Steps in the manufacturing context diagram using professional easycase 4:23

EasyCASE is one application that is used to design a workflow system or better known as DFD (Data Flow Diagram). DFD is very important to analyze the course of the system. The flow of this system reflects the performance of a system. Unlike the other applications, EasyCase gave token of the mistakes made so that the depiction of the output that comes out is actually output by the rules and symbols of each methodology.
There are several options methodology and process model data offered by this application relating to the depiction of the flow system, ie
1.
a. Process Model
b. Yourdon (DFD)
c. Gane and Sarson (DFD)
d. SSADM (DFD)
2.
a. Data Model
b. Martin (ERD and DMD)
c. Merise (ERD)
d. Shlaer-Mellor (ERD)
e. SSADM (ELS and ELH)
f. Each methodology has different symbols and rules.

Here is an example DFD generated EasyCase.

1. Choose a start - and then press the easy case professional Program 4:23 - then at a click. Easy case such as that displayed in the following figure:


2. The next step in the case of professional eassy menu select and click on the file and select the project and on click


3. langah subsequently created in the storage directory and then create a folder in that directory contonya D: \ 06141010 \ Practicum 2 that means we keep our project in Drive D with 06,141,010 directory name. see in the picture below:


4. next steps write an appropriate project name project name and select the icon Define Contact the diagram.

5. type the name of the context diagram on Contack name then ok then ok again. Perhatihkan the following picture:


6. The next step after as above and then click on the diagram define Contack as written click here, the image appears as follows:


7. Then click Ok then Ok again and will appear as follows:


8. Then will appear the dialog as follows:


9. Click Ok to eat will be performing the layer where we design the DFD as follows seseuai screen can be enlarged with the desire. And we can make disaing DFD by creating a process in the context diagaram first. But in Case Eassy usually standard diagram will appear automatically be confirmed over at the click Ok.


10. From the figure is still above the standard and simple as we can process it and give the name and so on, as follows:

11. With Double-click on the symbol that will be given a name and description given in it to follow up the following dialog appears, then click yes.


12. after select yes will appear as follows:


13. Select the appropriate Type Chil PPS on the image above and then click Ok, can also be done by right-clicking on the object / symbol DFD then select difine Child as above but with way more quickly.

14. Then give a brief description of the dialog text editor, then click Save and then select Close, "This command can also be done primarily to right-click on the object and then pili goto child.


Bisa Download Software Disini !

Read more

Anti Virus

Antivirus is a type of software used to detect and remove computer viruses from computer systems. Also called Virus Protection Software. This application can determine whether a computer system has been infected with a virus or not. Generally, this software runs in the background (background) and do a scan of all files that are accessed (opened, modified, or when saved).

Antivirus is based on types of users can be divided into two, namely for the Home User and Network (Corporate User). For home users, antivirus running as usual. For the network version, antivirus scans on a computer - the client computer and network drives. In addition, the update client computers in the network do not have to directly from the Internet. Client computer can do upate directly from a network server.

Most of the antivirus worked with some of the methods as below:

- The detection by using virus signature database (virus signature database): The workings of this antivirus is an approach that is widely used by traditional antivirus, seeking signs of the virus by using a fraction of the virus code that has been analyzed by antivirus vendors, and has dikatalogisasi according to the type, size, power and destruction of several other categories. This method is particularly fast and reliable way to detect viruses that have been analyzed by antivirus vendors, but can not detect new viruses until the virus signature database into the newly installed system. Virus signature database can be obtained from the antivirus vendor and can generally be obtained free of charge via download or by subscription (subscription).

- Detection by the way how the virus works: How it works like this antivirus is a new approach borrowed from the technology applied in the Intrusion Detection System (IDS). This method is often referred to as Behavior-blocking detection. This method uses policy (policies) that must be applied to detect the presence of a virus. If any software behavior that is "not fair" according to the policy being applied, as well as software that tries to access the address book to send out mass e-mails to e-mail list within the address book (this way is often used by virus to transmit the virus through e-mail), then the antivirus will stop the process performed by the software. Antivirus also can isolate the code that is suspected as a virus until the administrator determines what to do next. The advantage of this method is an antivirus can detect new viruses that have not been recognized by the virus signature database. The drawback, obviously because of the antivirus software to monitor the workings of a whole (rather than monitor the file), then the antivirus often create a false alarm or "False Alarm" (if the configuration of the antivirus too "hard"), or even allow the virus to multiply in the system (if antivirus configuration is too "soft"), false positives occur. Some manufacturers call this technique as a heuristic scanning. Heuristic Scanning technology has progressed so far that now. Some anti-virus check on a file with the usual definition. If the usual escape detection, then the file is run in a virtual environment. All changes made file is like a virus, then the user will be warned. Antivirus that uses behavior-blocking detection are still few in number, but in the foreseeable future, most likely all antivirus will use this way. Some antivirus also uses the above two methods simultaneously.

Read more

Overcoming Computer Virus

Virus attacks can be prevented or overcome by using antivirus software. This type of software can also detect and remove computer viruses, provided the data base of viruses that are owned by the antivirus software already contains the code to remove the virus. Because it is very important to update your antivirus already we put on our computer. If not then in vain we plug in our computer antivirus because the virus is always up to date even always one step ahead of antivirus updates. Examples of viruses is a Worm, Trojan, Backdoor, hacking, etc.. Examples of reliable antivirus and counteract the virus is Kaspersky, AVG, AntiVir, PCMAV, Norton, Norman, and McAfee.

Read more

History and Future of Computer Viruses

1. What is a virus?
A computer virus is a small program that can copy itself in a computer storage media. Formal is as follows:
"A program That can infect other programs by modifying Them to include a copy of Altered slighty Itself. A virus can spread throughout a computer system or network using the authorization of every user using it to infect Their programs. Every That gets infected programs can also act as a viral infection grows That (Fred Cohen).

The virus is also capable, either directly or indirectly, infect, copy or distribute the program executable file or program that is in the sector in a storage medium (hard disk, diskette, CD-R). The virus can also infect files that can not be executed (data files) by using macros (simple program that is usually used to perform a command). The point is the ability to attach to and infect a program. The virus is not something that happens by accident or weakness of computer devices because essentially, all viruses are designed by human intelligence after the first few experiments like scientific experiments in other fields. It's all about alghoritm ... ..

2. Differences viruses, worms, and Trojan horses
In addition to the virus in the sense as mentioned above, we also know the program called Trojan horse (Trojan Horse). Trojan horse is not a virus in real terms, because the program does not have the ability to reproduce itself into other programs. However, this program is no less dangerous when compared to program a computer virus.
Trojan horses are generally packaged in the form of an interesting program. But behind the 'charm' software, the other hidden functions to do the destruction. Computer users who get these files are going to run it. As a result of fatal, because then the user has run the destroyer routines that can wreak havoc on computer systems.
Trojan first appeared in 1986 in the form of a shareware program called PC-Write. Therefore, the user must ensure that its shareware or freeware free from trojans by installing a kind of firewall or antivirus in your computer system.
Another source of disaster similar to the virus, but can not be categorized as a virus, a worm. A worm is a program that can duplicate itself without infecting other programs. The worm usually spreads through the exchange of data between the hard disk, diskette, or e-mail. The spread via e-mail is usually in the form of a small attachment. Users who are interested will run the program. Furthermore, without further ado, the program will perform the action. Worms will multiply by sending its files automatically through an attachment to every address in the address book in the mail manager of the victim.
Generally not a destructive worm, however, besides resulting in aggravation on the part of the victim, the worm attacks can be very dangerous for the mailserver. Worm outbreak caused mailserver workload soared up can affect performance.
And not just for the mailserver, and even our personal computers can be castrated because of it. This happens because the worm is able to duplicate itself in the computer memory in very much. Now imagine if the worm to duplicate itself in unison, 'going slow computer deh'.
Generally shaped worm executable files (ending in. EXE datau. SCR), which is attached (attach) to the e-mail. However, there are several types of worms in the form of scripts written in Visual Basic (VBScript). Worm attack of this type of software in particular is an e-mail Microsoft Outlook Express, but that does not mean that other application is definitely immune to all kinds of worms.
Just like a trojan that can not be repaired (except by the author himself who knows its source code), to address the required antivirus worm attacks that can remove it directly from the computer.

3. The history of viruses and other malware
Although many parties to the agreement that the worms and trojans can not be categorized as a virus, but in its history, the delivery of the virus travel history will always be accompanied by stories about the appearance and actions of other malware, the worm and trojan. This simply can not be avoided because both 'creature' was born as the impact of the ability of the virus itself.
1981: First computer virus (virus ancestor)
In 1981, a program called Elk Cloner appear on the Apple II computer. This program (this year the term computer virus has not been found) displays six lines on a computer monitor as follows:
Will it get on your disk
Will it infiltrate your chips
Yes it's Cloner!
Will it stick to you like glue
It Will modify ram too
Send in the Cloner!
1983: Documentation of the first computer virus
In 1983, documentation of test virus was first performed by Fred Cohen. Cohen is a S3 student and researcher who theoretically and with a variety of scientific experiments can provide insight and understanding to the world that there will be 'new creature' around us with huge potential to be 'troublemakers' in the development of computer and telecommunications century.
1986: The first virus on PC
'The Brain' is the name for the virus which was first known to infect the PC. The virus is made by two brothers from Pakistan, Basit and Amjad, in 1986. These viruses infect floppy disk that is inserted in the PC operating system MS-DOS. Seiap floppy already infected will have a volume label: "© Brain". 'The Brain' is also often referred to as the first computer stealth viruses because these viruses are able to master tables on a DOS interrupt (Interrupt interceptor). The virus is capable of controlling the DOS level instructions and usually they are hidden as well as a full name or size.
1987: The virus attacks the extensions *. COM
This year is the year the virus file. These variants are specifically attacking all files with extension *. COM. Files that are commonly attacked is the subject of the attackers named command.com Lehigh virus. In addition to attacking *. COM, the virus at that time have also been able to attack .* EXE file, such as viruses Suriv-02. In addition to viruses, worms also do not want to miss graced the virus incursion into the computer system at the time. Recorded in history that this year the term "The IBM Christmas Worm" as the impact of IBM's large mainframe worm attacked.

1988: Virus for Macintosh, worms created ARPANET, antivirus for 'the brain', and ... ... .. become celebrities
In this year began macintosh infected by a virus called MacMag and The Scores. It still includes some good news. The bad news is the collapse of the 6000 computers in the network, the ARPANET because the act of 'a' worm works of Robert Morris (he was only 23 years old at the time). The worm works its way to duplicate himself and settle in the computer memory. Funnily enough, the worm he created just to kill boredom. Finally, the prison became his home for 3 years plus a fine of $ 10,000.00. Other bad news is the birth of 'Jerusalem' and 'Cascade'. The Jerusalem virus is only active / live on Friday the 13th (Friday The 13th) and infect the two extensions at once, namely .* .* EXE and COM. Remarkably, all infected computers will lose their programs when run on that date. While the cascade discovered by the Germans was the first virus that encrypted (encrypted viruses) that can not be changed or eliminated for the time. Except by those who know the encryption code-behind (decode) course. For example the creator of the virus itself.
History re-occur, the first antivirus eventually appear. Antivirus is designed to detect at the same time removing the virus 'The Brain' that infected diskettes. Plus the ability to immunize (give immunity) to the diskette from being seized by 'The Brain'. This means, technically a computer, the antivirus algorithm is an algorithm that can damage the course of the algorithm of the virus.
The number of major events caused by computer viruses this year makes it popular move and start filling the pages of popular media such as Business Week, Newsweek, Fortune, PC Magazine and Time. That's cool ...
1989: Trojan AIDS and Dark Avenger
AIDS spreads as a Trojan program that can hold data information of AIDS (Acquired Immuno Deficiency Syndrome) in the computer dijangkitinya. It may be useful if it is on the hard drive of doctors and health practitioners, but another problem with the mathematician and banking practitioners.
In the month of September the 17th, the Washington Post reported on a virus that they called the language of the journalist: "a virus that lives and destroyed on the 13th day of Friday had fled". This virus works like Jerusalem, his name is DataCrime. Model introduced a new style of attack by Dark Avenger virus. The virus is designed to destroy the computer system slowly. So, at first the user will not realize that their computer got a virus, until the time arrives when the computer will run slower, slower, and slower.
In October in Israel emerged virus called Frodo. This virus is a virus that is programmed to damage the hard drive (hard drive) running on September 22, or later in the year regardless.
1990: Virus Exchange, a book about viruses, and antiviral highlights
Bulgaria emerged from a virus that can swap and change its own code, its name is a virus exchange (VX) BBS. Mark Ludwig enlisting as a writer who published a book about viruses. IBM, McAfee, Digital Dispatch, and Iris antivirus issue. The new arena in the IT business, making the program (toolkit) antivirus. In this variant of the virus circulating more and more and great. One of them is a virus combinations that ability is not just hiding (stealth virus), but also capable of changing its own structure to outwit antivirus programs (polymorphic viruses) and infect the two types of popular extensions, namely .* .* EXE and COM as well as infect the boot sector .
1991: Symantec releases antivirus and Tequilla
Do not want to miss the big vendors who have made an antivirus, Symantec released the antivirus eventually labeled Norton Antivirus. Products that to this day continues to rule the world antivirus market. The surprise this year was when Tequilla found. This virus has three magic power at once, which could hide (stealth), can be polymorphic and multipartite.
1992: Toolkit virus maker
The Dark Avenger Mutation Enginge (DAME) became the first virus maker toolkit that can transform ordinary viruses into polymorphic viruses. Besides DAME was born too VCL (Virus Creation Laboratory), which became the first virus maker. In March Michelangelo virus appeared, the news spread by the media about this virus makes antivirus sales rose sharply. Statistics noted that there were already about 1300 virus this year. Means increased 420% since December 1990.
1993: The virus is good and Satan Bug
Cruncher is often regarded as a good virus because it compress each file the infected. So, it is considered also as the savior of storage capacity. Meanwhile, in another place where a big surprise. The makers of The Satan Bug virus that arrest by the FBI using the help of antivirus vendors was just a kid.
1994: Good Times, which makes the bad times; first Hoax
Good Times is a virus that spread through e-mail with the subject as his own name. In the content of his message he mentioned that only by reading or viewing the message bersubject "good times" on the computer then the contents of computer hard drives will disappear and even damage the processor. Having examined carefully, it turns out the contents of the message is hoax (hoax) only. Good times is true that a virus replicating itself Like the other viruses.
1995: Windows 95 and the first Macro virus
The advent of Windows 95 made a lot of antivirus vendors are worried that their products will eventually not work anymore and no one bought. However, the first macro viruses appeared, called Concept. This virus does not attack but attacking DOS word processor application's most famous moment, ie MS-Word. Antivirus vendors have fruit simalakama tub, one hand they are happy, the other side they do not. Because of their enemies grow again.
1996: virus for windows 95, linux, and Excel
A year after its emergence, Concept diseantero world increasingly popular. Ms Excel also finally gets with the Laroux virus. No lag, viruses and Staog Boza became the first virus for Windows 95 and open source OS; Linux. After the manufacturer was investigated and Staog Boza is the same group.
1998: Virus Java, Back Orifice, and Solar Sunrise
Strange Brew is a virus that attacks the java files for the first time, but the damage is not too 'proud'. In this year until now the legendary Trojan, Back Orifice, a remote control tool (remote administration) that would allow someone to take someone else's computer specialists via a network, either local network or the Internet network. Access macro viruses started to emerge later this year. One of the most tumultuous events this year is when two teenagers from California managed to infiltrate and control the computer system belongs to the Department of Defense USA, government offices, private and public institutions. The accident was popular with the term 'Solar Sunrise' because the OS that is widely used by a compromised computer is Sun Solaris. In addition, this year is also the emergence of Chernobyl, a virus that damages the hard drive storage system and be able to disrupt the system. In China alone, the losses reached 120 million U.S. dollars. Fortunately, this virus attacks the Windows OS only and are not attacking the OS range of Unix and Novell Netware. If both the OS later also infected with the losses that occur could be even greater because Unix and Netware are widely used in the banking sector, governments, securities, aviation, and telecommunications.
1999: Please welcome ... ... Melissa
This year truly belonged to Melissa macro virus that utilizes MS Word, Outlook Express and Internet networks in spreading. Melissa became the fastest spreading viruses than previous viruses, and of course being the catalyst antiviral sales worldwide.
Bubble Boy emerged and became the first virus that does not depend on the user to perform an action. So, when a recipient opens the attachment Bubble Boy manager of his mail program like Ms Outlook, so the virus does not have to wait to open her first attachment. Viruses Corner appears complete line of malware that infects fond prodik-Microsoft products. This time the target is Ms Project.
Tristate became the first virus capable of infecting three variants of MS Office as well, namely Ms Word, Excel, and Power Point.
2000: time to say love the 'I Love You'
A young man known as the creator of the virus Philippines 'I Love You'. Mode of action of this virus-like Melissa but more sophisticated and more destructive than Melissa alone. If Melissa only took 50 e-mail list available on the infected computer and then send it to another computer over the Internet, then I love you not only take 50, but all. Amazingly, all the information about the e-mail address book taken from the computer, such as your username and password will be sent to the address of the author of the virus. Plus the ability to delete files with extension *. MP3, *. MP2, *. JPG and.
2001: Kournikova, Code Red and Nimda
Virus 'Anna Kournikova' young tennis player who uses the image of Russia as a shining bait works by sending itself to e-mail in Ms Outlook Address Book. The emergence of this virus makes security analysts worried that maybe out there the virus makers no longer have to bother to think about complex algorithms in the process of virus due to the availability of virus creation tools are easily available on the internet.
Code Red made the world scene when the power (resource) all computers which successfully dijangkitinya can he used to make the system collapse in the White House website (White House). Losses generated by this virus in the United States reached about $ 2 billion. In fact, computers are being attacked by the virus is a computer that uses windows 2000 server and Windows NT as the OS.
Exactly one day after the destruction of the WTC on 11 September 2001 came the Nimda. The virus is regarded as one of the smartest virus in history history of the virus because it has five kinds of ways / methods for infecting systems and replicating itself.
At this year's Melissa virus author David L. Smith (33 years), finally got arrested and put into the United States federal prison for 20 years.
2002: Klez worm and its superstars
Klez, malignant worm that spreads through the internet. Interestingly, after he sent copies of itself to all the victims, that all e-mails that are in Ms Outlook folders, Klez then create a hidden copy of the original file dijangkitinya. In addition, the popular worm is also able to disable some antivirus products are already installed on your computer first victim.
Continuing the success virus' Anna Kournikova 'virtual world capable of horrendous previous philosophy, exists then some viruses that use the name Hollywood celebrities as' detonator' her. Among other celebrities, Britney Spears, Shakira, and Jennifer Lopez.
2003: Slammer and Sobig, again worms, worms ...
worm 'Slammer' worm is actually the relatively friendly and casual. However, the power serangnya (spread) and speed duplikasinya (replication occurs every 8.5 seconds) is really able to shake the world. Within 10 minutes since its emergence, it is capable of infecting 75,000 computers. These worms cause significant damage to the business world, including the melumpuhnya cash machines owned by banks that can not get online and delayed some flights ticket handling is done by computer has been infected.
And it turns out, also Sobig worm. This worm was recorded as 'worms' are favored by spammers. Why? Since the Sobig can make any computer that he jangkiti point relay (baton) for spammers to spread replicas separately Sobig mass to the victims to be addressed.
2004: MyDoom, Netsky, Bagle and Sasser ... whoever win, lose, We Are!
Novarg aka known as MyDoom virus spreads most rapidly in the history of the virus world, ahead of Melissa popular in 1999. This virus spreads via e-mail and file sharing software. He lure potential victims by telling them that one of the e-mails they had sent earlier had failed messages. This is a clever trick to deceive the simple nan victims. The real motive of this virus is as a tool for hackers to launch DoS attacks (Denial of Service) to the server computer SCO Inc.. (Santa Cruz Operation), and succeeded. After a DoS attack occurs, ie on September 1, 2004, the site of the hated company among open source this was offline a few days. Because of the seriousness, the SCO was willing to give of $ 250,000.00 reward for those who can tell who is behind making this virus.
Sven Jaschan, a German high school teenagers admitted writing Sasser. This worm does not cause technical damage to the computer, only she was able to lead some of the infected computer to be slow and rebooting itself without desired by the user. Noted, some large companies become victims of this worm. As the pride of the British airline, British Airways, Britain's Coast Guard, RailCorp Australia, and even the two hospitals in Sweden failed to online the 5000 their computers because of this worm. When questioned by German police about the motive behind making this worm, Jaschan replied that Sasser was written to deal with the spammers who were behind the creation Baggle and MyDoom.
Netsky was written by Jaschan to spammers who use the face of attacks Bagle and MyDoom. So when Bagle and Mydoom are set actions to make each of the infected computer as a dumping ground bulk mail, Netsky will do the opposite.
Great history occurred in June of this year when the first mobile phone virus, Cabir, appeared to be a candidate frightening specter for mobile users based on the Symbian OS Bluetooth enabled. Followed by that attack Duts Pocket PCs and PDAs.

4. Future Computer Virus
A few years from now is already certain that there will be more new-born viruses. Whether it is malignant, normal, or 'friendly'. Meanwhile, all the experts agree that computer viruses are old or classic will not experience death, it is reasonable and it is in accordance with the properties of biological viruses in reality. It should be remembered by all computer users on the planet earth that there will be no term 'dead' for computer programs, and that was true computer virus is a computer program that will 'live' or moving according to the compilers of the code (source code) that have been made by the creator. So, if a virus is in an environment that 'true' then he will execute automatically alghoritma evil without favoritism. Understandably, the virus was not created to tolerate. However, computer users also do not become 'virusphobia', which was so scared, so scared to hold the computer once. There was no disease no cure, in the sense, if we continue to update our antivirus regularly then no one should worry about the extravagant.
Viruses in the SmartPhone
When we try to look far ahead into the wave of advance IT (Information Technology) it will be increasingly clear that it is not just a desktop computer or laptop that has our general met. TabletPC, phone, or PDA that looks compact with any real grip is deservedly called a computer. Especially for the latest products that have been injected with a range of operating system variant or Symbian OS Microsoft Windows Mobile for cell phones, or Palm OS and Microsoft Windows PocketPC for PDAs.
Based on the above facts, we can conclude that one day these gadgets would be plagued by the virus. And proven, right! For SmartPhone, after Cabir present and spread with the help of Bluetooth-infected, follow from the two latest malware, ie Mosquito and Skull Trojan. Mosquito is a game that works on Symbian, but can entertain users funny he also secretly send a message (sms) to certain numbers that are the service (service) paid, thus causing the disappearance of the pulse phones. As with the Skull Trojan, shareware programs are downloaded from one of these internet sites can lead to malfunction of the applications running on your smartphone plus a sweet trail by replacing the icons of the application program with the icon image of the skull. The only good that is left by this Trojan is when he is still allows you to berhallo-hello ria, but that's it, that's it.
The above description really can not be underestimated. Especially in the mobile era such as this, where the smoothness of an activity has become very dependent on the existence of such gadgets. Call it mobile banking, activity-containing money will eventually be exploited by virus makers to create a variant that is not only damaging the phone system but also able to transmit certain data confidential to the virus creator. Phone number in the phonebook example. Well, should we have to be careful from now on as well.
Antivirus for Smartphones
In quartal 4 (Q4) of 2004 yesterday, Nokia began to equip their products with antivirus support from big vendors, F-Secure. As for the type in question is the Nokia 6670 and Nokia 7710. While F-Secure yourself proudly state that their antivirus designed to work in real-time and automatically via sms mechanisms that have been patented. Besides Nokia, antivirus service from F-Secure is also used by Elisa, one of the mobile operator that offers antivirus services over wireless networks to its customers.
Spamming
Computer users in Indonesia may not be believed when 70% of the world's viruses are viruses that spread by spamming techniques. This is natural, because Indonesia Internet penetration rate is very small when compared with countries like the United States, China, and Western European countries. As a result, most viruses are popular in Indonesia are viruses that attack the floppy disk, although at the beginning of its spread is also using the internet. Call it Pesin coming from Palembang, South Sumatra provincial capital. Another story with these big countries, where the viruses are popular among Netsky, MyDoom, Baggle, Sasser, and all its variants.

5. Motivation virus makers
According to Mr. Alfons Tanujaya Anthony, Director of PT Vaksin.com, there are some things that be the goal of spreading the virus when his work. First, self-actualization. This type of virus writers generally have the programming skills are high enough, he wants the whole world know that he was smart. Second, idly (script kiddie). This typically makes the virus with the help of a virus maker applications are widely available on the internet. Third, to show off. Fourth, the promotion. Viruses are written by the fourth type is in addition to damage to the system also aims to promote something you want on sale by the author. An example is the author of Brain C which promotes the author's computer store in Pakistan.
In addition to the above motivation, there are several other very troubling motivations of computer users, among other virus writers who created the virus to transmit computer data are attacked for the sake of evil, virus writers who want to convey specific messages or the contents of his heart to the world, eg pesin virus, etc..

Read more

Multimedia Based Information Systems

a. Information systems
Information System consists of two words namely Systems and Information. The system itself is a composite of several sub-systems that aim to achieve one goal. Information means something that is easily understood by the recipient. Information Systems has a meaning system that aims to display the information. In the old days before there is a computer system then the system this information had already been there and run well.

b. multimedia
Multimedia comes from two words and that is multi media, multi media means and means some facilities or equipment. The word multimedia itself was already there before the computer as it is today and more in use in the world of multimedia entertainment such as theater performances that have been around a long time is a theatrical form that is supported by many tools such as loudspeakers, stage lighting, moving images in the background and so on. In the world of home electronics also known multimedia digital television, which means the TV can support the use of many tools such as receiving input from a cd player, game player, and so forth. Log into the computer world is booming with appendage appendage when multimedia sound card products, product tv card, graphics card products into a computer function as an expansion in the decade of the 90s. At that time computers become more flexible usage is not only to make computing activities such as attendance at the beginning of the beginning of the computer but has additional functions to play a song, to receive television signals, plays movies and so on. This product is sold in the market and currently all the additional devices are becoming the standard for all computer products, especially the Personal Computer. For additional device server products are virtually not used.

c. Multimedia Databases
Multimedia databases is an expansion capability database that can store not only text data but can be sounds, images, animations and other multimedia data. Support databases that can store data in multimedia formats can be provided by Oracle, PostgreSQL, MS SQL Server and some other products. The format is currently supported to be stored properly as one of the values ​​of the database field is a BLOB, within this field we can store the data in the form of images. This support has been provided by Microsoft SQL Server since version 6.5 [REFERRAL], PostgreSQL 7.2 [REFERRAL] also support the image type. Multimedia data storage format is also used to do with tricks to save the address (path) in one of the fields in the database. This trick is usually done by the programmer to alleviate / reduce the size of the database so that application performance is getting better. In case the actual BLOB data storage also performed the same trick, only storage management performed by the database engine, so that from the programmer is seen that the BLOB data is stored in the field of type BLOB.
The problems that arise when the data in this multimedia format is stored in a database at the time of retrieval / retrieval of data. Is it possible to input a query request photos, or a voice sample or a sample animation. In such a case different from the query with which to easily input text searching is done by one of the criteria values ​​in the database field of type number, date, boolean, or text. This is because the operation of comparison of data text, dates, booleans or numbers can be easily done. For conventional data types such as string, numeric, date and boolean searches have long supported by the language SQL (Structured Query Language) standard currently used. Unlike the complex data type that is used to store multimedia data are not yet supported retrievalnya using standard SQL language. For it's one building that software should be prepared to implement a multimedia-based information system is a database engine that can support this process.
While there are several methods that have been developed to perform a search image data and voice. Like the image search method using wavelet algorithms [REFERRAL] that has been developed by several researchers. This method can also be developed to perform data retrieval that contains the sound [REFERRAL]. Did not rule in the future this method can be developed to perform data search data with other multimedia content. Search by wavelet method is suitable in use to perform data search large volumes of data items.

d. Multimedia information
Information in the form of multimedia is the information conveyed by combining several elements of information. In the conventional presentation of information, information is presented using only one medium only as text (text) only, voice only or image only. One example of a multimedia presentation of information is not is when there is a call to someone at a station that was announced over the microphone as one example of the presentation of information through sound. Another example is when the information appears on a computer screen that lists the students who get the value of E, you'll see the form of text information. In some conditions of such information is considered sufficient. The problem is when an information system is built with the output information which is not presented only using text only. It was the presentation of information must use a richer form by blending a variety of media are available [REFERRAL].

e. Multimedia input
In addition to multimedia can be used to convey information so that the information presented in multimedia form as the output of information systems. Input or input into the system can also be input data of multimedia data. Data is current data can be entered into the computer not only through the keyboard and mouse but can get into the computer through a variety of tools / devices to capture multimedia data. For example cameras, scanners, light sensor, telephopne home, mobile telephon sound sensors, barcode readers and so forth. By means of input devices are then input to the system will become increasingly rich, for example if the system is available in the recidivist database of several thousand, and then try to find one Satui recidivists with a sample picture then the system can do a search with input via a scanner. The algorithm used to perform such a search can be used wavelet algorithms to perform image querying.
Multimedia input needed to perform data capture (capture data). Multimedia data with data richer than the conventional data capture equipment for multimedia data is also different from the means of capturing data commonly used as a keyboard and mouse. To capture the image (image) is used snanner, digital photographs to satellite images, while the microphone used to record sound and forwarded to other equipment such as mixers for sound processing and so forth. To capture moving images used a video recorder with its variations.

f. Multimedia-Based Information System
Multimedia-based information system is an information system with the concept of using the input and output with the form of multimedia data. Specifications changes the technology used in the input block, the block of data base and output blocks are modifications made to characterize multimedia-based information systems with information systems that are not based multimedia. The processing of input is then stored in a database and then removed the device (device) with a variety of forms remain to be done by machine. The machine that is meant here is a computer device with berbaai architecture. Human role in multimedia-based information systems remain outside the system as a user. Both as a user to perform / provide input (handles data input activity) as well as users who act as consumers of information. Humans as the owner of this information system in terms of multimedia-based information systems did not enter into a provider of information systems and information processing. Human role in this system once again emphasized here only as a provider of data and consumer information.

h. conclusion
- Based Multimedia Information System is the development of information systems
- Modifications carried out on multimedia-based information system is to apply multimedia technology in the input block, the block of data base and output block
- Current data base technology has supported the data stored with the new data type is an image (image), sound (voice) or animation
- Mechanical Retrieval (retrieval) in the database with new data types data type is still wide open to doing research in this field.

Read more

Setting up a network shared folder in windows 7

this time I will tell you how my steps in creating a shared network folder settings in Windows 7.

The steps to perform this setup is actually simple:

1. Open network and sharing center
2. Set advanced sharing settings on the left upper
3. Then select option enabled network discovery, file sharing, public folder sharing for
4. Then just select the folder which will be shared via Windows Explorer (right click on the folder, select sharing, and enable sharing)
5. Voila! Folder and the shared computer will look at the network on the windows explorer.

Looks easy? Sure.

Unfortunately, it's things that look easy turn out in fact to be (very) difficult.

Setting above appears only successful if computer users only use the machine by means of 'normal', setinggan connection using a router, do not use additional firewalls, etc..

As for me? To connect computers and netbooks I use a cross lan cable by using a static ip (ip just different single digit, same subnet mask), then to the firewall using windows7firewall control that really gives the choice of what programs are allowed to pass (I'm not like a computer I provide these data without my permission). Besides, my computer is also connected to the internet via a modem (which means I have multiple network computers, it is enough to make this more complicated.

When the data step by step here's the problem:

- Setting static ip

The first step, because the direct use of cross lan cable, no router then set static ip settings. Make sure the ip and subnet mask settings correctly. (The easy way, set ip: xxx.xxx.xxx.xxy, (differing only in the last digit and the subnet mask of 255.255.255.0)

- Try to ping - General Failure Error

After ip set, check whether it can send data from computer to a netbook with a ping.

Problems that arise in the ping is usually a general failure error. This happens because the system can not send ping packets due to blocked. This problem usually occurs when using an additional firewall such as norton or windows 7 firewall control. Make sure the program "general service process windows" in the form scvhost can access the file locally.

Another problem that can happen is the destination host unreachable, this is because the purpose was not found. This problem is usually complete when the step 4 has been done.

- Set shared folder

Set of folders which can be shared, just right click on the folder with windows explorer and select share.

- Setting a different network

Well, remember the share change advanced settings on the top left of the network and sharing center? There may be changes in settings such as network discovery, file sharing, etc.. The important thing here is seen in the windows divide the network into three networks, ie public, work, and home. If eg only connected on one computer only then consider all of the network as the public does not matter (even though not recommended). If like me, where a desktop computer connected to the Internet, then as a result my desktop would be connected to a public network. If I set enable file sharing in the public, will certainly pose a potential safety hazard.

Therefore, you should do is to set file sharing only on the home alone. However, this raises a new problem, where a new network with a cable cross that has been made between netbooks and desktops will automatically be set as the public network by Windows 7 and there is no option how to change it back. xD

After struggling a long time, and I found also a way to outsmart. By using only a computer connected to the network is only (in this case my netbook), open windows explorer, and select network. Notification will occur on the network where discovery has not been activated (of course, because the network is still in public). Click the notification, and will show the option that is no, do not enable file sharing for the public, and yes, enable file sharing to the public. Do not select a second, but select the first. For some reason windows will change the network that are connected now, that is before (Unidentified network, public), it automatically becomes work. (Which until now I do not know why .. xD) Now, the public should share in the computer will be detected via netbooks.

- Problems on every time the connection

For each time a connection, usually will need a username and password. Enter once and select save to automatically connect. Unfortunately every time I removed lan cable, before re-emerging problem, so every time you remove and install the cable must perform again the previous steps to create a network that is detected to be public.

- Network shared folder can be used. Give it a shot! Works wonders with SyncToy:)

wiuuuh ..

Eventually settled as well. Microsoft actually provides more features for easy sharing, namely via homegroup.

Read more

Whar_Wher Jalanan. Diberdayakan oleh Blogger.

Postingan Populer

Retainers