Setup File Transfer Protocol (FTP) bagian II

1. Pendahuluan

Pada bagian I sudah diuraikan bagaimana menginstal ftp pada sebuah server yang sedang berjalan. Dalam uraian berikut, diuraikan bagaimana menginstal ftp pada server yang baru dibuat. Ketika proses instalasi sistem operasi server dilakukan, kita juga harus membuat slice untuk ftp. Kemudian di dalam uraian ini dipaparkan bagaimana menginstal ftp pada server Caldera OpenLinux sebagai contoh server unix disini.
Servis FTP begitu sederhana untuk digunakan dan dikelola, sehingga langkah setup servis FTP menarik untuk dilakukan pada waktu setup sebuah server. Syaratnya software unix Linux atau FreeBSD yang dimiliki harus sudah dilengkapi dengan file program FTP server. Langkah utama pada setup servis FTP antara lain : Lanjutkan membaca Setup File Transfer Protocol (FTP) bagian II

Setup File Transfer Protocol (FTP) bagian I

Di era Internet, orang yang akan mengambil file atau memindahkan file dari komputer server ke komputernya sendiri memakai program aplikasi FTP client. Program FTP server hanya dijalankan di dalam komputer server saja untuk menjawab request pemindahan file yang dikirim oleh komputer user dan akan mendownload file dari server ke komputer tersebut. Direktori FTP di dalam server merupakan sebuah slice tersendiri, dan dikendalikan oleh daemon tp.Bila hendak membuat file database dari user ftp, pergunakanlah gid dan uid dari system yang ada dan pilihlah gid serta uid yang tidak tidak terpakai.

Lanjutkan membaca Setup File Transfer Protocol (FTP) bagian I

Sejarah Puasa

Puasa merupakan salah satu rukun Islam yang dilaksanakan oleh kaum muslimin di seluruh dunia. Allah swt. telah mewajibkannya kepada kaum yang beriman, sebagaimana telah diwajibkan atas kaum sebelum Muhammad saw. Puasa merupakan amal ibadah klasik yang telah diwajibkan atas setiap umat-umat terdahulu.
Ada empat bentuk puasa yang telah dilakukan oleh umat terdahulu, yaitu:
Puasa merupakan salah satu rukun Islam yang dilaksanakan oleh kaum muslimin di seluruh dunia. Allah swt. telah mewajibkannya kepada kaum yang beriman, sebagaimana telah diwajibkan atas kaum sebelum Muhammad saw. Puasa merupakan amal ibadah klasik yang telah diwajibkan atas setiap umat-umat terdahulu.
Ada empat bentuk puasa yang telah dilakukan oleh umat terdahulu, yaitu: Lanjutkan membaca Sejarah Puasa

Definisi Paypal

Kebijaksanaan perlindungan tertulis untuk pembeli yang menggunakan Paypal menyatakan pembeli yang menggunakan Paypal dapat melakukan komplain dalam waktu 45 hari jika pembeli belum mendapatkan barang yang dipesan atau jika barang yang dipesan tidak sesuai deskripsi yang di beritahukan penjual. Jika pembeli menggunakan kartu kredit akan mendapatkan pengembalian uang chargeback dari perusahaan kartu kreditnya

Paypal juga melindungi penjual dari pengembalian uang atau komplain tergantung situasi dan pembuktian. Kebijakan perlindungan tertulis untuk penjual dirancang untuk melindungi penjual dari klaim pembeli yang mengaku telah mengirim uang yang tidak ada catatan bukti pembayarannya, setiap pembelian menggunakan Paypal selalu ada catatan bukti pembayarannya di account Paypal pengirim dan penerima uang, sebagai bukti jika benar telah terjadi pengiriman uang
Lanjutkan membaca Definisi Paypal

Naif – Dimana aku disini

Naif

bilakah engkau mengerti
semua yg ada di hatiku ini
ku hanya ingin dekatmu
namun kau slalu menyadarkan aku
bukan engkau

reff:
kau yg selalu bilang, selalu bilang
tuk tetap aku di sini
takkan berarti
bahwa yg kau bilang, yg kau bilang
kita saling memiliki

dimana aku di sini
dimana aku di sini
dimana aku di sini

pernahkah engkau sadari
bahwa kau selalu menyadarkan aku
bukan engkau

repeat reff

Tips on Understanding the Dangers of Spyware and Adware

Money is the very crux of adware and spyware. These pose several problems and are a security risk.

Adware is a program that displays advertisements on the computer whether you want them or not. They are not just connected to particular websites or free software but are programmed to start up whenever your computer is switched on.

Programs like Eudora mail client display advertisements in lieu of charging registration fees for use of software. It helps developers recover program development costs. Kazaa the file sharing application comes bundled with at least three ad-ware programs. Two of them serve ads to the desktop while another redirects the user’s browser to a search engine with advertiser sponsored web results. Well known ones are: BroadcastPC; Comet Cursor; GeoWhere; Network Essentials, 123 Messenger, Direct Revenue, and so on.

Unfortunately, other guises of adware are spyware and malware.

Spyware is a program code that relays information about you and your work without your permission or knowledge. Some just “spy” on you conveying your Internet habits to marketing companies, while others are “thieves” they access credit card information as well as other sensitive files. In plain terms, it is malicious software that can intercept or take control of a computer’s operation without user knowledge or consent. Termed as “malware” the redefinition of spyware, the programs can: Lanjutkan membaca Tips on Understanding the Dangers of Spyware and Adware

10 Reasons Why Vista is Much More Than a Spoon Full of Sugar

Every new operating system comes with advanced and much improved features. What is exciting to some is not so to others. Basically within a new system each user has his or her own individual preferences. Windows Vista or Longhorn as it was first known is a replacement for XP and is the “new” desk operating system scheduled to be launched by December 2006.

Descriptions of Vista are glowing; it is seen as a vision of the future. High definition graphics, the ‘z’ level in organization, greater clarity, unbelievable security, and boundless thinking power are what it is about. The operating system is set to fulfill all needs, it has a secure and speedy start up, not just when booting but also when returning to active status from standby mode; improved and strengthened driver design which protects the os from crashing when other things go wrong; and an antiphishing device or filter that identifies and confirms phishing sites by using a dynamically updated database. Technically, the Vista uses an image-based installation thereby facilitating deployments by IT professionals. An advanced event log simplifies administrative tasks. Lanjutkan membaca 10 Reasons Why Vista is Much More Than a Spoon Full of Sugar

13 Comparisons of Vista vs Tiger

Competitive and fast are two terms that are applicable to the world of computers. Constantly changing and evolving computer systems bring many advantages to the users and techies alike. The race for supremacy between the yet to be launched Vista (scheduled for 2006) and Mac OSX Tiger began in 2003 with Microsoft’s announcements of plans for an integrated desktop search functionality in Windows Vista.

While opinions vary and are really personal choices in many ways, the following sums up the functionalities between Vista and Tiger. Lanjutkan membaca 13 Comparisons of Vista vs Tiger

Simple Steps – Protect your Computer Online

So you’ve bought your computer and want to get online? It’s not as simple as connect the wire and off you go these day’s. The internet is a weird and wonderful place as long as you can control what you do.

That’s why you need to protect yourself. These can be done in a number of very simple steps. This article will get you started but you should always try to be smart when your surfing the net!

Step 1: Anti-Virus Scanner

Whether you’re connecting to the internet or not, you need an Anti-Virus scanner. Your computer can become infected with “viruses”. These are little files or codes that have been written to ruin your computer! That’s why they must be stopped! Lanjutkan membaca Simple Steps – Protect your Computer Online

Practical Use of Open Source Code Software

As we started the project of our web site, we knew that the proprietary software costs would be too high for our financial resources. Our only option then was to make use of Open Source Code softwares.

However, within the Open Source Code there are lots of softwares to choose from, and it´s up to the system analyst/programmer to pick the ones that best suit the project goals. Lanjutkan membaca Practical Use of Open Source Code Software