to pay the course fee.
Does not feel the day went very quickly and finally one month has been exceeded. Because they are very satisfied, almost all students eventually pay the course fee and wanted to stay to join my courses. Of the money credited my computer some 12 computers. "Yes sir no computer" commented the students with a little tease. "His name is just too computer courses. It must have the computer "and I replied in my heart to say that your money actually, if you do not pay we can not buy a computer. That simple bit of my experience in open computer courses without cash. Hopefully inspiring start a business without cash. Read more "THE ENTREPRENEUR (16)..."
Within a month, I give my entrepreneurial education began with an entrepreneurial spirit of education, when it was given the Achievement Motivation Training (AMT), which was conceived by David McLalland. The material is very interesting, because it touches the soul of the students. The contents of these materials ranging from regulations made with the AMT so successful, self-portrait, self description, discussion gap, Johary Window, until the end Goal Setting premises reflection and prayer. Most students will almost certainly cry, regretting his mistake either to others or to both parents and to the Lord. Usually they like being born again and motivated to reach his goals, to be successful. Some comments from them after following AMT include "I feel born again sir" said one student. "I learned my self sir" commented another student. "My goal is very close. Like in my eyelid. Lived to reach "another student said again Once motivated, the students began equipped science and business entrepreneurship. Starting from a positive mental attitude, carving a dream, took the step to be an entrepreneur, a business strategy of driving up to how to deal with failure. Very nice lesson for students. One by one in a month that students begin to pay the course fee.
Does not feel the day went very quickly and finally one month has been exceeded. Because they are very satisfied, almost all students eventually pay the course fee and wanted to stay to join my courses. Of the money credited my computer some 12 computers. "Yes sir no computer" commented the students with a little tease. "His name is just too computer courses. It must have the computer "and I replied in my heart to say that your money actually, if you do not pay we can not buy a computer. That simple bit of my experience in open computer courses without cash. Hopefully inspiring start a business without cash. Read more "THE ENTREPRENEUR (16)..."
Labels:
enterprenuership
THE ENTREPRENEUR
Similarly when I set up a computer course. Building as I have discussed previously, can be done with payments in the back. We pay the rent of the building after we had the money in accordance with what we planned. Facilities chair can also use the rent can be paid at a later date. Even we iklanpun can also pay at the back. I was fortunate to be working with the Daily People's Sovereignty at the beginning of starting a business. This daily helped me by providing the advertised facilities may be paid later. Besides sharing a brochure to schools, one of the flagship advertising to find potential participants of the course. At first, I just put on line ad, because the cost is cheap, but to build the image, we need an ad that not only text ads, but ads to build brand, and can increase sales.
After I finished designing your ad by using the considerations, including the targeted goals, product benefits offered courses, which use creative strategies, attraction and compelling message execution style that is used, then I take the design to the daily office is located at Jalan Mangkubumi. Arriving at the office, then I ask at the reception, so I can see the ads to advertise. The reception that I met delivering advertising section. I expressed my desire to serve advertisements to the ad. Advertising section happy to help me. My experience in negotiating payment and the amount of advertising costs is what I want to share. Small companies or big companies wanting to set up effective advertising, cost, and if light can be paid at a later date. I also mengingikan things like that.
Steps I did try to ask the advertising costs for a year and snapped, "Sir if I can place an ad size 20 cm x 3 columns, every day for a year how much sir?" Then the ad staff count and he found considerable value when that, hundreds of millions of rupiah. "If this magnitude, Mr. Yanto be a special discount, 70%" said the official ad. In my heart "huge cut.". "Put a one-year advertising Pak Yanto?" Tanya advertising officer. I paused for a moment, because it costs so much, in my opinion at the time, but the cut is very interesting. "My first pair of three-month yes sir, but I have fixed the cut 70%". The officer was returning to calculate the ad, with a calculator., Then he called his boss "To Mr. Yanto. It's okay, but it is every day sir? ". I paused for a moment, because I think it is still very large, let alone set up a computer course with no cash., "One week old double yes sir. But the pieces still 70%? ". The commercial officer in consultation with the boss again, since then "Yes .. may sir. "As usual you sir. Can be paid after the ad contained "I pleaded. "Yes. Pak Yanto, as usual "the officer replied that ad. A very interesting lesson from my experiences is to get a cheap price made by buying in large quantities in advance and ask for specific pieces, and then gradually negotiate with maintaining these pieces, but buying in smaller quantities. More than that can we pay in the future. http://journal.amikom.ac.id/index.php/Koma/article/view/1706 Read more "THE ENTREPRENEUR..."
After I finished designing your ad by using the considerations, including the targeted goals, product benefits offered courses, which use creative strategies, attraction and compelling message execution style that is used, then I take the design to the daily office is located at Jalan Mangkubumi. Arriving at the office, then I ask at the reception, so I can see the ads to advertise. The reception that I met delivering advertising section. I expressed my desire to serve advertisements to the ad. Advertising section happy to help me. My experience in negotiating payment and the amount of advertising costs is what I want to share. Small companies or big companies wanting to set up effective advertising, cost, and if light can be paid at a later date. I also mengingikan things like that.
Steps I did try to ask the advertising costs for a year and snapped, "Sir if I can place an ad size 20 cm x 3 columns, every day for a year how much sir?" Then the ad staff count and he found considerable value when that, hundreds of millions of rupiah. "If this magnitude, Mr. Yanto be a special discount, 70%" said the official ad. In my heart "huge cut.". "Put a one-year advertising Pak Yanto?" Tanya advertising officer. I paused for a moment, because it costs so much, in my opinion at the time, but the cut is very interesting. "My first pair of three-month yes sir, but I have fixed the cut 70%". The officer was returning to calculate the ad, with a calculator., Then he called his boss "To Mr. Yanto. It's okay, but it is every day sir? ". I paused for a moment, because I think it is still very large, let alone set up a computer course with no cash., "One week old double yes sir. But the pieces still 70%? ". The commercial officer in consultation with the boss again, since then "Yes .. may sir. "As usual you sir. Can be paid after the ad contained "I pleaded. "Yes. Pak Yanto, as usual "the officer replied that ad. A very interesting lesson from my experiences is to get a cheap price made by buying in large quantities in advance and ask for specific pieces, and then gradually negotiate with maintaining these pieces, but buying in smaller quantities. More than that can we pay in the future. http://journal.amikom.ac.id/index.php/Koma/article/view/1706 Read more "THE ENTREPRENEUR..."
Labels:
enterprenuership
Nov 16, 2009
Hacking Using DOS
Microsoft DOS came with some hidden hacking tool that I will discuss here.
This tool can be found in the directory c: \ \ windows if you use Win98, and if you
using WinXP then this tool is at C: \ \ WinXP \ \ system32. WinXP, Win2000 and WinNT
released with some additional Internet tools. So if you are still using Win98 then I
suggested replacing it with WinXP. Which of course has an additional feature securiti
and commands a good internet hacking. In this manual I will discuss about some
commands found in Win98 and WinXP
So for the user window, the following commands at the DOS hacking.
1. ping
2. tracert
3. telnet
4. ftp
5. netstat
1. ping
Utiliy is used to find the existence of the remote host.
Yan gmengirmkan a SYN signal to a remote host and if the remote host is returned then there is a remote machine.
Try you type this command:
C:\\windows>ping/?
*************
Newbie tip: type in \ '/? \' After the show dos command helpnya. So how do you learn various dos commands.
Is not WinXP, WinNT and Win2000 also has command 'help' to display all the dos commands.
*************
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] destination-list
Options:
-t Ping the specified host until stopped.
To see statistics and continue - type Control-Break;
To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don\'t Fragment flag in packet.
-i TTL Time To Live.
-v TOS Type Of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.
-j host-list Loose source route along host-list.
-k host-list Strict source route along host-list.
-w timeout Timeout in milliseconds to wait for each reply.
So I can ping any ip address or domain name to check its presence on the internet.
For example I type "ping localhost" then I get.
Pinging chintan [127.0.0.1] with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 timemput *.*
sends all files from C:\\windows to /etc
5. \'mget\' to get multiple files from remote machine.
contohnya. ftp>mget *.*
gets all files from /etc to C:\\windows
6. \'open\' to establish a connection with remote host.
contohnya. ftp>open www.target.com
7. \'bye\' closes the connection and quits from ftp
For other commands from the ftp, please see their help.
Now on the FTP port (prot 21) is open www.nosecurity.com. A hacker will connect to the site
using the "ftp www.nosecurity.com" at the dos prompt. Then he will try to log in anonymously. With
assumption that www.nosecurity.com use linux servers, so hackers will mengtikkan orders
"Get / etc / apsswd" for the password file mendaptkan and mengcracknya. If you are a hacker, so do not forget
to remove the log.
5. netstat
You can specify a connection to the remote machine on a particular port, the port is only opened on the remote machine.
For example, if you want to specify a connection with www.target.com on port 23 (telnet) then the port should be
open at www.target.com. And all hacking activity typically use an open port. Typing "netstat /?" On
dos prompt gives:
Displays protocol statistics and current TCP/IP network connections.
NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s
option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the -p option may be used to specify
a subset of the default.
interval Redisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.
Options will explain their respective functions. And the most important is the option-a and-n. The-a displays
all ports are open on the machine. And if I use the-n option it will show ip
address instead of the domain. I get the following if I type "netstat-a" at the command prompt.
Active Connections
Proto Local Address Foreign Address State
TCP chintan:1027 0.0.0.0:0 LISTENING
TCP chintan:80 0.0.0.0:0 LISTENING
TCP chintan:135 0.0.0.0:0 LISTENING
TCP chintan:6435 0.0.0.0:0 LISTENING
TCP chintan:1025 0.0.0.0:0 LISTENING
TCP chintan:1026 0.0.0.0:0 LISTENING
TCP chintan:1028 0.0.0.0:0 LISTENING
TCP chintan:1309 0.0.0.0:0 LISTENING
TCP chintan:1310 0.0.0.0:0 LISTENING
TCP chintan:1285 rumcajs.box.sk:80 ESTABLISHED
TCP chintan:1296 l an-202-144-78-3.maa.sify.net:80 CLOSE_WAIT
TCP chintan:1297 lan-202-144-65-14.sify.net:80 ESTABLISHED
TCP chintan:1310 cdn-v13.websys.aol.com:80 ESTABLISHED
TCP chintan:1220 aiedownload.cps.intel.com:ftp ESTABLISHED
"Proto" stated the name of the protocol, "localaddress" gives us Ipaddress and open ports.
"Foreign Address" with Namor Ipaddress menyatkaan port connected to us. "State" states
current statement if a connection is "established" or listening, or just "waiting".
For example if I open http://www.yahoo.com then when I run "netstat-a"
I would get input like this:
\ "ESTABLISHED TCP 203.43.50.81:2034 www.yahoo.com:80 \"
My computer with the ip 203.43.50.81 port 2034 connected with yahoo on port 80
************************************************** ***************************
* Newbie tip: Dengna this way you can get the ip chat with someone who is. *
* The first time you run "netstat-an" and look under foreign ip address. Now begins *
* Private chat with other people. Also run "netstat-an" and you will get one *
* Ip foreign lagin eventually. This is the ip person.
Read more "Hacking Using DOS..."
This tool can be found in the directory c: \ \ windows if you use Win98, and if you
using WinXP then this tool is at C: \ \ WinXP \ \ system32. WinXP, Win2000 and WinNT
released with some additional Internet tools. So if you are still using Win98 then I
suggested replacing it with WinXP. Which of course has an additional feature securiti
and commands a good internet hacking. In this manual I will discuss about some
commands found in Win98 and WinXP
So for the user window, the following commands at the DOS hacking.
1. ping
2. tracert
3. telnet
4. ftp
5. netstat
1. ping
Utiliy is used to find the existence of the remote host.
Yan gmengirmkan a SYN signal to a remote host and if the remote host is returned then there is a remote machine.
Try you type this command:
C:\\windows>ping/?
*************
Newbie tip: type in \ '/? \' After the show dos command helpnya. So how do you learn various dos commands.
Is not WinXP, WinNT and Win2000 also has command 'help' to display all the dos commands.
*************
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] destination-list
Options:
-t Ping the specified host until stopped.
To see statistics and continue - type Control-Break;
To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don\'t Fragment flag in packet.
-i TTL Time To Live.
-v TOS Type Of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.
-j host-list Loose source route along host-list.
-k host-list Strict source route along host-list.
-w timeout Timeout in milliseconds to wait for each reply.
So I can ping any ip address or domain name to check its presence on the internet.
For example I type "ping localhost" then I get.
Pinging chintan [127.0.0.1] with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 timemput *.*
sends all files from C:\\windows to /etc
5. \'mget\' to get multiple files from remote machine.
contohnya. ftp>mget *.*
gets all files from /etc to C:\\windows
6. \'open\' to establish a connection with remote host.
contohnya. ftp>open www.target.com
7. \'bye\' closes the connection and quits from ftp
For other commands from the ftp, please see their help.
Now on the FTP port (prot 21) is open www.nosecurity.com. A hacker will connect to the site
using the "ftp www.nosecurity.com" at the dos prompt. Then he will try to log in anonymously. With
assumption that www.nosecurity.com use linux servers, so hackers will mengtikkan orders
"Get / etc / apsswd" for the password file mendaptkan and mengcracknya. If you are a hacker, so do not forget
to remove the log.
5. netstat
You can specify a connection to the remote machine on a particular port, the port is only opened on the remote machine.
For example, if you want to specify a connection with www.target.com on port 23 (telnet) then the port should be
open at www.target.com. And all hacking activity typically use an open port. Typing "netstat /?" On
dos prompt gives:
Displays protocol statistics and current TCP/IP network connections.
NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s
option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the -p option may be used to specify
a subset of the default.
interval Redisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.
Options will explain their respective functions. And the most important is the option-a and-n. The-a displays
all ports are open on the machine. And if I use the-n option it will show ip
address instead of the domain. I get the following if I type "netstat-a" at the command prompt.
Active Connections
Proto Local Address Foreign Address State
TCP chintan:1027 0.0.0.0:0 LISTENING
TCP chintan:80 0.0.0.0:0 LISTENING
TCP chintan:135 0.0.0.0:0 LISTENING
TCP chintan:6435 0.0.0.0:0 LISTENING
TCP chintan:1025 0.0.0.0:0 LISTENING
TCP chintan:1026 0.0.0.0:0 LISTENING
TCP chintan:1028 0.0.0.0:0 LISTENING
TCP chintan:1309 0.0.0.0:0 LISTENING
TCP chintan:1310 0.0.0.0:0 LISTENING
TCP chintan:1285 rumcajs.box.sk:80 ESTABLISHED
TCP chintan:1296 l an-202-144-78-3.maa.sify.net:80 CLOSE_WAIT
TCP chintan:1297 lan-202-144-65-14.sify.net:80 ESTABLISHED
TCP chintan:1310 cdn-v13.websys.aol.com:80 ESTABLISHED
TCP chintan:1220 aiedownload.cps.intel.com:ftp ESTABLISHED
"Proto" stated the name of the protocol, "localaddress" gives us Ipaddress and open ports.
"Foreign Address" with Namor Ipaddress menyatkaan port connected to us. "State" states
current statement if a connection is "established" or listening, or just "waiting".
For example if I open http://www.yahoo.com then when I run "netstat-a"
I would get input like this:
\ "ESTABLISHED TCP 203.43.50.81:2034 www.yahoo.com:80 \"
My computer with the ip 203.43.50.81 port 2034 connected with yahoo on port 80
************************************************** ***************************
* Newbie tip: Dengna this way you can get the ip chat with someone who is. *
* The first time you run "netstat-an" and look under foreign ip address. Now begins *
* Private chat with other people. Also run "netstat-an" and you will get one *
* Ip foreign lagin eventually. This is the ip person.
Read more "Hacking Using DOS..."
Labels:
network
Antenna Type Mikrotik
5 GHz Omni Antennas
5G/O8L 5.7-5.867 GHz 10 dBi Omnidirectional Antenna
5G/O8H 5.7-5.867 GHz 13 dBi Omnidirectional Antenna
5G/O4L 5.4-5.7 GHz 10 dBi Omnidirectional Antenna
5G/O4H 5.4-5.7 GHz 13 dBi Omnidirectional Antenna
5 GHz Directional Antennas
5G/PAR 5GHz Parabolic Antenna with Feed
5G/FED 5 GHz Antenna Feed
5 GHz Flat antennas
5G/522F 5.2-5.8 GHz Flat Panel 22 dBi Client Site Antenna without antenna cable
5G/MTA 5.2-5.8 GHz Flat Panel 22 dBi Client Site Antenna with antenna cable
5 GHz Sectoral Antennas
5G/BS8 5.7-5.867 GHz 14 dBi Base Station Sector Antenna
2.4 GHz Omnidirectional Antennas
2G/AO7 7.4 dBi Omnidirectional Antenna
2G/AO2 12 dBi Omnidirectional Antenna
2G/AO5 15.4 dBi Omnidirectional Antenna
2.4GHz Directional Antennas
2G/ADF 18dBi Flat Panel Antenna
2G/ADFW 18dBi Flat Panel Antenna
Lightning Arresters
AC/LAR58 Lightning Arrester for 5GHz
AC/LAR Lightning Arrester for 2.4GHz
Cables and Connectors
AC/L1A Low-Loss Cable (- 21.7dB/100m)
AC/CML N Connector for Low-Loss Cable - male
AC/CFL N Connector for Low-Loss Cable - female Read more "Antenna Type Mikrotik..."
5G/O8L 5.7-5.867 GHz 10 dBi Omnidirectional Antenna
5G/O8H 5.7-5.867 GHz 13 dBi Omnidirectional Antenna
5G/O4L 5.4-5.7 GHz 10 dBi Omnidirectional Antenna
5G/O4H 5.4-5.7 GHz 13 dBi Omnidirectional Antenna
5 GHz Directional Antennas
5G/PAR 5GHz Parabolic Antenna with Feed
5G/FED 5 GHz Antenna Feed
5 GHz Flat antennas
5G/522F 5.2-5.8 GHz Flat Panel 22 dBi Client Site Antenna without antenna cable
5G/MTA 5.2-5.8 GHz Flat Panel 22 dBi Client Site Antenna with antenna cable
5 GHz Sectoral Antennas
5G/BS8 5.7-5.867 GHz 14 dBi Base Station Sector Antenna
2.4 GHz Omnidirectional Antennas
2G/AO7 7.4 dBi Omnidirectional Antenna
2G/AO2 12 dBi Omnidirectional Antenna
2G/AO5 15.4 dBi Omnidirectional Antenna
2.4GHz Directional Antennas
2G/ADF 18dBi Flat Panel Antenna
2G/ADFW 18dBi Flat Panel Antenna
Lightning Arresters
AC/LAR58 Lightning Arrester for 5GHz
AC/LAR Lightning Arrester for 2.4GHz
Cables and Connectors
AC/L1A Low-Loss Cable (- 21.7dB/100m)
AC/CML N Connector for Low-Loss Cable - male
AC/CFL N Connector for Low-Loss Cable - female Read more "Antenna Type Mikrotik..."
Labels:
network
Nov 14, 2009
Split DNS Menggunakan Bind9
Instalasi BIND
Instalasi bind9 pada debian mudah saja, yaitu dengan menggunakan apt-get.
Bila anda menggunakan distro lain install saja dari CD installernya, atau mungkin dengan mendownload source code dari ftp://ftp.isc.org/isc/bind9/.
root:~# apt-get install bind9
Konfigurasi named.conf
Konfigurasi zone file sama dengan konfigurasi pada umumnya, tanpa ada perbedaan sedikit pun. Implementasi split DNS ini hanya membutuhkan sedikit konfigurasi pada named.conf. Perlu kembali diingat bahwa masing-masing view tidak dapat berbagi zone. Walaupun semuah zone mempunyai data yang sama untuk kedua view, kita tetap harus menyebutkan definisi zone tersebut dalam semua view yang ada.
Pertama kita harus memisahkan network mana saja yang boleh meresolve domain internal, kemudian kita kelompokkan pada view yang bersesuaian. Kita akan membuat dua buah view, yakni eksternal dan internal. View eksternal memuat data yang bisa dilihat oleh seluruh dunia, dan view internal memuat data yang dapat dilihat dari jaringan internal KUD Suka Maju.
Daftar alamat IP dan domain yang dimiliki oleh KUD:
Nama domain: kud-sukamaju.com.
www: 12.2.1.10
mail: 12.2.1.11
ns: 12.2.1.12
kepala: 192.168.1.5
sekretaris: 192.168.1.6
db: 192.168.1.7
Alamat-alamat di atas kita kelompokkan menjadi dua view:
view eksternal: www, mail, ns - dapat diresolve oleh semua client internet(0.0.0.0/0).
view Internal: semua yang ada di eksternal ditambah kepala, sekretaris, dan db - hanya dapat diresolve oleh jaringan milik KUD Suka Maju(192.168.1.0/24, 12.2.1.0/29).
Contoh konfigurasi pada file named.conf:
view "internal" {
match-clients {
192.168.1.0/24;
12.2.1.0/29;
};
zone "." {
type hint;
file "/etc/bind/db.root";
};
zone "kud-sukamaju.com" {
type master;
file "/etc/bind/kud-sukamaju.com.int";
};
};
view "eksternal" {
match-clients {
0.0.0.0/0;
};
zone "." {
type hint;
file "/etc/bind/db.root";
};
zone "kud-sukamaju.com" {
type master;
file "/etc/bind/kud-sukamaju.com.eks";
};
};
Satu hal yang perlu diingat adalah saat ada query dari client, maka bind akan mencoba mencocokkan IP penanya dengan view(s) yang ada di dalamnya secara berurutan dari atas ke bawah. Oleh karena itu view yang mengandung network 0.0.0.0 harus dituliskan setelah view yang lainnya.
Konfigurasi zone file
Zone file yang kita buat pertama kali adalah yang digunakan untuk view "eksternal". Kemudian setelah itu kita dapat membuat sebuah file lagi untuk view "internal" yang isinya juga menyertakan file eksternal dengan menggunakan $INCLUDE.
File /etc/bind/kud-sukamaju.com.eks:
@ IN SOA ns.kud-sukamaju.com. admin.kud-sukamaju.com. (
23 7200 3600 604800 86400
)
IN NS ns.kud-sukamaju.com
IN MX 1 mail.kud-sukamaju.com
IN A 12.2.1.10
$ORIGIN kud-sukamaju.com.
www IN A 12.2.1.10
mail IN A 12.2.1.11
ns IN A 12.2.1.12
Kemudian file /etc/bind/kud-sukamaju.com.int:
$INCLUDE "/etc/bind/kud-sukamaju.com.eks"
kepala IN A 192.168.1.5
sekretaris IN A 192.168.1.6
db IN A 192.168.1.7
Dengan cara itu maka semua definisi yang berlaku untuk view eksternal berlaku juga untuk view internal. Selain dengan cara itu pembuatan file zone secara total juga bisa dilakukan. Dengan konsep yang sama kita juga bisa membuat sebuah domain yang berIP a.b.c.d bila dilihat dari jaringan x, namun berIP q.w.e.r bila dilihat dari jaringan y.
Selamat mencoba, semoga sukses!
Referensi
Bind 9 Advanced Reference Manual
Google
Note: Terima kasih kepada Oom Sokam atas tulisannya yang menarik dan berguna ini. Semoga ngga bosen-bosen berbagi ilmu dengan kita yah Oom. Beliau berasal dari Institut Tekonologi Sepuluh November Surabaya. Wajahnya yang boros usia sering membuat orang mengira ia seorang dosen :)
Last Updated ( Wednesday, 27 April 2005 ) Read more "Split DNS Menggunakan Bind9..."
Instalasi bind9 pada debian mudah saja, yaitu dengan menggunakan apt-get.
Bila anda menggunakan distro lain install saja dari CD installernya, atau mungkin dengan mendownload source code dari ftp://ftp.isc.org/isc/bind9/.
root:~# apt-get install bind9
Konfigurasi named.conf
Konfigurasi zone file sama dengan konfigurasi pada umumnya, tanpa ada perbedaan sedikit pun. Implementasi split DNS ini hanya membutuhkan sedikit konfigurasi pada named.conf. Perlu kembali diingat bahwa masing-masing view tidak dapat berbagi zone. Walaupun semuah zone mempunyai data yang sama untuk kedua view, kita tetap harus menyebutkan definisi zone tersebut dalam semua view yang ada.
Pertama kita harus memisahkan network mana saja yang boleh meresolve domain internal, kemudian kita kelompokkan pada view yang bersesuaian. Kita akan membuat dua buah view, yakni eksternal dan internal. View eksternal memuat data yang bisa dilihat oleh seluruh dunia, dan view internal memuat data yang dapat dilihat dari jaringan internal KUD Suka Maju.
Daftar alamat IP dan domain yang dimiliki oleh KUD:
Nama domain: kud-sukamaju.com.
www: 12.2.1.10
mail: 12.2.1.11
ns: 12.2.1.12
kepala: 192.168.1.5
sekretaris: 192.168.1.6
db: 192.168.1.7
Alamat-alamat di atas kita kelompokkan menjadi dua view:
view eksternal: www, mail, ns - dapat diresolve oleh semua client internet(0.0.0.0/0).
view Internal: semua yang ada di eksternal ditambah kepala, sekretaris, dan db - hanya dapat diresolve oleh jaringan milik KUD Suka Maju(192.168.1.0/24, 12.2.1.0/29).
Contoh konfigurasi pada file named.conf:
view "internal" {
match-clients {
192.168.1.0/24;
12.2.1.0/29;
};
zone "." {
type hint;
file "/etc/bind/db.root";
};
zone "kud-sukamaju.com" {
type master;
file "/etc/bind/kud-sukamaju.com.int";
};
};
view "eksternal" {
match-clients {
0.0.0.0/0;
};
zone "." {
type hint;
file "/etc/bind/db.root";
};
zone "kud-sukamaju.com" {
type master;
file "/etc/bind/kud-sukamaju.com.eks";
};
};
Satu hal yang perlu diingat adalah saat ada query dari client, maka bind akan mencoba mencocokkan IP penanya dengan view(s) yang ada di dalamnya secara berurutan dari atas ke bawah. Oleh karena itu view yang mengandung network 0.0.0.0 harus dituliskan setelah view yang lainnya.
Konfigurasi zone file
Zone file yang kita buat pertama kali adalah yang digunakan untuk view "eksternal". Kemudian setelah itu kita dapat membuat sebuah file lagi untuk view "internal" yang isinya juga menyertakan file eksternal dengan menggunakan $INCLUDE.
File /etc/bind/kud-sukamaju.com.eks:
@ IN SOA ns.kud-sukamaju.com. admin.kud-sukamaju.com. (
23 7200 3600 604800 86400
)
IN NS ns.kud-sukamaju.com
IN MX 1 mail.kud-sukamaju.com
IN A 12.2.1.10
$ORIGIN kud-sukamaju.com.
www IN A 12.2.1.10
mail IN A 12.2.1.11
ns IN A 12.2.1.12
Kemudian file /etc/bind/kud-sukamaju.com.int:
$INCLUDE "/etc/bind/kud-sukamaju.com.eks"
kepala IN A 192.168.1.5
sekretaris IN A 192.168.1.6
db IN A 192.168.1.7
Dengan cara itu maka semua definisi yang berlaku untuk view eksternal berlaku juga untuk view internal. Selain dengan cara itu pembuatan file zone secara total juga bisa dilakukan. Dengan konsep yang sama kita juga bisa membuat sebuah domain yang berIP a.b.c.d bila dilihat dari jaringan x, namun berIP q.w.e.r bila dilihat dari jaringan y.
Selamat mencoba, semoga sukses!
Referensi
Bind 9 Advanced Reference Manual
Note: Terima kasih kepada Oom Sokam atas tulisannya yang menarik dan berguna ini. Semoga ngga bosen-bosen berbagi ilmu dengan kita yah Oom. Beliau berasal dari Institut Tekonologi Sepuluh November Surabaya. Wajahnya yang boros usia sering membuat orang mengira ia seorang dosen :)
Last Updated ( Wednesday, 27 April 2005 ) Read more "Split DNS Menggunakan Bind9..."
Labels:
network
Configuration LIRC
Download:
LIRC Driver
http://optusnet.dl.sourceforge.net/lirc/lirc-0.7.0.tar.bz2
LIRC GUI Config for .lircrc
http://optusnet.dl.sourceforge.net/lirc/lircrc_config-0.1.1.tar.gz
LIRC Scripts for Supported Remotes
http://www.lirc.org/remotes.tar.bz2
LIRC Script for specific card (PV951)
http://lirc.sourceforge.net/remotes/provideo/PV951
LIRC Test Suite for X
http://optusnet.dl.sourceforge.net/lirc/xirw-0.4.2.tar.bz2
http://optusnet.dl.sourceforge.net/lirc/xrc-0.6.4.tar.bz2
Dependencies:
Kernel > 2.2.4 untuk antarmuka SERIAL/PARAREL
Kernel > 2.4.2 untuk antarmuka TV Tuner
Precompiled (source) kernel yang sama dengan kernel anda (www.kernel.org)
Libtool > 1.3.3 (http://ftp.gnu.org/gnu/libtool/)
Versi terkini saat tulisan ini dibuat: libtool-1.5.8
GCC > 2.x (http://ftp.gnu.org/gnu/gcc/)
Versi terkini saat tulisan ini dibuat: gcc-3.4.3
Automake > 1.4 (http://ftp.gnu.org/gnu/automake/)
Versi terkini saat tulisan ini dibuat: automake-1.9.4
Autoconf > 2.13 (http://ftp.gnu.org/gnu/autoconf/)
Versi terkini saat tulisan ini dibuat: autoconf-2.59
Notes:
Versi perangkat lunak yang tercantum adalah versi terakhir tertanggal sesuai subkategori Last Update
Misc:
Dipersembahkan untuk saudara-saudaraku di Nanggroe Aceh Darussalaam yang tertimpa musibah Tsunami tanggal 26/12/2004. Kami tak akan pernah lupa luka itu, semoga Allah SWT memberikan surga bagi para syuhada-Nya
Hai,
Ketemu lagi dengan OV3RR|D3 yang cakep banget :p
Kali ini kita akan ngebahas LIRC kali yee
OK,
Pertama tama, apa itu LIRC?
LIRC adalah singkatan dari Linux Infrared Remote Control
Nah, jadi kira-kira definisi LIRC adalah sebuah project untuk membuat remot kontrol infra merah anda dapat dikenali dan diberdayagunakan oleh GNU/Linux.
Mengapa project LIRC terbentuk?
Project LIRC terbentuk karena adanya kebutuhan yang cukup mendesak (kalau tidak mau disebut krusial) akan pendayagunaan remot kontrol infra merah di GNU/Linux.
Seperti kita ketahui bersama, GNU/Linux merupakan Sistem Operasi yang saat ini merupakan trend yang banyak menyita perhatian para praktisi TI, pemula, institusi pendidikan, perusahaan, pemerintahan, dan lain lain, sebagai alternatif yang murah namun handal dalam penerapan solusi TI.
Namun sayangnya, dibalik semua kegempitaan tersebut, masih banyak vendor-vendor yang belum mengeluarkan driver-drivernya untuk GNU/Linux, diantaranya vendor-vendor yang menggunakan fasilitas remot kontrol infra merah.
Oleh karena itu, untuk mengatasi kesenjangan antara kebutuhan dengan ketersediaan driver, dibentuklah project LIRC (http://www.lirc.org/) yang dirintis oleh Christoph Bartelmus ( christoph@bartelmus.de ).
Saya sangat menyarankan bagi anda untuk terlebih dahulu membaca-baca literatur di website resmi tersebut untuk memahami bagaimana LIRC bekerja di sistem GNU/Linux anda sebelum melanjutkan ke bagian selanjutnya.
Apa yang dibutuhkan?
Sebelum memulai pembahasan, ada baiknya anda memeriksa sistem anda terlebih dahulu, perangkat keras / lunak apa saja yang dibutuhkan agar proses ini berjalan lancar, kemudian cantumkan di sini:
* Infrared device =
* GNU/Linux distribution =
* Kernel version =
* Kernel source installed =
* Libtool version =
* GCC version =
* Automake version =
* Autoconf version =
Seperti perangkat saya sbb:
* Infrared device = 3DeMON TV Tuner (PV951)
* GNU/Linux distribution = Matrix GNU/Linux 0.2 (buatan sendiri dari LFS 5.0)
* Kernel version = 2.4.27-lck1
* Kernel source installed = ya, di /usr/src/linux
* Libtool version = 1.4.3
* GCC version = 3.3.2
* Automake version = 1.4-p6
* Autoconf version = 2.13
LIRC mendukung hampir semua antarmuka (interface) perangkat remot kontrol infra merah, baik SERIAL, PARAREL, onboard (terintegrasi dengan TV Tuner). Kecuali antarmuka USB. Jadi apabila anda memiliki TV Tuner USB, kemungkinan besar anda belum bisa memfungsikan remot kontrol infra merah anda. Tapi jangan khawatir, ada sebuah project yang menjembatani hal tersebut di http://tusb3210.sourceforge.net/. Namun saya belum mencobanya karena ketiadaan perangkat kerasnya.
LIRC juga membutuhkan kernel minimal versi 2.2.4 untuk perangkat Infrared SERIAL, atau kernel minimal versi 2.4.2 untuk perangkat infrared onboard dengan TV Tuner PCI (saya yakin anda semua memiliki kernel versi 2.4.2 atau di atasnya J)
Tidak ada distribusi GNU/Linux khusus yang tidak didudung oleh LIRC, namun pembahasan kali ini akan menitikberatkan pada instalasi dengan menggunakan source code, oleh karena itu anda membutuhkan source kernel yang diletakkan di /usr/src/linux, libtool minimal versi 1.3.3, GCC minimal versi 3.x, Autoconf minimal versi 2.13, automake minimal versi 1.4. (lihat subkategori Dependencies di header halaman ini)
Periksalah semua dependencies anda satu per satu:
Memeriksa versi kernel:
$ uname r
2.4.27-lck1
Memeriksa ada tidaknya source kernel:
$ ls al /usr/src/linux/
total 4376
drwxr-xr-x 15 573 573 4096 Nov 3 01:42 ./
drwxr-xr-x 6 root root 4096 Dec 28 15:50 ../
drwxr-xr-x 20 573 573 4096 Mar 16 2004 arch/
-rwxrwxrwx 1 root root 69 Aug 11 19:35 compile.run*
-rw-r--r-- 1 root root 50836 Feb 15 2004 config
-rw-r--r-- 1 root root 43539 Nov 3 01:05 .config
-rw-r--r-- 1 root root 50836 Nov 2 23:10 .config.old
-rw-r--r-- 1 573 573 18691 Aug 2 2002 COPYING
-rw-r--r-- 1 root root 82280 Aug 30 14:09 CREDITS
drwxr-xr-x 2 root root 4096 Nov 3 01:41 crypto/
-rw-r--r-- 1 root root 4691 Nov 3 01:06 .depend
drwxr-xr-x 32 573 573 4096 Aug 30 14:09 Documentation/
drwxr-xr-x 40 573 573 4096 Nov 3 01:05 drivers/
drwxr-xr-x 49 573 573 4096 Nov 3 01:31 fs/
-rw-r--r-- 1 root root 222295 Nov 3 01:06 .hdepend
drwxr-xr-x 29 573 573 4096 Nov 3 01:06 include/
drwxr-xr-x 2 573 573 4096 Nov 3 01:42 init/
drwxr-xr-x 2 573 573 4096 Nov 3 01:11 ipc/
drwxr-xr-x 2 573 573 4096 Nov 3 01:07 kernel/
drwxr-xr-x 4 573 573 4096 Nov 3 01:41 lib/
-rw-r--r-- 1 root root 48859 Aug 30 14:09 MAINTAINERS
-rw-rw-r-- 1 root root 19096 Aug 30 14:09 Makefile
drwxr-xr-x 2 573 573 4096 Nov 3 01:09 mm/
drwxr-xr-x 29 573 573 4096 Nov 3 01:11 net/
-rw-r--r-- 1 root root 14287 Mar 16 2004 README
-rw-r--r-- 1 root root 2818 Mar 16 2004 REPORTING-BUGS
-rw-r--r-- 1 root root 9325 Mar 16 2004 Rules.make
drwxr-xr-x 4 573 573 4096 Nov 2 23:12 scripts/
-rw-r--r-- 1 root root 600378 Nov 3 01:42 System.map
-rw-r--r-- 1 root root 2 Nov 3 01:42 .version
-rwxr-xr-x 1 root root 3190102 Nov 3 01:42 vmlinux*
Memeriksa versi libtool:
$ libtool --version
ltmain.sh (GNU libtool) 1.4.3 (1.922.2.111 2002/10/23 02:54:36)
Memeriksa versi GCC:
$ gcc version
gcc (GCC) 3.3.2
Copyright (C) 2003 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Memeriksa versi automake:
$ automake --version
automake (GNU automake) 1.4-p6
Copyright (C) 1999, 2001 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Written by Tom Tromey
Memeriksa versi autoconf:
$ autoconf --version
Autoconf version 2.13
Jika anda yakin kebutuhan minimal telah terpenuhi, maka kita siap untuk memulai pertempuran:
LANGKAH 1: MENDOWNLOAD PAKET-PAKET YANG DIBUTUHKAN
Ada banyak paket yang berkaitan dengan LIRC, tapi sebenarnya paket yang paling utama adalah paket LIRC itu sendiri dan paket REMOTES
untuk itu apabila anda terhubung ke internet, downloadlah paket-paket yang dimaksud dari URL berikut:
http://optusnet.dl.sourceforge.net/lirc/lirc-0.7.0.tar.bz2
http://www.lirc.org/remotes.tar.bz2
simpanlah di direktori /tmp/
LANGKAH 2: KOMPILASI
bagi yang familiar dengan source code, tentu anda tahu apa yang harus anda lakukan, tapi jika anda adalah benar benar pemula, maka ikutilah langkah-langkah berikut dengan berurutan
masuk ke direktori /tmp/
$ cd /tmp/
ekstrak dua paket tersebut
$ bunzip2 -cd lirc-0.7.0.tar.bz2 | tar xv
$ bunzip2 -cd remotes.tar.bz2 | tar xv
masuk ke direktori LIRC
$ cd lirc-0.7.0/
ketikkan perintah './configure'
$ ./configure
Maka akan terlihat tampilan sbb:
di sini anda dituntut untuk mengetahui perangkat keras yang anda miliki, terutama yang berkaitan dengan remot kontrol infra merah.
Pilih section (1) Driver configuration
maka akan tampil pilihan sbb:
pilihlah sesuai dengan perangkat keras yang anda miliki
jika telah selesai memilih, pilih untuk kembali ke menu semula, lalu pilihlah (3) Save configuration & run configure.
Langkah kompilasi telah selesai
LANGKAH 3: INSTALASI
langkah ini relatif lebih mudah yaitu dengan hanya mengetikkan tiga langkah perintah yaitu:
masuklah sebagai super user dengan mengetikkan 'su' dan disusul dengan mengetikkan kata sandi:
$ su
password: ******
Ketikkan perintah 'make'
# make
Kita harus menunggu beberapa saat sebelum proses make selesai dijalankan
lalu setelah selesai, ketikkan perintah 'make install'
# make install
Dan pekerjaan instalasi telah selesai, mudah bukan?
Sekarang waktunya perang sesungguhnya, dimana anda akan dihadapkan dengan gunung batu yang terjal dan berliku, yang bisa membuat anda patah semangat dengan dahi semakin berkerut tanda kesal.
Well, perjuangan belum usai kawan, perjalanan baru saja dimulai. :)
LANGKAH 4: KONFIGURASI
mungkin anda bingung dengan langkah ini, mengapa disebut KONFIGURASI, apa bedanya dengan ./configure? Itu akan saya jelaskan nanti jika anda telah berhasil mengontrol program TV anda dari jarak jauh :).
kini anda perhatikan, ada dua berkas baru di direktori /lib/modules//misc/
# ls -l /lib/modules/2.4.27-lck1/misc/
total 24
-rw-r--r-- 1 root root 14068 Dec 29 15:07 lirc_dev.o
-rw-r--r-- 1 root root 7980 Dec 29 15:07 lirc_i2c.o
Berkas pertama yaitu lirc_dev.o adalah modul yang mengontrol receiver anda, dan lirc_i2c.o adalah modul yang mengontrol transmitter anda.
Apa itu receiver, dan apa pula transmitter?
Bagi anda yang familiar dengan dunia radio, tentu istilah ini tak asing lagi, receiver adalah alat penerima sinyal, dan transmitter adalah alat pengirim sinyal, dalam hal ini receiver berarti perangkat keras infrared yang tertanam di CPU anda, dan transmitter adalah remot kontrolnya.
Dua berkas ini harus diload ke memory dengan perintah
# insmod /lib/modules/2.4.27-lck1/misc/lirc_dev.o
# insmod /lib/modules/2.4.27-lck1/misc/lirc_i2c.o
# depmod -a
# modprobe /lib/modules/2.4.27-lck1/misc/lirc_dev.o
# modprobe /lib/modules/2.4.27-lck1/misc/lirc_i2c.o
Agar dua modul ini diload secara otomatis ke memori setiap boot, maka kita perlu melakukan beberapa modifikasi di berkas /etc/modules dan /etc/modules.conf.
Lakukan perintah sbb:
# echo lirc_dev >> /etc/modules
# echo lirc_i2c >> /etc/modules
# echo alias char-major-61 lirc_dev >> /etc/modules.conf
Dengan adanya dua modul ini di memori, maka receiver dan transmitter siap berinteraksi lewat protokol device LIRC Daemon atau LIRCD yang terdapat di direktori /usr/local/sbin/
# ls -l /usr/local/sbin/ | grep lircd
-rwxr-xr-x 1 root root 251311 Dec 29 15:07 lircd*
-rwxr-xr-x 1 root root 251311 Dec 28 18:04 lircd.0.7.0*
Loadlah LIRC Daemon ini ke memori
# /usr/local/sbin/lircd
Juga agar daemon ini secara otomatis diload ke memori saat boot, maka kita harus membuat beberapa berkas. Dengan perintah sbb:
# echo /usr/local/sbin/lircd >> /etc/rc.d/init.d/lircd
# chmod 755 /etc/rc.d/init.d/lircd
# ln s /etc/rc.d/init.d/lircd /etc/rc3.d/s65lircd
perhatikan juga ada beberapa berkas baru di direktori /dev/
# ls -l /dev/ | grep lirc
crw-rw-rw- 1 root root 61, 0 Dec 30 09:39 lirc
srw-rw-rw- 1 root root 0 Dec 30 14:39 lircd=
prw-r--r-- 1 root root 0 Dec 30 09:39 lircm|
Berkas /dev/lirc adalah berkas CHARACTER SPECIAL FILE, berkas /dev/lircd adalah SOCKET LINK, dan berkas /dev/lircm adalah FIFO. Untuk mengetahui apa arti jenis jenis file tersebut, disarankan untuk membaca literatur terkait.
Namun intinya ketiga berkas tersebut adalah berkas-berkas yang menangani arus lalu lintas data yang dikirimkan oleh transmitter kepada receiver.
Sebelumnya kita harus mengubah permisi berkas /dev/lircd dengan menjalankan perintah:
# chmod 666 /dev/lircd
Selain itu juga di direktori /usr/local/bin/ ada beberapa berkas yang semuanya berawalan ir-
# ls -l /usr/local/bin/ | grep ir
-rwxr-xr-x 1 root root 28525 Dec 29 15:07 ircat*
-rwxr-xr-x 1 root root 29286 Dec 29 15:07 irexec*
-rwxr-xr-x 1 root root 42641 Dec 29 15:07 irpty*
-rwxr-xr-x 1 root root 248412 Dec 29 15:07 irrecord*
-rwxr-xr-x 1 root root 38753 Dec 29 15:07 irsend*
-rwxr-xr-x 1 root root 29549 Dec 29 15:07 irw*
-rwxr-xr-x 1 root root 65921 Dec 29 15:07 irxevent*
Tiap berkas memiliki di direktori ini memiliki fungsi fungsi tersendiri yang berkaitan dengan translasi kode sinyal yang dikeluarkan oleh transmitter.
LANGKAH 5: TEST!
Tentunya tak afdol jika paket yang telah berhasil kita pasang belum kita uji untuk melihat berhasil atau tidaknya jerih payah kita.
Untuk itu kita memerlukan salah satu program yang terletak di /usr/local/bin/ yaitu 'irw'
setelah irw kita jalankan, kita bisa mengarahkan remot kontrol kita ke arah receiver spot dan menekan beberapa tombol untuk memastikan semua telah berjalan dengan baik. Untuk keluar tekan tombol - secara bersamaan.
Jika anda melihat algoritma seperti yang terlihat di bawah, maka anda boleh tersenyum barang sejenak, karena anda telah berhasil menginisialisasikan perangkat anda. SELAMAT!!
# irw
0000000061d6807f
0000000061d640bf
0000000061d6c03f
0000000061d620df
0000000061d6a05f
0000000061d6609f
0000000061d6e01f
0000000061d610ef
0000000061d6906f
0000000061d600ff
0000000061d650af
0000000061d6e817
0000000061d6d02f
0000000061d68877
0000000061d6f00f
0000000061d6c837
0000000061d608f7
0000000061d69867
0000000061d66897
0000000061d628d7
0000000061d618e7
0000000061d630cf
0000000061d67887
0000000061d6d827
0000000061d6f807
0000000061d6708f
0000000061d6b847
Sekarang bagaimana caranya mengkonversi nilai nilai di atas menjadi simbol yang dimengerti?
Mudah saja, anda masih ingat dengan paket remotes.tar.bz2 yang anda download sebelumnya?
Masuklah sekali lagi ke direktori /tmp/ kemudian masuk ke direktori remotes/
# cd /tmp/remotes/
Lalu lihat-lihatlah isinya, barangkali anda tertarik dengan nama-nama vendor yang bisa jadi memproduksi remot kontrol infra merah anda :)
# ls -l
total 1108
drwxr-sr-x 2 26674 6444 4096 Nov 18 2002 3m/
drwxr-sr-x 2 26674 6444 4096 Jul 19 2003 abit/
drwxr-sr-x 2 26674 6444 4096 Nov 18 2002 provideo/
drwxr-sr-x 2 26674 6444 4096 Apr 12 2004 zenith/
drwxr-sr-x 2 26674 6444 4096 Nov 18 2002 zoltrix/
Saya melihat vendor remot kontrol infra merah saya, yaitu provideo, ini bisa saja berbeda dengan remot kontrol infra merah anda.
Oleh karena itu saya membuka direkori provideo tersebut
# cd provideo/
# ls -l
total 4
-rw-r--r-- 1 26674 6444 2468 May 27 2000 PV951
Ada sebuah berkas bernama PV951 yang merupakan berkas konfigurasi untuk remot kontrol infra merah saya, apabila saya melihat isinya, maka akan terlihat isinya sebagai berikut:
# cat PV951
#
# this config file was automatically generated
# using lirc-0.6.1 on Wed May 24 23:10:08 2000
#
# contributed by BartOwl
#
# brand: 3DeMON (from J.Sir Computer inc.) http://www.jsir.com/
# model: PV951 (http://www.jsir.com/pv951.htm)
# supported devices: Remote control for this TV-capture card
#
# The manufacturer seems to be ProVideo: http://www.provideo.com.tw
# Funny: they have Linux "drivers" for this card...
#
begin remote
name PV951
bits 16
flags SPACE_ENC|CONST_LENGTH
eps 30
aeps 100
header 9067 4482
one 597 1650
zero 597 529
ptrail 584
repeat 9068 2232
pre_data_bits 16
pre_data 0x61D6
gap 107983
repeat_bit 0
begin codes
power 0x00000000000048B7
air/cbl 0x000000000000D02F
pc/tv 0x0000000000008877
source 0x000000000000F00F
mts 0x000000000000C837
mute 0x00000000000008F7
1 0x000000000000807F
2 0x00000000000040BF
3 0x000000000000C03F
4 0x00000000000020DF
5 0x000000000000A05F
6 0x000000000000609F
7 0x000000000000E01F
8 0x00000000000010EF
9 0x000000000000906F
0 0x00000000000000FF
+100 0x00000000000050AF
ch_rtn 0x000000000000E817
ch+ 0x00000000000058A7
ch- 0x0000000000007887
vol+ 0x000000000000D827
vol- 0x000000000000F807
func 0x0000000000009867
ttx 0x000000000000B04F
pg+ 0x000000000000708F
pg- 0x000000000000B847
cc 0x0000000000006897
sync 0x00000000000028D7
ch+- 0x00000000000018E7
autoscan 0x00000000000030CF
end codes
end remote
Inilah dia translasi kode algoritma remot kontrol infra merah anda,
langkah selanjutnya adalah menyalin berkas tersebut ke direktori /etc/ dan mengganti nama PV951 menjadi 'lircd.conf'
# cp PV951 /etc/lircd.conf
Jalankan kembali irw dan ulangi lagi langkah sebelumnya dengan remot kontrol infra merah anda
# irw
0000000061d6807f 00 1 PV951
0000000061d640bf 00 2 PV951
0000000061d6c03f 00 3 PV951
0000000061d620df 00 4 PV951
0000000061d6a05f 00 5 PV951
0000000061d6609f 00 6 PV951
0000000061d6e01f 00 7 PV951
0000000061d610ef 00 8 PV951
0000000061d6906f 00 9 PV951
0000000061d600ff 00 0 PV951
0000000061d650af 00 +100 PV951
0000000061d6e817 00 ch_rtn PV951
0000000061d6d02f 00 air/cbl PV951
0000000061d68877 00 pc/tv PV951
0000000061d6f00f 00 source PV951
0000000061d6c837 00 mts PV951
0000000061d608f7 00 mute PV951
0000000061d69867 00 func PV951
0000000061d66897 00 cc PV951
0000000061d628d7 00 sync PV951
0000000061d618e7 00 ch+- PV951
0000000061d630cf 00 autoscan PV951
0000000061d67887 00 ch- PV951
0000000061d6d827 00 vol+ PV951
0000000061d6f807 00 vol- PV951
0000000061d6708f 00 pg+ PV951
0000000061d6b847 00 pg- PV951
Agak terlihat sedikit berbeda bukan? Ya, kini remot kontrol infra merah anda telah siap digunakan untuk tugas tugas yang lebih berat dari sekedar memindahkan saluran TV semata. :)
DRIVER MODEL
| +------------------------------------------------------+
S | | 'gpm -t msc -m /dev/lircm' or a well configured X |
O | | (see section 'Configuring lircmd') for details |
F | +--------------+---------------------------------------+
T | |
W | /dev/lircm (named pipe (FIFO) ==> one connection)
A | |
R | +-----------+-----------+ +-------------------------------+
E | | mouse daemon (lircmd) | | tools (irexec, irxevent, ...) |
| | configured with | | configured with ~/.lircrc |
| | lircmd.conf | | |
| +-----------+-----------+ +-----------+-------------------+
| | |
| +-------------+-------------+
| |
| /dev/lircd (socket ==> multiple connections)
| |
S | +----------------+--------------------------+
O | | decoder daemon (lircd), irrecord or mode2 | TCP/IP
F | | lircd is configured through lircd.conf +--- port
T | User space | | 8765
W | +------------------+------------------------+
A | |
R | |
E | |
| |
| |
| |
+---------------------------------+----------------------------------
| Kernel space | (character device
| | driver ==>
| +------------+----------+ one connection)
| | |
| /dev/lirc /dev/ttySx
| | |
| +------------+-------------+ +-----+---------------+
| | LIRC device driver | | Linux serial driver |
| | (with ioctl-interface) | | |
| +------------+-------------+ +----------+----------+
| | |
--+--------------------+----------------------------+------------------
| | |
| +----------+------------+ |
| | | |
| +-------+----------------+ +----+-----+ +-------+-----------------+
H | | serial / parallel port | | TV cards | | Irman/RemoteMaster/etc. |
W | +------------------------+ +----------+ +-------------------------+
|
APLIKASI YANG BISA DIGUNAKAN BERSAMA LIRC
sebenarnya aplikasi yang bisa disimbiosa dengan LIRC tak terbatas pada aplikasi multimedia umum seperti XMMS, Mplayer, Kradio, TV-Time, dll. Tapi juga bisa menangani aplikasi non multimedia seperti web browser, home automation program, bash scripts, men-shutdown komputer anda, dan bahkan mengeksekusi semua perintah linux!.
Anda pikir saya membual?
Mari kita buktikan sendiri. Asumsi bahwa anda telah melewati semua proses kompilasi, instalasi, dan konfigurasi dengan baik, adalah syarat mutlak :)
KONFIGURASI LIRCRC
Apa yang anda lakukan dengan remot kontrol infra merah, sangat tergantung pada berkas /etc/lircrc, berkas ini menentukan semua perilaku remot kontrol infra merah anda. Berkas ini belum ada jika anda belum membuatnya sendiri, karenanya buatlah sebuah berkas yang dimaksud dengan perintah:
# echo #berkas /etc/lircrc >> /etc/lircrc
Kembali beberapa langkah ke belakang sejenak untuk memikirkan program apa yang akan dijalankan dengan remot kontrol infra merah anda.
Ada ide?
Hmmm, bagaimana untuk permulaannya jika tombol satu (1) di remot kontrol infra merah anda bisa menyapa anda di konsol? Ide yang bagus bukan
Mari kita mulai. Suntinglah berkas /etc/lircrc anda dengan editor favorit anda (saya lebih menyukai vi karena kesederhanaannya)
# vi /etc/lircrc
Tekanlah huruf pada tuts keyboard untuk mulai menyunting, lalu salinlah baris berikut ini
#berkas /etc/lircrc
begin
button = 1
prog = irexec
remote = PV951
config = echo Halo!!!
end
simpanlah berkas anda dengan menekan tuts
sekarang berikan perintah ini
# irexec
Dan tekanlah tombol 1 di remot kontrol infra merah anda, dan anda akan melihat:
# irexec
Halo!!!
Tekan - untuk keluar dar program irexec
Mengapa hal di atas bisa terjadi?
Mari kita lihat kembali konfigurasi /etc/lircrc berikut penjelasannya
#berkas /etc/lircrc
begin ---> memulai argumen
button = 1 ---> tombol di remot kontrol infra merah yang digunakan
prog = irexec ---> program yang menerima perintah
remote = PV951 ---> jenis remot kontrol infra merah
config = echo Halo!!! ---> aplikasi yang akan dijalankan saat tombol ditekan
end ---> akhir argumen
Argumen 'begin' mengawali konfigurasi per tombol, dan argumen 'end' mengakhirinya.
'button' adalah tombol yang telah terkonfigurasi dalam /etc/lircd.conf
konfigurasi tombol remot kontrol infra merah PV951 jika diuraikan adalah sbb:
perhatikan kolom button, di sana terdapat bermacam tombol sesuai dengan remot kontrol infra merah anda.
Baiklah, mungkin anda bosan dengan teori dan ingin segera mengeluarkan kelinci dari topi sulap :)
mari kita sunting kembali berkas /etc/lircrc, dan berikan argumen berikut di baris 'config='
#berkas /etc/lircrc
begin
button = 1
prog = irexec
remote = PV951
config = firefox http://www.google.com/
end
Simpanlah berkas tersebut kembali
lalu jalankan kembali irexec dan tekanlah tombol 1 di remot kontrol infra merah anda, dan keajaiban akan terjadi (itu jika anda tidak mengidap penyakit jantung dan komputer anda terhubung ke internet) :)
tentu saja anda bisa menambahkan argumen argumen lain sesuka anda selama reserved button masih tersedia di remot kontrol infra merah anda, contohnya adalah sbb:
#berkas /etc/lircrc
begin
button = 1
prog = irexec
remote = PV951
config = firefox http://www.google.com/
end
begin
button = 2
prog = irexec
remote = PV951
config = xmms
end
Dan seterusnya...
demikianlah akhir tutorial konfigurasi LIRC ini semoga berguna bagi anda yang mempelajarinya
baca juga tutorial mengenai penggunaan LIRC lebih lanjut dengan aplikasi multimedia seperti XMMS, TV-Time, dan KRadio.
Let the good time rolls
Last Updated ( Thursday, 23 June 2005 ) Read more "Configuration LIRC..."
LIRC Driver
http://optusnet.dl.sourceforge.net/lirc/lirc-0.7.0.tar.bz2
LIRC GUI Config for .lircrc
http://optusnet.dl.sourceforge.net/lirc/lircrc_config-0.1.1.tar.gz
LIRC Scripts for Supported Remotes
http://www.lirc.org/remotes.tar.bz2
LIRC Script for specific card (PV951)
http://lirc.sourceforge.net/remotes/provideo/PV951
LIRC Test Suite for X
http://optusnet.dl.sourceforge.net/lirc/xirw-0.4.2.tar.bz2
http://optusnet.dl.sourceforge.net/lirc/xrc-0.6.4.tar.bz2
Dependencies:
Kernel > 2.2.4 untuk antarmuka SERIAL/PARAREL
Kernel > 2.4.2 untuk antarmuka TV Tuner
Precompiled (source) kernel yang sama dengan kernel anda (www.kernel.org)
Libtool > 1.3.3 (http://ftp.gnu.org/gnu/libtool/)
Versi terkini saat tulisan ini dibuat: libtool-1.5.8
GCC > 2.x (http://ftp.gnu.org/gnu/gcc/)
Versi terkini saat tulisan ini dibuat: gcc-3.4.3
Automake > 1.4 (http://ftp.gnu.org/gnu/automake/)
Versi terkini saat tulisan ini dibuat: automake-1.9.4
Autoconf > 2.13 (http://ftp.gnu.org/gnu/autoconf/)
Versi terkini saat tulisan ini dibuat: autoconf-2.59
Notes:
Versi perangkat lunak yang tercantum adalah versi terakhir tertanggal sesuai subkategori Last Update
Misc:
Dipersembahkan untuk saudara-saudaraku di Nanggroe Aceh Darussalaam yang tertimpa musibah Tsunami tanggal 26/12/2004. Kami tak akan pernah lupa luka itu, semoga Allah SWT memberikan surga bagi para syuhada-Nya
Hai,
Ketemu lagi dengan OV3RR|D3 yang cakep banget :p
Kali ini kita akan ngebahas LIRC kali yee
OK,
Pertama tama, apa itu LIRC?
LIRC adalah singkatan dari Linux Infrared Remote Control
Nah, jadi kira-kira definisi LIRC adalah sebuah project untuk membuat remot kontrol infra merah anda dapat dikenali dan diberdayagunakan oleh GNU/Linux.
Mengapa project LIRC terbentuk?
Project LIRC terbentuk karena adanya kebutuhan yang cukup mendesak (kalau tidak mau disebut krusial) akan pendayagunaan remot kontrol infra merah di GNU/Linux.
Seperti kita ketahui bersama, GNU/Linux merupakan Sistem Operasi yang saat ini merupakan trend yang banyak menyita perhatian para praktisi TI, pemula, institusi pendidikan, perusahaan, pemerintahan, dan lain lain, sebagai alternatif yang murah namun handal dalam penerapan solusi TI.
Namun sayangnya, dibalik semua kegempitaan tersebut, masih banyak vendor-vendor yang belum mengeluarkan driver-drivernya untuk GNU/Linux, diantaranya vendor-vendor yang menggunakan fasilitas remot kontrol infra merah.
Oleh karena itu, untuk mengatasi kesenjangan antara kebutuhan dengan ketersediaan driver, dibentuklah project LIRC (http://www.lirc.org/) yang dirintis oleh Christoph Bartelmus ( christoph@bartelmus.de ).
Saya sangat menyarankan bagi anda untuk terlebih dahulu membaca-baca literatur di website resmi tersebut untuk memahami bagaimana LIRC bekerja di sistem GNU/Linux anda sebelum melanjutkan ke bagian selanjutnya.
Apa yang dibutuhkan?
Sebelum memulai pembahasan, ada baiknya anda memeriksa sistem anda terlebih dahulu, perangkat keras / lunak apa saja yang dibutuhkan agar proses ini berjalan lancar, kemudian cantumkan di sini:
* Infrared device =
* GNU/Linux distribution =
* Kernel version =
* Kernel source installed =
* Libtool version =
* GCC version =
* Automake version =
* Autoconf version =
Seperti perangkat saya sbb:
* Infrared device = 3DeMON TV Tuner (PV951)
* GNU/Linux distribution = Matrix GNU/Linux 0.2 (buatan sendiri dari LFS 5.0)
* Kernel version = 2.4.27-lck1
* Kernel source installed = ya, di /usr/src/linux
* Libtool version = 1.4.3
* GCC version = 3.3.2
* Automake version = 1.4-p6
* Autoconf version = 2.13
LIRC mendukung hampir semua antarmuka (interface) perangkat remot kontrol infra merah, baik SERIAL, PARAREL, onboard (terintegrasi dengan TV Tuner). Kecuali antarmuka USB. Jadi apabila anda memiliki TV Tuner USB, kemungkinan besar anda belum bisa memfungsikan remot kontrol infra merah anda. Tapi jangan khawatir, ada sebuah project yang menjembatani hal tersebut di http://tusb3210.sourceforge.net/. Namun saya belum mencobanya karena ketiadaan perangkat kerasnya.
LIRC juga membutuhkan kernel minimal versi 2.2.4 untuk perangkat Infrared SERIAL, atau kernel minimal versi 2.4.2 untuk perangkat infrared onboard dengan TV Tuner PCI (saya yakin anda semua memiliki kernel versi 2.4.2 atau di atasnya J)
Tidak ada distribusi GNU/Linux khusus yang tidak didudung oleh LIRC, namun pembahasan kali ini akan menitikberatkan pada instalasi dengan menggunakan source code, oleh karena itu anda membutuhkan source kernel yang diletakkan di /usr/src/linux, libtool minimal versi 1.3.3, GCC minimal versi 3.x, Autoconf minimal versi 2.13, automake minimal versi 1.4. (lihat subkategori Dependencies di header halaman ini)
Periksalah semua dependencies anda satu per satu:
Memeriksa versi kernel:
$ uname r
2.4.27-lck1
Memeriksa ada tidaknya source kernel:
$ ls al /usr/src/linux/
total 4376
drwxr-xr-x 15 573 573 4096 Nov 3 01:42 ./
drwxr-xr-x 6 root root 4096 Dec 28 15:50 ../
drwxr-xr-x 20 573 573 4096 Mar 16 2004 arch/
-rwxrwxrwx 1 root root 69 Aug 11 19:35 compile.run*
-rw-r--r-- 1 root root 50836 Feb 15 2004 config
-rw-r--r-- 1 root root 43539 Nov 3 01:05 .config
-rw-r--r-- 1 root root 50836 Nov 2 23:10 .config.old
-rw-r--r-- 1 573 573 18691 Aug 2 2002 COPYING
-rw-r--r-- 1 root root 82280 Aug 30 14:09 CREDITS
drwxr-xr-x 2 root root 4096 Nov 3 01:41 crypto/
-rw-r--r-- 1 root root 4691 Nov 3 01:06 .depend
drwxr-xr-x 32 573 573 4096 Aug 30 14:09 Documentation/
drwxr-xr-x 40 573 573 4096 Nov 3 01:05 drivers/
drwxr-xr-x 49 573 573 4096 Nov 3 01:31 fs/
-rw-r--r-- 1 root root 222295 Nov 3 01:06 .hdepend
drwxr-xr-x 29 573 573 4096 Nov 3 01:06 include/
drwxr-xr-x 2 573 573 4096 Nov 3 01:42 init/
drwxr-xr-x 2 573 573 4096 Nov 3 01:11 ipc/
drwxr-xr-x 2 573 573 4096 Nov 3 01:07 kernel/
drwxr-xr-x 4 573 573 4096 Nov 3 01:41 lib/
-rw-r--r-- 1 root root 48859 Aug 30 14:09 MAINTAINERS
-rw-rw-r-- 1 root root 19096 Aug 30 14:09 Makefile
drwxr-xr-x 2 573 573 4096 Nov 3 01:09 mm/
drwxr-xr-x 29 573 573 4096 Nov 3 01:11 net/
-rw-r--r-- 1 root root 14287 Mar 16 2004 README
-rw-r--r-- 1 root root 2818 Mar 16 2004 REPORTING-BUGS
-rw-r--r-- 1 root root 9325 Mar 16 2004 Rules.make
drwxr-xr-x 4 573 573 4096 Nov 2 23:12 scripts/
-rw-r--r-- 1 root root 600378 Nov 3 01:42 System.map
-rw-r--r-- 1 root root 2 Nov 3 01:42 .version
-rwxr-xr-x 1 root root 3190102 Nov 3 01:42 vmlinux*
Memeriksa versi libtool:
$ libtool --version
ltmain.sh (GNU libtool) 1.4.3 (1.922.2.111 2002/10/23 02:54:36)
Memeriksa versi GCC:
$ gcc version
gcc (GCC) 3.3.2
Copyright (C) 2003 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Memeriksa versi automake:
$ automake --version
automake (GNU automake) 1.4-p6
Copyright (C) 1999, 2001 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Written by Tom Tromey
Memeriksa versi autoconf:
$ autoconf --version
Autoconf version 2.13
Jika anda yakin kebutuhan minimal telah terpenuhi, maka kita siap untuk memulai pertempuran:
LANGKAH 1: MENDOWNLOAD PAKET-PAKET YANG DIBUTUHKAN
Ada banyak paket yang berkaitan dengan LIRC, tapi sebenarnya paket yang paling utama adalah paket LIRC itu sendiri dan paket REMOTES
untuk itu apabila anda terhubung ke internet, downloadlah paket-paket yang dimaksud dari URL berikut:
http://optusnet.dl.sourceforge.net/lirc/lirc-0.7.0.tar.bz2
http://www.lirc.org/remotes.tar.bz2
simpanlah di direktori /tmp/
LANGKAH 2: KOMPILASI
bagi yang familiar dengan source code, tentu anda tahu apa yang harus anda lakukan, tapi jika anda adalah benar benar pemula, maka ikutilah langkah-langkah berikut dengan berurutan
masuk ke direktori /tmp/
$ cd /tmp/
ekstrak dua paket tersebut
$ bunzip2 -cd lirc-0.7.0.tar.bz2 | tar xv
$ bunzip2 -cd remotes.tar.bz2 | tar xv
masuk ke direktori LIRC
$ cd lirc-0.7.0/
ketikkan perintah './configure'
$ ./configure
Maka akan terlihat tampilan sbb:
di sini anda dituntut untuk mengetahui perangkat keras yang anda miliki, terutama yang berkaitan dengan remot kontrol infra merah.
Pilih section (1) Driver configuration
maka akan tampil pilihan sbb:
pilihlah sesuai dengan perangkat keras yang anda miliki
jika telah selesai memilih, pilih untuk kembali ke menu semula, lalu pilihlah (3) Save configuration & run configure.
Langkah kompilasi telah selesai
LANGKAH 3: INSTALASI
langkah ini relatif lebih mudah yaitu dengan hanya mengetikkan tiga langkah perintah yaitu:
masuklah sebagai super user dengan mengetikkan 'su' dan disusul dengan mengetikkan kata sandi:
$ su
password: ******
Ketikkan perintah 'make'
# make
Kita harus menunggu beberapa saat sebelum proses make selesai dijalankan
lalu setelah selesai, ketikkan perintah 'make install'
# make install
Dan pekerjaan instalasi telah selesai, mudah bukan?
Sekarang waktunya perang sesungguhnya, dimana anda akan dihadapkan dengan gunung batu yang terjal dan berliku, yang bisa membuat anda patah semangat dengan dahi semakin berkerut tanda kesal.
Well, perjuangan belum usai kawan, perjalanan baru saja dimulai. :)
LANGKAH 4: KONFIGURASI
mungkin anda bingung dengan langkah ini, mengapa disebut KONFIGURASI, apa bedanya dengan ./configure? Itu akan saya jelaskan nanti jika anda telah berhasil mengontrol program TV anda dari jarak jauh :).
kini anda perhatikan, ada dua berkas baru di direktori /lib/modules//misc/
# ls -l /lib/modules/2.4.27-lck1/misc/
total 24
-rw-r--r-- 1 root root 14068 Dec 29 15:07 lirc_dev.o
-rw-r--r-- 1 root root 7980 Dec 29 15:07 lirc_i2c.o
Berkas pertama yaitu lirc_dev.o adalah modul yang mengontrol receiver anda, dan lirc_i2c.o adalah modul yang mengontrol transmitter anda.
Apa itu receiver, dan apa pula transmitter?
Bagi anda yang familiar dengan dunia radio, tentu istilah ini tak asing lagi, receiver adalah alat penerima sinyal, dan transmitter adalah alat pengirim sinyal, dalam hal ini receiver berarti perangkat keras infrared yang tertanam di CPU anda, dan transmitter adalah remot kontrolnya.
Dua berkas ini harus diload ke memory dengan perintah
# insmod /lib/modules/2.4.27-lck1/misc/lirc_dev.o
# insmod /lib/modules/2.4.27-lck1/misc/lirc_i2c.o
# depmod -a
# modprobe /lib/modules/2.4.27-lck1/misc/lirc_dev.o
# modprobe /lib/modules/2.4.27-lck1/misc/lirc_i2c.o
Agar dua modul ini diload secara otomatis ke memori setiap boot, maka kita perlu melakukan beberapa modifikasi di berkas /etc/modules dan /etc/modules.conf.
Lakukan perintah sbb:
# echo lirc_dev >> /etc/modules
# echo lirc_i2c >> /etc/modules
# echo alias char-major-61 lirc_dev >> /etc/modules.conf
Dengan adanya dua modul ini di memori, maka receiver dan transmitter siap berinteraksi lewat protokol device LIRC Daemon atau LIRCD yang terdapat di direktori /usr/local/sbin/
# ls -l /usr/local/sbin/ | grep lircd
-rwxr-xr-x 1 root root 251311 Dec 29 15:07 lircd*
-rwxr-xr-x 1 root root 251311 Dec 28 18:04 lircd.0.7.0*
Loadlah LIRC Daemon ini ke memori
# /usr/local/sbin/lircd
Juga agar daemon ini secara otomatis diload ke memori saat boot, maka kita harus membuat beberapa berkas. Dengan perintah sbb:
# echo /usr/local/sbin/lircd >> /etc/rc.d/init.d/lircd
# chmod 755 /etc/rc.d/init.d/lircd
# ln s /etc/rc.d/init.d/lircd /etc/rc3.d/s65lircd
perhatikan juga ada beberapa berkas baru di direktori /dev/
# ls -l /dev/ | grep lirc
crw-rw-rw- 1 root root 61, 0 Dec 30 09:39 lirc
srw-rw-rw- 1 root root 0 Dec 30 14:39 lircd=
prw-r--r-- 1 root root 0 Dec 30 09:39 lircm|
Berkas /dev/lirc adalah berkas CHARACTER SPECIAL FILE, berkas /dev/lircd adalah SOCKET LINK, dan berkas /dev/lircm adalah FIFO. Untuk mengetahui apa arti jenis jenis file tersebut, disarankan untuk membaca literatur terkait.
Namun intinya ketiga berkas tersebut adalah berkas-berkas yang menangani arus lalu lintas data yang dikirimkan oleh transmitter kepada receiver.
Sebelumnya kita harus mengubah permisi berkas /dev/lircd dengan menjalankan perintah:
# chmod 666 /dev/lircd
Selain itu juga di direktori /usr/local/bin/ ada beberapa berkas yang semuanya berawalan ir-
# ls -l /usr/local/bin/ | grep ir
-rwxr-xr-x 1 root root 28525 Dec 29 15:07 ircat*
-rwxr-xr-x 1 root root 29286 Dec 29 15:07 irexec*
-rwxr-xr-x 1 root root 42641 Dec 29 15:07 irpty*
-rwxr-xr-x 1 root root 248412 Dec 29 15:07 irrecord*
-rwxr-xr-x 1 root root 38753 Dec 29 15:07 irsend*
-rwxr-xr-x 1 root root 29549 Dec 29 15:07 irw*
-rwxr-xr-x 1 root root 65921 Dec 29 15:07 irxevent*
Tiap berkas memiliki di direktori ini memiliki fungsi fungsi tersendiri yang berkaitan dengan translasi kode sinyal yang dikeluarkan oleh transmitter.
LANGKAH 5: TEST!
Tentunya tak afdol jika paket yang telah berhasil kita pasang belum kita uji untuk melihat berhasil atau tidaknya jerih payah kita.
Untuk itu kita memerlukan salah satu program yang terletak di /usr/local/bin/ yaitu 'irw'
setelah irw kita jalankan, kita bisa mengarahkan remot kontrol kita ke arah receiver spot dan menekan beberapa tombol untuk memastikan semua telah berjalan dengan baik. Untuk keluar tekan tombol - secara bersamaan.
Jika anda melihat algoritma seperti yang terlihat di bawah, maka anda boleh tersenyum barang sejenak, karena anda telah berhasil menginisialisasikan perangkat anda. SELAMAT!!
# irw
0000000061d6807f
0000000061d640bf
0000000061d6c03f
0000000061d620df
0000000061d6a05f
0000000061d6609f
0000000061d6e01f
0000000061d610ef
0000000061d6906f
0000000061d600ff
0000000061d650af
0000000061d6e817
0000000061d6d02f
0000000061d68877
0000000061d6f00f
0000000061d6c837
0000000061d608f7
0000000061d69867
0000000061d66897
0000000061d628d7
0000000061d618e7
0000000061d630cf
0000000061d67887
0000000061d6d827
0000000061d6f807
0000000061d6708f
0000000061d6b847
Sekarang bagaimana caranya mengkonversi nilai nilai di atas menjadi simbol yang dimengerti?
Mudah saja, anda masih ingat dengan paket remotes.tar.bz2 yang anda download sebelumnya?
Masuklah sekali lagi ke direktori /tmp/ kemudian masuk ke direktori remotes/
# cd /tmp/remotes/
Lalu lihat-lihatlah isinya, barangkali anda tertarik dengan nama-nama vendor yang bisa jadi memproduksi remot kontrol infra merah anda :)
# ls -l
total 1108
drwxr-sr-x 2 26674 6444 4096 Nov 18 2002 3m/
drwxr-sr-x 2 26674 6444 4096 Jul 19 2003 abit/
drwxr-sr-x 2 26674 6444 4096 Nov 18 2002 provideo/
drwxr-sr-x 2 26674 6444 4096 Apr 12 2004 zenith/
drwxr-sr-x 2 26674 6444 4096 Nov 18 2002 zoltrix/
Saya melihat vendor remot kontrol infra merah saya, yaitu provideo, ini bisa saja berbeda dengan remot kontrol infra merah anda.
Oleh karena itu saya membuka direkori provideo tersebut
# cd provideo/
# ls -l
total 4
-rw-r--r-- 1 26674 6444 2468 May 27 2000 PV951
Ada sebuah berkas bernama PV951 yang merupakan berkas konfigurasi untuk remot kontrol infra merah saya, apabila saya melihat isinya, maka akan terlihat isinya sebagai berikut:
# cat PV951
#
# this config file was automatically generated
# using lirc-0.6.1 on Wed May 24 23:10:08 2000
#
# contributed by BartOwl
#
# brand: 3DeMON (from J.Sir Computer inc.) http://www.jsir.com/
# model: PV951 (http://www.jsir.com/pv951.htm)
# supported devices: Remote control for this TV-capture card
#
# The manufacturer seems to be ProVideo: http://www.provideo.com.tw
# Funny: they have Linux "drivers" for this card...
#
begin remote
name PV951
bits 16
flags SPACE_ENC|CONST_LENGTH
eps 30
aeps 100
header 9067 4482
one 597 1650
zero 597 529
ptrail 584
repeat 9068 2232
pre_data_bits 16
pre_data 0x61D6
gap 107983
repeat_bit 0
begin codes
power 0x00000000000048B7
air/cbl 0x000000000000D02F
pc/tv 0x0000000000008877
source 0x000000000000F00F
mts 0x000000000000C837
mute 0x00000000000008F7
1 0x000000000000807F
2 0x00000000000040BF
3 0x000000000000C03F
4 0x00000000000020DF
5 0x000000000000A05F
6 0x000000000000609F
7 0x000000000000E01F
8 0x00000000000010EF
9 0x000000000000906F
0 0x00000000000000FF
+100 0x00000000000050AF
ch_rtn 0x000000000000E817
ch+ 0x00000000000058A7
ch- 0x0000000000007887
vol+ 0x000000000000D827
vol- 0x000000000000F807
func 0x0000000000009867
ttx 0x000000000000B04F
pg+ 0x000000000000708F
pg- 0x000000000000B847
cc 0x0000000000006897
sync 0x00000000000028D7
ch+- 0x00000000000018E7
autoscan 0x00000000000030CF
end codes
end remote
Inilah dia translasi kode algoritma remot kontrol infra merah anda,
langkah selanjutnya adalah menyalin berkas tersebut ke direktori /etc/ dan mengganti nama PV951 menjadi 'lircd.conf'
# cp PV951 /etc/lircd.conf
Jalankan kembali irw dan ulangi lagi langkah sebelumnya dengan remot kontrol infra merah anda
# irw
0000000061d6807f 00 1 PV951
0000000061d640bf 00 2 PV951
0000000061d6c03f 00 3 PV951
0000000061d620df 00 4 PV951
0000000061d6a05f 00 5 PV951
0000000061d6609f 00 6 PV951
0000000061d6e01f 00 7 PV951
0000000061d610ef 00 8 PV951
0000000061d6906f 00 9 PV951
0000000061d600ff 00 0 PV951
0000000061d650af 00 +100 PV951
0000000061d6e817 00 ch_rtn PV951
0000000061d6d02f 00 air/cbl PV951
0000000061d68877 00 pc/tv PV951
0000000061d6f00f 00 source PV951
0000000061d6c837 00 mts PV951
0000000061d608f7 00 mute PV951
0000000061d69867 00 func PV951
0000000061d66897 00 cc PV951
0000000061d628d7 00 sync PV951
0000000061d618e7 00 ch+- PV951
0000000061d630cf 00 autoscan PV951
0000000061d67887 00 ch- PV951
0000000061d6d827 00 vol+ PV951
0000000061d6f807 00 vol- PV951
0000000061d6708f 00 pg+ PV951
0000000061d6b847 00 pg- PV951
Agak terlihat sedikit berbeda bukan? Ya, kini remot kontrol infra merah anda telah siap digunakan untuk tugas tugas yang lebih berat dari sekedar memindahkan saluran TV semata. :)
DRIVER MODEL
| +------------------------------------------------------+
S | | 'gpm -t msc -m /dev/lircm' or a well configured X |
O | | (see section 'Configuring lircmd') for details |
F | +--------------+---------------------------------------+
T | |
W | /dev/lircm (named pipe (FIFO) ==> one connection)
A | |
R | +-----------+-----------+ +-------------------------------+
E | | mouse daemon (lircmd) | | tools (irexec, irxevent, ...) |
| | configured with | | configured with ~/.lircrc |
| | lircmd.conf | | |
| +-----------+-----------+ +-----------+-------------------+
| | |
| +-------------+-------------+
| |
| /dev/lircd (socket ==> multiple connections)
| |
S | +----------------+--------------------------+
O | | decoder daemon (lircd), irrecord or mode2 | TCP/IP
F | | lircd is configured through lircd.conf +--- port
T | User space | | 8765
W | +------------------+------------------------+
A | |
R | |
E | |
| |
| |
| |
+---------------------------------+----------------------------------
| Kernel space | (character device
| | driver ==>
| +------------+----------+ one connection)
| | |
| /dev/lirc /dev/ttySx
| | |
| +------------+-------------+ +-----+---------------+
| | LIRC device driver | | Linux serial driver |
| | (with ioctl-interface) | | |
| +------------+-------------+ +----------+----------+
| | |
--+--------------------+----------------------------+------------------
| | |
| +----------+------------+ |
| | | |
| +-------+----------------+ +----+-----+ +-------+-----------------+
H | | serial / parallel port | | TV cards | | Irman/RemoteMaster/etc. |
W | +------------------------+ +----------+ +-------------------------+
|
APLIKASI YANG BISA DIGUNAKAN BERSAMA LIRC
sebenarnya aplikasi yang bisa disimbiosa dengan LIRC tak terbatas pada aplikasi multimedia umum seperti XMMS, Mplayer, Kradio, TV-Time, dll. Tapi juga bisa menangani aplikasi non multimedia seperti web browser, home automation program, bash scripts, men-shutdown komputer anda, dan bahkan mengeksekusi semua perintah linux!.
Anda pikir saya membual?
Mari kita buktikan sendiri. Asumsi bahwa anda telah melewati semua proses kompilasi, instalasi, dan konfigurasi dengan baik, adalah syarat mutlak :)
KONFIGURASI LIRCRC
Apa yang anda lakukan dengan remot kontrol infra merah, sangat tergantung pada berkas /etc/lircrc, berkas ini menentukan semua perilaku remot kontrol infra merah anda. Berkas ini belum ada jika anda belum membuatnya sendiri, karenanya buatlah sebuah berkas yang dimaksud dengan perintah:
# echo #berkas /etc/lircrc >> /etc/lircrc
Kembali beberapa langkah ke belakang sejenak untuk memikirkan program apa yang akan dijalankan dengan remot kontrol infra merah anda.
Ada ide?
Hmmm, bagaimana untuk permulaannya jika tombol satu (1) di remot kontrol infra merah anda bisa menyapa anda di konsol? Ide yang bagus bukan
Mari kita mulai. Suntinglah berkas /etc/lircrc anda dengan editor favorit anda (saya lebih menyukai vi karena kesederhanaannya)
# vi /etc/lircrc
Tekanlah huruf pada tuts keyboard untuk mulai menyunting, lalu salinlah baris berikut ini
#berkas /etc/lircrc
begin
button = 1
prog = irexec
remote = PV951
config = echo Halo!!!
end
simpanlah berkas anda dengan menekan tuts
sekarang berikan perintah ini
# irexec
Dan tekanlah tombol 1 di remot kontrol infra merah anda, dan anda akan melihat:
# irexec
Halo!!!
Tekan - untuk keluar dar program irexec
Mengapa hal di atas bisa terjadi?
Mari kita lihat kembali konfigurasi /etc/lircrc berikut penjelasannya
#berkas /etc/lircrc
begin ---> memulai argumen
button = 1 ---> tombol di remot kontrol infra merah yang digunakan
prog = irexec ---> program yang menerima perintah
remote = PV951 ---> jenis remot kontrol infra merah
config = echo Halo!!! ---> aplikasi yang akan dijalankan saat tombol ditekan
end ---> akhir argumen
Argumen 'begin' mengawali konfigurasi per tombol, dan argumen 'end' mengakhirinya.
'button' adalah tombol yang telah terkonfigurasi dalam /etc/lircd.conf
konfigurasi tombol remot kontrol infra merah PV951 jika diuraikan adalah sbb:
perhatikan kolom button, di sana terdapat bermacam tombol sesuai dengan remot kontrol infra merah anda.
Baiklah, mungkin anda bosan dengan teori dan ingin segera mengeluarkan kelinci dari topi sulap :)
mari kita sunting kembali berkas /etc/lircrc, dan berikan argumen berikut di baris 'config='
#berkas /etc/lircrc
begin
button = 1
prog = irexec
remote = PV951
config = firefox http://www.google.com/
end
Simpanlah berkas tersebut kembali
lalu jalankan kembali irexec dan tekanlah tombol 1 di remot kontrol infra merah anda, dan keajaiban akan terjadi (itu jika anda tidak mengidap penyakit jantung dan komputer anda terhubung ke internet) :)
tentu saja anda bisa menambahkan argumen argumen lain sesuka anda selama reserved button masih tersedia di remot kontrol infra merah anda, contohnya adalah sbb:
#berkas /etc/lircrc
begin
button = 1
prog = irexec
remote = PV951
config = firefox http://www.google.com/
end
begin
button = 2
prog = irexec
remote = PV951
config = xmms
end
Dan seterusnya...
demikianlah akhir tutorial konfigurasi LIRC ini semoga berguna bagi anda yang mempelajarinya
baca juga tutorial mengenai penggunaan LIRC lebih lanjut dengan aplikasi multimedia seperti XMMS, TV-Time, dan KRadio.
Let the good time rolls
Last Updated ( Thursday, 23 June 2005 ) Read more "Configuration LIRC..."
Labels:
network
Transparent Firewall
Kernel Linux 2.6 or 2.4 (with patch) with bridge firewall option enabled
If you want to use the Version 2.4 kernel, please search in patchnya http://ebtables.sourceforge.net/. 2.6 kernel already include these facilities, so no need patched again.
Here it is assumed that the kernel is fine, and stayed install other programs needed to run the bridge. Computers are used which has 2 NICs eth0 and eth1.
2. Installation & Configuration
As usual, to install the debian package we use apt-get.
root:~# apt-get install bridge-utils iptables
If you do not use other distributions you can download the source code for both programs and that the http://www.iptables.org/files/ http://bridge.sourceforge.net/. Guide the installation process can follow the README / INSTALL included in the tarball you downloaded.
Programs that we get from the bridge-utils is brctl. This program is set up all sorts of parts of the bridge began to manufacture, removal, addition of the bridge, and so on. Create a bridge interface (br0), and add the interface to the new bridge interface created.
root:~# brctl addbr br0
root:~# brctl addif br0 eth0
root:~# brctl addif br0 eth1
root:~# ifconfig eth0 0
root:~# ifconfig eth1 0
Delete an IP address on eth0 and eth1, and if this bridge will be assigned an IP address to the address given is br0. Another interface must remain on without having their own IP address. Later, the two existing ethernet will respond to any requests that enter the IP address of the bridge.
Try to network memping outside your network. When smooth, meaning the bridge has been going well. So that every boot we do not repeat the steps above then edit the file / etc / network / interfaces and add the necessary configuration. Example of my file is below.
auto br0
iface br0 inet static
address 10.11.12.3
netmask 255.255.255.0
network 10.11.12.0
broadcast 10.11.12.255
gateway 10.11.12.1
bridge_ports eth0 eth1
Note: notice that the configuration items in bold.
Also make sure you enable IP forwarding by executing the following command every time the computer boots.
root: ~ # echo 1> / proc/sys/net/ipv4/ip_forward
In addition to the manual way you can also edit the file / etc / network / options.
ip_forward=yes
spoofprotect=yes
syncookies=no
Now you can configure iptables to do the filtering of data packets passing through this firewall. Iptables will not be discussed in depth here. Just info, filtering is done in table filter chain FORWARD. Example:
root:~# iptables -t Filter -A FORWARD -s 0.0.0.0 -d 10.11.12.0/24 -p tcp --dport 23 -j DROP
root:~# iptables -t Filter -A FORWARD -s 0.0.0.0 -d 10.11.12.0/24 -p tcp --dport 25 -j DROP
root:~# iptables -t Filter -A FORWARD -s 0.0.0.0 -d 10.11.12.0/24 -p udp --dport 161 -j DROP
Pieces instructions above iptables filtering packets from outside our network that will access the telnet port, smtp, and snmp. Add another filter in accordance with what you need.
Keep the commands you run in a script. Sh and change the file permissions to be executable (executable). Arrange for the file every time diekseuksi boot. There are several ways to do it, the easiest is to add an entry in / etc / network / interfaces. If iptables script is stored in / etc / init.d / aturanfirewall.sh you can add the following line under the entry br0.
up command /etc/init.d/aturanfirewall.sh
Thus the contents of the file / etc / network / interfaces to be as below.
auto br0
iface br0 inet static
address 10.11.12.3
netmask 255.255.255.0
network 10.11.12.0
broadcast 10.11.12.255
gateway 10.11.12.1
bridge_ports eth0 eth1
up command /etc/init.d/aturanfirewall.sh
By using a small bash script to output memparsing command "iptables-FORWARD nvL" you can monitor activities such filtering:)
---------------------------------------------------------+
| I/O Total | 95M Packets 62G Bytes |
+-------------+---------------------+---------------------+
| | Traffic In | Traffic Out |
| Filter +----------+----------+----------+----------+
| | Byte | Packet | Byte | Packet |
+-------------+----------+----------+----------+----------+
| Ping Blaster| 0 | 0 | 23184 | 252 |
| udp 69 | 0 | 0 | 0 | 0 |
| udp 135 | 0 | 0 | 0 | 0 |
| udp 137 | 38298 | 491 | 9828 | 126 |
| udp 138 | 534 | 2 | 1343 | 5 |
| udp 445 | 0 | 0 | 0 | 0 |
| udp 161 | 3672 | 54 | 0 | 0 |
| tcp 23 | 912 | 19 | 0 | 0 |
| tcp 135 | 47520 | 990 | 1584 | 33 |
| tcp 445 | 1027K | 21402 | 15180 | 316 |
| tcp 593 | 0 | 0 | 0 | 0 |
| tcp 4444 | 528 | 12 | 864 | 18 |
+-------------+----------+----------+----------+----------+
3. Note Pinggir
From some experiments I did, high-quality Ethernet helps smooth the firewall work. All kinds of Ethernet which uses the 8139too driver causing frequent traffic firewall, and regularly have to direboot once a week. After ethernet Intel EtherExpress replaced with 100 and 3Com 3c905B everything went smoothly without interruption. AMD Lance pcnet32 also showed good results. If you have any other experience I am very happy for them available here.
Ressa Restullah (May 30, 2005) - bridge made Mas Ressa was not going well, because one ethnya interface connected to the Cisco 1700. According to news from ISPnya, the problem arises because there are facilities "auto negotiation" is owned router. This problem disappeared after a deadly Ressa Mas auto-negotiation on the router & bridge, and use cross cable to connect the router with bridgenya. Also, try to interface to the bridge and router type. If the router using FastEthernet, then use FastEthernet also to bridgenya:)
4. Referensi
http://ebtables.sourceforge.net
Securing Debian Manual
Milis tanya-jawab@linux.or.id
http://www.google.com :D Read more "Transparent Firewall..."
If you want to use the Version 2.4 kernel, please search in patchnya http://ebtables.sourceforge.net/. 2.6 kernel already include these facilities, so no need patched again.
Here it is assumed that the kernel is fine, and stayed install other programs needed to run the bridge. Computers are used which has 2 NICs eth0 and eth1.
2. Installation & Configuration
As usual, to install the debian package we use apt-get.
root:~# apt-get install bridge-utils iptables
If you do not use other distributions you can download the source code for both programs and that the http://www.iptables.org/files/ http://bridge.sourceforge.net/. Guide the installation process can follow the README / INSTALL included in the tarball you downloaded.
Programs that we get from the bridge-utils is brctl. This program is set up all sorts of parts of the bridge began to manufacture, removal, addition of the bridge, and so on. Create a bridge interface (br0), and add the interface to the new bridge interface created.
root:~# brctl addbr br0
root:~# brctl addif br0 eth0
root:~# brctl addif br0 eth1
root:~# ifconfig eth0 0
root:~# ifconfig eth1 0
Delete an IP address on eth0 and eth1, and if this bridge will be assigned an IP address to the address given is br0. Another interface must remain on without having their own IP address. Later, the two existing ethernet will respond to any requests that enter the IP address of the bridge.
Try to network memping outside your network. When smooth, meaning the bridge has been going well. So that every boot we do not repeat the steps above then edit the file / etc / network / interfaces and add the necessary configuration. Example of my file is below.
auto br0
iface br0 inet static
address 10.11.12.3
netmask 255.255.255.0
network 10.11.12.0
broadcast 10.11.12.255
gateway 10.11.12.1
bridge_ports eth0 eth1
Note: notice that the configuration items in bold.
Also make sure you enable IP forwarding by executing the following command every time the computer boots.
root: ~ # echo 1> / proc/sys/net/ipv4/ip_forward
In addition to the manual way you can also edit the file / etc / network / options.
ip_forward=yes
spoofprotect=yes
syncookies=no
Now you can configure iptables to do the filtering of data packets passing through this firewall. Iptables will not be discussed in depth here. Just info, filtering is done in table filter chain FORWARD. Example:
root:~# iptables -t Filter -A FORWARD -s 0.0.0.0 -d 10.11.12.0/24 -p tcp --dport 23 -j DROP
root:~# iptables -t Filter -A FORWARD -s 0.0.0.0 -d 10.11.12.0/24 -p tcp --dport 25 -j DROP
root:~# iptables -t Filter -A FORWARD -s 0.0.0.0 -d 10.11.12.0/24 -p udp --dport 161 -j DROP
Pieces instructions above iptables filtering packets from outside our network that will access the telnet port, smtp, and snmp. Add another filter in accordance with what you need.
Keep the commands you run in a script. Sh and change the file permissions to be executable (executable). Arrange for the file every time diekseuksi boot. There are several ways to do it, the easiest is to add an entry in / etc / network / interfaces. If iptables script is stored in / etc / init.d / aturanfirewall.sh you can add the following line under the entry br0.
up command /etc/init.d/aturanfirewall.sh
Thus the contents of the file / etc / network / interfaces to be as below.
auto br0
iface br0 inet static
address 10.11.12.3
netmask 255.255.255.0
network 10.11.12.0
broadcast 10.11.12.255
gateway 10.11.12.1
bridge_ports eth0 eth1
up command /etc/init.d/aturanfirewall.sh
By using a small bash script to output memparsing command "iptables-FORWARD nvL" you can monitor activities such filtering:)
---------------------------------------------------------+
| I/O Total | 95M Packets 62G Bytes |
+-------------+---------------------+---------------------+
| | Traffic In | Traffic Out |
| Filter +----------+----------+----------+----------+
| | Byte | Packet | Byte | Packet |
+-------------+----------+----------+----------+----------+
| Ping Blaster| 0 | 0 | 23184 | 252 |
| udp 69 | 0 | 0 | 0 | 0 |
| udp 135 | 0 | 0 | 0 | 0 |
| udp 137 | 38298 | 491 | 9828 | 126 |
| udp 138 | 534 | 2 | 1343 | 5 |
| udp 445 | 0 | 0 | 0 | 0 |
| udp 161 | 3672 | 54 | 0 | 0 |
| tcp 23 | 912 | 19 | 0 | 0 |
| tcp 135 | 47520 | 990 | 1584 | 33 |
| tcp 445 | 1027K | 21402 | 15180 | 316 |
| tcp 593 | 0 | 0 | 0 | 0 |
| tcp 4444 | 528 | 12 | 864 | 18 |
+-------------+----------+----------+----------+----------+
3. Note Pinggir
From some experiments I did, high-quality Ethernet helps smooth the firewall work. All kinds of Ethernet which uses the 8139too driver causing frequent traffic firewall, and regularly have to direboot once a week. After ethernet Intel EtherExpress replaced with 100 and 3Com 3c905B everything went smoothly without interruption. AMD Lance pcnet32 also showed good results. If you have any other experience I am very happy for them available here.
Ressa Restullah (May 30, 2005) - bridge made Mas Ressa was not going well, because one ethnya interface connected to the Cisco 1700. According to news from ISPnya, the problem arises because there are facilities "auto negotiation" is owned router. This problem disappeared after a deadly Ressa Mas auto-negotiation on the router & bridge, and use cross cable to connect the router with bridgenya. Also, try to interface to the bridge and router type. If the router using FastEthernet, then use FastEthernet also to bridgenya:)
4. Referensi
http://ebtables.sourceforge.net
Securing Debian Manual
Milis tanya-jawab@linux.or.id
http://www.google.com :D Read more "Transparent Firewall..."
Labels:
network
seting network
Wearing Linux on notebooks is a pride in itself, because the install sometimes requires more effort than when installed on the PC desktop, because Linux drivers are available for hardware notebooks are still relatively few desktop PCs, especially network card driver, modem, infrared port ( IrDA), and bluetoothnya. Ok, when finally installed Linux successfully, obstacles arise when we use this notebook in a different location ... ... let's say in the office and at home. Because chances are the network settings at work and at home is different, whether it's IP address, Gateway, DNS, etc.. Will be very inconvenient if we have any time to change the network settings of our notebook when moving from office to home, and back again the next day the office.
This article will discuss an efficient trick how to use the script to make the network settings automatically and quickly. The author uses Mandrake 9.2, but this script can also for other distributions by adjusting the location of files and startup scripts in the distro in question.
Well, we started well. Setting-network setting in the following files are:
/etc/resolv.conf --> berisi settingan DNS.
/etc/sysconfig/network --> berisi settingan hostname, dan gateway.
/etc/sysconfig/network-scripts/ifcfg-eth0 --> berisi settingan kartu network kita, yaitu IP address, netmask, network address, broadcast address, dll.
Maybe someone says, "But I never touch the configuration files, how about when wrong?" Do not worry, you only need to change the relevant information only. To give an illustration, these files typically contain the following:
[fajar@centrino fajar]$ cat /etc/resolv.conf
search linux.home
#nameserver 192.168.0.234
#nameserver 202.158.3.7
nameserver 202.157.48.8
[fajar@centrino fajar]$ cat /etc/sysconfig/network
HOSTNAME=centrino.linux.home
NETWORKING=yes
GATEWAY=192.168.7.25
[fajar@centrino fajar]$ cat /etc/sysconfig/network-scripts/ifcfg-eth0
DEVICE=eth0
BOOTPROTO=static
IPADDR=192.168.4.29
NETMASK=255.255.255.248
NETWORK=192.168.4.24
BROADCAST=192.168.4.31
ONBOOT=yes
HWADDR=00:c1:9e:28:01:65
MII_NOT_SUPPORTED=no
Ketiga file itulah yang harus kita ubah mengikuti ketentuan yang ada di masing-masing lokasi. Misalkan di rumah kita memakai settingan jaringan sebagai berikut:
Nameserver 202.127.5.6
IP 192.168.0.5
Netmask 255.255.255.0
Network 192.168.0.0
Broadcast 192.168.0.255
Sedangkan di kantor kita memakai settingan sebagai berikut:
Nameserver 192.168.4.100
IP 192.168.4.29
Netmask 255.255.255.248
Network 192.168.4.24
Broadcast 192.168.4.31
So we can imagine that we would be bothered at all if every time we are in different locations that we must change the network settings by editing the configuration files mentioned above. If we use the configuration menu from any distribution will still be trouble, right?
Then what? Well, here is the trick:
We will use the shell environment that has been provided in our distro. This time the authors use the BASH shell.
Step 1. Make a configuration file for each location (file name up to you, which is important to distinguish between these different locations). The contents of configuration files are tailored to what we need in each location.
/etc/resolv.conf-rumah
/etc/resolv.conf-kantor
/etc/sysconfig/network-rumah
/etc/sysconfig/network-kantor
/etc/sysconfig/network-scripts/ifcfg-eth0-rumah
/etc/sysconfig/network-scripts/ifcfg-eth0-kantor
If you are unsure or worried about one, the easiest way is to copy configuration files into the original file name you want, then you edit the file copy of these with the desired settigan.
Step 2. Write this script using your favorite text editor:
2a. Script for the home network.
#!/bin/bash
cp -v /etc/resolv.conf-rumah /etc/resolv.conf
cp -v /etc/sysconfig/network-rumah /etc/sysconfig/network
cp -v /etc/sysconfig/network-scripts/ifcfg-eth0-rumah /etc/sysconfig/network-scripts/ifcfg-eth0
service network restart
aka netrumah = "/ root / .netrumah"
aka netkantor = "/ root / .netkantor"
Then as root, run this command for both is stored into the shell environment:
bash
Ok, easy right? Let us test. As root, we have to do is type:
netrumah <- to set the network when at home netkantor <- when he was in office when the command is executed will appear as can be seen in figure 1: Check whether the network has been finely tuned correctly with the command: ifconfig example in Figure 2. Then test by trying to browse the internet. When was the way, means you have succeeded. Congratulations:) The use of other than bash environment. As you can see at the beginning of this paper, that we can create our own command in the bash, which this can we use to make the things we often do on the server. For example, as a sysadmin, of course we often need to monitor the log-log files from our server. Of course we often type the command-command like: tail-f / var / log / messages tail-f / var / log / squid / access.loh tail-f / var / log / httpd / access_log tail-f / var / log / httpd / error_log I mean, typing command-command is not long, especially if there is bash history. But it would be nice if we could shorten the command-command again it becomes a shorter, right? It's easy, just like when entering the command netrumah / netkantor above. Enter the command lines that we want into the file / root / .bashrc. Like this: alias tailm = "tail-f / var / log / messages' alias tails =" tail-f / var / log / squid / access.log "alias tailhttpd =" tail-f / var / log / httpd / access_log "alias tailhttpderr =" tail-f / var / log / httpd / error_log "When you're done, save the file. bashrc and run type 'bash' at the console for additional mengsave. Now try running 'tailm' and see the results, so easy, is not it? :) As can be seen in Figure 3. So this writing, it would be useful for us all. If there are less obvious can contact the author at fajarpri (at) arinet (dot) org or through the website at http://linux2.arinet.org Thank you. v.1.0 by ari_stress aka tiger74 aka Fajar Priyanto Jakarta, March 12, 2005. fajarpri at arinet dot org. The author is a Microsoft Certified Professional, who fell in love with Linux. Working in an educational institution in Jakarta Last Updated (Saturday, 12 March 2005)
Read more "seting network..."
This article will discuss an efficient trick how to use the script to make the network settings automatically and quickly. The author uses Mandrake 9.2, but this script can also for other distributions by adjusting the location of files and startup scripts in the distro in question.
Well, we started well. Setting-network setting in the following files are:
/etc/resolv.conf --> berisi settingan DNS.
/etc/sysconfig/network --> berisi settingan hostname, dan gateway.
/etc/sysconfig/network-scripts/ifcfg-eth0 --> berisi settingan kartu network kita, yaitu IP address, netmask, network address, broadcast address, dll.
Maybe someone says, "But I never touch the configuration files, how about when wrong?" Do not worry, you only need to change the relevant information only. To give an illustration, these files typically contain the following:
[fajar@centrino fajar]$ cat /etc/resolv.conf
search linux.home
#nameserver 192.168.0.234
#nameserver 202.158.3.7
nameserver 202.157.48.8
[fajar@centrino fajar]$ cat /etc/sysconfig/network
HOSTNAME=centrino.linux.home
NETWORKING=yes
GATEWAY=192.168.7.25
[fajar@centrino fajar]$ cat /etc/sysconfig/network-scripts/ifcfg-eth0
DEVICE=eth0
BOOTPROTO=static
IPADDR=192.168.4.29
NETMASK=255.255.255.248
NETWORK=192.168.4.24
BROADCAST=192.168.4.31
ONBOOT=yes
HWADDR=00:c1:9e:28:01:65
MII_NOT_SUPPORTED=no
Ketiga file itulah yang harus kita ubah mengikuti ketentuan yang ada di masing-masing lokasi. Misalkan di rumah kita memakai settingan jaringan sebagai berikut:
Nameserver 202.127.5.6
IP 192.168.0.5
Netmask 255.255.255.0
Network 192.168.0.0
Broadcast 192.168.0.255
Sedangkan di kantor kita memakai settingan sebagai berikut:
Nameserver 192.168.4.100
IP 192.168.4.29
Netmask 255.255.255.248
Network 192.168.4.24
Broadcast 192.168.4.31
So we can imagine that we would be bothered at all if every time we are in different locations that we must change the network settings by editing the configuration files mentioned above. If we use the configuration menu from any distribution will still be trouble, right?
Then what? Well, here is the trick:
We will use the shell environment that has been provided in our distro. This time the authors use the BASH shell.
Step 1. Make a configuration file for each location (file name up to you, which is important to distinguish between these different locations). The contents of configuration files are tailored to what we need in each location.
/etc/resolv.conf-rumah
/etc/resolv.conf-kantor
/etc/sysconfig/network-rumah
/etc/sysconfig/network-kantor
/etc/sysconfig/network-scripts/ifcfg-eth0-rumah
/etc/sysconfig/network-scripts/ifcfg-eth0-kantor
If you are unsure or worried about one, the easiest way is to copy configuration files into the original file name you want, then you edit the file copy of these with the desired settigan.
Step 2. Write this script using your favorite text editor:
2a. Script for the home network.
#!/bin/bash
cp -v /etc/resolv.conf-rumah /etc/resolv.conf
cp -v /etc/sysconfig/network-rumah /etc/sysconfig/network
cp -v /etc/sysconfig/network-scripts/ifcfg-eth0-rumah /etc/sysconfig/network-scripts/ifcfg-eth0
service network restart
aka netrumah = "/ root / .netrumah"
aka netkantor = "/ root / .netkantor"
Then as root, run this command for both is stored into the shell environment:
bash
Ok, easy right? Let us test. As root, we have to do is type:
netrumah <- to set the network when at home netkantor <- when he was in office when the command is executed will appear as can be seen in figure 1: Check whether the network has been finely tuned correctly with the command: ifconfig example in Figure 2. Then test by trying to browse the internet. When was the way, means you have succeeded. Congratulations:) The use of other than bash environment. As you can see at the beginning of this paper, that we can create our own command in the bash, which this can we use to make the things we often do on the server. For example, as a sysadmin, of course we often need to monitor the log-log files from our server. Of course we often type the command-command like: tail-f / var / log / messages tail-f / var / log / squid / access.loh tail-f / var / log / httpd / access_log tail-f / var / log / httpd / error_log I mean, typing command-command is not long, especially if there is bash history. But it would be nice if we could shorten the command-command again it becomes a shorter, right? It's easy, just like when entering the command netrumah / netkantor above. Enter the command lines that we want into the file / root / .bashrc. Like this: alias tailm = "tail-f / var / log / messages' alias tails =" tail-f / var / log / squid / access.log "alias tailhttpd =" tail-f / var / log / httpd / access_log "alias tailhttpderr =" tail-f / var / log / httpd / error_log "When you're done, save the file. bashrc and run type 'bash' at the console for additional mengsave. Now try running 'tailm' and see the results, so easy, is not it? :) As can be seen in Figure 3. So this writing, it would be useful for us all. If there are less obvious can contact the author at fajarpri (at) arinet (dot) org or through the website at http://linux2.arinet.org Thank you. v.1.0 by ari_stress aka tiger74 aka Fajar Priyanto Jakarta, March 12, 2005. fajarpri at arinet dot org. The author is a Microsoft Certified Professional, who fell in love with Linux. Working in an educational institution in Jakarta Last Updated (Saturday, 12 March 2005)
Labels:
network
Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23.
However, Telnet was developed in the days when security was not an issue. For this reason,
all Telnet traffic is forwarded in plain text.
SSH has replaced Telnet as the best practice for providing remote router administration with
connections that support strong privacy and session integrity. SSH uses port TCP 22.
It provides functionality that is similar to that of an outbound Telnet connection, except that the connection is encrypted.
With authentication and encryption, SSH allows for secure communications over an insecure network. In this configuration,
four routers are interconnected in a hub-and-spoke Frame Relay configuration. Router R1 is the hub, and routers R2, R3,
and R4 are the spokes. Dynamic routing has been configured using multiarea OSPF.
Task 1: View the Default Configuration.
Step 1. Verify the Frame Relay configuration on the routers.
a. On all four routers, enter user EXEC mode with the password cisco.
b. Enter privileged EXEC mode with the password cisco.
c. From privileged EXEC mode on all four routers, issue the show frame-relay map
command to verify Frame Relay connectivity.
Step 2. Verify the routing tables.
From privileged EXEC mode on all four routers, issue the show ip route command to verify the all network segments are being advertised.
Step 3. Verify connectivity between routers.
a. From R1, ping all LAN interfaces to verify connectivity.
b. Again from router R1, Telnet to R2 using it’s LAN interface IP address. Exit and repeat the step for routers R3 and R4.Ping other PCs on the same network.
Task 2: Configure SSH on the Hub Router (R1).
Step 1. Enable and configure SSH on R1.
To enable SSH on the router, the following parameters must be configured:
- Hostname
- Domain name
- Asymmetrical keys
- Local authentication
a. The hostname on R1 is pre-configured. Therefore configure the domain name cisco.com using the ip domain-name domain-name command.
b. The asymmetrical RSA keys must be generated on R1 using the crypto key generate rsa command. When prompted for a modulus size, specify a modulus of 1024 bits.
c. SSH will prompt for a username and password combination when enabled. Therefore, a local username database entry must be configured using the username name password password command. Create a local account for the user admin and password cisco.
d. Configure the SSH version using the ip ssh version command. In this lab, we will be configuring to use version 2.
e. Next, we need to disable Telnet and enable SSH communication to the VTY lines. To do so, enter the following commands on R1.
R1(config)# line vty 0 4
R1(config-line)# no transport input all
R1(config-line)# transport input ssh
R1(config-line)# login local
R1(config-line)# end
Read more " ..."
However, Telnet was developed in the days when security was not an issue. For this reason,
all Telnet traffic is forwarded in plain text.
SSH has replaced Telnet as the best practice for providing remote router administration with
connections that support strong privacy and session integrity. SSH uses port TCP 22.
It provides functionality that is similar to that of an outbound Telnet connection, except that the connection is encrypted.
With authentication and encryption, SSH allows for secure communications over an insecure network. In this configuration,
four routers are interconnected in a hub-and-spoke Frame Relay configuration. Router R1 is the hub, and routers R2, R3,
and R4 are the spokes. Dynamic routing has been configured using multiarea OSPF.
Task 1: View the Default Configuration.
Step 1. Verify the Frame Relay configuration on the routers.
a. On all four routers, enter user EXEC mode with the password cisco.
b. Enter privileged EXEC mode with the password cisco.
c. From privileged EXEC mode on all four routers, issue the show frame-relay map
command to verify Frame Relay connectivity.
Step 2. Verify the routing tables.
From privileged EXEC mode on all four routers, issue the show ip route command to verify the all network segments are being advertised.
Step 3. Verify connectivity between routers.
a. From R1, ping all LAN interfaces to verify connectivity.
b. Again from router R1, Telnet to R2 using it’s LAN interface IP address. Exit and repeat the step for routers R3 and R4.Ping other PCs on the same network.
Task 2: Configure SSH on the Hub Router (R1).
Step 1. Enable and configure SSH on R1.
To enable SSH on the router, the following parameters must be configured:
- Hostname
- Domain name
- Asymmetrical keys
- Local authentication
a. The hostname on R1 is pre-configured. Therefore configure the domain name cisco.com using the ip domain-name domain-name command.
b. The asymmetrical RSA keys must be generated on R1 using the crypto key generate rsa command. When prompted for a modulus size, specify a modulus of 1024 bits.
c. SSH will prompt for a username and password combination when enabled. Therefore, a local username database entry must be configured using the username name password password command. Create a local account for the user admin and password cisco.
d. Configure the SSH version using the ip ssh version command. In this lab, we will be configuring to use version 2.
e. Next, we need to disable Telnet and enable SSH communication to the VTY lines. To do so, enter the following commands on R1.
R1(config)# line vty 0 4
R1(config-line)# no transport input all
R1(config-line)# transport input ssh
R1(config-line)# login local
R1(config-line)# end
Read more " ..."
Labels:
network
Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23.
However, Telnet was developed in the days when security was not an issue. For this reason,
all Telnet traffic is forwarded in plain text.
SSH has replaced Telnet as the best practice for providing remote router administration with
connections that support strong privacy and session integrity. SSH uses port TCP 22.
It provides functionality that is similar to that of an outbound Telnet connection, except that the connection is encrypted.
With authentication and encryption, SSH allows for secure communications over an insecure network. In this configuration,
four routers are interconnected in a hub-and-spoke Frame Relay configuration. Router R1 is the hub, and routers R2, R3,
and R4 are the spokes. Dynamic routing has been configured using multiarea OSPF.
Task 1: View the Default Configuration.
Step 1. Verify the Frame Relay configuration on the routers.
a. On all four routers, enter user EXEC mode with the password cisco.
b. Enter privileged EXEC mode with the password cisco.
c. From privileged EXEC mode on all four routers, issue the show frame-relay map
command to verify Frame Relay connectivity.
Step 2. Verify the routing tables.
From privileged EXEC mode on all four routers, issue the show ip route command to verify the all network segments are being advertised.
Step 3. Verify connectivity between routers.
a. From R1, ping all LAN interfaces to verify connectivity.
b. Again from router R1, Telnet to R2 using it’s LAN interface IP address. Exit and repeat the step for routers R3 and R4.Ping other PCs on the same network.
Task 2: Configure SSH on the Hub Router (R1).
Step 1. Enable and configure SSH on R1.
To enable SSH on the router, the following parameters must be configured:
- Hostname
- Domain name
- Asymmetrical keys
- Local authentication
a. The hostname on R1 is pre-configured. Therefore configure the domain name cisco.com using the ip domain-name domain-name command.
b. The asymmetrical RSA keys must be generated on R1 using the crypto key generate rsa command. When prompted for a modulus size, specify a modulus of 1024 bits.
c. SSH will prompt for a username and password combination when enabled. Therefore, a local username database entry must be configured using the username name password password command. Create a local account for the user admin and password cisco.
d. Configure the SSH version using the ip ssh version command. In this lab, we will be configuring to use version 2.
e. Next, we need to disable Telnet and enable SSH communication to the VTY lines. To do so, enter the following commands on R1.
R1(config)# line vty 0 4
R1(config-line)# no transport input all
R1(config-line)# transport input ssh
R1(config-line)# login local
R1(config-line)# end
Read more " ..."
However, Telnet was developed in the days when security was not an issue. For this reason,
all Telnet traffic is forwarded in plain text.
SSH has replaced Telnet as the best practice for providing remote router administration with
connections that support strong privacy and session integrity. SSH uses port TCP 22.
It provides functionality that is similar to that of an outbound Telnet connection, except that the connection is encrypted.
With authentication and encryption, SSH allows for secure communications over an insecure network. In this configuration,
four routers are interconnected in a hub-and-spoke Frame Relay configuration. Router R1 is the hub, and routers R2, R3,
and R4 are the spokes. Dynamic routing has been configured using multiarea OSPF.
Task 1: View the Default Configuration.
Step 1. Verify the Frame Relay configuration on the routers.
a. On all four routers, enter user EXEC mode with the password cisco.
b. Enter privileged EXEC mode with the password cisco.
c. From privileged EXEC mode on all four routers, issue the show frame-relay map
command to verify Frame Relay connectivity.
Step 2. Verify the routing tables.
From privileged EXEC mode on all four routers, issue the show ip route command to verify the all network segments are being advertised.
Step 3. Verify connectivity between routers.
a. From R1, ping all LAN interfaces to verify connectivity.
b. Again from router R1, Telnet to R2 using it’s LAN interface IP address. Exit and repeat the step for routers R3 and R4.Ping other PCs on the same network.
Task 2: Configure SSH on the Hub Router (R1).
Step 1. Enable and configure SSH on R1.
To enable SSH on the router, the following parameters must be configured:
- Hostname
- Domain name
- Asymmetrical keys
- Local authentication
a. The hostname on R1 is pre-configured. Therefore configure the domain name cisco.com using the ip domain-name domain-name command.
b. The asymmetrical RSA keys must be generated on R1 using the crypto key generate rsa command. When prompted for a modulus size, specify a modulus of 1024 bits.
c. SSH will prompt for a username and password combination when enabled. Therefore, a local username database entry must be configured using the username name password password command. Create a local account for the user admin and password cisco.
d. Configure the SSH version using the ip ssh version command. In this lab, we will be configuring to use version 2.
e. Next, we need to disable Telnet and enable SSH communication to the VTY lines. To do so, enter the following commands on R1.
R1(config)# line vty 0 4
R1(config-line)# no transport input all
R1(config-line)# transport input ssh
R1(config-line)# login local
R1(config-line)# end
Read more " ..."
Labels:
network
configure router
Task 1: View the Default Configuration.
Step 1. Verify the Frame Relay configuration on the routers.
a. On all four routers, enter user EXEC mode with the password cisco.
b. Enter privileged EXEC mode with the password cisco.
c. From privileged EXEC mode on all four routers, issue the show frame-relay map
command to verify Frame Relay connectivity.
Step 2. Verify the routing tables.
From privileged EXEC mode on all four routers, issue the show ip route command to verify the all network segments are being advertised.
Step 3. Verify connectivity between routers.
a. From R1, ping all LAN interfaces to verify connectivity.
b. Again from router R1, Telnet to R2 using it’s LAN interface IP address. Exit and repeat the step for routers R3 and R4.Ping other PCs on the same network.
Task 2: Configure SSH on the Hub Router (R1).
Step 1. Enable and configure SSH on R1.
To enable SSH on the router, the following parameters must be configured:
- Hostname
- Domain name
- Asymmetrical keys
- Local authentication
a. The hostname on R1 is pre-configured. Therefore configure the domain name cisco.com using the ip domain-name domain-name command.
b. The asymmetrical RSA keys must be generated on R1 using the crypto key generate rsa command. When prompted for a modulus size, specify a modulus of 1024 bits.
c. SSH will prompt for a username and password combination when enabled. Therefore, a local username database entry must be configured using the username name password password command. Create a local account for the user admin and password cisco.
d. Configure the SSH version using the ip ssh version command. In this lab, we will be configuring to use version 2.
e. Next, we need to disable Telnet and enable SSH communication to the VTY lines. To do so, enter the following commands on R1.
R1(config)# line vty 0 4
R1(config-line)# no transport input all
R1(config-line)# transport input ssh
R1(config-line)# login local
R1(config-line)# end
f. Save the configuration.
Step 2. Check results.
Your completion percentage should be 25%. If not, click Check Results to see which required components are not yet completed.
Task 3: Configure SSH on the Spoke Routers R2, R3 and R4.
Step 1. Configure SSH on routers R2, R3, and R4.
Repeat the Steps from Task 2 on routers R2, R3 and R4.
Step 2. Check results.
Your completion percentage should be 100%. If not, click Check Results to see which required components are not yet completed.
Task 4: Verify SSH.
Step 1. Verify the SSH configuration.
After configuring SSH on all routers, verify the SSH configuration on R1.
a. Issue the show ip ssh command to verify which version of SSH is configured, and what the default settings are.
R1# sho ip ssh
SSH Enabled - version 1.99
Authentication timeout: 120 secs; Authentication retries: 3
b. Next, issue the show ip ssh command to verify if SSH is currently running.
R1#show ssh
%No SSHv2 server connections running.
%No SSHv1 server connections running.
Step 2. connect to R2.ext.
a. Now Telnet to router R2.ext, to issue the show ip ssh command to verify if SSH is currently running.
R1# telnet 10.20.20.1
Trying 10.20.20.1 ...
[Connection to 10.20.20.1 closed by foreign host]
Recall that Telnet was deactivated using the no transport input all command. Only SSH can be used to establish a remote connection.
b. Using R1 as the SSH client, SSH to router R2 using the ssh –l username ip-address command.
R1#ssh –l admin 10.20.20.1
Password:
c. When prompted for a password, enter cisco. You should now be connected to router R2.
Read more "configure router..."
Step 1. Verify the Frame Relay configuration on the routers.
a. On all four routers, enter user EXEC mode with the password cisco.
b. Enter privileged EXEC mode with the password cisco.
c. From privileged EXEC mode on all four routers, issue the show frame-relay map
command to verify Frame Relay connectivity.
Step 2. Verify the routing tables.
From privileged EXEC mode on all four routers, issue the show ip route command to verify the all network segments are being advertised.
Step 3. Verify connectivity between routers.
a. From R1, ping all LAN interfaces to verify connectivity.
b. Again from router R1, Telnet to R2 using it’s LAN interface IP address. Exit and repeat the step for routers R3 and R4.Ping other PCs on the same network.
Task 2: Configure SSH on the Hub Router (R1).
Step 1. Enable and configure SSH on R1.
To enable SSH on the router, the following parameters must be configured:
- Hostname
- Domain name
- Asymmetrical keys
- Local authentication
a. The hostname on R1 is pre-configured. Therefore configure the domain name cisco.com using the ip domain-name domain-name command.
b. The asymmetrical RSA keys must be generated on R1 using the crypto key generate rsa command. When prompted for a modulus size, specify a modulus of 1024 bits.
c. SSH will prompt for a username and password combination when enabled. Therefore, a local username database entry must be configured using the username name password password command. Create a local account for the user admin and password cisco.
d. Configure the SSH version using the ip ssh version command. In this lab, we will be configuring to use version 2.
e. Next, we need to disable Telnet and enable SSH communication to the VTY lines. To do so, enter the following commands on R1.
R1(config)# line vty 0 4
R1(config-line)# no transport input all
R1(config-line)# transport input ssh
R1(config-line)# login local
R1(config-line)# end
f. Save the configuration.
Step 2. Check results.
Your completion percentage should be 25%. If not, click Check Results to see which required components are not yet completed.
Task 3: Configure SSH on the Spoke Routers R2, R3 and R4.
Step 1. Configure SSH on routers R2, R3, and R4.
Repeat the Steps from Task 2 on routers R2, R3 and R4.
Step 2. Check results.
Your completion percentage should be 100%. If not, click Check Results to see which required components are not yet completed.
Task 4: Verify SSH.
Step 1. Verify the SSH configuration.
After configuring SSH on all routers, verify the SSH configuration on R1.
a. Issue the show ip ssh command to verify which version of SSH is configured, and what the default settings are.
R1# sho ip ssh
SSH Enabled - version 1.99
Authentication timeout: 120 secs; Authentication retries: 3
b. Next, issue the show ip ssh command to verify if SSH is currently running.
R1#show ssh
%No SSHv2 server connections running.
%No SSHv1 server connections running.
Step 2. connect to R2.ext.
a. Now Telnet to router R2.ext, to issue the show ip ssh command to verify if SSH is currently running.
R1# telnet 10.20.20.1
Trying 10.20.20.1 ...
[Connection to 10.20.20.1 closed by foreign host]
Recall that Telnet was deactivated using the no transport input all command. Only SSH can be used to establish a remote connection.
b. Using R1 as the SSH client, SSH to router R2 using the ssh –l username ip-address command.
R1#ssh –l admin 10.20.20.1
Password:
c. When prompted for a password, enter cisco. You should now be connected to router R2.
Read more "configure router..."
Labels:
network
Task 1: View the Default Configuration.
Step 1. Verify the Frame Relay configuration on the routers.
a. On all four routers, enter user EXEC mode with the password cisco.
b. Enter privileged EXEC mode with the password cisco.
c. From privileged EXEC mode on all four routers, issue the show frame-relay map
command to verify Frame Relay connectivity.
Step 2. Verify the routing tables.
From privileged EXEC mode on all four routers, issue the show ip route command to verify the all network segments are being advertised.
Step 3. Verify connectivity between routers.
a. From R1, ping all LAN interfaces to verify connectivity.
b. Again from router R1, Telnet to R2 using it’s LAN interface IP address. Exit and repeat the step for routers R3 and R4.Ping other PCs on the same network.
Task 2: Configure SSH on the Hub Router (R1).
Step 1. Enable and configure SSH on R1.
To enable SSH on the router, the following parameters must be configured:
- Hostname
- Domain name
- Asymmetrical keys
- Local authentication
a. The hostname on R1 is pre-configured. Therefore configure the domain name cisco.com using the ip domain-name domain-name command.
b. The asymmetrical RSA keys must be generated on R1 using the crypto key generate rsa command. When prompted for a modulus size, specify a modulus of 1024 bits.
c. SSH will prompt for a username and password combination when enabled. Therefore, a local username database entry must be configured using the username name password password command. Create a local account for the user admin and password cisco.
d. Configure the SSH version using the ip ssh version command. In this lab, we will be configuring to use version 2.
e. Next, we need to disable Telnet and enable SSH communication to the VTY lines. To do so, enter the following commands on R1.
R1(config)# line vty 0 4
R1(config-line)# no transport input all
R1(config-line)# transport input ssh
R1(config-line)# login local
R1(config-line)# end
f. Save the configuration.
Step 2. Check results.
Your completion percentage should be 25%. If not, click Check Results to see which required components are not yet completed.
Task 3: Configure SSH on the Spoke Routers R2, R3 and R4.
Step 1. Configure SSH on routers R2, R3, and R4.
Repeat the Steps from Task 2 on routers R2, R3 and R4.
Step 2. Check results.
Your completion percentage should be 100%. If not, click Check Results to see which required components are not yet completed.
Task 4: Verify SSH.
Step 1. Verify the SSH configuration.
After configuring SSH on all routers, verify the SSH configuration on R1.
a. Issue the show ip ssh command to verify which version of SSH is configured, and what the default settings are.
R1# sho ip ssh
SSH Enabled - version 1.99
Authentication timeout: 120 secs; Authentication retries: 3
b. Next, issue the show ip ssh command to verify if SSH is currently running.
R1#show ssh
%No SSHv2 server connections running.
%No SSHv1 server connections running.
Step 2. connect to R2.ext.
a. Now Telnet to router R2.ext, to issue the show ip ssh command to verify if SSH is currently running.
R1# telnet 10.20.20.1
Trying 10.20.20.1 ...
[Connection to 10.20.20.1 closed by foreign host]
Recall that Telnet was deactivated using the no transport input all command. Only SSH can be used to establish a remote connection.
b. Using R1 as the SSH client, SSH to router R2 using the ssh –l username ip-address command.
R1#ssh –l admin 10.20.20.1
Password:
c. When prompted for a password, enter cisco. You should now be connected to router R2. Read more " ..."
Step 1. Verify the Frame Relay configuration on the routers.
a. On all four routers, enter user EXEC mode with the password cisco.
b. Enter privileged EXEC mode with the password cisco.
c. From privileged EXEC mode on all four routers, issue the show frame-relay map
command to verify Frame Relay connectivity.
Step 2. Verify the routing tables.
From privileged EXEC mode on all four routers, issue the show ip route command to verify the all network segments are being advertised.
Step 3. Verify connectivity between routers.
a. From R1, ping all LAN interfaces to verify connectivity.
b. Again from router R1, Telnet to R2 using it’s LAN interface IP address. Exit and repeat the step for routers R3 and R4.Ping other PCs on the same network.
Task 2: Configure SSH on the Hub Router (R1).
Step 1. Enable and configure SSH on R1.
To enable SSH on the router, the following parameters must be configured:
- Hostname
- Domain name
- Asymmetrical keys
- Local authentication
a. The hostname on R1 is pre-configured. Therefore configure the domain name cisco.com using the ip domain-name domain-name command.
b. The asymmetrical RSA keys must be generated on R1 using the crypto key generate rsa command. When prompted for a modulus size, specify a modulus of 1024 bits.
c. SSH will prompt for a username and password combination when enabled. Therefore, a local username database entry must be configured using the username name password password command. Create a local account for the user admin and password cisco.
d. Configure the SSH version using the ip ssh version command. In this lab, we will be configuring to use version 2.
e. Next, we need to disable Telnet and enable SSH communication to the VTY lines. To do so, enter the following commands on R1.
R1(config)# line vty 0 4
R1(config-line)# no transport input all
R1(config-line)# transport input ssh
R1(config-line)# login local
R1(config-line)# end
f. Save the configuration.
Step 2. Check results.
Your completion percentage should be 25%. If not, click Check Results to see which required components are not yet completed.
Task 3: Configure SSH on the Spoke Routers R2, R3 and R4.
Step 1. Configure SSH on routers R2, R3, and R4.
Repeat the Steps from Task 2 on routers R2, R3 and R4.
Step 2. Check results.
Your completion percentage should be 100%. If not, click Check Results to see which required components are not yet completed.
Task 4: Verify SSH.
Step 1. Verify the SSH configuration.
After configuring SSH on all routers, verify the SSH configuration on R1.
a. Issue the show ip ssh command to verify which version of SSH is configured, and what the default settings are.
R1# sho ip ssh
SSH Enabled - version 1.99
Authentication timeout: 120 secs; Authentication retries: 3
b. Next, issue the show ip ssh command to verify if SSH is currently running.
R1#show ssh
%No SSHv2 server connections running.
%No SSHv1 server connections running.
Step 2. connect to R2.ext.
a. Now Telnet to router R2.ext, to issue the show ip ssh command to verify if SSH is currently running.
R1# telnet 10.20.20.1
Trying 10.20.20.1 ...
[Connection to 10.20.20.1 closed by foreign host]
Recall that Telnet was deactivated using the no transport input all command. Only SSH can be used to establish a remote connection.
b. Using R1 as the SSH client, SSH to router R2 using the ssh –l username ip-address command.
R1#ssh –l admin 10.20.20.1
Password:
c. When prompted for a password, enter cisco. You should now be connected to router R2. Read more " ..."
Labels:
network
Subscribe to:
Posts (Atom)