Postingan

Membangun Jaringan Wireless Dengan Mikrotik

Gambar
Pendistribusian akses jaringan menggunakan teknologi nirkabel/wireless saat ini semakin menjadi pilihan. Cakupan area, kemudahan serta sifat flexible pada wireless menjadi alasan admin jaringan menggunakan nya. Untuk area-area yang banyak dikunjungi orang seperti mal, cafe, atau kantor dimana pengunjung akan selau berganti dengan jumlah yang tidak tentu (dinamis), teknologi wireless sangat tepat digunakan. Dalam implementasi di lapangan, sebelum perangkat Wireless Mikrotik dapat memberikan akses ke client di bawah nya, maka perangkat tersebut harus dapat menerima akses dari provider terlebih dahulu. Konfigurasi Dasar Mikrotik Langkah pertama yang harus dilakukan adalah konfigurasi dasar Mikrotik agar dapat menerima akses dari provider. Ada banyak metode yang bisa diterapkan, disesuaikan dengan metode distribusi yang diterapkan oleh provider. Langkahnya dapat mengikuti video tutorial berikut. Distribusi Wireless Ada 2 metode yang bisa digunakan dalam melakukan distribusi wireless ke ar...

Delete Browsing History

U sers have always had the ability to manage browsing information collected and stored on their machines. Internet Explorer 8 provides an enhanced interface to make it easier than ever to remove this information – while keeping related data that the user chooses to retain.   Managing Private Information Privacy is a complex topic that more often than not puts one party in conflict with another. If security boils down to “the user is in control of what code runs on the machine,” then privacy boils down to “the user is in control of what information the browser makes available to Web sites." Some organizations write scripts to clean up cookies and browsing history at the end of a browsing session to help ensure user privacy. This type of environment might be needed for very sensitive data (for example, defense, security, or law enforcement environments), for regulatory or compliance reasons, or for very private data in the healthcare industry. Internet Explor...

Review light downloader

Gambar
Secara teori, hampir semua aplikasi download manager memiliki fungsi yang sama.  Kemampuannya dibuat agar Anda bisa melakukan proses unduh berkas dari suatu situs lebih cepat dengan tingkat keberhasilan yang lebih tinggi. Feature -nya pun mirip, mulai dari proses akselerasi, pause , resume , dan schedule . Namun, aplikasi ini tidak dikhususkan untuk mengunduh kandungan multimedia dari situs streaming video. Nah, Light Downloader (LD) lebih mengedepankan fungsi yang ringan dan sederhana namun berkinerja tinggi. Aplikasi ini juga tidak kalah dengan aplikasi sejenis. LD memiliki antarmuka yang mirip dengan DAM, meski terlihat lebih sederhana. Aplikasi ini memiliki pemisahan hasil unduhan berdasarkan kategori yang lebih sederhana. Hanya saja tidak seperti DMA, Light Downloader sepenuhnya bersifat freeware . LD diklaim mampu meningkatkan kecepatan saat mengunduh hingga 6 kali lebih cepat. Hal ini dimungkinkan karena LD menggunakan metode pemisahan berkas menjadi beberapa bagian dan ...

WINDOWS DISCOVERY TOOLS

Gambar
Most platforms have one or two popular scanning tools along with a handful of other less feature-filled applications available. Windows is no exception. The ubiquitous NetStumbler is by far the most popular scanning tool, and for the Windows user who wants monitor mode, AiroPeek is the usual solution. NetStumbler NetStumbler is by far the most popular scanning tool on Windows. While NetStumbler has a lot of unique features, it also has some drawbacks. It has GPS support, so it can record the location of an access point (AP), but it is not tightly integrated into mapping/ navigation software. Also, because it's an active scanner, it might not be able to find "hidden" APs, and it definitely will not be able to find the name of a hidden AP. Access points that are closed or hidden (your vendor may use different language) don't respond to broadcast probe requests. They also don't transmit their real name in beacons (they are set to null). A examination o...

Earn 20 Times More With GOMEZPEERZONE

Gambar
Do you know what is Gomez Peer , refer to this article - What is Gomez Peer? It is basically, a website that allows you to become a peer for the servers of Gomez to measure web performances. In return for your help in letting them use your machine, they reward you monetarily. The Million Dollar Question: How to Explode the Earnings by 20X? Well, I have been searching the web and did some research on my own and I found that it is indeed possible to do it. How I know? I heard you rhetorically asked. Because I have tried it and tested it myself.

The 802.11 MAC

Gambar
O ne of the most important aspects of the 802.11 standard is the rules laid down for Media Access Control (MAC). Regardless of the physical layer 802.11 is implemented on (2.4-GHz ISM band, 5-GHz UNII band, and so on), the MAC rules stay the same. Distributed Coordination Function The 802.11 standard specifies two modes in which MAC can operate: contention free and contention based. In contention-based MAC, stations basically fight for access to the media. Similar to Ethernet, when a station wants to transmit first, it checks to see if another station is using the wire. In an Ethernet network, a station waits until the media is not in use and then transmits the packet. If another station transmits at the same time, it will detect the collision and randomly back off. This makes Ethernet a carrier sense multiple access/collision detection (CSMA/CD)–based algorithm.

HARDWARE AND DRIVERS

Gambar
T he tools you use are only as good as the hardware they are running on, but the best wireless card and chipset in the world is useless if the driver controlling it has no idea how to make it do what you want. This section introduces you to the currently available drivers, the chipsets that they control, and the cards that have the chipsets in them. There is a strong emphasis on Linux drivers, because this is where most of the development is currently happening. Before getting into the nitty gritty details of chipsets and drivers, some information on why drivers and chipsets are so important in wireless hacking is needed.