Kolom-Tuttorial Blogger Indonesia | Blog Here is Version Live Beta

Universitas Budi Luhur Terbagus di Jakarta

Posted by Deny Kurniawan ( Computer Indonesia ) Friday, November 9, 2012 0 comments
Universitas Budi Luhur Terbagus di Jakarta
Universitas Budi Luhur Terbagus di Jakarta - Universitas budi luhur adalah sebuah nama gabungan dari 5 fakultas dan 1 akademik. Universitas ini sendiri merupakan sebagai pelopor sebuah kampus pertama yang mengusung jurusan ilmu komputer di Indonesia. Nama budi luhur sendiri di ambil dari filosofis "cerdas berbudi luhur" sebuah landasan yang mengutamakan berbudi luhur dan kecerdasan yang baik.

Universitas bdu luhur sendiri berdiri dsejak tahun 1 april 1979 dengan nama awal akademi ilmu komputer (AIK). Di universitas budi luhur sendiri sekarang sedang mengusung sebuah program tentang kesehatan dan kebersihan lingkungan atau yang di kenal sebagai nama "go green".

Inilah daftar jurusan yang berada di universitas budi luhur :
  1. Fakultas ilmu komunikasi.
  2. Fakultas teknologi informasi.
  3. Fakultas ekonomi.
  4. Fakultas ilmu sosial dan politik.
  5. Fakultas teknik.
  6. Dan akademi sekertaris budi luhur.

Budeseo.com Jasa Seo dan Website Murah Terpercaya

Posted by Deny Kurniawan ( Computer Indonesia ) Friday, August 17, 2012 3 comments
Budeseo.com Jasa Seo dan Website Murah Terpercaya
Kali ini kolom-tuttorial memberikan review sebuah jasa seo murah indonesia yang di percayai akan jasa dan keberhasilannya dalam meraih posisi pertama mesin pencarian google.  Jasa seo yang di sediakan tersendiri di bandrol dengan harga miring mulai dari Rp 100.000 anda bisa mendapatkan keyword untuk bisnis anda. Selain itu budeseo.com juga memberikan jasa website murah dengan platform mulai dari blogspot di hargai sebesar Rp 30.000 serta hingga self-host di hargai dengan Rp 250.000 anda bisa memilikinya dengan .com / .net / .org / .info.

Selain itu banyak bonus yang di dapat mulai dari social bookmar di 50 situs website ber-pr serta backlink sesuai dengan isi bisnis anda. Selain itu jasa seo murah ini juga memberikan anda submit ke google mesin pencarian gratis. buruan buktikan kehebatannya dengan memesan. Untuk pembayaran seperi jasa seo anda akan di kenakan 50% pembayaran awal sedangkan untuk pembuatan website sel-hosting di kenakan langsung pembayaran secara full.

Media Player

Posted by Deny Kurniawan ( Computer Indonesia ) Wednesday, March 14, 2012 6 comments

Media Player - A media player is a program that allows you to view images and animation, listen to audio and watch video files on your computer. Media players may also include the capability to organize media files, convert them to different formats, connect to and purchase media from an online media store, download podcast and vodcast, burn audio CDs, and transfer media to portable media players. Windows includes windows media player. There other popular media players are iTunes, realplayer and rhapsody.

Example media player :

  • Winamp
  • Rhapsody
  • Real Players
  • Windows media players
  • Vlc media players
  • K-lite


Disc Burning an Personal Computer Maintenance

Posted by Deny Kurniawan ( Computer Indonesia ) Tuesday, March 13, 2012 2 comments
Disc Burning an Personal Computer Maintenance - Disc Burning software writes text, graphic, audio and video on a recordable or rewritable cd, dvd, or blu-ray disc. This software enables the home user easily to back up contents of their hard disk on an optical disc  and make duplicates of uncopyrighted music or movie. Disc burning software usually also includes photo editing, audio editing and video editing capabilities.

When you buy a recordable or rewritable disc, it typically includes burning software. You also can buy stand alone disc burning software for a cost of less than $100.

Personal Computer Maintenance
Personal Computer Maintenance, Operating system tyipically include a diagnostic utility that diagnoses computer problems but does not repair them. A personal computer maintance uyility identifies and fixes operating system problems, detects and repair disk problems and includes the capabilitiy of improving a computer's performance. Additionally, some personal computer maintance utilities continuously monitor a computer while you use it do identify and repair problems before they occur.

CRT Monitors

Posted by Deny Kurniawan ( Computer Indonesia ) Monday, March 12, 2012 1 comments
CRT Monitors - A CRT monitor is a desktop monitor that contains a cathoderay tube. A cathoderay tube (CRT) is a large, sealed glass tube. That front of the tube is the screen. Tiny dots of phospor material coat the screen on a CRT. Inside the CRT, an electron beam moves back and froth across the back of the screen to glow, which produces an image on the screen.

CRT monitors have a much larger footprint than do LCD monitors : that it, they take up more desk space and thus are not used much today. A CRT monitor's viewable size is the diagonal measurement of the actual viewing area provided by the screen in the CRT monitor. A 21 inch monitor, for example : may have a viewble size of 20 inches.

Digital Communications

Posted by Deny Kurniawan ( Computer Indonesia ) Sunday, March 11, 2012 8 comments
Digital Communications - Which factor largely in many people's personal and business lives, include any transmission of information from one computer or mobile device to another. This feature covers many forms of digital communications : e-mail, text messaging and picture/video messaging, digital voice communications, blogs and wikis, online social network, chat rooms and web conferences and content sharing.

With the internet cell phone network and other wireless network increasing in size and speed, digital communications have become more and more prevalent. The most common devices used to communicate digitally are desktop computers, mobile computers, smart phones and other mobile devices.

Seccesful use of digital communications involves selecting both the proper communications device and the proper mode of communication for a given situation. For example, under what circumstances might sending a text message from a smart phone be more appropriate than sending an e-mail from a desktop computer ? the answer to this question also may depend on whether the situation involves personal or business communications. Each computer or mobile device and communications method has advantages and disadvantages that you should consider.

The following pages describe how people use different types of digital communications in their personal and business lives to enhance collaborations in their personal and business lives to enhance collaboration and increase productiveity. The final section og the feature includes an example an example of how you might use digital communications.

Internet Filters

Posted by Deny Kurniawan ( Computer Indonesia ) Saturday, March 10, 2012 2 comments
Internet Filters - Filters are programs that remove or block certain items from being displayed. Four widely used internet filters are web filters, anti spam, programs, phishing filters and pop up blockers.

Web Filters, web filtering software is a program that restricts access to certain material on the web. Some restrict access to specific web sites, other filter site that use certain wordd or phrases. Many businesses use web filtering software to limit employee's web access. Some schools, linraries and parents use this software to restricts access to minors. Windows 7 contains parental controls, which allow parents to record and control the types of content their childern can access on the internet.

Anti spam programs spam is an unsolicited e-mail message or newsgroup posting sent yo many recipients or newsgroup at once. The content of spam ranges from selling a product or service, to promoting a business opportunity, to advertising offensive material. An anti spam program is a filtering program that attempts to remove spam before it reaches your inbox. If your e-mail program does not filter spam, many anti spam programs are available at no cost on the web. Internet access providers often filter spam as a service for their subscribers.

Phising filters phising is a scam in which a perpetrator attempts to obtain your personal and financial information. A phishing filter is a program that warns or blocks you from potentially fraudulent or suspicious web sites. Some web browsers or suspicious web sites. Some web browsers include phishing filters.

Pop up blockers a pop uo ad is an internet advertisment that suddenly appeasrs in a new window in the foregrouns of a web page displayed in your browser. A pop up blocker is a filtering program that stops pop up ads from displaying on web pages. Many web browsers include a pop up blocker. You also can download pop up blockers from the web at no cost.

File compression a file compression utility shrinks the sized of a file. A compressed file takes up less storage space than the original file. Compressing files frees up room on the storage media and improves system performance. Attaching a compreesed file to an e-mail message, for example, reduces the time needed for file transmission. Uploading and downloading compressed files to and from the internet reduces the file transmission time.

Two types of commperssion are lossy and lossless. With lossy compression, because the quality of a file decreases slightly each time the file is compressed, you will be unable to restore the file to its exact orginal state. With audio and video files, small degradations in quality usually are not recognizable : thus, lossy compression often in used in these types of files. With lossless compression, by contrast, a comprossed file can be returned to its exact orginal state. Text files typically use lossless compression.

Comprossed files, some times called zipped files, usually have a .zip extension. When you receive or download a compreesed file, you must uncompress it. To uncompress, or unzip, a file, you restore it to its orginal form. Some operating systems such as windows include file compression and uncompression capabilities, Two popular stand alone file compression utilities are PKZIP and WINZip.

Miniature Hard Disk

Posted by Deny Kurniawan ( Computer Indonesia ) Friday, March 9, 2012 2 comments
Miniature Hard Disk - Both internal and external hard disk are available in miniature sized. These tiny hard disk have from factors of 1,8 inch, 1 inch, and 0,85 inch. evice such as portable media players, digital camera and smartphone often have internal miniature hard disk, which provide greater sronge capacities than flash memory. External hard disk that are smaller in sized capacity, which also contain miniature hard disk, are sometimes called a pocket hard drive because they enable mobile users easily to transport photos and other files from one computer to another.

When a device containing a miniature hard disk is connected to a computer, the user can read from and write on the device as a separate drive. Miniature hard disks have stroge capaciries that range from 1 GB to 320 GB. Miniature hard disks with the generator stronge capacities typically use perpendicular recording.

Antivirus Programs

Posted by Deny Kurniawan ( Computer Indonesia ) Thursday, March 8, 2012 4 comments
Antivirus Programs - The term, computer virus describes a potentially demaging computer program that affect, or infects, a computer negatively by altering the way the computer work without the user's knowledge or permision. Once the virus is a computer, it can spread throughtout and may demage your files and opearting system.

Computer viruses do not generate by chance. The programer of a virus, known as a virus author, intentionally writes viruses a challenge. Others write virus programs to cause destruction. Writing a virus program usually requires significant programing skills.

Some viruses are harmless pranks that simply freeze a computer temporarily or display sound or massages. The music bug virus, for example : instructs the computer to play a few chords of music. Other viruses destroy or corrupt data shared on the hard disk of the infected computer. If you notice any usual changes in your computer's performance, it may be infected with a virus.

Viruses are just one type of malicious software. Malware (short for malicious software) is software that acts without a user's knowledge and deliberately aalters the computer's operations. In addition to viruses, worm and trojan horses are melware.

A worm, such as sasser or klez, copies itself repeatedly for example : in memory over a network using up system resource and posibly shutting down the system. A trojan horse (named after the hreek myth) hides within or looks like a legitimate program such as a screen server. A certain condition or action usually trigers the trojan horse. Unlike a virus or worm, a trojan horse does not replicate itself to other computers. Currently more than one milion known threats to your computer exist.

To protect a computer from virus attacks, users should install an antivirus program and update it frequently. An antivirus program protect a computer against by identifying and removing any computer viruses found in memory, on stroge media, or on incoming files. Most antivirus programs also protect againts worms and trojan. When you purchase a new computer, it often includes antivirus software.

There more popular antivirus programs are Mcafee virus scan, Eset NOD 32, Norton anti virus, Avira,  Avast, Panda, Bitdefender, symantec, f-secure,  trend micro, most of which also contains spyware removers, internet filters and other utilities. As an alternative to purchasing these products on disc, both McAfee and Norton offer web based antivirus programs.

Adware Removers and Spyware

Posted by Deny Kurniawan ( Computer Indonesia ) Wednesday, March 7, 2012 5 comments
Adware Removers and Spyware - Adware is program that displays an online advertisment in a banner or pop up window on web pages, e-mail, or other internet services. Sometimes spyware is hidden in adware. A spyware remover is a program that detects and deletes spyware and other similiar programs. An adware remover is a program that detects and deletes adware. Most spyware and adware removers cost less than $50 some are available on the web at no cost. Some operating systems removers. Popular stand alone spyware and adware removers. Popular stand alone spyware and adware removers include ad adware spy sweeper, spy bot search and destroy and windows defender.

Spyware is a program placed on a computer without the user's knowledge that secrely collects information about the user often related to web browsing habits. Spyware can enter a computer as a virus or as a result of a user installing a new program. The spyware program communicates information it collect to an outside source while you are online.

Personal Firewall

Posted by Deny Kurniawan ( Computer Indonesia ) 2 comments

Personal Firewall - A personal firewall is a utility that detects and protects a personal computer from unauthorized instrusions. Personal firewall constantly monitor all transmissions to and from a computer.

When connected to the internet you computer is vulnerable to attacks from hacker. A backer is someone who teries to access a computer or network illegally. Users with broadband internet connections such as throught DSL and cable internet service are even susceptible than those with dial up access because the internet connection always is on.

Operating systems often include a personal firewall. Windows automatically enables its buit in personal forewall called windows firewall upon installation of the operating system. If your operating system does not include a personal firewall or you want additional proctetion you can purchase a stand alone personal firewall utility or a hardware firewall which is a device such as a router that has a buit in firewall.

Utility Programs

Posted by Deny Kurniawan ( Computer Indonesia ) Tuesday, March 6, 2012 2 comments
Utility Programs - A utility programs aslso called a utility, is a type of system software that allows a user to perform maintance type task, usually related to managing a computer, its devices, or its programs. Most operating system include several buit in utility programs. User often buy stand alone utilities, however, because they offer improvements over those included with the operating system.

Functions provided by utility programs include the following managing files, searching files, viewing imanges, uninstalling programs, cleaning up disk, defragmenting disks, backing up files and disk, setting up screen severs, removing spyware and adware, securing a computer from unaauthorsized access, procteting against viruses,  comperesing files, filtering internet content, playing media files, buring optical discs and maintaning a personal computer.

The following sections briefly discuss each of these utilities. Read innovative computing to find out about utility programs that can help you recover deleted files.

Embedded Linux and Google Android

Posted by Deny Kurniawan ( Computer Indonesia ) Monday, March 5, 2012 4 comments
Embedded Linux and Google Android - Embeded linux is a scale down linux operating system designed for smart phones, PDAs, portable media players, internet telephones and many other types of devices and computers requiring an embedded operation system. Devices with embedded linux offer calender and address book and other PIM functions, touch screens and handwraiting recognition. Many also allow you to connect to the internet, take picture, send e-mail and instant messages, listen music and play video. Devices that us embedded Linux synchronize with desktop computers using a variety of technologies including bluetooth.

Google Android is an operating system designed by google for mobile devices. Used on more than 20 different types of mobile devices, Google Android allow programmers to design programs speciffically for devices supporting that operating system. Google Android contains features suchh as access to e-mail account, an alarm clock, Wi-Fi access, web browsing and Google android market app. Example Google Android version Honey comb, Froyo, Ice Cream Sndwich, Jelly.

Windows Embedded CE

Posted by Deny Kurniawan ( Computer Indonesia ) Sunday, March 4, 2012 7 comments
Windows Embedded CE - Is a scaled down windows operating system designed for use on communications, entertaiment and computering devices with limited functionality. Examples of devices that use Windows Embedded CE includeVoIP telephones, industrial control devices, digital cameras, point of sale terminals, automated teller machine, digital photos frames, fuel pumps, security robots, handheld navigation evices, portable media players, ticket machines and computerized sewing machines.

Windows Embedded CE is a GUI that suports color, sound, multitasking, multimedia, e-mail, internet access and web the browsing. A bulit in file viewer allows users to view files created in populer programs such as Word, Excel and Power Point.

Devices equipped with Windows Embedded CE can communicate wirelessly with computers and other divices using bluetooth or other wireless technologies, as long as rhe device is equipped with the necessary communications hardware.

iPhone OS

Posted by Deny Kurniawan ( Computer Indonesia ) 0 comments
iPhone OS - Developed by Apple, is an operating system for the iPhone and iPod touch, Apple's smart phone and touch screen portable media player, respectively. These devices are multi touch, meaning they recognize multiple points of contact. This feature enables users to interact with iPhone Os devices using finger motions such ad tapping a button on the screen, sliding your finger to drag an object and pinchingor unpinching your fingers to zoom in or out.

With the iPhone OS users can manage contact and notes, send and receive e-mail and text messages, take pictures, view a compass, connect to the internet wirelessly and browse the web, check stock, access map and obtain dictionary, listen to the music, watch movies and videos and display photos. It also provides Wi-Fi access to the iTunes Music Store.

BlackBerry

Posted by Deny Kurniawan ( Computer Indonesia ) 0 comments
BlackBerry - The BlackBerry operating system runs on handheld devices supplied by RIM (Research In Motion). BlackBerry devicesprovide RIM capabilities such as managing schedules, contact and appoitment as well as phone capabilities. They also provide wireless functionality that includes sending e-mail messages, text messages and instant messages, connecting to the internet and browsing the web, and accesing bluetooth devices. Some BlackBerry devices allow users to take pictures, play music and access maps and directions.

Information on the device easily synchronizes wirelessly with a computer or other BlackBerry devices. Mny BlackBerry devices include a mini keyboard (Qwerty) some have touch screens. For a technical discussion about touch screens, read the high tech talk article on page.

Windows Mobile

Posted by Deny Kurniawan ( Computer Indonesia ) 0 comments
Windows Mobile - Windows mobile an operating system based on windows embedded ce, includes functionality, programs and a user interface designed for spesific types of smart phones and pda's. Devices with a touch screen use windows mobile proffesional and those without touch screens use windows mobile standard.

With the windows mobile operating system and a compatible device, users have access to all the basic PIM (personal information manager) functions such as contact list, schdules, task, calenders and note. Information on the mobile device easily synchronizes with a personal computer or prints using cable or a wireless technology.

Windows mobile also provider numerous additional features that allow users to check e-mail, browse the web, listen to music, take pictures or record video, send and receive text messages and instant message, manage finances, read e-book, view a map, play game, many program etc.

Palm OS

Posted by Deny Kurniawan ( Computer Indonesia ) Saturday, March 3, 2012 0 comments
Palm OS - A competing operation system to windows mobile is palm os, which runs on smart phones and pda. With palm OS devices, users manage schedules and contacts, phone message, notes, task and address list and appointments. Informations on the mobile device easily synchronizes with a personal computer or prints on a printer using a cable or a wireless technology.

Many palm  OS devices allow users to connect wirelessly to the internet, browse the internet, send and receive e-mail massages and instant message, listen music, record voice massages and view digital photos. Most have touch screens. The latest version of palm OS allows for biometric identification and support the use of smart card.

Solaris and Netware

Posted by Deny Kurniawan ( Computer Indonesia ) 0 comments
Solaris and Netware - Solaris, a version of unix developer by sun microsystems, is a server operating system designed specifically for e-commerce applications. Solaris manages high tarffic accounts and incoporates security necessary for web transactions. Client computers often use a desk top program, such as gnome desktop, that communicates with the solaris operating sytem.

Netware novell's netware is a server operating system designed for client/server networks. Netware has a server portion that resides on the network server and a client portion that resides on each cleint computer connected to the network. Netware support open source software and runs on all type of computers from mainframes to personal computers. Client computers also can have their own stand alone operating system such as a windows, mac os or linux.

Linux and Unix

Posted by Deny Kurniawan ( Computer Indonesia ) 0 comments
Linux and Unix - Linux some network servers use linux as their operating system. Thus, linux also is a multipurpose operating system. With linux, a netwok administrator can configure the network, administer security, run a web server, and process e-mail. Clietnts on the network can run linux, unix, or windows. Distributions of linux include the mozilla web browser. Example : Ubuntu, Redhat, Backtrack, Garuda Os.

Unix in addition to being a stand alone operating system, unix also is a server operating system. That is, unix is capable of handling a high volume of handling a high volume of transactions in a multiuser environment and workng with multiple proccesors using multiproccesing. For this roason, some computer proffesionals call unix a multipurpose operating system because it is both a stand alone and server operating system. Many web servers use unix as their operating system. Example : Dolphin.

Windows Server 2008

Posted by Deny Kurniawan ( Computer Indonesia ) 2 comments
Windows Server 2008 - Is an upgrade to windows server 2003. Windows server 2008, which includes feactures of previous windows server versions, offers the following capabiliities :
  • Improved web server management, enabling users to share data.
  • Enhanced server security.
  • Network acess proctection restricts computers that do not meet specified requirements.
  • Proctetion againt malicious software attacks.
  • Share many technologies with windows.
  • Client support using windows, mac os, unix and linux.
To meet the needs off all sized of busienesses, the windows server 2008 family includes many edition, eith the more common listed below :
  • Windows server 2008 standard for the typical small to medium sized businesses network.
  • Windows server 2008 enterprise for medium to large sized businesses, including those with e-commerce operations.
  • Windows server 2008 datacenter for businesses with huge volumes of transactions and large scale databases.
  • Windows web server 2008 for web server and web hosting businesses.
  • Windows server 2008 for itanium based systems for computer with 64-bit proccesors that function as a web server.
Most edition of windows server 2008 include hyper-v, which is a virtualization technology. Virtualization is the pratice of sharing or pooling computing resources, such as servers. Throught virtualization, for example operating system such as windows server 2008 can separate a physical server into several virtual servers. Each virtual server than can perform an independent, separate function, such as running a different operating system.

Server Operating System

Posted by Deny Kurniawan ( Computer Indonesia ) Friday, March 2, 2012 0 comments
Server Operating System - As discussed earlier in this chapter, a server operating system in a operating system that is designed specifically to support a network. A operating system typically resides on a server. The client computers on the network rely on the server for resource.

Many of the stand-alone operating system discussed in the previous section function as client anda work in conjuction with a server operating system. Some of these stand-alone operating sytems do includes networking capability : however, server operating systems are designed specifically to support all size of network, including medium to large sized businesses and web servers. Example of server operating system include windows server 2008, Unix, Linux, Solaris and Net ware.