Minggu, 05 Juli 2009

computer science

FTP (File Transfer Protokol)
Protokol (path) that is used to send / receive (transfer) files from one computer to another via TCP / IP.
FTP is the most common path to send / receive (upload / download) the files on the Internet.
ActiveX
Programming environment that is done by Microsoft to create a system that is active on the web page, which also supports Java, JavaScript, and Visual Basic programming languages other semuannya is limited and can only be used on Internet Explorer.
ADC (Analog / Digital Converter)
Tool that is used to change analog signals into digital signals.
Address The numbers indicate the location in memory as a place tersimpannya information.
ADSL (Asymmetric Digital Subscriber Lines)
Delivery of digital data on the high level line phone lines. ADSL is a technology developed with the modulation of discrete Multitone (DMT), which allows data transmission speed ADSL tinggi.Fasilitas simultaneously using regular phone service, ISDN, and high-speed data transmission, as well as video.
DMT-based ADSL visible as the transition from copper wire to fiber cable of the future. This makes ADSL more economical to use for the needs of the local phone company is because the ADSL mempu provide high-speed data services before using fiber optics technology.
AGP (accelerated Graphics Port) A high-speed graphics bus that directly connect the graphics card with the main memory. AGP operates a separate and independent PCI buses, and generally running at 66MHz which is twice the speed of PCI running at 33MHz. AGP 1x perform one transfer per cycle work to make a maximum data transfer 266 MB per second. AGP 2x to transfer data twice per cycle of work that is 533 MB per second, while the AGP 4x transfer to four times per one working cycle that is 1.06 GB per second. While the maximum data transfer rates of PCI itself is 132 MB per second.
AI (Artificial Intelligence) Science of the computer that can work and think and make decisions like humans. Sample bias in the game like a snake hiding he can, if we look to shoot, and the enemy is the withdrawal of life in the real world .. that caused the high level of AI the more things against perkondisian program.
An Aliasing effects (Aliasing) that appear as examples of image or signal is done at levels that are too low. This effect is caused area high texture (rapid change) in the image as seen slow change. When akan aliasing appears difficult to reproduce in the example image to the image of the original accurately.
Alpha Numeric mix of characters, including letters and digits (AZ, az), some punctuation and special characters such as @, #, $, *, and so forth.
Alt Key Name the key on the keyboard that is located on the right and left of the key space. This new function button when the button is pressed together with the other. In the Windows environment, this button together with a certain letter can be used to open and select the command in the menu quickly.
Pestle (Arithmetic and Logical Unit)
Part of the CPU that is useful for processing data in logical and also the data that requires calculation. Alu-register consists of registers to store information.
AMD760
AMD760 chipset is a chipset for the AMD Athlon processor. The chipset consists of two chips, namely AMD761 system controller or a bus known as the AMD 766 Northbridge and peripherals bus or Southbridge controller. AMD760 chipset to provide the new standard memory technology that is a more virile and memory DDR PC1600 DDR PC 2100 which enables high performance in applications and multimedia-intensive multitasking. AMD760 chipset supports up to FSB26 MHz and 266MHz DDR memory and AGP 4x.
AMD760MP
Chipset made for use with AMD Athlon MP processor. Consists of two chips, namely AMD762 chip bus system controller (Northbridge) and AMD766 peripherals bus controller (Southbridge). Chipset AMD760MP use DDR memory technology and enables maximum performance on the x86 processor technology in multitasking and multimedia applications. AMD760MP this chipset can support two Athlon MP processor, 266 MHz FSB, DDR PC2100 memory, and supports AGP 4x and PCI 33MHz/32-bit and 64-bit.
AMD761
System bus controller chip is also known as the Northbridge handles the important elements of the system that affect overall system performance while also transfer the data to the processor. AMD761 main features of the system controller is the ability to control the Athlon processor with a 266MHz bus, 266MHz DDR memory, 4x AGP, and PCI bus 33MHz/32-bit.
AMD762
CHIP system bus controller is also known as the Northbridge supports the AMD Athlon MP processors, PC2100 DDR memory up to 4GB maximum capacity, and 4x AGP graphics card. All features are designed to provide high performance on the server-class entry-level or dual-processor workstation-class range to high-end. AMD762 features a 266MHz FSB support, designed to provide increased data transfer 33 percent when compared with the usual AMD Athlon processor. In addition, the chip is also capable of handling DDR memory that supports Error Correction Control (ECC) and the PCI 33MHz/32-bit and 64-bit.
Ami Bios PC BIOS is a production of American Megatrends, Inc.. AMI BIOS has been widely used on the PC desktop.
AND
One of the service logic of Boolean algebra to compare whether the two variables will produce the value true (1) or incorrect (0) with the following rules:
0 AND 0 􀃆 ƒn0
0 AND 1 􀃆 ƒn0
1 AND 0 􀃆 ƒn0
1 AND 1 􀃆 ƒn1
AND Gate
Electronic circuits that carry out data processing by using the AND operation.
Anonymous FTP
Facilities pentransferan files between Internet sites that allow Internet users access the data files or documents from anywhere in the Internet without having to enter UserID and password.
Anti Aliasing
A technique that is used to eliminate jaggies effect on the resulting picture. By using anti-aliasing is the resulting picture will look more smooth, especially on lines that are not horizontal or vertical (diagonal).
Anti Virus
Program tailored to detect the file in a drive is exposed to the virus or not. This program as well as eliminate the virus.
API (Application Programming Interface)
The application programs that provide services required by a system, usually for special service applications.
Append
Command in the application processing the file to add a new record in a file or merge the new files with old files.
Application
Software is created by a company computer to do certain tasks, such as Ms-Word, Ms-Excel.
Application Layers
The top layer of the OSI protocol model (Open Systems Interconnections). Set the duty of all things related to the exchange of data / information between users, software applications and equipment in a system.
ARP (Address Resolution Protocol)
Internet protocol address Internet to put the address of the hardware on the LAN continuously.
ARPANET Network computer developed with the help of Advanced Research Project Agency, is the embryo of from the Internet.
Array
In programming languages. Array is a collection that consists of data objects with identical attributes.
Ascending
The sequence data from the smallest to the largest, for example, from AZ, from 0-9.
Sort Ascending
Pengurutan techniques in a way sort of data or information from the lowest to highest.
ASCII (American Standard Code for Information Interchange)
Standard letters and punctuation marks to the computer. ASCII code is an 8-bit characters such as figure 1 and 0 to represent the character alpha-numeric characters.
ASP (Active Server Pages)
Microsoft made a language program that combines server-side scripting and HTML to create a web page that is dynamic (dynamic pages).
ASP (Application Service Provider)
Of a business that offers access to the form of software applications to individual users as well as office facilities through the Internet. Basically, ASP is an Independent Software Vendor (ISV) or your ISP utilize the Internet as a means of delivery so that the application program can work.
Assembler
Programs that work with the program to convert your language to the Assembly in the engine.
Assembly
The process of translation of programs written in programming language symbols into machine language.
Assembly Language
Low-level programming language that resembles more in the form of machine language that is easy to remember.
Asynchronous
Method of data to the way data is sent one character each time unit. Synchronization will be done each time the character received with the help bit bit early and late.
ATA (Advanced Technology Attachment)
Standard interface for hard drives and cables 40-pin connector. Various ATA is ATA-2, ATA-3, Ultra-ATA, ATA/66, ATA/100 and ATA/133 most new.
Attachment
Facilities on an e-mail programs both webmail and a computer program that can be used to send files, or images, in which the ikutsertakan e-mail that will tell the.
Attach
Command to track and enter the program into memory. Computer on the network means that the command to enter the server in a network.
Attributes
Data that include information about a variable or file. Computer on the network means that the technical properties and access files or directories in the storage system.
Autoexec.bat
Autoexec is short for Automatic Execution of a batch file that is created to run specific tasks and the desired user automatically when the computer is turned on.
Backbone
Main path (high frequency) communications system in a computer network.
Backbone Network
The system's primary network connection terdistribusi with hierarchical structure.
Back Orifice
The program was developed and issued by The Cult of the Dead Cow (CDC). Back Orifice is a remote tool admnistration, but existence can be misused for things negative. If dimanpaatkan a hacker, he can take over full control over the victim computer. In addition, back orifice can also be used to steal data and e-mail from the victim computer. This program is an extensible programs that can be developed and changed at any time.
Bandwidth
Transmission capacity of the connection, such as electronic communications networks, computer desk and computer channels. Is represented with the usual bits per second or Hertz. If written in Hertz, the number becomes greater than if written in bits per second. For example if written in bits per second is 64 Kbps, which is a 64 kilobit per second or 8 kilobytes per second. This is usually used to measure the speed of the Internet we're using. Note 1Bytes = 8-bit
Banner
Part that is not engaged in Web documents scrollbar even if we roll up to the end of the document. Now this is only Internet Explorer that supports the banner.
Batch
A number of records or data that are combined and processed in such a way into one unit.
Batch File
Is a batch file with the ending. BAT that can be called through a DOS-like file berekstensi. EXE or. COM.
Batch Processing
Processing data with the pile and work will be done at once. Batch processing is the best way to utilize the computer. However, to develop a computer program, a batch is not very efficient.
CMOS battery
The battery is working to provide power in the motherboard to recognize the installed configuration, when he does not or has not been getting power from the power supply.
BCD (Binary Coded Decimal)
A system password is commonly used to express decimal numbers in digital.
Beep
Voters who appear through computer speakers, umunya shows the errors in the program is running. Beeps can be added in the paste made with ASCII code 7.
Benchmark
Summary measurement / benchmarking several types of product that has the same function, to find out the quality levels. A bench mark program running on several different computers in order to obtain information about the relative ability of each machine.
Beta
In the programming software, Beta is the final stage of refinement software. Software that is still possible for those with Beta still has "bugs" in it.
Binary File
File that contains a number of bits, generally can not be human readable, for example program files.
BIOS (Basic Input Output System)
1. Part of the operating system that can identify the set that is used to program mem-boot the computer, before placing the system diskette. Found in the BIOS ROM (Read Only Memory) of the system and generally stored permanently.
2. Mikroprosesor program that is used to set the computer. BIOS also set the flow of data between the computer and operating system enhancements that are connected to the computer.
Bit
Smallest unit of information. One bit is enough to express the difference between yes and no, up and down, on and off, one and zero. Computer must display information in a bit because the electronic circuits that have made only two conditions, on or off.
Bitmap
A graphic image from the arranged pixels-pixels and converted into bits. Normally used in Microsoft Windows.
Black Hat
Malicious hackers, black hat hacker is also commonly referred to as "aka Crackers" with the ability to steal data or damage the system that exists in the computer of the victim. Excess black hat is the ability to remove the impression not to be able to track who is actually the perpetrator of attacks that occurred after they met certain goals.
Bluetooth
The technology was created for a short distance wireless connection (10-meter radius). This technology uses a transceiver chip dirangkai on the mobile computer, phone, and other portable equipment. Bluetooth provides three-channel voice and data connections through a one-to-one with built-in encryption and verification.
Bookmark
1. In the Windows environment means that the cue on a particular case to facilitate the search time.
2. An electronic record in the browser containing the addresses to where we senangi on the Internet.
Boolean variable
A variable that only has a value of true or false.
Boot
The computer activities with the bootstrap loader.
Boot Record
A sector that contains a record all information in the diskette file. This sector is in any floppy disks, usually placed on the tracks 1.
Bps (Bytes per second)
Unit is used to indicate the speed transfer of data between computers, is calculated from the number of bits sent per second
Buffer
Temporary data storage. This is often used when transmitting data must take place at a different speed. Accumulate buffer data from the low-speed equipment. In the hardware, the buffer is a tool that extend the signal, increase the ability of the drive.
Broad Band
Able to provide a connection speed (bandwidth) in excess of 200 Kbps up to one mile on the last network connection, both from the provider to the customer (downstream) or from the consumer to the provider (Upstream). (Government of the Federal Communications Commission U.S.).
Broad Band ISDN
The form of broad band service with integrated, with high speed and using fiber optics as the transmission media.
Browse
Command in the Windows environment to display the contents of the disk.
Browser
Application program that is used for browsing.
Browse
Exploration activities that some sites are crawled.
bugs
Errors in programs that lead to the road program to be less good.
Bus
Cable which is a set of means of transportation information to all equipment in the system. This information can include data, command or address.
Bus topology
One type of network topology. All knot (node) have the same position. When one of a damaged, then the network system will not be disturbed.
The information bytes with length 8 bits.
Byte Mode
Model of data transfer is done with the byte for byte.
Cache
Derived from the word cash, used to increase the speed of data transfer either temporary or permanent.
Cache Memory
High-speed memory that is capable of working with the CPU, to act as a buffer between the CPU and main memory is slow.
Call
The command to do a procedure or subrutin placed anywhere in this command, take some of the required input conditions and results, and then back to the caller program.
Call In
The command to transfer control from the main program to subrutin a while for a particular purpose.
Call Instruction
Command in the main program to call subrutin.
Carry
When the two numbers sum up the computer and get answers that exceed the capacity of the register, the number 1 terkiri's answers will be lost. But the computer to recognize this situation with a carry flag.
Carry Flag
A series of flip-flop to mark the overflow in the computer operation.
CC (Carbon Copy)
Dituju address to send e-mail address other than the main dituju.
CD Drive (CD Drive)
A drive to record or play a Compact Disk, which is often found is a CD-ROM (CD Read Only Memory) MO (Magneto-Optical) and Worm (Write Once Read Many).
CD ROM (Compact Disc Read Only Memory)
Compact Disk that can not be used to rewrite (deleted or added); used in computer data storage.
CD RW
A Compact Disk which in addition can be used to read can also be used to store the write data using a CD-RW Drive.
CD RW Drive
Compact Disc reader tool that is used to fill the data to a CD RW.
CGA (Color Graphics Adapter)
One type of monitor, the standard Ibm to monitor the quality of low resolution, in the mode chart can only display 4 colors.
CGI (Common Gateway Interface)
One set of rules that explains how a Web Server communicates with other parts of the same machine, and vice versa. Each part of a software can be a CGI program, if the duty is set the input and output based on the standard CGI.
Chip
Little bit of Silicon, which is the core of an IC (Integrated Circuit) or for a IC itself.
Chipset
Chips or chipsets are small pieces of Silicon that is used to store information and instructions on the computer. Each computer component has at least a chip in it. Chipset on the motherboard to control the input and output (input and output) of a basic computer. Chipset on the video card control the rendering of 3D graphics and the output of the image on your monitor. CPU is one of the sample chip which is very important. BX chipset motherboard for example, i810, i820, and many more.
Client
On the network, the client is a software application that allows users to access the service or services from the computer server.
Client-Server
A form of architecture where the client is to receive a device that will display the user interface and run the application (a computer) and server is a device that provides and serves as the manager of applications, data and security (server or Mainframe).
CMOS (Compelementary Metal Oxide Semiconductor)
Small size of RAM is 64 bytes save BIOS settings when the computer is currently disabled. CMOS technology is an extension of the MOS IC with the needs of low battery power. CMOS is used to save the program configuration, program and information on diagnostic and time of the file that will not be lost even if the computer is turned off.
CMYK
Abbreviations of the four component colors: Cyan (C), Magenta (M), yellow (Y) and black (K).
Coaxial Cable
Type of cable with copper core and is surrounded by finely plaited copper cable other, there is among insulator. Have the ability to bring the data with high speed, high bandwidth to load and resistant to interference (noise). Cable koaksial considered to meet the standard IEEE / ISO as transmission media on the computer network system.
Cobol
Programming language specifically designed to handle business applications and data processing. Cobol is very good to handle the file.
Cookie
Information in the form of text that are exchanged by client and server (create a cookie that this is a server). There is a cookie in the name of the server that the information provided, the path the cookie, the contents cookienya and expiration date.
CPU (Central Processing Unit)
Central processing of entries so that it outputs. Included here are all the register, aritmatik circuits, a comparison unit, and so on.
Cracker
People forced into a computer system illegally. Sometimes the cracker and cause damage to the system is entered.
CRT (Catoda Ray Tube)
The technology used to make the system display / computer monitors use cathode ray tubes.
Cyclic Redudancy Check
Check the transmission bit-oriented. Block the message will be seen as a bit array sent. Bit-bit will be included in the CRC generator. Bit string is then charged mathematical operations. The result of the calculation when the bit is sent and received will determine there is no error in the shipment.
Database
A set of related files and data form a wake. The database consists of at least one file that is manipulated by a computer for such.
Data Redudancy
A copy of the data elements in the preparation of files, but copies of the content elements of the data need not be exact.
DDR SDRAM (Double Data Rate SynchrousDRAM)
Type of next generation SDRAM memory that has a FSB two times faster than regular SDRAM (FSB-200 and FSB-266) has a number of pins more than SDRAM.
Debugging
The process of search and error correction of writing programs, so the program can be run again as expected.
Decryption
Change the encryption back to the original form so that information can be read.
Dedicated Hosting
One of the types of hosting services that provide the opportunity for customers to put the files on a server site that specifically rented to customers by service providers. In this way then the data will have flexibility in developing a load on the server and application performance, and guaranteed work will remain good. The mechanism is likely suitable for small and medium companies who do not have special staff to manage site and server, including e-mail, VPN, and others. For completeness of facilities for the use dedicated hosting provider, is diberikannya backup power source (catudaya) and some of the main connection to the Internet.
Denial of Service attack
The term given to efforts to attack down the road with the performance of a web site with continuously repeat the request to the server from multiple sources simultaneously. Attacks such as this aims to make the server serve victims so overwhelmed request sent and the event ended with a stop or stop by itself because it can not afford to serve the request and can not provide services (denial of service).
Dirrect Access
The ability to get data from memory or to data memory meemasukkan easily. This is because the initialization process does not depend on the placement of data before, but only based on location data.
Direct X
Software that allows Windows programs to work with all types of files that is different from the available hardware.
Distributed Denial of Service Attack
Attacks against Internet servers in a way to send data beyond the capacity of the server to make server overload and paralysis.
DMA (Direct Memory Access)
A memory tool that helps speed the process of the CPU in data processing.
Domain
Definition of an address on the Internet, which also refers to a country where the website is used. For example co.id to Indonesia. Meanwhile, co or com for commercial organizations and agencies for the net associated with the Internet.
Domain Name
Part of the URL or address of a site that shows ownership, for example, shows andinomaseleno.com address is owned by andinomaseleno.
Domain Name Service
Terdistribusi database system that will not be much affected by the increase in the database.
Domain Name System
1. Systems that translate between IP addresses and Internet host name.
2. The address system used in the Internet environment. The idea to name others in the Internet Protocol address which consists of two parts, namely the identity of the organization (name of organization) and type of organization (. Com,. Edu,. Net, etc.).
DRAM (Dynamic RAM)
PC memory that can be written and read. To store data in memory, its content needs to be refreshed periodically. This type of memory used in the main memory that is used for routine process.
Dual-boot system
A PC that has two operating systems, so that each time the user can choose when to work.
Dynamic Host Configuration Protocol (DHCP)
Protocol that provides dynamic Internet Protocol address on the new computer every time you have to do is login.
DSL (Digital Subscriber Line)
Technology that allows the use of bandwidth that is not in use (unused bandwidth) that already exist in the regular phone line to transmit digital data quickly without disrupting phone service analog used. DSL is often referred to as xDSL or ADSL, wire pengkabelan use the phone to send data to the PC from the Internet or from a PC to the Internet.
EDO RAM (Extended Data Output RAM)
Type of memory that can store and retrieve the contents of the memory simultaneously. This type of memor replace many primary memory in the PC of the FPM (Fast Page Memory) RAM. Because it can save and read simultaneously, then the read write speed of the EDO RAM is able to more quickly.
EEPROM (Electronically Erasable Programmable Read Only Memory)
One type of ROM chip that can be removed and re-programmed using a special tool.
EGA (Enhanced Graphics Adapter)
One of the standard resolution monitor. EGA is able to display 16 colors in the graph model, at the top of the CGA monitor. EGA monitor with a card capable of displaying 16 colors in the form of text (80 x 25 x 40 characters or 25 characters), 16 colors in the form of low resolution and 4 colors in high resolution graphics display and 640 x 350 dots. Development of this type of EGA are ATI Technologies Inc. with a card called EGA WONDER, can display 132 x 25 characters. EGA monitor the type of monitor connector is still wearing the same type of monitor with the CGA and Monochrome. EVEREX card issued EPGA (Proffesional Enhanced Graphics Adapter), capable of displaying 649 x 480 dot (dot) with 256 colors, from the 4096 combination of basic colors (pallette). EPGA and is also called PEGA (Proffesional Enhanced Graphics Adapter), or PGA (Proffesional Graphics Adapter), display screen 132 x 43 text characters in the multi-frequency or birthday sync, and flexibility that can use the monitor as well as enhanced Monochrome monitor. Monitor this practice 9-pin connector consisting of 2 rows.
EIA (Electronics Industry Association)
An electronic assembly factory in the USA that determine the standard interface, such as RS 232 and RS-C-422A.
Else
Branching in the command programming language that will be considered as the first choice that must be implemented when conditions are not met given.
E-mail
Correspondence through the Internet. Users can exchange news. News that will be collected in a file for the form pengalamatan mailbox, so that users can read news that is directed to him at any time.
E-mail Address
Address that is used in the process of sending e-mail to the destination. Address is based on DNS.
Encoder
A computer system or network system is only able to accept only one entry, that each input will result in some combination of the output.
Encryption
Translation of data into secret code. Encryption is the most efektip to obtain the security of data. To read the file in-enkrip, we must have access to the password that allows our men-dekrip message. Data that is not in enkrip-called plain text, while the in-enkrip called cipher text.
ENIAC
The first digital computer built by the University of Pennsylvania, USA during the World War II (1942-1945 years). The main use is as a vacuum flask brace signal.
EOF (End of File)
Sign stating that it was up to the last record of a file.
Ethernet
Includes a standard LAN cable scheme and communications protocol developed by Xerox Corporation. Now, the Ethernet protocol to be used and adapted by other companies.
Ethernet Cable
All the media cable for Ethernet networks. Example Ethernet Cable is the cable type 10base5, UTP / STP.
Exclusive OR
One of the operating logic of computers to compare 2 word bit for bit. When both bits have the same value, the value generated is'0 '. Conversely, if both are different then the resulting value is'1 '.
Exclusive OR gate
Electronic circuits keluarannya value is'1 'if two different inputs, and value'0' when masukannya all the same. Often referred to as half Adder.
Extended Memory
Additional memory on the side of the main memory.
Fast Ethernet
To explain a standard CSMA / CD Ethernet with 100 Mbps speed.
Fiber Optic
An optical system using glass fiber or glass transparent plastic as a medium of light.
Fiber Optic Cable
Fiber optic cable has a surplus with the data channel capable of high speed, very wide bandwidth and is not affected by signal elektromagnetik.
File Server
Software in a network system that allows you to use files stored in the server by the system network.
File Sharing
The ability of a network to allow use of files by several users at the same time.
Finger
Utility from the UNIX duty to report information about other users who have UNIX accounts. Finger application form that displays information about a particular user or all users who are logged on the local system or on the remote system. Shown that usually the length of user name, last login time, idle time, terminal line and terminal location.
Firewalls
A software program that is installed on a network and protect computer systems tasked with the goal of secure the Internal Network. Sometimes a service requires a proxy to allow access to the Web.
Firewire
The video cable to the computer. High-speed serial bus is developed by Apple and Texas Instrument, has the ability to connect up to 63 devices. Also known as IEEE standard 1394, with a spec that has a transfer rate of 100, 200 and 400Mbits/detik. Fungsi-fungsi yang didukung oleh Firewire adalah Hotswapping. Kecepatan ganda pada bus yang sama dan transfer data asinkronus, yang mengatur lebar gelombang operasi multimedia. Firewire dipakai secara luas untuk menghubungkan peralatan video ke komputer.
Firmware
Software yang dituliskan ke dalam ROM, tidak dapat diganti-ganti tanpa pengubahan secara fisik. Misalnya untuk komputer yang mengendalikan proses produksi.
Flash Memory
Memory chip yang tetap bisa menyimpan data meskipun power sudah dimatikan atau kamera telah dimatikan. Keuntungan kamera digital yang memakai flash memory adalah image tidak hilang meskipun baterai “habis”, Flash Memory tidak memerlukan power untuk bisa menyimpan citra yang telah direkam dalam kamera.
Folding
Sebuah cara untuk mengubah data menjadi format tertentu yang berbeda dengan format sebelumnya.
FSB (Front Side Bus)
Pada mikroprosesor FSB menghubungkan prosesor dengan memori utama. FSB digunakan untuk mengkomunikasikan antara motherboard dengan komponen lainnya.
Frame Rate
Jumlah bingkai gambar atau frame yang ditunjukkan setiap detik dalam membuat gambar bergerak; diwujudkan dalam satuan fps (frames per second), makin tinggi angka fps-nya, semakin mulus gambar bergeraknya. Game dan film biasanya tinggi fps-nya.
FTP (File Transfer Protocol)
Protokol yang disediakan pada Internet untuk melakukan pengalihan file dari suatu tempat (site) di Internet ke komputer lokal. Program yang memungkinkan kita memindahkan data di antara dua komputer yang berjauhan letaknya. Protokol yang dipakai pada Internet untuk mengirim file.
Full Duplex (FDX)
Kemampuan untuk berkomunikasi dan saling bertukar data dua arah secara bersamaan. Umumnya dilakukan pada saluran pribadi atau saluran sewa.
Gateway
Sebuah komputer yang melayani konversi protokol antara beberapa tipe yang berbeda dari suatu network atau program aplikasi. Sebagai contoh, sebuah gateway dapat meng-convert sebuah paket TCP/IP menjadi paket NetWare IPX atau dari Apple Talk menjadi DECnet, dan lain-lain.
General Purpose Register
Register dalam CPU yang dimanfaatkan untuk berbagai macam kepentingan. Misalnya untuk indeks, alamat, perhitungan dan operasi logika.
GIF
Format file untuk menyimpan data berupa gambar. Format GIF dikembangkan pertama kali oleh Compuserve. Format GIF 89a dapat menyimpan beberapa gambar sekaligus dalam satu file untuk dijadikan animasi. File GIF terkompresi, sehingga sangat kecil dan sesuai untuk penggunaan di Internet.
GUI (Graphical User Interface)
User interface yang didasarkan pada grafik. Termasuk dalam GUI adalah icons, pulldown menus dan mouse. GUI dapat dikatakan sebagai cara standar yang umum dipakai oleh pengguna komputer untuk berinteraksi dengan PC-nya. Tiga GUI utama adalah Windows, Macintosh dan Motif.
Hacker
Dalam dunia hacker atau underground orang-orang yang menjadi hacker biasanya akan melalui tahapan-tahapan. Tahapan-tahapan tersebut adalah:
1. Mundane Person Tingkatan paling bawah. Seseorang pada tingkatan ini pada dasarnya tidak tahu sama sekali tentang hacker dan cara-caranya, walaupun ia mungkin memiliki komputer sendiri dan akses Internet. Ia hanya tahu bahwa yang namanya hacker itu membobol sistem komputer dan melakukan hal-hal yang negatif (tindak kejahatan).
2. Lamer Seseorang pada tingkatan ini masih dibingungkan oleh seluk beluk hacking karena ia berpikir bahwa melakukan hacking sama seperti cara-cara warez (dalam dunia underground berarti menggandakan perangkat lunak secara ilegal). Pengetahuannya tentang hal-hal seperti itu masih minim, tapi sudah mencoba belajar. Seseorang pada tingkatan ini sudah bisa mengirimkan trojan (yang dibuat orang lain) ke atau pada komputer orang lain ketika melakukan obrolan pada IRC atau ICQ dan menghapus file-file mereka. Padahal ia sendiri tidak tahu persis bagaimana trojan bekerja. Seseorang yang sukses menjadi hacker biasanya bisa melalui tahapan ini dengan cepat bahkan melompatinya.
3. Wannabe Pada tingkatan ini seseorang sudah mengetahui bahwa melakukan tindakan hack itu lebih dari sekedar menerobos masuk ke komputer orang lain. Ia lebih menganggap hal tersebut sebagai sebuah filsafat atau way of life. Akhirnya ia jadi ingin tahu lebih banyak lagi. Ia mulai mencari, membaca dan mempelajari tentang metode-metode hacking dari berbagai sumber.
4. Larva Juga dikenal dengan sebutan newbie. Pada tingkatan ini ia sudah memiliki dasar-dasar teknik hacking. Ia akan mencoba menerobos masuk ke sistem orang lain hanya untuk mencoba apa yang sudah ia pelajari. Meskipun demikian, pada tingkatan ini ia mengerti bahwa ketika melakukan hacking ia tidak harus merusak sistem atau menghapus apa saja jika hal itu tidak diperlukan untuk menutupi jejaknya.
5. Hacker Sebenarnya sulit untuk mengatakan tingkatan akhir atau final dari hacker telah tercapai, karena selalu saja ada sesuatu yang baru untuk dipelajari atau ditemukan (mengumpulkan informasi dan mempelajarinya dengan cermat merupakan dasar-dasar yang sama bagi seorang hacker) dan hal tersebut juga tergantung perasaan (feeling). Meskipun demikian, menjadi seorang hacker memang lebih menjurus pada hal pemikiran.
Hacker dengan Keahlian khusus
Seorang hacker dapat mencapai pengalaman dan keahlian pada bidang-bidang tertentu seperti sistem operasi atau sebuah Aplikasi. Dalam hal ini ada dua tingkatan, yaitu :
1. Wizard Istilah ini diberikan pada seseorang yang telah memiliki pengetahuan luas dibidangnya. Kemampuannya tersebut tidak diragukan lagi.
2. Guru Istilah ini digunakan pada seseorang yang mengetahui semua hal pada bidangnya, bahkan yang tidak terdokumentasi. Ia mengembangkan trik-trik tersendiri melampaui batasan yang diperlukan. Kalau bidangnya berkaitan dengan aplikasi, ia tahu lebih banyak daripada pembuat aplikasi tersebut
Karakter hacker yang bersifat merusak, yaitu :
1. Dark-side Hacker Istilah ini diperoleh dari film Star Wars-nya George Lucas. Seorang Dark-side hacker sama seperti Darth Vader (tokoh dalam film Star Wars) yang tertarik dengan kekuatan kegelapan. Hal ini tidak ada hubungannya dengan masalah “baik” atau “jahat” tapi lebih kepada masalah “sah (sesuai hukum yang berlaku)” dan “kekacauan”. Seorang Dark-side hacker punya kemampuan yang sama dengan semua hacker, tapi “sisi gelap” dari pikirannya membuat ia menjadi unsur berbahaya untuk semua komunitas.
2. Malicious Hacker Istilah untuk menyebut seseorang yang merusak sistem orang lain untuk sekedar iseng (tidak merasa bersalah) tanpa memperoleh apa pun dari tindakannya tersebut.
Host
Istilah yang digunakan untuk menunjuk sebuah komputer yang memungkinkan penggunanya terhubung ke Internet.
Host Name
Nama dari komputer dalam Internet, digunakan untuk menunjukkan skema penamaan URL.
Hosting Service Provider
Biasa disebut dengan Web-Hosting, adalah perusahaan yang menyediakan layanan dan penyimpanan Web bagi perorangan atau perusahaan. Ada tiga tipe utama dalam layanan hosting yaitu shared, dedicated dan colocation.
HTTP (Hyper Text Transfer Protocol)
Sebuah metode atau protokol untuk mendowload file ke komputer. Protokol ini berbasis hyper text, sebuah format teks yang umum digunakan di Internet.
Hyperlink
Link atau sambungan ke sumber lain (bisa file atau halaman yang berbeda). Biasanya digunakan dalam membangun sebuah Web.
Internet Control Message Protocol (ICMP)
Protokol yang digunakan untuk mengatur perilaku IP. ICMP berperan membantu menstabilkan kondisi jaringan.
ICQ
Dari kata “I Seek You”. Aplikasi untuk chatting dengan pertukaran file dan pengiriman SMS.
IDE (Integrated Drive Electronics)
Sebuah tipe hardware interface yang berfungsi untuk menghubungkan hard disk, CD-ROM dan drive tape pada sebuah PC. IDE sangat populer dan banyak digunakan karena menyediakan cara yang terhitung ekonomis untuk menghubungkan komponen-komponen hardware.
IDE controller
Alat yang dipakai untuk mengatur harddisk, cd-rom, dsb.
Illegal Operation
Sebuah operasi yang tidak sesuai aturan atau tidak dapat dimengerti oleh komputer. Pada Windows 95/98, jika muncul error message seperti ini, merupakan indikasi bahwa program-program yang dijalankan mengalami crash.
IMAP (Internet Message Access Protocol)
Protokol standar untuk mengakses atau mengambil e-mail dari server. IMAP memungkinkan pengguna memilih pesan e-mail yang akan diambil, membuat folder di server, mencari pesan e-mail tertentu, bahkan menghapus pesan e-mail yang ada. Kemampuan ini jauh lebih baik daripada POP (Post Office Protocol) yang hanya memperbolehkan kita mengambil/download semua pesan yang ada tanpa kecuali.
Intranet
Sumber daya informasi yang digunakan untuk kepentingan internal dari suatu instansi atau perusahaan dengan menggunakan jaringan komputer yang ada.
IP address
Alamat numeric unik dari sebuah komputer di Internet. IP address komputer Anda sama dengan nomor telepon Anda sendiri dalam fungsinya.
IRC (Internet Relay Chat)
Sebuah layanan Internet yang dapat berkomunikasi antara orang yang satu dengan yang lainnya.
IrDA Port
Transmiter atau receiver untuk sinyal-sinyal infra red.
ISDN (Integrated Services Digital Network)
Metoda standar transmisi data digital melalui jaringan telepon dengan kecepatan tinggi, lebih cepat dari sebuah modem biasa.
ISO9660
Bila ingin memiliki CD-ROM sebaiknya memanfaatkan dukungan ini karena banyak sekali CD-ROM yang ada di pasaran menggunakan format ISO9660 ini.
ISP (Internet Service Provider)
Perusahaan yang menawarkan dan menyediakan layanan akses Internet ke kalangan umum.
Java Bahasa pemrograman untuk menciptakan isi yang aktif dalam halaman Web, juga dapat dijalankan dalam semua komputer. Applet Java diambil/diakses dari halaman Web dan dijalankan secara total.
Java applet
Sebuah program Java yang didownload dari server dan dijalanan melalui program browser. Java Virtual Machine dibundle di dalam browser dan memberikan instruksinya.
JavaScript
Bahasa script interpreter untuk menciptakan isi yang aktif dalam halaman Web.
JPEG (Joint Photographic Expert Group)
Format file yang memuat data berupa gambar. Gambar JPEG terkompresi secara lossy, sehingga kualitas gambar diturunkan untuk mendapatkan ukuran file yang kecil. Walaupun demikian perbedaan kualitas tersebut tidak akan dapat terlihat untuk gambar-gambar tertentu. JPEG biasanya digunakan untuk gambar-gambar yang tidak jelas batas warnanya, seperti foto, lukisan, dll.
Jumper
Bentuk yang sederhana dari switch on/of. Umumnya jumper ini berukuran amat kecil dan terbuat dari logam yang terbungkus plastic. Dimana biasanya digunakan untuk menentukan setting suatu fungsi seperti besaran frekuensi BIOS, dll.

K
Kbit/s (Kilobits per Second)
Ukuran untuk transfer data atau kecepatan modem. Kebanyakan modem komputer men-download informasi pada kecepatan 56 Kbit/s. Digunakan untuk mengekspresikan kecepatan transfer data di dalam jaringan. Satu kilobit sama dengan 1000 bit.
KHz
Satuan unit frekuensi yang sama dengan 1000 siklus per detik.

L
L1 Cache
Sejumlah kecil SRAM memori yang digunakan sebagai cache yang terintegrasi atau satu paket di dalam modul yang sama pada prosesor. L1 cache ini dikunci pada kecepatan yang sama pada prosesor. Berguna untuk menyimpan secara sementara instruksi dan data, dan memastikan bahwa prosesor memiliki supply data yang stabil untuk diproses sementara memori mengambil dan menyimpan data baru.
L2 Cache
Umumnya terdiri dari chip SRAM yang terletak di dekat prosesor, meskipun demikian, prosesor Athlon generasi terbaru memiliki L2-Cache on chip. Fungsinya sama dengan L1 Cache, L2 Cache dikenal juga dengan nama secondary cache, adalah memory yang memiliki urutan kecepatan kedua (tipe memori yang paling cepat adalah L1 Cache) yang disediakan untuk mikroprosesor.
LAN
Sebuah jaringan yang dibangun pada sebuah lokasi seperti di rumah ataupun gedung perkantoran. Bisa diartikan juga sebagai sebuah sistem komunikasi komputer yang jaraknya dibatasi tidak lebih dari beberapa kilometer dan menggunakan koneksi high-speed antara 2 hingga 100 Mbps.
Land Attack
Serangan kepada sistem dengan menggunakan program yang bernama “land”. Apabila serangan diarahkan kepada sistem Windows, maka sistem yang tidak diproteksi akan menjadi hang (dan bisa keluar layar biru). Demikian pula apabila serangan diarahkan ke sistem UNIX versi lama, maka sistem akan hang. Jika serangan diarahkan ke sistem Windows NT, maka sistem akan sibuk dengan penggunaan CPU mencapai 100% untuk beberapa saat sehingga sistem terlihat seperti macet. Program land menyerang server yang dituju dengan mengirimkan packet palsu yang seolah-olah berasal dari server yang dituju. Dengan kata lain, source dan destination dari packet dibuat seakan-akan berasal dari server yang dituju. Akibatnya server yang diserang menjadi bingung.
LCD (Liquid Crystal Display)
Jenis tampilan layar yang menggunakan persenyawaan cair yang mempunyai struktur molekul polar, diapit antara dua elektroda yang transparan. Bila medan listrik diberikan, molekul menyesuaikan posisinya pada medan, membentuk susunan kristalin yang mempolarisasi cahaya yang melaluinya.
Localhost
Di dunia Networking, Localhost merupakan istilah yang digunakan untuk host itu sendiri. Nama localhost digunakan untuk konfigurasi aplikasi sebelum benar - benar mendapatkan hostname dari hostmasternya.
0.13-micron technology
Istilah industri yang mengacu pada ukuran gerbang poly silicon pada mikro prosesor. Ukuran disini berkorelasi langsung dengan kecepatan dan daya yang dibutuhkan oleh mikro prosesor. Jika ukuran dikurangi maka kecepatan prosesor (MHz) meningkat, sementara kebutuhan daya menurun secara signifikan.
MAC
Singkatan dari Macintosh, keluarga PC dari Apple yang diperkenalkan sejak 1984. MAC merupakan komputer pertama yang mempopulerkan penggunaan Graphical User Interface (GUI), arsitektur hardwarenya memungkinkan kemudahan dan konsistensi penggunaan. MAC yang pertama memakai power Motorola 32 bit 680 x 0 CPU. Pada 1994 Apple memperkenalkan Power Macs yang menggunakan chip Power PC CPU. Dengan Insignia Solution softwindows, DOS dan window dapat diaplikasikan pada Power Macs.
Mailbomb
Kegiatan pengiriman sejumlah besar e-mail ke sebuah alamat e-mail yang bermaksud untuk memenuhi kuota server mail tersebut.
Mailing list
Sebuah forum diskusi di Internet dengan menggunakan e-mail. Satu pesan dari seorang anggota akan diterima oleh semua anggota.
Mandrake (http://www.linux-mandrake.com)
Salah satu distribusi Linux, lahir diinspirasi oleh RedHat Linux, dengan banyak pengembangan dan aplikasi prakonfigurasi sehingga memudahkan untuk para pemula, baik dari proses awal instalasinya yang berbasis Xwindow, sampai penggunaannya dan didukung oleh berbagai bahasa. Di dalam Mandrake, semua paket telah dikompilasi dengan optimasi CPU untuk kelas Pentium (intel, amd, cyrixm winchip) dan prosesor di atasnya dan menghasilkan optimasi lebih dari 30%.
MIDI (Musical Instrument Digital Interface)
Merupakan sebuah standard untuk menghubungkan instrument elektronik (electronic instruments), pemroses efek (effect processors), dan komputer.
MIME (Multi-Purpose Internet Mail Extension)
Digunakan untuk menunjukkan tipe data dalam server Web, sehingga program pembantu serta Plug-in yang tepat dapat dipanggil.
Modem (MOdulation/DEModulation)
Sebuah perangkat yang menerjemahkan informasi digital ke sinyal analog dan sebaliknya.

N
Network
Sekelompok komputer yang terhubung yang bisa saling berbagi sumber daya (seperti printer atau modem) dan data.
Network Adapter
Sebuah perangkat keras yang digunakan untuk menghubungkan komputer ke jaringan. Sebuah network adapter bisa berupa kartu PCI ataupun terhubung dengan sebuah komputer secara eksternal melalui USB atau parallel port.
Network Service Provider
Service provider yang mencakup perusahaan telekomunikasi, data carriers, ISP, Wireless-communication Service Provider dan operator cable yang menawarkan sambungan berkecepatan tinggi.
NIC (Network Interface Card)
Perangkat keras yang dipasang pada komputer agar komputer tersebut bisa terhubung ke komputer lain.
Northbridge
Salah satu dari dua chip pada chipset yang menghubungkan prosesor ke memori system dan bus AGP dan PCI. Chip lainnya adalah Southbridge.
NTFS (NT File System)
File sistem Windows NT yang digunakan untuk mengorganisir dan melacak keberadaan file.
O
OEM (Original Equipment Manufacturer)
Sebuah frasa slank untuk menyebut suatu perusahaan yang mempunyai hubungan khusus dengan produsen komputer berskala besar. OEM membeli produk buatan perusahaan besar yang belum diberi merk dan kemudian mengemasnya dan menjual produk tersebut dengan merk milik perusahaan mereka.
P
Parity
Sebuah sistem pendeteksi keadaan error yang menguji integritas data antara sistem komputer dan jaringannya. Cek parity menggunakan 9 bit ekstra yang mencakup nilai 0-1 (tergantung dari kandungan data dari byte). Setiap kali sebuah byte ditransfer atau ditransmisi, terjadi tes parity bit.
Partition
Proses membagi ruang harddisk menjadi dua atau lebih, sehingga seolah-olah akan ada lebih dari satu harddisk.
PCI (Peripheral Component Interconnect)
Periferal bus yang umum digunakan pada PC, Macintosh dan workstation. Pertama kali didesain oleh Intel dan muncul di pasaran pada akhir 1993. PCI menyediakan jalur transfer data cepat antara CPU dengan komponen-komponen periferal lain di PC seperti video, disket, jaringan dan lain-lain.
Peer to Peer
Suatu model komunikasi dua arah antar pengguna PC melalui jaringan komputer atau Internet tanpa melalui sebuah server. Dalam model ini, tiap pesertanya memiliki kapabilitas yang sama dan tidak seorangpun dari peserta dapat memulai suatu sesi komunikasi tersendiri.
Ping
Packet Internet Groper. Suatu program test koneksi yang mengirim suatu paket data kepada host dan menghitung lamanya waktu yang dibutuhkan untuk proses pengiriman tersebut.
Ping-O-Death
Serangan dengan cara eksploitasi program ping dengan memberikan packet yang ukurannya besar ke sistem yang dituju. Beberapa sistem UNIX menjadi hang ketika diserang dengan cara ini. Program ping umum terdapat di berbagai sistem operasi, meskipun umumnya program ping tersebut mengirimkan packet dengan ukuran kecil (tertentu) dan tidak memiliki fasilitas untuk mengubah besarnya packet. Salah satu implementasi program ping yang dapat digunakan untuk mengubah ukuran packet adalah program ping yang ada di sistem operasi Windows 95.
Proxy Server
Proxy server bekerja dengan menjembatani komputer ke Internet. Program Internet seperti browser, download manager dan lain-lain berhubungan dengan proxy server, dan proxy server tersebut yang akan berkomunikasi dengan server lain di Internet.
Public Key Encription
Sistem enkripsi (penyandian) yang menggunakan dua kunci, yaitu kunci publik dan kunci privat. Kunci publik diberitahukan oleh pemilik dan digunakan oleh semua orang yang ingin mengirimkan pesan terenkripsi kepada pemilik kunci. Kunci privat digunakan oleh pemilik kunci untuk membuka pesan terenkripsi yang ia terima.

Q
Query
Suatu extracting data dari suatu database dan menampilkannya untuk “pengolahan” lebih lanjut.
QuickStart Technology
Fitur ini memperpanjang umur baterai dengan memasuki status low power saat sedang tidak bekerja atau diantara pekerjaan meskipun dalam waktu yang sangat singkat.
R
RAMDAC (Random Acces Memory Digital to Analog Converter)
Chip pengontrol VGA yang mengatur color pallete dan convert data dari memori ke sinyal analog di monitor.
RDRAM
Sebuah teknologi chip dinamis dari Rambus, Inc. Produk ini memiliki lisensi khusus untuk teknologi semi konduktor yang memproduksi chip. Pada 1995 diperkenalkan chip dasar dengan kecepatan 600 MBytes/sec. Pada 1997, Concurrent RDRAM mengalami peningkatan kecepatan hingga 700 MBps, dan pada 1998, Direct RDRAM mencapai kecepatan 1,6 GBps. Concurrent RDRAMs banyak dipergunakan pada video games, sementara Direct RDRAM biasa dipakai pada komputer.
Red Hat (http://www.redhat.com)
Salah satu distribusi Linux, merupakan distribusi (distro) paling populer. Modus grafis memudahkan instalasi ini. Point terbesar distro ini adalah RPM (Redhat Package Manager), dengan software ini kita dapat melakukan install atau uninstall aplikasi dan komponen sisop. RPM saat ini dianggap sebagai standar de-facto dalam hal pemaketan dan penggunaannya telah luas di berbagai distro lainnya, kecuali Debian.
RJ-11 Connector
Konektor telepon standar yang dipasang ke jack yang biasanya dipasang di dinding untuk mendapatkan sambungan telepon. Konektor ini bisa digunakan untuk menghubungkan komputer dalam sebuah jaringan PCnet-Home.
RJ-45 Connector
Konektor standar untuk kabel Ethernet Cat 5.
Root
Istilah ini diadaptasi dari sistem UNIX dimana seorang pengguna bisa memiliki hak pengendalian terbatas pada sebuah sistem. Hacker menggunakan istilah ini untuk menggambarkan kemampuan mereka dalam melancarkan serangan dan menguasai sistem korbannya.
Root directory
Direktori dasar untuk memulai semua direktori yang ada di hard disk atau disket.
Router
Alat penghubung antara LAN dan Internet yang merutekan transmisi antara keduanya.
Routing Information Protocol (RIP)
Protokol yang digunakan untuk menyebarkan informasi routing dalam jaringan lokal (terutama yang bermedia broadcast seperti Ethernet).
RPM (Rotation Per Minute)
Jumlah putaran per menit. Ukuran yang digunakan untuk menyatakan kecepatan rotasi dari sebuah disk drive. Floopy disks memiliki kecepatan rotasi 300 rpm, sedangkan harddisk memiliki kecepatan dari 2.400 hingga 3.600 rpm atau lebih.
RS 232
Standard ini menyangkut komunikasi data antara komputer induk (Data Terminal Equipment-DTE) dengan alat-alat pelengkap komputer (Data Circuit Terminating-DCE).
SCSI (Small Computer System Interface)
Interface (antarmuka) yang menghubungkan sistem dengan banyak peripheral seperti harddisk, CDROM drive dan tape drive. SCSI distandarkan oleh ANSI (American Standards Institute) pada 1986 dan telah mengalami banyak peningkatan hingga sekarang. Pada awal SCSI distandarkan dan digunakan SCSI memiliki lebar data sebesar 8 bit dengan clock sebesar 5 MHz. Adapun kecepatan transper maksimum yang dimiliki adalah sebesar 4 MB/s untuk yang asynchronous dan sebesar 5 MB/s untuk yang synchronous. Jumlah device yang didukung untuk keduanya adalah 7 buah (tidak termasuk host). SCSI generasi awal ini sering disebut SCSI-1. Perkembangan selanjutnya dari SCSI-1 ini adalah SCSI-2 yang distandarkan pada tahun 1994. Pada SCSI-2 ini terdapat apa yang dinamakan Common Command Set (CCS) yang merupakan 18 buah perintah dasar. Diterapkannya CCS ini pada SCSI-2 didasarkan atas anggapan bahwa CCS ini merupakan kebutuhan dasar untuk dapat mendukung setiap peralatan SCSI. Selain penerapan CCS ini, SCSI-2 juga menawarkan lebar data yang lebih tinggi, bisa sampai 16 bit. Begitu pula dengan clock yang ditawarkan, bisa menjadi 10MHz. Istilah Fast SCSI dan Wide SCSI juga didasarkan pada peningkatan kecepatan transfer ini. Istilah fast menunjukkan clock yang digunakan adalah 10 MHz, sementara istilah Wide menunjukkan lebar data yang digunakan adalah 16 bit. Baik Fast SCSI maupun Wide SCSI, keduanya memiliki kecepatan transfer teroritis maksimum sebesar 10MB/s. Sementara untuk Fast/Wide SCSI (memiliki lebar data 16 bit dan clock sebesar 10 MHz). Kecepatan transfer teoritis maksimum yang dimiliki adalah sebesar 20 MB/s. Untuk masalah jumlah device yang didukung, terdapat perbedaan antara Fast SCSI dengan Wide SCSI. Pada Fast SCSI jumlah device yang didukung tetap 7 (host tidak termasuk), sementara pada Wide SCSI jumlah device yang didukung adalah 15 (juga tidak termasuk host). Pada Fast/Wide SCSI jumlah device yang didukung adalah sama dengan Wide SCSI. Pada SCSI-2 ini juga terdapat sebuah fitur baru yang diberi nama Command Queuing. Command Queuing ini membolehkan sebuah device SCSI-2 menyimpan kumpulan perintah yang diperolehnya dari sistem untuk kemudian dikerjakan dengan urutan yang paling efisien. Kombinasi antara host yang hanya mendukung SCSI-1 dengan device SCSI-2 tetap dimungkinkan, begitu pula sebaliknya. Hanya saja terdapat kemungkinan tidak semua fitur yang tersedia akan bisa dimanfaatkan. Perkembangan selanjutnya dari SCSI-2 ini adalah SCSI-3 yang mulai tersedia pada 1995, meskipun belum distandarkan secara resmi. Hal ini disebabkan pengalaman pada SCSI-2 yang membutuhkan waktu begitu lama untuk menstandarisasikannya. Jadi SCSI-3 ini adalah kumpulan dari berbagai standar yang berbeda-beda namun memiliki hubungan. Pada SCSI-3 ini kecepatan transfer teoritis maksimum mengalami peningkatan. Bila pada SCSI-2 kecepatan transfer teoritis bisa mencapai 20 MB/s, maka pada SCSI-3 hingga saat ini kecepatan transfer teoritis maksimum bisa mencapai 320MB/s. Beragam jenis SCSI-3 ini memiliki kecepatan transfer teoritis maksimum mulai dari 20MB/s hingga 320 MB/s. Lebar data yang dimiliki juga bervariasi, 8 bit dan 16 bit. Begitu pula clock yang dimiliki bervariasi mulai dari 20 MHz hingga 80 MHz.
SDRAM (Synchronised Dynamic RAM)
Adalah pengganti DRAM yang spektakuler. Siklus akses memori ini disinkronkan dengan clock processor. Dengan demikian mengurangi waktu tunggu antara prosessor dan memori.
Serial Port
Sebuah port pada komputer yang m
Simple Mail Transfer Protocol (SMTP)
Protokol ini untuk memproses pesan teks yang hanya berisi rangkaian karakter ASCII (A-Z, angka, dan tanda baca keyboard standar) serta alamat sasaran.
Shell
Program yang mem-provide interface antar user dan sistem operasi. Pada Windows 95/98, shell memaintain desktop atau graphical user interface.
Slackware (http://www.slackware.com)
“Ibu” dari distro Linux, merupakan distro Linux yang banyak fiturnya, ‘crptic”, dan UNIX-like. Slackware dianggap merupakan distro yang cukup “manual” (baca:sulit) dibandingkan distro lainnya dan cukup “bandel”, karena memang merupakan distro Linux yang pertama. Didesain untuk komputer minimal 386.
Snoop bus
Teknologi inovatif AMD yang merupakan bus kecepatan tinggi, jalur komunikasi inter-prosesor yang digunakan pada platform AMD Athlon MP. Snoop bus memfasilitasi transfer data antara CPU cache untuk mengurangi kebutuhan bandwith memori untuk data yang digunakan secara bersama.
Southbridge
Salah satu dari dua chip pada chipset yang mengontrol bus IDE, USB, dukungan Plug and Play, menjembatani PCI dan ISA, mengontrol keyboard dan mouse, fitur power management dan perangkat lain. Chip lainnya adalah Northbridge.
SPAM
Pesan tidak diinginkan yang masuk melalui e-mail, bisa berupa pesan yang tak berarti atau iklan yang kurang berguna.
SRAM (Static RAM)
Kebalikan dari DRAM, isi bit-bit yang ada tetap ‘diingat’ tanpa perlu di refresh secara periodic. Memori jenis ini lebih cepat dibandingkan dengan DRAM dan mungkin harganya lebih mahal dari DRAM. Secara tipikal jenis memori ini digunakan untuk L2 caches.
Subnet Mask
Angka biner 32 bit yang digunakan untuk membedakan network ID dengan host ID, menunjukkan letak suatu host, apakah berada di jaringan lokal atau jaringan luar.
SuSE (http://www.suse.com)
Salah satu distro Linux, merupakan distro paling populer penggunaannya di Jerman dan Eropa dan mulai merambah ke internasional. Ditujukan untuk pengguna “newbie” sampai yang sudah “gape”. Fiturnya antara lain : instalasi berbasis menu(CD-ROM), disket boot modular, ratusan halaman buku referensi, dan YAST, tool admnistrasi dalam SuSe. Mendukung kartu grafis baru dan mode demo secara langsung. Paket SuSe dinamakan SPM(SuSe Package Manager).
Swap file
Sebuah file disk yang secara non permanen, dipakai untuk menyimpan program atau sebagian program yang berjalan pada memori.

T
TCP/IP (Transmission Control Protocol/Internet Protocol)
Protokol komunikasi yang mula-mula dikembangkan oleh Departemen Pertahanan AS. TCP/IP menyediakan jalur transportasi data sehingga sejumlah data yang dikirim oleh suatu server dapat diterima oleh server yang lain. TCP/IP merupakan protokol yang memungkinkan sistem di seluruh dunia berkomunikasi pada jaringan tunggal yang disebut Internet.
Thread
Sebuah artikel yang ditempatkan ke sebuah Usenet newsgroup bersama-sama dengan semua artikel yang mengikutinya, artikel yang mengikutinya, dan seterusnya. Mengelola artikel-artilkel menjadi thread menyebabkannya menjadi lebih mudah memilih artikel di sebuah newsgroup yang ingin dibaca.
Trojan Horse
Sebuah aplikasi yang didesain untuk melakukan sebuah kecurangan namun terselubung dengan kebaikan. Biasanya metode yang dipakai adalah dengan menyelipkan (attach file lewat e-mail) sebuah file tertentu yang mengandung Trojan Horse namun dengan kemasan menarik. Kalau Trojan Horse berhasil menginfeksi maka bisa dipastikan hacker bisa mendapat akses tak terhingga ke komputer korban. Tiga jenis Trojan Horse yang popular digunakan adalah Bac Orifice, NetBus, dan SubSeven.

U
UNIX
Sistem operasi yang digunakan baik pada PC maupun Mainframe. Banyak komputer dan server yang terhubung dengan Internet menggunakan UNIX.
URL (Uniform Resource Locator)
Sebuah alamat yang menunjukkan rute ke file pada Web atau pada fasilitas Internet yang lain. URL diketikkan pada browser untuk mengakses suatu situs Web.
USB (Universal Serial Bus)
Socket yang terdapat di semua PC model baru untuk koneksi perangkat-perangkat USB. USB mendukung instalasi yang mudah dengan system Plug and Play, dan secara bertahap menggantikan port serial dan pararel yang lama. Perangkat USB meliputi scanner, modem dan printer.
User Interface
Tampilan yang dilihat oleh user pada sistem operasi, tampilan ini dibuat sesederhana mungkin gunanya untuk memudahkan user dalam bekerja.

V
Vertex Shaders
Bagian dari nfiniteFX engine, Vertex Shaders digunakan untuk memberikan kesan hidup dan lebih nyata pada sebuah karakter atau tampilan layar. Sebagai contoh, melalui vertex shading, para pengembang aplikasi dapat membuat kerut yang muncul pada wajah ketika karakter tersebut tersenyum.
VFAT (Windows95) fs
Merupakan peningkatan dari MS-DOS FAT fs dan mendukung formal long filename. Ini juga berguna untuk komputer yang memiliki sistem dual-boot.
VLB (VESA Local Bus)
Ekstensi 32 bit yang mempunyai kecepatan tinggi untuk ISA dipromosikan oleh ESA.
VPN (Virtual Private Network)
Suatu jaringan yang menggunakan fasilitas jaringan publik/umum tetapi mempunyai policy seperti pada jaringan privat/pribadi. Pengguna dapat menikmati fasilitas-fasilitas yang ada pada jaringan privat seperti tingkat security yang tinggi, quality of service (QoS), kemudahan manajemen dan tingkat kepercayaan yang tinggi. Secara garis besar, VPN dibagi menjadi dua (2) kategori yaitu Dial VPN dan Dedicated VPN. Dial VPN terdiri dari Access VPN, sedangkan Dedicated VPN terbagi menjadi Intranet VPN dan Extranet VPN. Secara garis besar, VPN akan memberikan keuntungan-keuntungan seperti jaminan keamanan untuk koneksi end-to-end, peningkatan connectivity, pengurangan biaya dan pengaturan prioritas dari suatu aplikasi.
Tipe-tipe VPN: Access VPN, Intranet VPN, Extranet VPN.
VRAM (Video RAM)
Tipe spesial dari DRAM yang memungkinkan akses direct high speed memory melalui sirkuit video. Jenis memori ini lebih mahal bila dibandingkan chips DRAM yang konvensional.
W
WAP (Wireless Application Protocol)
Merupakan standar protokol untuk aplikasi wireless (seperti yang digunakan handphone). WAP merupakan hasil kerjasama antara industri untuk membuat sebuah standar yang terbuka (open standard). WAP berbasis pada standar Internet, dan beberapa protokol yang sudah dioptimasi untuk lingkungan wireless, seperti kebutuhan kompresi data, long latency dan keterbatasan bandwith, serta keterbatasan perangkat wireless. Disain dari informasi yang dikirimkan melalui WAP biasanya menggunakan format WML (Wireless Markup Language). WML ini mirip HTML, hanya lebih spesifik untuk perangkat wireless yang memiliki keterbatasan seperti di atas.
White Hat
Hacker yang lebih memanfaatkan pengetahuan mereka untuk memuaskan rasa ingin tahu bagi intelektualitas ketimbang untuk perbuatan jahat yang merusak. Hacker seperti ini sangat anti dengan perusakan sebuah system, pencurian data maupun merusak kinerja sebuah situs.
Whois
Perintah pada beberapa sistem yang menjelaskan nama seseorang yang sesungguhnya, yang didasarkan pada nama pemakai orang itu. Whois dapat dipakai melalui World Wide Web.
WinSock
Kependekan dari Windows Sockets yaitu suatu cara standar bagi program-program Windows untuk bekerja dengan TCP/IP. Dipakai bila dihubungkan dengan PC Windows secara langsung ke Internet, entah dengan suatu hubungan permanen ataupun dengan sebuah modem memakai SLIP atau PPP.
Wireless LAN (Wireless Local Area Network)
Teknologi komunikasi data dengan tidak menggunakan kabel untuk menghubungkan antara klien dan server. Secara umum teknologi Wireless LAN hampir sama dengan teknologi jaringan komputer yang menggunakan kabel (Wire LAN atau Local Area Network). Teknologi Wireless LAN ada yang menggunakan frekuensi radio untuk mengirim dan menerima data yang tentunya mengurangi kebutuhan atau ketergantungan hubungan melalui kabel. Akibatnya pengguna mempunyai mobilitas atau fleksibilitas yang tinggi dan tidak tergantung pada suatu tempat atau lokasi. Teknologi Wireless LAN juga memungkinkan untuk membentuk jaringan komputer yang mungkin tidak dapat dijangkau oleh jaringan komputer yang menggunakan kabel.
Web Hosting
Penyediaan ruang untuk menyimpan halaman web oleh pemilik komputer/server, yang dapat diakses 24 jam via Internet.
Web Servers
Perangkat keras dan perangkat lunak yang dipakai untuk menyimpan dan mengirim dokumen HTML untuk digunakan dalam World Wide Web.
Web Site
Suatu koleksi dokumen HTML pribadi atau perusahaan dalam server Web. Sebuah server Web dapat berisi lebih dari satu situs.
Worm
Program yang dapat mereplikasi dirinya dengan menggunakan media komputer. Sifatnya dekstruktif terhadap disk dan memori juga menyebabkan kerusakan pada sistem dan memperlambat kinerja komputer dalam mengaplikasi sebuah program. Disebut juga virus.
Workstation
Single-user komputer berdaya penuh yang kebanyakan berjalan di bawah sistem operasi UNIX. Workstation ditujukan bagi high-end graphics dan aplikasi desain tambahan . Umum disebut juga sebagai graphics workstation. Saat ini, workstation dipakai untuk menyebut komputer yang terhubung ke suatu jaringan.
WWW (World Wide Web)
Servis Internet yang dapat me-link dengan dokumen multimedia bersama dengan HyperText. Pemakai dapat melompat antara dokumen dengan menggunakan link untuk melihat text, grafik, video dan media lainnya.

X
Xabre
Chipset grafis dari SiS yang mendukung penuh AGP 8x dan DirectX. Chip ini merupakan chip grafis pertama yang mendukung kedua fitur teakhir.
XML (Extensible Markup Language)
XML termasuk dalam keluarga Markup Language seperti halnya HTML atau WML. Namun dengan XML, kita bisa mendefinisikan custom tag sendiri.
X Terminal
Sebuah terminal yang memakai antar muka pemakai grafis X. Antarmuka ini membolehkan kita untuk membuka banyak sekali jendela di layar dan melaksanakan semua jenis pekerjaan dalam waktu yang bersamaan. X terminal popular di dunia UNIX.

Z
ZIP socket (Zero Insertion Force socket)
Sebuah tipe socket yang didesain agar mudah dimasuki chip PGA.

Compile Kernel OpenBSD

From the later forget, note aja. His is old .....
Here I am using OpenBSD 4.1.
Dmassage Add a package to ease pendeteksian new hardware to the kernel. Can be taken from the installation CD.
# mount / dev/cd0a / mnt
# pkg_add-v / mnt/packages/dmassage-0.6.tgz

So now we start compilenya
# cd / usr/src/sys/arch/i386/conf
# s dmassage-generic> KERNELKU
# vi KERNELKU
KERNELKU for a few adjustments, such as processor type, lan card etc..
# config KERNELKU
# cd .. / compile / KERNELKU /
# make clean & & make depend & & make
# make install

You make userland (so far I have not know this function from userland, seniorku according to menyetabilkan binarinya), can be seen in http://openbsd.org/
# rm-rf / usr / obj / *
# cd / usr / src
# make obj
# cd / usr / src / etc & & env DESTDIR = / make distrib-dirs
# cd / usr / src
# make build

While nunggu be left to sleep first.
I wake up, I used to backup original kernel
# cp / bsd / bsd.asli
# cd / usr/src/sys/arch/i386/compile/KERNELKU /
# cp bsd / KERNELKU
# reboot

Dah finished booting now fit to live load and then enter KERNELKU
How ngecek use a command
# uname-a
OpenBSD proxy 4.1 KERNELKU # 0 i386

Rabu, 01 Juli 2009

the working principles of transmission control (TCP)

Unlike the Internet Protocol (IP), TCP has the working principles of such "virtual circuit" in the telephone network. TCP more important governance-how and reliability in the delivery of data between two computers in the network. TCP does not care with what is done by IP, is an important communication link between two computers running well. In this case, how do I set up a TCP connection to open communication, the type of application is to be conducted in the communication (for example to send e-mail, file transfer etc.). In addition, to detect and edit the data if there is a mistake. Manage the entire process of a TCP connection between one computer with another computer in a computer network.
Unlike the IP connectionless mechanisms that rely on the TCP connection is a connection mechanism oriented. In this case, the relationship of logic will be built by TCP between one computer with another computer. Time specified in the computer is connected to send data or must acknowledge that the relationship still held. If this is not able to do so can be assumed that the computer that we are dealing with broken relationships and the logic can be closed.
TCP multiplexing set of data sent / received by a computer. There is an identification in the TCP header allows multiplexing is done. This allows a computer to do some of the TCP connection logic. Form of relationship is full duplex, this allows two computers to talk each other in the same time without having to use alternate communication channel. To overcome the saturation (congestion) on the communication channel, the TCP header includes information about flow control.
It is important to understand is the TCP port number. Determine the port number of the services performed by application programs over TCP. Numbers have been determined by the Network Information Center in the Request For Comment (RFC) 1010 [10]. As an example application for File Transfer Protocol (FTP) over transport layer TCP port number 20 is used and many more.
Working principle of TCP based on the principle of client-server. Server is a program on the computer that will passively listen (listen) port number that was specified in the TCP. Medium client is a program that actively opens a TCP connection to the server computer to request the service required.
client will actively open the connection (active open) by sending a signal Syn (Syn SENT state) to the destination server computer. If the server receives the signal Syn server at that time are on the LISTEN state akan Syn and send signals to two computers (client & server) akan to ESTAB state. If no response from the computer that dituju, the program will return to the state CLOSE. After the service has been completed then the client will send the wrong signals FIN and the client computer will be in state FIN WAIT signal until FIN received from the server. At the time of receiving signals FIN, the server will be to CLOSE WAIT state relationship to be. Finally, the second computer will be back in the state CLOSE.

Are you hacker ?

Make a small question for this day. If you say

match the description below. you get some net account

months ago. you are surfing on the internet, and tease you in many

media reported the information superhighway. you have red

box, you do not need to pay for the call. You have

crackerjack, and you've run it in the password file on a unix

and you get an account. All the people in sekolahmu salut

with computer knowledge, you are the only people

the required teacher to help her. Would you like that? you

not a hacker.

There are hundreds of people out there in sepertimu. You buy 2600 and you

ask. phreack you read it and you ask. you join the

# hack and you ask. you ask all the questions, and ask

what is wrong with that? Basically, a hacker is to ask

about something, so correct? All you want to know the answers to

pertanyaanmu. You are not hackers.

Hacking is not about answers. Hacking is on the road

you take to find the answers. if you need help, do not

ask for an answer, ask about the road that must be

you take to find the answers for yourself. Because not

someone who has called a hacker, but the person who

do perjalan along roads.

Minggu, 14 Juni 2009

The soul of Christ

The soul of Christ, I am holy.
Blood of Christ, save me.
Water side of Christ, I puaskanlah.
Out of Christ, strengthen me.
Yes Jesus is good, luluskanlah prayer.
LukaMu hide in me.
Do not let me be divorced from you.
Against the enemies of lazy, I lindungilah.
At the time ajalku, call me.
Perintahkanlah I come to you.
So that together with the kudusMu.
I give praise for ever. Amin

The soul of Christ

The soul of Christ, I am holy.
Blood of Christ, save me.
Water side of Christ, I puaskanlah.
Out of Christ, strengthen me.
Yes Jesus is good, luluskanlah prayer.
LukaMu hide in me.
Do not let me be divorced from you.
Against the enemies of lazy, I lindungilah.
At the time ajalku, call me.
Perintahkanlah I come to you.
So that together with the kudusMu.
I give praise for ever. Amin

Testimony I

In Garabandal, Bundan we said, "Pay attention given to the long Ekaristisemakin be on the wane." Garabanda through events, such as the Visible miracle host, Maria Bundan unrelenting menakankan the importance of the Eucharist.


As a Catholic, we know that the Holy Eucharist should be the center of our lives, even though sometimes felt empty and dry. Where we can perdalam faith and the Eucharist we experience?

One purpose of Pope John Paul II in preparing the third millennium of the Church is to help us become a better person for the Eucharist. The first step in achieving this goal is to improve the reception of communion. Second Vatican church council, several times, suggesting to the communion of each day or as often as possible, "Those who believe are recommended to receive the Holy Eucharist every day" (decree of the Catholic Church East region, "no. 15)

Yanbg in his book entitled "Frequent and Daily Communion Confession," Imam Jesuits Bertrand de Margerie revive welcome communion every day. This is a relationship of communion is the highest because the real evidence and signs that our relationship with Christ terdalam, who loves us and wants us to love Him also. Reception communion every day or as often as possible, to guide us towards humility, self-development and persistence in prayer.

Two major influences of the Holy Eucharist is the acceptance of love is greater in God and each other, and the remission of sins lightly. "Food with a daily Eucharist will bring changes in the family often with social life and career. Receiving communion as often as may be the biggest source of happiness and balance of our lives," said P. De Margerie.

Increase communion and holiness of each person to spread the activities in daily living that lead to social dialogue, justice, and growth. Love of Jesus will lead us to love a fellow human being. As our love for Jesus grow through daily communion, as well as our hearts desire to spread the Gospel and Christianity developed.

The influence of the Eucharist

How can we explain all the amazing impact of receiving communion in the Holy in our lives?

St. Catherine of Siena, penglihat-14 th century and Doctor of the Church, write a few chapters in his book "The Dialogue" to the mystery of the Eucharist. Chaterine, who lived for many years exclusively with only the Eucharist, encouraging us to receive communion as often as possible, and to guide us so that communion can be helpful in our spiritual life. He describes the quality of 4. or attributes that help deepen our acceptance of the Eucharist: faith, CINTA, desire, and CHANGE.

Iman, who is one of the largest gift from pembabtisan and many of our spiritual life, nature is much needed for a reception of communion seriously. The life of faith, believe in the love given by the Trinity Mahakudus on each man as an individual. Faith is owned by St. Augustine membimbingnya to say, "Tuham care of each menusia as He is, and to all mankind as a unity" Jesus loves us so that His death and the afterlife, he still continue to provide his own self to us in the form of bread and wine in the Eucharist.

Catherine encourages us to a faith that Jesus is total trust and that Jesus is really present in the sacrament Terberkati. He really wanted to unite with us so that we can live together with Him. We must believe. "And if we do not believe, that our faith becomes weak and small, what next?" ask Catherine. We must pray so that each communion we receive the Holy akan increase our faith.

Faith to guide us to CINTA, the quality of the second. We are all created to love and to beloved. When we see how much God loves us, the responses are only able to give us his well-loved with our whole hearts. He always wanted to with us, and live in us.

The best way to realize our love of God is to love a fellow human way. Eucharist is the real existence of God to love people. Fruit of the receipt of Holy communion deepen our love for God and each other.

Third nature that we need is desire. Catherine said, our actions as a human being has limits, but our desire is not limited. We can, and should want the Lord, because He wanted us. If we do not expect much from the Holy communion, we also will not receive many. Everyone receives the same amount, but some people will grow kerohaniannya, while the other does not. Catherine explains that this depends on the desire of each person to God. We can wish, and accept, this is the perfection of God!

Terdalam desire comes from our hearts the Holy Spirit, Catherine wants us to give up desire to do good, the Spirit of grace, purity, and unity with God. Determine the completeness spiritual yearning in Holy communion. The desire of the Lord will direct all our actions to honor and glory to Him, not only at the time of Misa, but also at any time in our lives every day.

Three nature requires that the nature of the first four: CHANGES continuously from sin and the tendency to sin to the truth in God. As we grow in love, and desire, the Spirit will reveal weaknesses or sins of us with more details. We see how much we need to change. The change is a process of growth, moving forward step for step. We leave our old way of life in the start and think and act like Jesus that we receive in Holy communion.

Candle of Faith

Catherine usually describe themselves in a simple, so that each person can understand himself. He uses the image depicts a candle in the attributes that are required to receive Holy communion. The candle light is a picture of the meaning for the people because every Catholic tarbenakel in the world marked with a candle that burned. (Sadly in most churches, candles have been replaced by electric lights)

Catherine emphasizes that wick candle must penetrate the center of the candle, if not then the candle will not burn perfectly. Firing stopped when sumbunya akan habis akan wax form or deform when sumbunya not straight. So, likewise with our faith, our faith must truly steady, consistent, and permeate into all aspects of our lives. Axis of faith permeate the middle of the candle of faith, so faith candle can ignite the fire with love.

Sin like water over a flame api.Di back warm light, there is death. The flame must be dried by repentant (conversion) because it has sinned, and through the recognition of sin. These changes bring the warmth of faith, love, and desire.

Catherine offers three ways to us to mengingkatkan qualities needed for a communion of the Holy helpful. Repentance sehinggat to cleanse us can see the sacrament Terberkati with eyes of faith, accept it with love, desire and feel the holy spirit.

People who love the Eucharist and attend Misa regularly, only to realize that the Holy Spirit desires that can drive our hearts against Jesus. For us that is not experienced in spiritual things like this, never too late to turn to the Holy Spirit in prayer. Hopefully everyone will be careful berdevosi on the Holy Eucharist, as the candle light in the altar, to spread Christ's light in the midst of the darkness of the world.

Preparation to receive Holy communion:

Prepare the hearts and pikiranmu convenience. What you think about before and during the Misa in progress at the time you want to run Holy communion and walk back to the place? What pikiranmu focus to Jesus?

1. Discard kelemahanmu and sins in mercy to the Heart of Jesus and the Eucharist.
2. Listen to the Word of God well when Misa.
3. Think about what is actually taking place: we are preparing ourselves to meet our Lord.
4. Expect to meet Jesus kebutuhanmu. Are you lonely, depression, hurt? Medium need a friend? Jesus can meet all our needs.
5. Ask for a special gift to Jesus that you need to do on that day: patience, trust, courage or magnanimity.
6. Take enough time to thank mengucap after we receive the Lord.
7. Ciptakanlah the spiritual life throughout the day through communion.
8. Read the Word of God during the Eucharist.



Source: Garabandal, Jul-Sept'08
Penterjemah: Tula Sufenty

St. Peter of Alcantara

"There is no tongue that is able to greatness of love of Jesus to every soul, so that the hadiran him a chance not to forget him, then leave this world before he gives the sacrament of Holy Church, His bride. He lived in this sacrament , so that between him and the Church there is no bond other than his own self as the memories he will live. "

St. Francis of Sales

"No one acts Rescue is able to show that we love and tenderness for him greater than the Most Holy sacrament in which He was clear and self merendahakan himself become food to penetrate our lives and unite himself with the hearts of those believers."

St. Alfonsus de Liguori

"One thing is for sure is that the most exciting worship God, as the Holy communion, every day is a visit to our Lord Jesus Christ in the sacrament of Holy altar. Know that a quarter hours in front of Jesus in the Most Holy sacrament, you will get more of all the good deeds you do on that day. "

Sacramental repentance (Recognition)

"Who among you have a tail that has a hundred sheep, and a loss if he does not leave the ninety-nine-tails in the wilderness, and go find a stray until he find it. And if he has to find it, he put on the shoulder with joy, and Arriving in the house, he called for companions and their neighbors, and said to them: "Rejoice with me, because I lost my sheep was kutemukan." I say to you: "Similarly there will be joy in the heaven because one sinner who repents, more than joy because ninety-nine righteous people do not need conversion, "(Luc. 15:4-7)

Selasa, 09 Juni 2009

make art ala kamasutra

Up to now, still
many members, that sex is something natural.
Therefore, sex is not necessary. Because, by itself,
when a different type of human life is a pair (as
husband-wife), eventually will bear offspring, - without the need to
learn about science seksologi.

However,
indeed, such contention is mistaken. The actual sex
not only aims to deliver offspring. However, sex also
art is beautiful, where the knowledge about sex, then
the second pair will have the satisfaction, harmony, and harmony
happiness.

Many
cases occurred, because of lack of knowledge about science seksologi,
many husband-wife pair finally experiencing dissatisfaction and
unhappiness in their lives. Moreover, because sex is also, finally
fracas occurred, perselingkuhan, and even on the same berbuntut
divorce.

Actually,
knowledge about seksologi has been learned by people. Although
However, until now, there is no knowing when the actual
knowledge about sex is the start and learned. However,
at least, of some ancient manuscript found in India, - the
then known as the book "Kama Sutra", proves that
many turns since then, India has the nation on science
seksologi.

Kama Sutra in the context of Hindu philosophy, - means that the god Kama Sutra and Cintam
all the more to the narrative,-governance procedures. So, Kama
Sutra is a collection containing about grammar-how to make. Therefore
in the book of Kama Sutra, written many things about sex problems,
such as behavior, intimate relationship techniques, variations in sexual relations even
the type of fellow.

According to
dr. Nugroho Setiawan, seksolog who work in some hospital
Jakarta, - that the Kama Sutra, art heritage of India make this
very real need to be introduced on each couple's family.
For, in it there is a solution how to overcome difficulties
to stimulation techniques or smell, palpability, position
make, and so aim to be the second pair can be reached
satisfaction with the summit.

Next
about the art of Kama Sutra bercina version Watsyayana, and explanation of dr.
Nugroho Setiawan, MS., Sp. And., Who is also a medical expert
fertility problems in men Consultation Clinic Sex Grasia, Kebun Jeruk,
Jakarta.

I. Sexual desire & passion

Intimate relationship, usually occur because of the passion and fire of sexual desire menggebu. Generally, women can better control the fire and spark of sexual desire than men to appear. This means, at the time the men are often so passionate and desires that tersalurkan.

Pressure
sexual appetite that occurs in women will be on lubrikasi
vitalnya organ. While in the men's, marked with the penegangan
or ereksi, which is also followed with the lubrikasi, - such as
well as on women. However, the men lubrikasi
usually called emisio is not spent as much as women.
Lubrikasi can be referred to as a clear liquid.

Deep
make their own intimate relationships, there are several steps that must be
passed, ie, starting from the action stimulation (excitement), copulation
(plateau), orgasme, until eventually the resolution or fatigue.

To
get the maximum quality of the relationship, should the fourth stage
can be eloquent. Where they should be mutually
understanding and willingness to understand each.

II. Embrace (hug)

Spoon
or hug is a form of expression of feeling affection on someone
spouses. I love the expression on someone spouses.
Expression of love for husband-wife pair, in the form of rangkul
embrace this, according to the Kama Sutra have several kinds, namely:

1. Jatawestitaka:

Spoon
conducted with women menggelantungkan himself on a spouse
standing. While the men, bow his head and juxtapose
on the head with a woman's eyes stare and menciumnya
with feelings of love. Cordial and soft caress as
creeper plants that coil around the tree is called "spinning plant
creep. "

2. Wrksadhirudhaka:

In the
this position, the two women laying on the feet that are currently paired
stand. Meanwhile, one of the waist and hug lengannya only
shoulder embrace more partners, to create intimate gumaman
seems to get really hope osculation of spouses. Spoon
This is called "Pemanjatan a tree." Indeed, in this case the
is the more aggressive women, like men, but surely.

3. Tila-Tandulaka:

Position
in the intimate embrace of this very common. Done while lying and
they embrace each other closely. Both the arm and leg wrestle
integrates each other. Hug or embrace the so-called "Mixed seeds
sesame with rice "This shows that the two couples together
active, but quiet, patient, and of course - love each other.

4. Ksiraniraka:

Position
spoon is almost the same as the Tila-Tandulaka. However,
both are more enthusiastic, more active and in close embrace, - without
think pain or suffering. As if they try
to enter the body in the party. This position is not only
require physical endurance, but also the spirit and sincerity. Because
the neck is called a "susu mix and water."

Actually
there is another version of the technique and embrace rangkul this. In the Kama Sutra
Suwarnanabha version, there are techniques embrace a more simple, the
based on the body, namely:

1. Neck thigh / Pool:

Wrong
one of the spouses between pahanya own. At this position appears
one pair more motivated and aggressive. In fact, this technique is required if one of the pair is less active.

2. Jaghana hug:

Is Jaghana is part of the body down to the navel to the thigh. Men and pressing Jaghana
spouses with their own bodies with the full sense, even
enthusiastic. Therefore, this technique is often accompanied cakaran, bites,
and smell.

3. Neck Chest:

The
men lay chest to chest with a chest press
female pair. This technique common technique, in which men show
protection and security in the women's pair.

4. Caress the forehead:

Menyentukan second pair of mouth, face each other until memanggut ignites.

III. Kiss

Kiss
not only as an expression of feeling affection. But osculation
also can be the size of how big appetite or feelings of passion
each pair.

Deep
this case, there are several ways and pick the places that sensitive
and can excite sexual desire, such as the forehead,
eyes, cheeks, throat, stomach, breast, mouth, and the base
thigh.

Girls to women, with a different form of kiss kiss adult women. In the adult female, have some form of smell, that is:

1. Osculation Jump:

Smack the lips with a stick to each other directly with each other, which is made by many couples.

2. Osculation curve:

A warm kiss and embrace each other with the second pair of curved.

3. Osculation turn: When one of the other pair holds the head and chin and then menciumnya.

4. Pressing osculation:

When
with the lips pressed down hard with the lips or under
between two fingers, and after a touch with the tongue he
pressing tight with the lips.

Instead
there is also another type of smell, that is, the face when he looked
spouses who fall asleep and then menciumnya. Osculation not only
conducted in the lips, but also in the neck and places
senstif other. This type of kiss called the "kiss of kindle
love, "which shows the attention and sexual desire.

There
also another type of kiss called the "kiss the making."
Usually, this is done by men when returning late, and then
kiss the spouse sleeps. In fact, the actual
his wife, ostensibly asleep, with a wish to know whether
spouses have the attention on it.

IV. Cakaran

When
in peak condition when exposed intimate, usually without realizing it
akan scratch or spouse mencengkeram tight. Cakaran or
This grip is actually a form of expression or overflow
irrespective of sexual emotions. Even so, often result
leave the former nail sketch.

Gust
cakaran form of expression that is used to leave, can also
defined as a sign or warning for the second pair.
That whenever you see these signs, they will remember
back with the love of the spouses. Of course, it is
this was done in the areas closed. For example, is done on
around the axilla, chest, or the body and thigh tengan (jaghana).

In the
Kama Sutra make art, there are 8 types of emphasis or the cakaran
nail, - which can also lead to the emergence or sign former
warning:

1. Gumaman Voters:

By pressing chin, chest, lips or jaghana pair women with soft without leaving the sketch or used, but only to make the pair, and mutter a sound.

2. Cakaran Crescent:

Alerts
with a curved claw ditancapkan on the neck and chest. Former
cakaran this condition in the pair indicates the 'trance', the
enjoy the psychological relationship.

3. Cakaran
Orbicular: If the crescent is formed dicapkan is opposite each other.
Outline the form of a nail is usually made at the navel, in the
around the buttocks, and hip.

4. Cakar Lines:

Alerts
the form of small lines that can be made at any place in the
body. Typically, a sketch such as this are not made deliberately and not
restrained.

5. Macan Cakar Nail Care:

This same line when dilengkungkan and made in the chest.

6. Cakar Footwashing Merak Birds:

If
marks made on the curved chest with a claw fifth fruit at once. Alerts
This is made with the goal to be praised, because the making of such sign
this requires high skills. This is a sketch or marked
that number. Therefore, this pair is usually the person who can
self-control and able to give warmth spouses.

7. Cakar Kelinci Jump:

If the fifth sign of the nail was a meeting of each other. Usually conducted near the hilt breast.

8. Cakar Teratai Leaf Blue:

Marks made in the chest (breast) in the pinggul, or hip in the form of a blue lotus.

V. Bites / embrace

Instead
grip, or bite embrace is also part of the art
make. When intimate relationships, conducted by the bite
pair that can excite and satisfaction
own. For instance, soft bites, small bites, or bites
hard with the clutch or emphasis.

1. Small bites:

Bite
or done as clinch this expression to the feeling of affection
pair. This does not leave the bite or wound the former, and even taste
ill. However, the bite is more delicate as the expression
closeness or love the depth. Sometimes, the bite,
also be accompanied with a gentle caress or fondling. Some of the areas where the
usually do this is to bite the cheeks, arms,
nose, eyebrow, or eyes. But, on this small bites, can also
to excite desire and sexual partners, --
such as a bite on the neck, ears, under arms, around the breast,
places and other sensitive.

2. Hard bites:

Generally
bites or clinch this is a form of overflow from the passion and
sexual desire. In this bite hard, often leave
the former, - and usually, without conscious, often also accompanied by the
grip that produces signs or nails used.

VI. Technical Intim Relationships

Deep
life husband-wife couples, sex is sangatpenting.
Often the case, sexual relations can cause kerenggangan
husband-wife. In fact, in the life of couples, the sex akan
become a part and make a beautiful, when it
communicated. That is, intimate relationships will be the case that
fun and not monoton or menjenuhkan for both parties
when done with various techniques that variatif and innovative.
For example, techniques intimate relationship with the press position, wind,
up, conceal, mare, crabs, and so forth.

Position
clamp, is when the second leg pair direnggang straight and mutual
clamp. "The position of twine" is a place if one of the women
pahanya armed men in the thigh. While "the position", ie,
when the second pair of women pahanya straight. Instead
that, when the second leg pair ditekuk women and placed on the
stomach itself, this position is called "crab position".

Deep
Kama Sutra book, also mentioned a variety of techniques intimate relationship with
stand, squat, or lie. Lie at the position, male
usually play an active role - namely at the position above, but can also
suggest that women in the top.

That, whatever technique intimate relations should be carried out with the attitude of openness between both parties.

VII. Gumam Voters

Sounds
that out of the mouth is in fact a flaming
or sexual expression that appears in spontaneity. And
psychological, emotional factors can affect a person, which can
stimulate or increase the work of the organs and functions of the sexual
owned.

For
couples who do intimate relationships, voice-vote was
can help. In particular, the difficulty for the pair to reach the peak.
Voters desahan, moan, groan or effect in stimulating
organs and sexual function of a person. In fact, when reached akan
top, often he (pair) can not control ourselves, to remove the voice
rintih, sigh or groan.

In the
a number of women's refuge is often used to 'cheat' spouses
or 'clients' in order to finish quickly. In addition, in order to feel satisfied. For
many things, the satisfaction of men not only how it is
ejakulasi get, but because the spouse can satisfy.

In the
Kama Sutra books, in addition to be a voice-vote on this, also
about the beating of the pair (sex maniak), which
then rise to the sound of weeping or the sound and others.

VIII. Role of Men & Women, And The Role Exchange

Usually,
women are passive act. Passive attitude of women are in fact
less profitable or can reduce the quality of the relationship
husband-wife.

Deep
Kama Sutra, women may be possible to be active,
replace the function of the role of male couples. How can the switch
or switch positions, or in sikapnya. In this case, the men's pair
can help melt dab attitudes so that women do not passively with
the light-teranganmembujuk to exchange the role or the way
fine attributes such as release or make while speaking. Or
clink parts so that women do not feel ashamed.

The
specifically, men's activities, there is at least 7, the movement, penggesekan,
transfixion, palpability, emphasis, and blowing the game.

While
women can also perform similar activities, with the additional 3
which is called by the term: tong pair, top, and float.

Couples
barrel is part of the game, with the added factor of time. With
other words, let the pejantan berendam longer before
continue the journey.

Peak is a movement to give women different variations. While the float when the man wills.

IX. Oral

There
some controversy about oral sex with this. There are
allow, as part of this technique to obtain satisfaction.
But there is also a forbid, because it is not in accordance with the attitude
the civilized man.

According to
history, oral sex is occurring because of irregularities between
men and men, where one of them act as women. Besides
that, also because there is slavery, where the employer treats the
sex. Of women as sex objects, to serve the needs of sex
employer, including to perform oral.

Nah,
make art from, oral sex is a way that can be called as
efforts to get satisfaction. According to the experience of the women, there are 8
stage art bercina using the mouth, that is: nominal relationship,
bite edge, out of emphasis, the emphasis, smell, palpability,
penghisapan, and swallow.

The
nominal definition of the relationship is with the holding of the
pejantan between the lip-movement digerak. While the bite edge,
ie on the edges closed with the fingers as well as closed
flowers that will bloom, where the edge is pressed to the lips and teeth.

Emphasis
exit is to press the tip of the pejantan with the lips and dikatupkan
menciumnya as if trying pulling out. Conversely, if
placed in the mouth and then pressed and issued again, the
it is called in to the stress. Meanwhile, when only menciumnya --
as if kissed lips down, then it is called a smack. However,
if followed by a touch of tongue on all parts, then it is
referred to as the palpability.

But,
when in the same way and laying half in the mouth
and by force and kissed menghisapnya, referred to as
penghisapan. However, when all placed in the mouth and to
as if trying menelannya, this is called a swallow.

X. & The End

Talk
concerning intimate relationships, many husband-wife pairs, often do
intimate relationship that is done without any preparation or planning.
In fact, when the couple's family is preparing for all
sesuatunya well, the intimate relationship that has been done, actually
akan feel more beautiful and impressive. For example, the second in this pair
plan to do at night, the pair since morning
men also have started to prepare himself to stay fit. It can
consume nutritious foods and beverages. So also in the
female pair.

Before
relationship began, of course, the second pair must berbenah themselves. Namely,
clean the body, spout wewangian, and so forth. And
when both couples want a romantic atmosphere, so they can
preparing the room or a room with things that smell romantic.
For example, place the flowers, the room lighting to create a
temaram, or set of songs romantic.

In the
at the intimate relationship, should not need a second pair
in a hurry. They can start with the heating or forplay. And if it is felt to be sufficient, so they can start a real relationship.

Nah,
the intimate relationship ended, many cases in pairs men, --
they are usually fatigue and sleep snore immediately. For
women, this is very provoking. Moreover, when
apparently has not reached his peak. Therefore, suggestions for
men, should they not be selfish or self,
but he must also understand the desire of women.

Thus,
intimate relationship does not always end with sleep snore. But
akan very impressive again when both of them and then shoot the while
enjoy a drink or snack. If necessary, discuss the
about the relationship that has just done, - whether or beatify
no. By communicating about it, then the second pair
akan mutual desire to know each couple.