Jumat, 30 April 2010

Scurity: Hackers World Know

Aang Yogya security post, To some people, hearing the word "hacker" or "hacking" alone makes chilling shiver of fear. Hacking activities in general it has been identified with evil deeds, whereas the real purpose of hacking is to find security holes penetrated prone. Any technology as a double-edged knife, could be used for good, but also a crime. This paper attempts to decipher what was actually hacking activities, and how we can use them for our common good. In carrying out its action, the work of a hacker is identical to an attempt to tamper with the cmd on windows operating system and shell on linux operating system. Why use the cmd and the shell? Because in the cmd shell and have access to take over the authority without limit for the system with the provisions of hacker candidates must know and understand the function of what is in cmd and shell. A hacker can be categorized as a hacker is smart and creative in its operations if the hacker is not much use tools that help smooth the action. As an initial capital to move into the world of hacking, it is obligatory to learn the contents or purpose of the information displayed in the Cmd and shell. To find out what a command that can be used in Cmd and the shell you can do with typing "Help" or "Info" in the Cmd and the shell will display data that serves as a command in the Cmd and shell like the example in Figure 1.0 results from cmd when typing "Help": In the cmd on windows will dinampilkan all functions available in the cmd and also explained what the functions of his orders. If still confused of the purpose of the let command cmd in together immediately wrote practiced as for ways to practice are as follows: To find the IP Address from the command window can be done by typing "ipconfig / all" will display data in the form of information such as IP Address

White blocked text above is what is called an IP Address and IP Address to see in linux is done by typing the command "ifconfig" will display the same data as instructed to display the IP Address on Linux machines. Like the picture 1.2. On the other side hackers also claimed to be active and creative in finding other commands that have not been there in Cmd and in the Shell. After the candidates with advanced hackers can master it then it could be said the hackers were eligible to move into a higher level such as using a function of the ping, nmap, telnet and other sebaginya, where each of these functions or cruise mempuyai rooting ability of its own. As far as a hacker still has the willpower to try and try again until successful, not impossible if one day he will be able to explore this virtual world without borders, without finding the wall that is too high or too 'hot' for his passing.

Kamis, 29 April 2010

DSL Access Network Technologies

Aang Yogya's Post : Internet today has become a technological and data communication network of the most popular on the planet. At five years ago, telnet traffic and the World Wide Web is the dominant types of traffic. However, the form of services offered by the Internet increasingly diverse. Internet users start using the applications "killers", such as video conferencing, telemedicine, distance learning, and other services who spent much bandwidth.

However, conventional modem technology today that have a maximum rate of 56 kbps of course can not accommodate these new services. Internet users want the data transfer capacity of a larger order to use Internet applications fairly. Therefore, current xDSL technology is a suitable alternative that best applied to accelerate the transfer of data at the subscriber access lines.

DSL (Digital Subcriber Lines)
Digital Subscriber Lines, as the actual transmission technology developed for ISDN (Integrated Services Digital Network), Basic Rate Access Channel. DSL name used to describe the transmission technology or the physical layer for ISDN Basic Rate Access Channel. Currently, DSL, or also known as xDSL is used as a common naming system for all types of DSL.
Full-duplex transmission on the 2 wire telephone network, using 3 different methods:
  1. Frequency Division Multiplex (FDM)
  2. Time Compression Multiplex (TCM)
  3. Echo cancellation (EC)
Differences of opinion between TCM and the EC method for transmitting DSL still going on until today. The main issue is about the comparison of transmission losses, echo level, compatibility with other systems, and complexity of the system. Broadly speaking, the advantage of TCM systems do not require echo canceller, in separating the different directions of transmission that occurred at a time. But with the development of technology Very Large Integrated Circuits (VLSI), the echo canceller to realize to be more economical. EC system is potentially more complex, using 50% less transmission bandwidth than its competitors.

HDSL (High Data-Rate Digital Lines Subcriber)
HDSL is a better system to deliver T1/E1 through twisted-pair wire channels. HDSL requires smaller bandwidth and requires no repeaters. With the adoption of better modulation techniques, HDSL can transmit data with a transfer rate of 1.544 Mbps or 2.048 Mbps bandwidth only by about 80 kHz to 240 kHz or less when compared with that required by AMI. HDSL can deliver data at speeds above the channel along the 12 Kft 24 AWG, commonly called a CSA (Carrier Serving Area), and requires 2 pairs of wire channels for T1 and E1 3 pairs of channels for each working on or the total speed.

SDSL (Single-Line Digital Subcriber Lines)
SDSL is another type of HDSL. SDSL requires only a pair of wire-line course to deliver POTS and T1/E1. The major advantage compared with HDSL SDSL is easily applied in every customer because it only requires a regular phone lines. The drawback is only be used on the channel along the 10 Kft.

ADSL (Asymmetric Digital Subcriber Lines)
ADSL is the next development of HDSL. As the name implies, ADSL transmits data asymmetrically, ie different transmission capacity between now and the downstream (from network to customer) and at the upstream (from customer to network). Higher downstream capacity than upstream capacity. There are several reasons for the asymmetric data transmission, such as transmission capacity needs, the nature of the transmission line, and the application. Capacity needs that are not necessarily the same can be seen from custom yagn around today, that is usually the customer (eg Internet service subscribers) only requires the data retrieval (downloading) of information providers. If the information extracted in the form of multimedia information (or anything that has a relatively large data size), should be required transport channels with a large capacity for these downloads. On the other hand, customers rarely perform data transmission to the network (upload). If carried out, usually only in the form of control data to the provider of service or request information. Control data are nothing more than a series of characters that is relatively short. Therefore, only the required transmission channel with limited capacity yagn. There are times when customers upload to the network by sending data that is big enough. However, even this relatively less frequently performed than the download. From the above explanation, it can be concluded that the need to download much larger than uploading purposes. If forced to have the same rate, it will make the bandwidth becomes less efficient. If viewed from the transmission medium, the channels of the existing transmission (telephone lines) are not distributed one by one to each customer (single channel), but several channels into one channel in a single bundle. Usually there are 50 bundles in a single channel. With these conditions, interference antarsaluran will very likely happen a lot. Even if the bundle was the same one for data transmission in the opposite direction, the signal emitted on one side (the side of the cable bundle), which has a higher signal level that is still going to interfere with the recipient on the same side (same side of the cable bundle with a transmitter) with the signal level at receiver so weak. This event is called NEXT. However, if on the same bundle that is going on signal transmission in the same direction and the signal level that existed at the two lines can be regarded as strong, channel interference may also occur. Interference effect was smaller than NEXT. This event is called FEXT. In addition, if on the same channel to be full-duplex communication, communication is usually done by sending two signals (signals transmitted and received) with memodulasikannya on the same carrier frequency so that it will happen yagn called echo (the signal being emitted into the receiver signal return or signal return). Echo can usually be removed with the circuit echo canceller yagn not simple. From the application side, an adult is only required applications that can provide information in one direction, such as video-on-demand, home shopping, Internet access, remote LAN access, and multimedia access. Therefore, from all the explanation above, seems to be easier to build an ADSL system.

VDSL (Very High Data Rate Digital Subscriber Line)
VDSL previously referred to as VADSL because initially, VDSL can only transmit digital data, such as ADSL are asymmetric, but with higher capacity than ADSL and channel length is shorter. There is no general standard for VDSL. From some discussion that exists, a common downstream capacity for VDSL is 12.96 Mbps (STS-1; 4.5 Kft), 25.82 Mbps (STS-1; 4 Kft), and 51.84 Mbps (STS-1 ; 1 Kft). For the purposes of upstream capacity available between 1.6 Mbps to 2.3 Mbps. VADSL much contested term, especially by T1E1.4, because it shows something that is not always symmetric. In fact, many who want to one day be truly symmetric. Therefore, a preferred VDSL. In some ways, simpler than ADSL VDSL. Shorter transmission line on VDSL causes constraints on the channel that might occur on a longer channel can be suppressed. Therefore, its transceiver technology may become more simple and its capacity will be 10 times higher. VDSL is a target of ATM network architecture. VDSL allows passive network termination and can be used on more than one VDSL modems for use on customer channels, as well as regular analog phone systems (POTS)

Aang Yogya

Rabu, 28 April 2010

Overclocking Guide

Aang Yogya's post this time presents the step by step process that must be done overclocking

STAGE Overclocking
In order to obtain optimal results, we must step by step through the overclocking process correctly. But when we perform the optimization and overclocking, we often can not wait and immediately expect to get exceptional results within the shortest possible time. We never try to look at the steps that must be passed before overclocking, because in fact the whole process very major effect on the optimization results we obtain. Usually without a clear step-step and a lot of thinking, we just get into the BIOS, raise the FSB (Front Side Bus), increased voltage, tooling with here and there looking for the fastest setting and so forth. As a result of system performance rather than increase stability but instead of a victim. Even if no improvement results are still far from expectations. The effects of overclocking crudely, the computer becomes often hangs, restarts, blue screen, and other such problems arise. So much to complain even consider overclocking is a "scourge" that just makes the computer becomes unstable, hot, and easily damaged. Actually, a computer optimization process, prior to overclocking it to go through the stages for the phase correct and not arbitrary in order to get satisfactory results or expectations. Due to the optimization and overclocking the right and true, could make a computer with a very high specification can even be easily defeated using a computer that has the specs on paper are far below it. Not only was defeated in terms of speed, but also in terms of stability and reliability to overcome heavy applications. From here we try to understand that the art of overclocking is not only trying to improve performance and speed, but also maintain and even improve the durability or stability of the system. Therefore in this article we try to give a guide step by step we have to do in the process of optimizing and overclocking, namely:

Stage Introduction and Understanding of hardware.In this phase we try to understand each component existing in our system, one by one we understand its characteristics, optimum and maximum capacity. This is actually very important for those who want to assemble a system. Because as has been stated above, the election system with hardware that "just right" with a much cheaper price, was able to have the performance, and stability of the system at a price far above the two or even three times as much from him. Then how could this have happened? This all seems strange, but this is not nonsense, because the most important of the selection of hardware components is "balanced" performance. In a sense the system is built perfectly capable of giving a real performance. What is the "actual performance"? Well this is the optimal hardware performance, because the label, packaging, and the series of a product does not necessarily describe the optimal performance. Whether it's processor, display card, memory, and so forth, all we can not simply compare the optimal performance of the "names, labeling, and typenya". Because the output of new goods, the higher the score, and the larger series, it does not necessarily describe the growing capabilities. Then how can we know the performance of 'optimal', or actual performance? Here we give preliminary description to understand:

PROCESSOR: CORE is the die of the processor, each series has its own code name. By identifying core processor code, we can recognize the type of processor, FSB, cachenya size, technology, and other important information. For that purpose, so that we can better understand and get to know about the processor, let's talk about the core and code corenya, never again get stuck at the official naming of the processor manufacturer. The naming of the series from the producer does not necessarily indicate actual performance and potential, and even tends to confuse and trap. By understanding the code name we will be more observant core processor to determine which one is best and has the greatest potential for overclocking. For example: The FX 60 has the same type of core X2 4400 + (Toledo) when the price offered two times more expensive, and of course still very much the other samples. With the introduction of many cores we can save costs because it get goods cheaper, with performance not much different. Processor Clock often confuse us, for it never assess the performance of the processor clock (GHz / MHz) speednya. Often we are stuck with a clock rate "GHz / MHz" of the processor. But actually it sangatsangat wrong, and very, very irrelevant for us make the benchmark performance. For example, some people are confused with the old processor with a clock output 3000Mhz / 3GHz, but why exactly recent processor now has only a lower clock (1.8GHz, 2.4Ghz). Worse, sometimes a few people actually consider this as fraud. Maybe for the Pentium I era, Pentium II, Pentium III, AMD K6, and processor-processor before, clock speed can still be used as a benchmark, but now can not anymore. This is an increasingly dizzying 'end-users' business applications such as the increasingly vague and unclear, because the naming of the series is highly diverse and not easily understood. This is because Intel also began to use performance standards, no longer based on the clock, which had been pioneered by AMD. Surely you remember when the Athlon XP 1700 + to 1463Mhz clock. This will be discussed again more in the special edition processor. However, to facilitate you, as the benchmark crude and simple, if we want to buy a processor, we should look for a clock which "lower" or type processor technology with the "latest". Even clocknya look lower, if it is the newest type, the performance would be more promising to offer to you, and you will not be guaranteed either choose, or disappointed with it. CODE series processor, or processor in batches of production code, sometimes it becomes very important to detect the series 'GoldBatch' of a particular processor type. Because the type and quality of processors for the same series can vary. Then what's 'Gold-Batch'? This simple explanation, hundreds of processor chips with the same technology, although different velocity series, printed in one place the same mold as "wafers" (wafer is a round plate as a template processor). Here processor located in the center position of wafer is believed likely to have higher ability, because the accuracy of the projection rays focus more precisely to the silicon wafer in the middle of it. From the resulting processor is carried out initial tests, and usually the difference between the performance of the test was made level processor speed variations in the market. Thus, different processor with a speed he could be in the same mold. For that difference in performance of "optimal" same is true, only the PCB plate processor provided "FID" or regulators to determine the clock speed that he was running at standard conditions. Sometimes in the early production of a new processor type, one plate of wafers used for the same series, so there is the possibility of processor with the highest quality can be sold on the series, and series production code then here's what we call the "Gold-Batch" . To find which processor who are in that position, there is a certain batch code that can be traced, the processor-processor code-code selection with the usual parties are sought after by overclockers. The term 'Gold-Batch' is just to simplify the menginisiali processor-processor. After knowing the type and batch of CPUs, you need to know and recognize that the speed limit could be exceeded by your CPU is. To learn more can be viewed via the forum or the internet (we will provide levels of CPU clock on a special edition CPU).

Mainboard: The chipset is the first major point you should observe from your mainboard. Try to observe and identify the type of chipset the characteristics, functions, and support. The chipset is the main controller chip on the mainboard that set the path all the components of the existing data, usually consisting of two chipsets, the south bridge (south / down), and the north bridge (the north / top / middle near the CPU). South bridge usually set the I / O, PCI, HDD, FDD, Sound, Lan, and other supporting components. North Bridge is being used to control the data flow components such as CPU, memory, and display slots (AGP / PCIe). But there is also self-employed yag chipset / single chipset that once set the whole thing. All pheriperal that can be installed and upgraded capacity of the mainboard is largely determined by the chipset used. The chipset is also very decisive capability upgrades and hardware support that can be handled by your computer. Quality-COMPONENT very influential on the stability, performance and quality of the mainboard. Actually, to distinguish the quality of components used, it is easily detectable and highly visible. Without any need to pay attention to its brand, we can distinguish clearly the quality of components used only by looking at his physical appearance. Then the apasajakah that need our attention?
  • PCB, mainboard which has the durability and very high quality can be seen from PCBnya quality, high-end mainboard common uses 8 layer PCB. In addition to the number of layers, to observe the difference can be seen from the sharpness of lines and kegetasan when we try to slightly bend the PCB. For some high quality mainboard PCB layers are cooling to remove heat.
  • Capacitor, the difference in the quality of the mainboard can be easily seen from the density, number, size and most important is the type of capacitor used. Mainboard capable of maintaining stability in the high compression used for some parts using low-esr capacitors (capacitor silver), for high quality capacitors under low-esr is 1st grade capacitors made in Japan, for example like 'Rubycon' and 'Nichicon' with the form we recognize that the easy parts of the capacitor form the letter 'K' for 'Rubycon' and the letter 'Y' for 'Nichicon'. There is also a 2nd grade Japanese capacitors are good quality with several other features, while China is known capacitor is much cheaper with a less good quality. For now almost every brand of upscale mainboard use Japanese capacitors, but you have to remain careful, because there are also some that use capacitors 2nd grade and 3rd grade. The more upscale type of capacitor, usually the board is able to offer stability and higher durability.
  • Regulator, Capacitor, Mofset, and other components we can also observe physically. Will therefore be easy to know which is more stable mainboard components usually take a higher class.
  • Pendinginan and air flow settings, and layout of mainboard also can be easily seen. Of all the things the class and quality reflect the corresponding mainboard. Especially for cooling, this factor is quite important to note, however, this is an external factor in a sense outside the scope of "quality" of the mainboard itself. So this is the easiest factor to our modification, with the addition of individual cooling.
As such, in fact just by looking and comparing physically we just simply can recognize its quality, though not yet in total performance. Minimum terms of stability and strength mainboard we can see a physical observation of these shortcuts. So any brand, if the mainboard has the qualifications as mentioned above, the products are usually reliable and you deserve to make the consideration of options. The BIOS is the main controller the whole system, the existing functions and pheriperal. Performance and system stability can be influenced from the BIOS. Even biasabiasa mainboard with quality components only, if supported by reliable BIOS, will be able to walk more optimal than high-end mainboard though. For it is very important for us to learn specifics about the BIOS, and recognize that there are functions in the BIOS. To examine the ability of the settings in the BIOS, the only thing that should be considered are: regulatory functions of the FSB, multiplier, memory timing, divider / divider, locking the AGP / PCI, system monitoring, and especially consider carefully who can afford to offer a range of voltage (vCore, vDIMM , Vchipset, etc.). For indeed, the BIOS is the main weapon for us to perform optimization and Overclocking. Onboard could be considered positive and negative, but do not be so "anti" with onboard. Onboard means an additional component that directly integrated into the mainboard (sound, LAN, VGA, etc.). Onboard is not a big problem, and not necessarily of poor quality, can be economical and practical solution, but never forget to pay attention to the expansion slot for upgrade opportunities. FUNCTION additional form of additional chip component, or function beyond BIOS (this, that, this, that, I need not write here) whether it functions penyetabil fan setting function, the function of the additional overclocking from windows (on the fly OC), as well as other functions. Actually all of these functions is purely cosmetic, and not necessarily going to your router. Not that the functions are of no use, but should not be a priority, let's say that in addition to, and adjust it to your needs as paramount to the settings in the BIOS everything is functional. For SLI and Crossfire functionality, we recommend for the moment forget about the facility because a very small possibility you'll use it, not that you should avoid, simply ignore it. Unless you are directly going to install SLI-Crossfire system, or for other purposes.

Power Supply : POWER of the Power Supply as the "heart" of our system should certainly be able to meet all the components integrated in it. Try to find the optimal power capacity required for your system, and what power supply should be used for your needs. Then how to estimate the optimal power is required? Here is a picture of pure power PSU that is used for purposes of your system. Previously, as an illustration, standard PSU / lowend have pure power 50-70% of power indicated on the label, so you can think-ira PSU which should you use your system needs.

  • System standard and low-end requires 180W-240W of pure power.
  • Mainstream System Pentium 4 / Athlon with a large HDD capacity, gaphic middle-class cards, optical drives and requires an additional 2 = 300W-400W.
  • High-end systems with multiple drives but only one display chip cards require 430W of pure power - 500W.
  • High-end system with Raid or SLI / Crossfire require 550W-750W power.
  • System Extreme dual GPU SLI / CF, dual core processors, and RAID require resources above 800w. Power capacity depends on the computer. Estimate the power requirements and existing PSU.
FLUCTUATION. Actually there are more important than just the power required, which is very influential on overclocking capabilities, durability and stability system, ie the power fluctuations and voltage / voltage when the system get a load that heavy. But to address these factors you're forced to set aside extra funds to buy a PSU classy. Besides fluctuations could be more guarded, and the voltage generated power will also be much more pure. Simply put these fluctuations can be viewed on the monitor system at the BIOS / particular program, or to more precisely multitester use to measure it. When conditions allow modification of the power supply please you. For more details can read on the 'modding PSU'. As a guide, a good PSU is a PSU which has the power and voltage stability, with "anything" that happened on the system. So the less fluctuation the better the PSU.
Card Display : Card is a miniature display module from the semi-independent system, because within an integrated processor, memory, BIOS, and so forth. So that the display card has a high complexity. However, to facilitate you to select analyze display card please look at the following sections:
  • GPU, similar to the processor, chipset type used observe, do not get stuck on the "naming" series and brand, because by identifying various types of chipsets, we will more easily find out the real capabilities.
  • BIT, the number of bits (64 bits, 128 bits, 256 bits) is a wide bandwidth data in RAM that is implanted in a VGA card. The larger the number of bits allows the RAM to receive data intake more than the number of bits less. Striking difference can be seen on the speed of loading a game scene today that uses a lot of polygons and textures are large.
  • TECHNOLOGY, any VGA card chipset manufacturer has a different architecture technology with competitors, for example, Nvidia with ATI with Crossfire SLInya or her. Study the architectural excellence VGA card carried by the VGA card manufacturer is.
  • MEMORY (RAM), VGA card effect when loading a 3D data (polygons, textures, etc.) and as a temporary shelter when the GPU to process the data. The faster and greater amount of RAM, the greater the accommodation, so that the process of 3D data calculation can be done more quickly without waiting for the availability of the data loaded by the RAM is too long (bottleneck effect). Consider the serial code on your VGA memory, and discover how nano speed (the higher the smaller the potential. Timing memory in the VGA are also very influential on the performance, but needs an editor BIOS settings of the VGA type. Remember this for VGA memory technology sped away more than the system memory technology.
  • PHYSICAL, Quality display card can also be identified from its physical form in the same way by identifying the quality of the mainboard as described earlier.
Memory : TYPE, type of memory is the first choice you will do, because today we are faced with two types of memory, ie DDR and DDR2. Even soon to appear DDR3. From the technical side of DDR2 is capable of running at clock higher than DDR, even up to three times that number, and akhirakhir has emerged a series of DDR2 with tight timing (CL-3). But the actual standard for speed, performance DDR and DDR2 generated itself do not differ much.
One guideline that must be a record for us is the difference of the working principle of memory in the series AMD K8 (Athlon 64) with other systems. On AMD K8-based systems series (the Athlon 64) occurred deductions for memory data paths, namely transfer of Memory controller on the chipset directly into the body core processor, while Intel or AMD systems still use the previous chipset support for this memory controller, here means we have two different perspective on memory that can be used on the K8-based system with other systems. The differences are related to the bus that is used, the necessary timing and conditions of speed processor memory that is aligned with the system. Thus we can determine the choice of the most appropriate memory chipsets for our system, whether the emphasis on timing, emphasis on high clock, or the importance of harmony between the processor and memory bus. However, these differences will be important and felt only on the use of the system with DDR memory, DDR2 is at all look the same. In DDR2, the higher the bus, will be higher the performance, bandwidth bigger role here than timing, because the clock that could be reached very far beyond DDR DDR2, so the tightness timing seemed "as if" no longer a priority. (As an illustration, the bandwidth of the DDR system with average figures ranged in 3000-5000, while the DDR2 range 7000-10000). Timing, a speed controller data to be and is being processed by the memory, so it is very influential with the amount of data that can be completed to the next process. There are so many on a memory timing settings, but here we will give some basic overview about it. Here we display information about the timing.
The main timing from memory:
  • CAS (TCL) Timing: CAS (Column Address Strobe / Column Address Select). Is the controller lap time during the reading of the data transmission command to the reading took place. Time from the beginning to the end of the CAS CAS is usually called time 'latency'. The lower this value, it means the process faster and higher performance. So the CAS latency is the time delay in the turnover time between sending the command to read the first reading of the data was sent to the output. This section is the most important part and most decisive speed memory access. Example: 2.5-3-3-8 number "2.5" is the CAS timing.
  • tRCD Timing: RAS to CAS Delay : (Row Address Strobe / Select to Column Address Strobe / Select). Is the time delay in active command until they are ready to do the reading process / writing. Example: 2.5-3-3-8 number "3" is the tRCD timing.
  • Timing TRP: Row Precharge Time. Used is the minimum time between active commands to the process of reading / writing data on a memory chip next to the memory module. Example: 2.5-3-4-8 number "4" is the TRP timing.
  • trace Timing: Min RAS Active Time. Is the activation and deactivation times each command line memory until expiry of the specified trace. The lower, faster semaki performance, but if the data is moved too quickly is not necessarily done all that could lead to process incomplete and corrupted data. To trace the optimal computation rate is by adding TCL, tRCD, and TRP (trace = TCL + tRCD + TRP), the configuration of + / - 1 from that number. jadi angka tRAS yang diambil 8, 9, atau 10." onmouseover="this.style.backgroundColor='#ebeff9'" onmouseout="this.style.backgroundColor='#fff'">(2.5 +3 +4 = 9.5) => a number trace taken 8, 9, or 10. Example: 2.5-3-4-8 figure "8" is the timing trace.
Other Timing:
  • tWR - Write Recovery Time: tWR is the lap time required for the process of writing data with data preparation for the next command. tWR is needed to ensure all data on writing buffer can be written in a safe and perfect in memory chips.
  • trace - Row Active Time: trace is the lap time needed for the process of accommodation of active commands will be executed (the bank active command) to the entry of such orders to be ready to do the commands (precharge command).
  • TRC - Row Cycle Time: TRC is the minimum time interval of active command has been executed in the chip / the same bank. TRC = trace + TRP.
  • TRP - Row Precharge Time: TRP is a round of time required to process the command ready to be done (precharge command) to the active command (active command). At this time chip / memory bank has been active.
  • tRRD - Row Active to Row Active Delay: tRRD is the minimum interval between the commands that have been actively into the process to be executed in the chip / bank next.
  • tCCD - Column Address to Column Address Delay: tCCD is the delay time for setting the order in each column address.
  • TRD - Active to Read Delay: TRD is the delay time required to process orders that have been active to the read command.
  • tWTR - Internal Write to Read Command Delay: tWTR is a delay to the process of writing in the memory chip to process the command reading the data that has been written.
  • tRDA - Read Delay Adjust: tRDA is setting a delay to the process of reading data in memory.
Aang Yogya

Selasa, 27 April 2010

Security USB Flashdisk

First post Aang Yogya raised about the safety of the flashdisk. USB flashdisk data in the more secure and can only be accessed by the owner. Like hard disks, USB flashdisk (UFD) can also be given security. One brand that has to include modern safety is a Lexar JumpDrive Touch Guard. UFD is equipped with fingerprint security and encryption, so that important data in it more secure.
STEP 1 Plug the JumpDrive into USB port on your PC. Run the program TouchGuard10 by clicking the icon in the drive.
STEP 2 On the screen will display the Dashboard box, click the [User Profile]. Fingerprint Registration box appears, click your fingers to be used as a fingerprint security. Click [Done]. Grit your fingers to the JumpDrive, the sensor will read fingerprints.
STEP 3 Click the [User Profile] [Set Password ...], so that the Set Password box appears. Enter your name, password, and password instructions. Click [OK]. Password useful when performing fingerprint safety facilities. Now, every time you plug the JumpDrive into USB port, the box will appear asking fingerprints.
STEP 4 We recommend that you Encrypt your important data. As of the Dashboard box, click [Encrypt / Decrypt] [Encrypt Files ...], then select the files to be encrypted. Encryption process is rapid. Once completed, File Encryption box appears. Click [OK]. To open a file that has been encrypted, you need to decrypt the pass [Decrypt Files ...].
STEP 5 You also can automatically log into a site via this device. Go to Yahoo! Mail, for example. Type in your Yahoo! ID and password, then click the icon [JumpDrive Auto Login] button on the toolbar. Page directly stored in the Auto Login Bookmark. Rename the web, then click [OK]. Next time, go to the site via the menu [Auto Login] only.

Aang Yogya