Rabu, 27 Maret 2013

Hacker

They are opinions of the sense HACKER are :
           1. Ordinary people,
           2. Middle IT,
           3. Highly IT.

1.Opinions of ordinary people.
Hackers are people who break a system.
Hackers are people who steal other people's data through the Internet.
Hacker is having the ability to analyze the weaknesses of a system or site.

2. Middle IT.
Hacker is a term for those who provide a useful contribution to the computer network, creating a small program and give the people the internet.

 3. Highly IT.
Hacker Hacker is a computer or IT professional group, they may consist instead of computer Engineers, pengaturcara and so have a high knowledge in any computer system. Hackers have a deep interest and knowledge in the IT world to know that berkeupayaan decree anything definite flaws with the system to something cuba test system. However, the hackers are not going to do any kero \ usakkan against something that system and it is an ethical hacker.


HACKER These types can be divided into 2 types:

1. White Hat Hacker
The term in the English language are White hat: focusing action how to protect a system, which contradicts with the black hat is more focused on how the action through the system.

2. Black Hat Hacker
The term in the English language that refers to the hackers that those who break the security of computer systems without permission, usually for the purpose of accessing computers connected to the network.

On the negative side kracker :
Scanning is to know the basic things about the system that is used, either the operating system, file system, vulnerelability (Data Security) and so on.
Infiltrating into the system, this happens if there is a possibility of folders that can be accessed with Priviledge Read Write and Execute the Public. So that people can put the file on the server and then executes it. The second possibility is the weakness of the server configuration.
Breaking through the super user password, can occur if Point 2 have to do will be very easy.
Furthermore, changing the random data. damaged is the page for Junior X trus pages to 10. kracker work quickly so as not to be known by the administrator. If it should be known thinkers-thinkers administrator.
Deface (page replacement), as an example: in 2004, the last Web KPU, the party turned into a party-party Cassava, rice etc (wow, I've forgotten).

Advantages of HACKER is :
Can spread to various places
Can do programming, not just theory
Can quickly learn programming


The disadvantage of HACKER is :
Arrogant
Can steal passwords
Damaging the system

The positive side to the Hacker :
Namely Refining a system.
whereas a kracker more destructive. Generally cracking kracker do to use resources in a system for its own sake.

A. In the world of underground people who become hackers usually through the following stages :
1. Mundane Person
2. Lamer
3. Wannabe
4. Flyblow
5. Hacker

B. There are two levels of hackers based on their expertise, namely :
1. Wizard
2. Teacher

C. Hacker character itself is split into two, they are more inclined to lead to kracker properties. Both of these characters are :
1. Dark-side hacker
2. Malicious Hackers

A. Stages:
1. Mundane Person :
          Steps taken by those who become hackers. Mundane Person is the bottom level. Someone at this level basically do not know anything about the hacker and his ways, though he may have his own computer and Internet access. He only knew that the name hacker broke into the computer system and do things the negative (crime).

2. Lamer :
          Steps taken by those who become hackers. A person at this level is still confused by the ins and outs of hacking because he thought that doing the same hacking warez ways (in the world of underground means doubling the software illegally). His knowledge of such things is still minimal, but it's been trying to learn. Someone at this level are able to send trojan (made by others) to or on someone else's computer when doing a chat on IRC or ICQ and delete their files. Though he did not know exactly how the trojan works. Someone who went on to become a hacker usually can get through this stage quickly even jump.

3. Wannabe :
          Steps taken by those who become hackers. At this stage one has to know that taking action hack was more than just break into someone else's computer. He better think of it as a philosophy or a way of life. Finally he so wanted to know more. He began to search, read and learn about hacking methods from a variety of sources.

4. Larvae :
          Stage through which they are a hacker. Also known as the newbie. At this stage he had already had the basics of hacking techniques. He will try to break into other people's systems just to try what he had learned. However, at this stage he understood that when he did not have to hack the system damage or remove anything if it is not necessary to cover his tracks.

5. Hacker :
          The same sense in the first paragraph.


B. Levels of expertise:

1. Wizard :
          This term literally means Shaman, Necromancer. Wizard is one of guidance when running the program, either at the time of installation, setting, and sebagainya.Tingkatan skills of a hacker. The term is given to someone who has extensive knowledge in their field. His ability is not in doubt.

2. Teacher :
          The level of expertise of a hacker. This term is used on someone who knows all the things on the field, even that is not documented. He developed the tricks of its own beyond the limits required. If the application relates to the field, he knows more than the manufacturer's application.

C. Character Hacker :
1. Dark-side Hacker :
          Characters from destructive hackers. The term is derived from the movie Star Wars George Lucas. A Dark-side hacker just like Darth Vader (Star Wars character) are interested in the power of darkness. It has nothing to do with the issue of "good" or "bad" but rather to the problem of "illegal (according to law)" and "chaos". A Dark-side hacker has the same ability with all the hackers, but the "dark side" of the mind making it a dangerous element for the whole community.

2. Malicious Hackers :
          Characters from destructive hackers. Hackers have attacked the evil nature of the system with malicious intent. Term to refer to someone that damages someone else's system to a fad (not guilty) without obtaining any of these actions.



Coditional Sentence


Definition Conditional sentence
A.Definition
            Conditonal Sentence means Sentences that express our wish in the future and past. The differences between our wish in future and past is not about the time but it's about our wish it self.
If we have a wish and we hope that our wish will happen someday or maybe today so we can express our wish in simple present and future tense.
            But, if we have a wish that we express it in the past and it actually didn't happen, so we use simple past, past perfect, past future, and past perfect future.Conditional Sentences is also called If Clause.

The  Formula :
Tipe
Induk kalimat
Anak kalimat
Pertama
Will + verb  1
Present tense(S+V 1+O)
Kedua
Would + verb 1
Past tense(S+V 2+O)
Ketiga
Would have + verb 3
Past perfect tense(S+have+V 3+o)


B. Types Of Conditional Sentences
Type 1 : Future Conditional
            In this type, we can express our wish that we hope it will happen today or maybe someday. Because it doesn't happen yet so we hope it become real.
The Formula :
- Subject + Simple Future + IF + Subject + Simple Present
or
- IF + Subject + Simple Present + Subject + Simple Future ( affirmative sentences )
or
- Subject + Simple Future + Unless + Subject +  Simple Present ( negative sentences )

Example  :
            - I will buy car if  I have a lot money  to buy.
            - If I have a lot of money, I’ll buy a car.
            - I will pass the examination  if i study hard.

Type 2 : Present Conditional
            This modality is used to explain that a job or activity at this time may be carried out if the conditions are met.
The Formula :
- If + Subject + Simple Past + bSubject + Simple Past Future
or
- Subject + Simple Past Future + If + Subject + Simple Past ( affirmative sentences )
or
- Subject + Simple Past Future + Unless + Sybject + Simple past ( negative sentences )
Note : For using be, all,subjects must put " were "

Example :
- If I were a manager, I would manage everything in the company well. So it means that
  I am not a manager so I will not manage everything in the company well.
- If I were a bird, I would fly in the sky. but I am not a bird
- She would help you if you told her the truth. But in fact he does not help you because you   did not tell the truth

Type 3 : Past Conditional
            This represents a modality that is not likely to happen because of events already passed. This type usually consists of remorse for what has happened in the past.
The Formula :
If + Subject + Past Perfect + Subject + Past Future Perfect
or
Subject + Past Future Perfect + If + Subject + Pat Perfect ( affirmative sentences )
or
Subject + Past Future Perfect + Unless + Subject + Past Perfect ( negative sentences )
Note : In this type be for all subjects have to be changed to " been "
Example :
-  If we had known you were there last year, we would have written you a letter.So it means I   did not know you were there last year.
- He could have come here if you had invited him yesterday. But the fact he did not come yesterday because you did’t invite.
- They might have employed me if I had had work experience.So it means that I do not have experience so they do not hire me.

Jumat, 22 Maret 2013

Menganalisa Lingkungan Eksternal & Internal Sebuah Perusahaan


                Dengan memperhatikan lingkungan sekitar yang ada pada perusahaan,yang dapat maupun tidak dapat mempengaruhi usahanya itu.Kita dapat mengetahui lingkungan Eksternal dan Lingkungan Internal perusahaan tersebut.
Dimana dengan memperhatikan Lingkungan Eksternal perusahaan kita dapat mengetahui peluang dan ancaman pada perusahaan.Dan dengan memperhatikan lingkungan internal kita dapat mengetahui kekuatan dan kelemahan nya.

Contoh : Pada salah satu toko percetakan di jalan raya Ratna.
                Toko percetakan ini melayani jasa pembuatan undangan,pembuatan kartu nama,stempel perusahaan,plat nomor kendaraan dan kwitansi.Toko percetakan ini terletak di sekitar jalan raya ratna,Bekasi.
                Setelah memperhatikan lingkungan sekitar yang ada di dekat toko tersebut .
dapat di simpulkan bahwa,
1.lingkungan Eksternalnya yaitu :
Yang merupakan Peluang bagi usaha itu :
- Karena toko itu berada di pinggir jalan raya dan di sekitar lingkungan padat,memungkinkan akan adanya banyak pembeli yang datang,
- Sedikitnya pesaing di sekitar lingkungan toko.karena disepanjang jalan raya ratna hanya ada beberapa toko saja yang sama.
- Akan di bangunnya sebuah apartement di seberang jalan toko itu memungkinkan lebih banyaknya lagi pembeli yang datang.
Dan yang merupakan Ancaman bagi usaha itu :
- Jika sewaktu-waktu adanya pelebaran jalan dari pemerintah daerah,mau tidak mau toko percetakan tersebut tidak memiliki lahan perkir bagi pelanggannya,sehingga akan menyebabkan berkurangnya pelanggan yang akan datang karena tidak tersedianya tempat parkir bagi kendaraan mereka.
- Tempat berjualan yang masih mengontrak.
- Akses jalan menuju toko mulai memburuk.
2.Lingkungan internalnya yaitu :
Yang merupakan kekuatan bagi usaha itu :
- Bahan-bahan yang digunakan merupakan bahan yang berkualitas,
- Perkrja yang berpengalaman dan terampil,
- Hasil barang yang bagus,
- Harga yang tidak terlalu mahal.
Dan yang merupakan Kelemahan bagi usaha itu :
 - Jumlah pekerja yang terbatas.