Masuk
Tampilkan postingan dengan label Cara optimalisasi blog biar cepat. Tampilkan semua postingan
Tampilkan postingan dengan label Cara optimalisasi blog biar cepat. Tampilkan semua postingan

Sabtu, 05 Mei 2012

Secure is your computer

This is yet again emphasized the need to return to this very important subject related to IT and computer systems. and no one I know who do not have some form of security to him or his property. No matter whether they live in the 6-digit home or in rented accommodation. The action could range from a single key to a highly sophisticated alarm and surveillance systems, but the point is they all have some form of security.

The same should be true of our computer systems. No matter if your system is connected with national security or stand alone in your house, if it contains sensitive data for you, you should take steps to protect it.

In this article I will go through several steps that you can put into action to ensure that the candidate made life difficult for thieves.

Physical Step

When it comes to IT security world, it is easy to overlook the obvious. When I was at school one of the 'catch you out' questions like these:

"If a red house is made of red brick and yellow house made of yellow bricks, what is a green house made of?"

Logical answer is the only green bricks but the correct answer is glass. The question is posed in such a way as to lead you to think a certain way. When it comes to IT, for some reason we think of ways to manage complex security when some simple practical steps may be all thats needed.

Lock It Away

If you have a notebook make sure that you lock it away when not in use or away from your desk overnight. Although this may be convenient for the desktop is still an option. I know at least one major bank that puts all of its desktop pc into a strong room in the evening. It may be boring, but very effective.

Bolt It Down

If your computer is the server and then turn it off and store it may not be an option. Then consider a run down. You can purchase a safety cage that bolts to the floor and would take too long for a thief right to cut and steal.

Many of the appropriate server that comes with lockable front panel, which prevents the computer from being opened, and / or the drive is removed. Why not take advantage of this simple deterrent?

Monitor Sensitive Systems

If you are a business, then relatively little money is easy to set up surveillance. All you need is a security camera (low-cost starting from 200 pounds) is connected to the computer base. This system not only record events, but also can send images to a computer outside the office or even send alerts to your mobile phone. You can log into the camera from a remote site using the Internet, this is very useful if the alarm system goes off and you want to check out your place soon.

Other Options

Password Protect

You will be amazed at how many systems and sensitive documents do not have the security password. There are at least four important things about using a password.

Use strong passwords

A strong password has the following characteristics:

A mixture of lowercase /

Including the number

Includes characters such as @ &%

At least 8 characters.

If your password does not contain the above, then your system may have security equivalent of a rusty bolt with a few screws loose!

Do not use one password for everything

Change passwords on a regular basis

Some servers can be set to force a password change on a regular basis every month or whatever time scale you choose. This system can also force the password can not be reused in many cycles.

Never use a password system is sensitive to the unknown

It is the policy of the sound advice you have any questions. Break it at your peril. You have been warned. To do so is like leaving a full set of buttons labeled in a public place. There are several software products available in the market that keeps a history of logging all keys pressed on the keyboard. Some even detect a mouse click option. If you must use the password (perhaps in a life or death situation) on the unknown system to change your password as soon as you can from a secure system is known.

Write down your password!

Yes, I know many of you will read that twice and wanted to know if I've lost plot.The advice from any bank or institution never write your password down anywhere. I actually agree. You should never write your password in a form everyone can identify. But with so many passwords we need to remember, it is amazing that people use the same password over and over again? What I did, was write down my password is encrypted in a way that I can understand but no one else will know what the numbers mean. Most, if not all credit cards work with 4-digit pin number. What you can do is write it in the wrong order and add 1 or 2 more numbers in the same place each time or always add the same amount over the original number. Also, I never write my password or PIN number along with other sources, for example, I did not write the name of the bank with a number beside it. I designed a system to provide bank account name and password. If someone finds my list they will never know the meaning of information and are more likely than not throw it away.

Practice

Firewall

A unique problem associated with the IT theft is that the thief did not have to enter your property to gain access to sensitive systems or data. Thanks to the Internet can be a thief on the other side of the world, sits drinking coffee while he's stealing from you.

All businesses must have a firewall stop, full well! A good router comes with a built in firewall of varying quality. From behind the fire-walled router, will be the thief got the answer when he / she is trying to 'ping' your IP address to find out if there are computers at the other end. Do not worry about the technical terms, just Firewall makes your computer invisible to the outside world.

Prohibit / prevent the use of file transfer and chat programs

If you are a business router or a third-party software can restrict access to the file transfer program that is commonly used to download music or chat programs. The program can act as a gateway through your firewall security.

Security Software

If you are a home user or a business you should consider using one of the many third-party software package known as Internet Security. I recommend the one that marks a secure website for the search.

Protecting Mobile Devices

Many companies have the personnel who use mobile devices that contain up to date data is usually like email, milk and event reminders. Most of the devices synchronization with the main server in the office. The tool is easily susceptible to theft. What many users may not know is that they can be remotely removed from the sensitive data no matter where the design is in the world.

Backup

To protect your property it is common to insure against losses from fire, theft and accidental damage. There is no discussion about the security would be complete without mentioning the backup, the equivalent of accidental damage. Here, I just wanted to mention one method of backup that I asked about more and more these days - the backup site.

Many third-party groups are now offering offsite backup. The options available for home and business users. Of course there are some good points in favor of this option, but there are limitations that I would like to draw your attention to:

Should not be considered as an answer to the

It is rare that one solution fits all needs. For example, what happens if your broadband connection goes down?

The cost of money

Of course, as the services offered there are costs involved. Vendor service fees based on the amount of data stored offsite. Costs range widely. As a believer in 'you get what you pay for' You need to investigate each offer carefully.

Data transfer rates and the number of

You have to calculate how much data you need to go back. Remember that time offsite backup will depend on how fast your broadband connection (if you do not have a broadband option is a non starter). Most systems work by moving the first backup all the files - which can take days - then just do incremental backups thereafter.

If a service contract with your operator to limit the amount of data you can transfer you have to make sure you do not have problems of excess costs.

Generally, you can not beat doing a full backup and store the tapes offsite own. I see this as a good choice for small files but it is very important as a tool in the arsenal.

If you would like help or advice on any of the issues raised in this article please visit my website at http://www.bdp.co.uk

For further information or assistance from Steve R Bryan http://www.bryansdataprogramming.com please visit the website at where you can find information about products, services and download a free monthly newsletter Bryan Programming the data are packed full of the latest news, information and advice about computing world
READ MORE - Secure is your computer

Kamis, 03 Mei 2012

Cara membuat google adsense melalui dostoc

langkah-langkahnya :
1.masuk ke situs docstoc,biar ga panjang lebar saya anggap dah pada punya akun di docstoc ya
kalau udah klik upload


2.kemudian klik select files
3.upload document minimal 5 gan
4.setelah upload document langkah selanjutnya adalah klik di menu akun docstoc kita kemudian klik setting dan klik doccash dan sign up for doccash

5. selanjutnya pilih i'd like to set up an adsense account dan isi alamat email kita,perlu di ingat emailnya yang masih perawan ya alias belum pernah buat daftar google adsense hehe kemudian klik submite
6.congratulation,anda telah sukses membuat akun google adsense, tapi jangan seneng dulu masih ada langkah yang harus di selesaikan lagi

7. masuk ke akun gmail dan buka folder inbox.kita akan mendapatkan email balasan yang isinya supaya kita konfirmasi ke google adsense,klik aja link yang ada di dalam email seperti gambar berikut
8. kemudian isi form nya dengan lengkap gan, sesuai alamat kita setelah yakin alamat nya benar klik submite information, seperti gambar di bawah ini
9.kemudian klik continue dan centang ceklist accept dan klik accept

10. langkah yang di tunggu tunggu adalah menunggu email balasan dari google adsense yang isinya ucapan selamat datang di google adsense,selesai
sampai langkah ini akun kita sudah di approve tapi masih menunggu sekitar 4 harian,karena pihak google ngecek dulu akun dan isi akun docstoc kita,dalam masa tunggu iklan tidak akan keluar,setelah di setujui full maka iklan akan muncul di akun docstoc kita,kalau sudah begini silahkan anda pasang iklannya di blog sobat , sekian semoga bermanfaat buat kita semua

sumber artikel: http://www.asfa-blog.com/2012/03/cara-daftar-google-adsense-lewat.html#ixzz1ts0oNYk0
READ MORE - Cara membuat google adsense melalui dostoc

Senin, 30 April 2012

Domain co.id gratis

Seperti yang tertera pada gambar di atas  saat ini anda dapat memiliki domain web.id dan co.id gratis...langsung aja klik disini  


note : tunggu 5 detik...skip add
READ MORE - Domain co.id gratis

Sabtu, 28 April 2012

Java Jazz Festival 2012: Some Tid-Bits from the Fest

Java Jazz Festival 2012 has been passed, yet many of us should still experience the jazz-lag after receiving the blows from stage to stage. Aside from enjoying jazz being served by around 2000 musicians from all over the world, it’s also interesting to see what’s happening outside during the festival.


It’s clear that Java Jazz Festival has become an important part of the lifestyle. Speaking of fashion, many people tried to dress up jazzy for this occasion as we found vests, blazers and of course the Sinatra’s fedora hats everywhere, other than the casual dress like t-shirts and jeans. Looking at the number of attendance, we can have a solid proof that jazz is actually not that difficult to digest. All ages from small babies to seniors packed in to catch their favorite artists, or even just to absorb the sense of jazz. For us, all these showgoers brought a different kind of excitment to see in a festival as big as this. It’s normal to see puzzled face when they were trying to find the stage or people running in full speed because they didn’t want to miss the selected show. There were many funny things, cool moments or unique situations all around the venue that we didn’t want to miss, not to mention the lovely blue sunset sky which appeared above the venue for the whole three days.

Salute to our photographers, they still managed to snap some shots in between their duty to take stage photos and squeezing through crowds. So now we want to share their off stage during the foremost music bash on earth. (Please click each thumbnail at the end of this article to see the photos).


There were many sweet couples seemed to drown their romance into Java Jazz by hugging each other while enjoying the show. Java Jazz Festival has also become the meeting point for artists around the world, including those who came from the same country said hi to one another. Fans took the chance to take pictures with the artists if they were lucky enough, while others had such a good time with their family and friends inside.

What Java Jazz Festival brings to us is not just a simple jazz event. Yes it’s gigantic, with thousands of artists and hundreds of show for total 3 days, but more than just that, we could also see the kind of jazz lifestyle under one roof living peacefully and harmoniously. We just remember a song from Level 42 titled “Love in a Peaceful World”, and we experience the essence in this festival. How lovely to have it through jazz. Not only jazz can entertain us to the max, but it can also carry the message of peace. Thank you Java Jazz! We’ll see you again next year.

jazzuality.com
READ MORE - Java Jazz Festival 2012: Some Tid-Bits from the Fest

Jumat, 27 April 2012

Cara optimalisasi blog biar cepat


Need for speed up your blog? Yups, siapa yang tidak ingin halaman blog-nya tampil lebih cepat, pada kenyataannya selain kualitas konten, faktor kecepatan loading page lah yang sangat besar pengaruhnya buat kenyamanan pengunjung. Sudah menjadi sifat dasar manusia dimana menunggu adalah pekerjaan yang sangat membosankan, ini yang harus kita cermati bersama, jangan sampai pengunjung kabur dan pindah ke situs lain hanya karena blog kita sangat lambat ketika dibuka..walaupun itu hanya telat beberapa detik saja. Faktor kecepatan koneksi juga bisa dikatakan sebagai salah satu biang kerok, meskipun kita berpikir halaman blog kita tampil secepat kilat ketika dibuka pada komputer kita sendiri, tapi tidak begitu khan dengan koneksi pengunjung :)

Nah, disini saya mencoba memberikan tips cara Optimasi blog agar bisa tampil lebih cepat, tentunya cepat dalam batas wajar :)

15 Cara Optimasi Halaman Blog Agar tampil lebih cepat:

1. Aktifkan Kompresi dengan GZIP
Browser modern biasanya mendukung kompresi untuk HTML, CSS dan Javascript. Melakukan kompresi pada ketiga file tersebut tentu akan menghemat waktu loading halaman dan secara otomatis tentu akan terjadi pengurangan waktu download. Para Webmaster pintar diluar sana sangat menyarankan kita menggunakan kompresi dengan Gzip. Untuk teknik dan tutorial Gzip silahkan disearch aja ya..sudah banyak sekali yang membahasnya. Jika pembaca menggunakan Platform Blogspot abaikan saja kompresi ini karena secara default blogspot sendiri sudah mendukung teknik tersebut. Untuk pengguna Plaform lain seperti Wordpress silahkan menggunakan Kompresi Gzip ini atau kalau gak mau repot pake Gzip sebaiknya gunakan saja plugin WP Super Cache.

2. Buang Spasi kosong pada kode HTML
Membuang Spasi kosong termasuk juga dalam teknik kompresi, yaitu dengan memadatkan kode HTML, XML atau PHP dengan cara membuang spasi yang dirasa tidak berguna. Salah satunya  termasuk juga dalam Inline untuk kode Javascript dan CSS. Dengan menghapus ruang kosong tentunya akan menyimpan banyak byte data dan imbasnya akan mempercepat waktu proses download. Untuk membuang Spasi yang tidak perlu saya biasanya menggunakan Tools Editor seperti Notepat++. Caranya sangat mudah, yaitu dengan mem-blok semua kode yang ingin dibuang spasinya kemudian pilih menu TextFX -> TextFX Edit dan pilih Delete Blank Lines atau Delete Surplus Blank Lines.

3. Lakukan Kompresi CSS (Stylesheet)
Teknik kompresi CSS ini sebenarnya cukup sederhana, hampir sama dengan cara diatas yaitu dengan cara membuang spasi yang tidak diperlukan. Memadatkan pengkodean CSS juga bisa menghebat waktu download, Parsing dan waktu eksekusi pada suatu halaman. Untuk mempermudah kita melakukan kompresi pada CSS, silahkan gunakan tools gratis yang sudah banyak disediakan seperti YUI Kompresor dan cssmin.js.

4. Letakan CSS (Stylesheet) di Atas
Adakalanya kita tidak meletakan CSS di header, biasanya cara tersebut kita gunakan untuk membuat Style tunggal untuk gaya tertentu pada widget. Para webmaster yang ahli biasanya menyarankan kita sebaiknya memanggil semua kode CSS pada halaman HEAD entah itu CSS Internal maupun CSS External semuanya sebaiknya dijadikan satu pemanggilan dalam Header.

5. Buang CSS (Stylesheet) yang tidak perlu
Ketika browser mengakses halaman, biasanya harus melalui proses download dan menganalisa setiap baris kode dalam CSS (stylesheet) terlebih dahulu, bayangkan jika banyak kode CSS percuma yang harus diproses namun  tidak dieksekusi sama sekali! ini akan sangat mengganggu karena akan menghambat proses rendering yang harusnya lebih cepat!

6. Periksa Validasi CSS (Stylesheet)
Walaupun sering terjadi kesalahan dalam menulis kode CSS, broser tidak akan menampilkan pesan kesalahan apapun dalam layar, semua eksekusi akan terus dijalankan tanpa adanya laporan error meskipun itu hanya salah dalam satu huruf saja. Sebaiknya jangan abaikan kesalahan ini, silahkan check validasinya. Untuk lebih mudahya silahkan gunakan tools online gratis seperti W3C CSS Validations

7. Kombinasi CSS (Stylesheet) dalam file External
Kekurangan CSS Internal hanya satu yaitu terjadinya pembengkakan kapasitas ukuran (size) pada besarnya halaman. Webmaster berpengalaman selalu menyarankan kita sebaiknya melakukan pemanggilan kode CSS melalui akses external, jika memungkinkan lebih bagus lagi melakukan kombinasi semua kode CSS hanya dalam satu file saja.  (untuk pengguna blogger abaikan teknik ini karena akan lebih bagus dengan pemanggilan internal)

8. Lakukan Kompresi Javascript
Teknik kompresi Javacsript hampir sama dengan CSS yaitu dengan cara membuang spasi yang tidak diperlukan. Memadatkan pengkodean Javacript juga bisa menghebat waktu download, Parsing dan waktu eksekusi pada suatu halaman. Untuk mempermudah kita melakukan kompresi pada javascript silahkan gunakan tools gratis yang sudah banyak disediakan seperti YUI Kompresor, Closure Compiler dan JSMin

9. Buang Javascript yang tidak Perlu
Suka tidak suka penggunakan javacript (JS) kadang sangat diperlukan, walaupun JS kadang membuat loading halaman akan semakin berat. Ketika browser mengakses suatu halaman, biasanya harus melalui proses download dan menganalisa kode dalam JS terlebih dahulu, bayangkan jika banyak pemanggilan JS secara percuma yang harus diproses namun tidak dieksekusi sama sekali! Silahkan teliti kembali kode JS yang menurut kita tidak berguna, cek ulang dan jangan sampai parkir terlalu lama, jika tidak digunakan lagi mending hapus saja!

10. Kombinasi Javascript dalam file External
Hampir sama kasusnya dengan CSS External diatas, Kekurangan javascript Internal hanya satu yaitu terjadinya pembengkakan kapasitas ukuran (size) pada besarnya halaman. Webmaster berpengalaman selalu menyarankan kita sebaiknya melakukan pemanggilan melalui akses external, jika memungkinkan lebih bagus lagi melakukan kombinasi semua koding JS hanya dalam satu file saja.  (untuk pengguna blogger jika memungkinkan sebaiknya panggil melalui file internal saja, silahkan baca kembali solusi hosting javasript internal)

11. Lakukan Optimasi Gambar
Website dinamis tanpa dihiasi gambar tentu tidak akan menarik, namum penggunaan gambar yang berlebihan akan menjadi masalah ketika browser melakukan download pada halaman. Sebaiknya kurangi gambar yang tidak perlu, terlebih pada gambar yang mempunyai ukuran cukup besar. Jika memang terpaksa menggunakannya, sebaiknya lakukan optimasi pada gambar tersebut dengan cara melakukan kompresi tanpa harus mengurangi kualitas gambar. Saran saya silahkan gunakan Yahoo! Smush.it

12. Jangan Paksa Skala Gambar dalam HTML
Hindari menggunakan gambar yang besar hanya karena kita dapat mengatur lebar dan tinggi dalam HMTL, Kita memang bisa mengatur ulang gambar sesuka hati melalui CSS atau dalam tag <Img> seperti pada html berikut ini <img width="100" height="100" src="gambar.jpg"/> walaupun ukuran gambar sebenarnya adalah 200x200px sebaiknya jangan mengecilkan dengan mengatur ulang skala gambar, akan lebih baik kita membuat gambar 100x100px sesuai dengan ukuran gambar sebenarnya.

13. Hindari Gambar SRC kosong
Pemanggilan tag SRC untuk gambar biasanya ada pada dua kemungkinan, bisa melalui HTML <img scr=""> atau memalui Javascript var img = new Image(); img.src = ""; walaupun browser mengabaikan permintaan ini jika gambar dalam keadaan kosong, tetap saja ini melalui proses rendering yang harusnya tidak membebani server. Silahkan perikasa kembali blank SRC, Jika memang tidak digunakan mending dihapus saja.

14. Periksa Kembali Broken link
Link yang telah mati bakal tidak disukai pembaca, jangankan pembaca..search engine sekalipun tidak menyukai hal ini. Lakukan pengecekan broken link sesering mungkin, banyak tools di internet yang bisa melakukan tugas ini, salah satunya yang terbaik bisa menggunakan tools dari W3C Checklink

15. Buang Widget atau plugin yang tidak Perlu
Widget yang terlalu banyak hanya membuat halaman jadi semakin berat, apalagi widget tersebut tidak begitu berguna. Silahkan kita pilah-pilah kembali widget yang sekiranya tidak ada maanfaat sama sekali seperti memasang jam dan kalender. Tanyakan pada diri kita sendiri apa gunanya memasang jam di blog, jika hanya sebagai penunjuk waktu..trus apa gunanya jam pada taksbar windows? untuk lebih jelas mengenai bahasan ini coba buka kembali catatan lama saya dilink ini 17 tips agar halaman blog tampil profesional
READ MORE - Cara optimalisasi blog biar cepat