Senin, 02 November 2009

postheadericon perintah pada windows

Arp
Displays and modifies entries in the Address Resolution Protocol (ARP) cache, which contains one or more tables that are used to store IP addresses and their resolved Ethernet or Token Ring physical addresses. There is a separate table for each Ethernet or Token Ring network adapter installed on your computer. Used without parameters, arp displays help.
Syntax
arp [-a [InetAddr] [-N IfaceAddr]] [-g [InetAddr] [-N IfaceAddr]] [-d InetAddr [IfaceAddr]] [-s InetAddr EtherAddr [IfaceAddr]]
Parameters
-a [InetAddr] [-N IfaceAddr]
Displays current ARP cache tables for all interfaces. To display the ARP cache entry for a specific IP address, use arp -a with the InetAddr parameter, where InetAddr is an IP address. To display the ARP cache table for a specific interface, use the -N IfaceAddr parameter where IfaceAddr is the IP address assigned to the interface. The -N parameter is case-sensitive.
-g [InetAddr] [-N IfaceAddr]
Identical to -a.
-d InetAddr [IfaceAddr]
Deletes an entry with a specific IP address, where InetAddr is the IP address. To delete an entry in a table for a specific interface, use the IfaceAddr parameter where IfaceAddr is the IP address assigned to the interface. To delete all entries, use the asterisk (*) wildcard character in place of InetAddr.
-s InetAddr EtherAddr [IfaceAddr]
Adds a static entry to the ARP cache that resolves the IP address InetAddr to the physical address EtherAddr. To add a static ARP cache entry to the table for a specific interface, use the IfaceAddr parameter where IfaceAddr is an IP address assigned to the interface.
/?
Displays help at the command prompt.
Remarks
• The IP addresses for InetAddr and IfaceAddr are expressed in dotted decimal notation.
• The physical address for EtherAddr consists of six bytes expressed in hexadecimal notation and separated by hyphens (for example, 00-AA-00-4F-2A-9C).
• Entries added with the -s parameter are static and do not time out of the ARP cache. The entries are removed if the TCP/IP protocol is stopped and started. To create permanent static ARP cache entries, place the appropriate arp commands in a batch file and use Scheduled Tasks to run the batch file at startup.
• This command is available only if the Internet Protocol (TCP/IP) protocol is installed as a component in the properties of a network adapter in Network Connections.
Examples
To display the ARP cache tables for all interfaces, type:
arp -a
To display the ARP cache table for the interface that is assigned the IP address 10.0.0.99, type:
arp -a -N 10.0.0.99
To add a static ARP cache entry that resolves the IP address 10.0.0.80 to the physical address 00-AA-00-4F-2A-9C, type:
arp -s 10.0.0.80 00-AA-00-4F-2A-9C
Assoc
Displays or modifies file name extension associations. Used without parameters, assoc displays a list of all the current file name extension associations.
Syntax
assoc [.ext[=[filetype]]]
Parameters
.ext
Specifies the file name extension.
filetype
Specifies the file type with which you want to associate the specified file name extension.
/?
Displays help at the command prompt.
Remarks
• Use a white space after the equal sign to delete the file type association for a file name extension.
• Use the ftype command to view current file types that have open command strings defined.
• Use the > redirection operator to redirect the output of assoc to a text file.
Examples
To view the current file type association for the file name extension .txt, type:
assoc .txt
To delete the file type association for the file name extension .txt, type:
assoc .txt=
To view current file type associations one screen at a time, type:
assoc | more
To send the output of assoc to the file Assoc.cfg, type:
assoc>assoc.cfg
At
Schedules commands and programs to run on a computer at a specified time and date. You can use at only when the Schedule service is running. Used without parameters, at lists scheduled commands.
Syntax
at [\\ComputerName] [{[ID] [/delete]|/delete [/yes]}]
at [[\\ComputerName] hours:minutes [/interactive] [{/every:date[,...]|/next:date[,...]}] command]
Parameters
\\ComputerName
Specifies a remote computer. If you omit this parameter, at schedules the commands and programs on the local computer.
ID
Specifies the identification number assigned to a scheduled command.
/delete
Cancels a scheduled command. If you omit ID, all of the scheduled commands on the computer are canceled.
/yes
Answers yes to all queries from the system when you delete scheduled events.
hours:minutes
Specifies the time when you want to run the command. Time is expressed as hours:minutes in 24-hour notation (that is, 00:00 [midnight] through 23:59).
/interactive
Allows command to interact with the desktop of the user who is logged on at the time command runs.
/every:
Runs command on every specified day or days of the week or month (for example, every Thursday, or the third day of every month).
date
Specifies the date when you want to run the command. You can specify one or more days of the week (that is, type M,T,W,Th,F,S,Su) or one or more days of the month (that is, type 1 through 31). Separate multiple date entries with commas. If you omit date, at uses the current day of the month.
/next:
Runs command on the next occurrence of the day (for example, next Thursday).
command
Specifies the Windows command, program (that is, .exe or .com file), or batch program (that is, .bat or .cmd file) that you want to run. When the command requires a path as an argument, use the absolute path (that is, the entire path beginning with the drive letter). If the command is on a remote computer, specify Universal Naming Convention (UNC) notation for the server and share name, rather than a remote drive letter.
/?
Displays help at the command prompt.
Remarks
• Schtasks is a more powerful superset command-line scheduling tool and includes all the functionality found in the at command-line utility. Use schtasks instead of at for all command-line scheduling tasks. For more information about schtasks, see Related Topics.
• Using at
To use at, you must be a member of the local Administrators group.
• Loading Cmd.exe
At does not automatically load Cmd.exe, the command interpreter, before running commands. If you are not running an executable (.exe) file, you must explicitly load Cmd.exe at the beginning of the command as follows:
cmd /c dir > c:\test.out
• Viewing scheduled commands
When you use at without command-line options, scheduled tasks appear in a table formatted similar to the following:
Status ID Day Time Command Line
OK 1 Each F 4:30 PM net send group leads status due
OK 2 Each M 12:00 AM chkstor > check.file
OK 3 Each F 11:59 PM backup2.bat
• Including identification number (ID)
When you include identification number (ID) with at at a command prompt, information for a single entry appears in a format similar to the following:
Task ID: 1

Status: OK

Schedule: Each F

Time of Day: 4:30 PM

Command: net send group leads status due
After you schedule a command with at, especially a command that has command-line options, check that the command syntax is correct by typing at without command-line options. If the information in the Command Line column is incorrect, delete the command and retype it. If it is still incorrect, retype the command with fewer command-line options.
• Viewing results
Commands scheduled with at run as background processes. Output is not displayed on the computer screen. To redirect output to a file, use the redirection symbol (>). If you redirect output to a file, you need to use the escape symbol (^) before the redirection symbol, whether you are using at at the command line or in a batch file. For example, to redirect output to Output.text, type:
at 14:45 c:\test.bat ^>c:\output.txt
The current directory for the executing command is the systemroot folder.
• Changing system time
If you change the system time at a computer after you schedule a command to run with at, synchronize the at scheduler with the revised system time by typing at without command-line options.
• Storing commands
Scheduled commands are stored in the registry. As a result, you do not lose scheduled tasks if you restart the Schedule service.
• Connecting to network drives
Do not use a redirected drive for scheduled jobs that access the network. The Schedule service might not be able to access the redirected drive, or the redirected drive might not be present if a different user is logged on at the time the scheduled task runs. Instead, use UNC paths for scheduled jobs. For example:
at 1:00pm my_backup \\server\share
Do not use the following syntax, where x: is a connection made by the user:
at 1:00pm my_backup x:
If you schedule an at command that uses a drive letter to connect to a shared directory, include an at command to disconnect the drive when you are finished using the drive. If the drive is not disconnected, the assigned drive letter is not available at the command prompt.
Examples
To display a list of commands scheduled on the Marketing server, type:
at \\marketing
To learn more about a command with the identification number 3 on the Corp server, type:
at \\corp 3
To schedule a net share command to run on the Corp server at 8:00 A.M. and redirect the listing to the Maintenance server, in the Reports shared directory, and the Corp.txt file, type:
at \\corp 08:00 cmd /c "net share reports=d:\marketing\reports >> \\maintenance\reports\corp.txt"
To back up the hard drive of the Marketing server to a tape drive at midnight every five days, create a batch program called Archive.cmd, which contains the backup commands, and then schedule the batch program to run, type:
at \\marketing 00:00 /every:5,10,15,20,25,30 archive
To cancel all commands scheduled on the current server, clear the at schedule information as follows:
at /delete
To run a command that is not an executable (that is, .exe) file, precede the command with cmd /c to load Cmd.exe as follows:
cmd /c dir > c:\test.out

Atmadm
Monitors connections and addresses that are registered by the ATM Call Manager on an asynchronous transfer mode (ATM) network. You can use atmadm to display statistics for incoming and outgoing calls on ATM adapters. Used without parameters, atmadm displays statistics for monitoring the status of active ATM connections.
Syntax
atmadm [/c][/a] [/s]
Parameters
/c
Displays call information for all current connections to the ATM network adapter installed on this computer.
/a
Displays the registered ATM network service access point (NSAP) address for each adapter installed in this computer.
/s
Displays statistics for monitoring the status of active ATM connections.
/?
Displays help at the command prompt.
Examples
To display call information
To display call information for all current connections to the ATM network adapter installed on this computer, type:
atmadm /c
The atmadm /c command produces output similar to the following:

Windows ATM Call Manager Statistics

ATM Connections on Interface : [009] Olicom ATM PCI 155 Adapter

Connection VPI/VCI Remote Address/
Media Parameters (rates in bytes/sec)
In PMP SVC 0/193 47000580FFE1000000F21A2E180020481A2E180B
Tx:UBR,Peak 0,Avg 0,MaxSdu 1516
Rx:UBR,Peak 16953936,Avg 16953936,MaxSdu 1516
Out P-P SVC 0/192 47000580FFE1000000F21A2E180020481A2E180B
Tx:UBR,Peak 16953936,Avg 16953936,MaxSdu 1516
Rx:UBR,Peak 16953936,Avg 16953936,MaxSdu 1516
In PMP SVC 0/191 47000580FFE1000000F21A2E180020481A2E180B
Tx:UBR,Peak 0,Avg 0,MaxSdu 1516
Rx:UBR,Peak 16953936,Avg 16953936,MaxSdu 1516
Out P-P SVC 0/190 47000580FFE1000000F21A2E180020481A2E180B
Tx:UBR,Peak 16953936,Avg 16953936,MaxSdu 1516
Rx:UBR,Peak 16953936,Avg 16953936,MaxSdu 1516
In P-P SVC 0/475 47000580FFE1000000F21A2E180000C110081501
Tx:UBR,Peak 16953984,Avg 16953984,MaxSdu 9188
Rx:UBR,Peak 16953936,Avg 16953936,MaxSdu 9188
Out PMP SVC 0/194 47000580FFE1000000F21A2E180000C110081501 (0)
Tx:UBR,Peak 16953984,Avg 16953984,MaxSdu 9180
Rx:UBR,Peak 0,Avg 0,MaxSdu 0
Out P-P SVC 0/474 4700918100000000613E5BFE010000C110081500
Tx:UBR,Peak 16953984,Avg 16953984,MaxSdu 9188
Rx:UBR,Peak 16953984,Avg 16953984,MaxSdu 9188
In PMP SVC 0/195 47000580FFE1000000F21A2E180000C110081500
Tx:UBR,Peak 0,Avg 0,MaxSdu 0
Rx:UBR,Peak 16953936,Avg 16953936,MaxSdu 9180
The following table contains descriptions of each element in the atmadm /c sample output.
Type of Data Screen Display Description
Connection Information In/Out Direction of the call. In is to the ATM network adapter from another device. Out is from the ATM network adapter to another device.
PMP Point-to-multipoint call.
P-P Point-to-point call.
SVC Connection is on a switched virtual circuit.
PVC Connection is on a permanent virtual circuit.
VPI/VCI Information VPI/VCI Virtual path and virtual channel of the incoming or outgoing call.
Remote Address/Media Parameters 47000580FFE1000000F21A2E180000C110081500 NSAP address of the calling (In) or called (Out) ATM device.
Tx The Tx parameter includes the following three elements:
• Default or specified bit-rate type (UBR, CBR, VBR, or ABR)
• Default or specified line speed
• Specified service data unit (SDU) size
Rx The Rx parameter includes the following three elements:
• Default or specified bit-rate type (UBR, CBR, VBR, or ABR)
• Default or specified line speed
• Specified SDU size
To list all registered addresses
To display the registered ATM network service access point (NSAP) address for each adapter installed in this computer, type:
atmadm /a
The atmadm /a command produces output similar to the following:

Windows ATM Call Manager Statistics

ATM Addresses for Interface : [009] Olicom ATM PCI 155 Adapter

47000580FFE1000000F21A2E180000C110081500
To display statistics
To display statistics for monitoring the status of active ATM connections, type:
atmadm /s
The atmadm /s command produces output similar to the following:

Windows ATM Call Manager Statistics

ATM Call Manager statistics for Interface : [009] Olicom ATM PCI 155 Adapter

Current Active calls = 4
Total successful Incoming calls = 1332
Total successful Outgoing calls = 1297
Unsuccessful Incoming calls = 1
Unsuccessful Outgoing calls = 1
Calls Closed by Remote = 1302
Calls Closed Locally = 1323
Signalling and ILMI Packets Sent = 33655
Signalling and ILMI Packets Received = 34989
The following table contains descriptions of each element in the atmadm /s sample output.
Call Manager Statistic Description
Current Active calls Calls currently active on the ATM adapter installed on this computer.
Total successful Incoming calls Calls successfully received from other devices on this ATM network.
Total successful Outgoing calls Calls successfully completed to other ATM devices on this network from this computer.
Unsuccessful Incoming calls Incoming calls that failed to connect to this computer.
Unsuccessful Outgoing calls Outgoing calls that failed to connect to another device on the network.
Calls Closed by Remote Calls closed by a remote device on the network.
Calls Closed Locally Calls closed by this computer.
Signaling and ILMI Packets Sent Number of integrated local management interface (ILMI) packets sent to the switch to which this computer is attempting to connect.
Signaling and ILMI Packets Received Number of ILMI packets received from the ATM switch


Attrib
Displays, sets, or removes the read-only, archive, system, and hidden attributes assigned to files or directories. Used without parameters, attrib displays attributes of all files in the current directory.
Syntax
attrib [{+r|-r}] [{+a|-a}] [{+s|-s}] [{+h|-h}] [[Drive:][Path] FileName] [/s[/d]]
Parameters
+r
Sets the read-only file attribute.
-r
Clears the read-only file attribute.
+a
Sets the archive file attribute.
-a
Clears the archive file attribute.
+s
Sets the system file attribute.
-s
Clears the system file attribute.
+h
Sets the hidden file attribute.
-h
Clears the hidden file attribute.
[Drive:][Path] FileName
Specifies the location and name of the directory, file, or set of files for which you want to display or change attributes. You can use wildcard characters (that is, ? and *) in the FileName parameter to display or change the attributes for a group of files.
/s
Applies attrib and any command-line options to matching files in the current directory and all of its subdirectories.
/d
Applies attrib and any command-line options to directories.
/?
Displays help at the command prompt.
Remarks
• Working with groups of files
You can use wildcard characters (that is, ? and *) with the FileName parameter to display or change the attributes for a group of files. If a file has the system or hidden attribute set, you must clear these attributes before you can change any other attributes for that file.
• Using the archive attribute
The archive attribute (that is, +a) marks files that have changed since the last time they were backed up. The xcopy command uses archive attributes. For more information about archive attributes and xcopy, see Related Topics.
• The attrib command, with different parameters, is available from the Recovery Console.
Examples
To display the attributes of a file named News86 located on the current drive, type:
attrib news86
To assign the read-only attribute to the file named Report.txt, type:
attrib +r report.txt
To remove the read-only attribute from files in the \Public\Jones directory on a disk in drive B and from files in any subdirectories of \Public\Jones, type:
attrib -r b:\public\jones\*.* /s
Consider a scenario where you want to give an associate a disk containing all files in the default directory on a disk in drive A, except files with the .bak extension. Because you can use xcopy to copy only those files marked with the archive attribute, you need to set the archive attribute for those files you want to copy. First, you need to set the archive attribute for all files on drive A. Second, you need to clear the archive attribute for those files with the .bak extension. For example, type:
attrib +a a:*.* attrib -a a:*.bak
Next, use xcopy to copy the files from the disk in drive A to the disk in drive B. The /a command-line option in the following command causes xcopy to copy only those files marked with the archive attribute. For example, type:
xcopy a: b: /a
If you want xcopy to clear each file's archive attribute after it copies the files, use the /m command-line option instead of /a. For example, type:
xcopy a: b: /m
B
More
Displays one screen of output at a time.
Syntax
command | more [/c] [/p] [/s] [/tn] [+n]
more [[/c] [/p] [/s] [/tn] [+n]] < [Drive:] [Path] FileName
more [/c] [/p] [/s] [/tn] [+n] [files]
Parameters
[Drive:] [Path] FileName
Specifies the file to display.
command
Specifies a command for which you want to display the output.
/c
Clears screen before displaying page.
/p
Expands form-feed characters.
/s
Changes multiple blank lines to one blank line.
/tn
Changes tabs to the number of spaces specified by n.
+n
Displays first file beginning at the line specified by n.
files
Specifies list of files to display. Separate file names with a space.
/?
Displays help at the command prompt.
Remarks
• Using more at the Recovery Console
The more command, with different parameters, is available from the Recovery Console.
• Using more subcommands
The following commands are accepted at the more prompt (-- More --).
Key Action
SPACEBAR Display next page
ENTER Display next line
f Display next file
q Quit
? Show available commands
= Show line number
p n Display next n lines
s n Skip next n lines
• Sources of data
When using the redirection character (<), you must specify a file name as the source. When using the pipe (|), you can use such commands as dir, sort, and type.
Examples
To view the file named Clients.new that you want to view on your screen, type either of the following two commands:
more < clients.new
type clients.new | more
The more command displays the first screen of information from Clients.new, and then the following prompt appears:
-- More --
You can then press the SPACEBAR to see the next screen of information.
To clear the screen and remove all extra blank lines before displaying the file Clients.new, type either of the following two commands:
more /c /s < clients.new
type clients.new | more /c /s
The more command displays the first screen of information from Clients.new, and then the following prompt appears:
-- More --
To display the file one line at a time, press ENTER.
To display the next page, press the SPACEBAR.
To display the next file listed on the command line, type f.
To quit more, type q.
Add commands to the more prompt as shown in this example:
-- More [Options: psfq=] --
To display the current line number, type =. The current line number is added to the more prompt as shown in this example:
-- More [Line: 24] --
To display a specific number of lines, type p. More prompts you for the number of lines to display as follows:
-- More -- Lines:
Type the number of lines to display and press ENTER. More displays the specified number of lines.
To skip a specific number of lines, type s. More prompts you for the number of lines to skip as follows:
-- More -- Lines:
Type the number of lines to skip, and then press ENTER. More skips the specified number of lines and displays the next screen of information.
Find
Searches for a specific string of text in a file or files. After searching the specified file or files, find displays any lines of text that contain the specified string.
Syntax
find [/v] [/c] [/n] [/i] "string" [[Drive:][Path]FileName[...]]
Parameters
/v
Displays all lines that do not contain the specified string.
/c
Counts the lines that contain the specified string and displays the total.
/n
Precedes each line with the file's line number.
/i
Specifies that the search is not case-sensitive.
"string"
Required. Specifies the group of characters that you want to search for. You must enclose string in quotation marks (that is, "string").
[Drive:][Path] FileName
Specifies the location and name of the file in which to search for the specified string.
/?
Displays help at the command prompt.
Remarks
• Specifying a string
If you do not use /i, find searches for exactly what you specify for string. For example, the find command treats the characters "a" and "A" differently. If you use /i, however, find is not case-sensitive and treats "a" and "A" as the same character.
If the string you want to search for contains quotation marks, you must use two quotation marks for each quotation mark contained within the string (that is, "StringContaining""QuotationMarks").
• Using find as a filter
If you omit a file name, find acts as a filter, taking input from the standard input source (usually the keyboard, a pipe, or a redirected file) and then displaying any lines that contain string.
• Ordering command syntax
You can type parameters and command-line options for the find command in any order.
• Using wildcards
You cannot use wildcards (that is, * and ?) in file names or extensions that you specify with the find command. To search for a string in a set of files that you specify with wildcards, you can use the find command in a for command.
• Using /v or /n with /c
If you use /c and /v in the same command line, find displays a count of the lines that do not contain the specified string. If you specify /c and /n in the same command line, find ignores /n.
• Using find with carriage returns
The find command does not recognize carriage returns. When you use find to search for text in a file that includes carriage returns, you must limit the search string to text that can be found between carriage returns (that is, a string that is not likely to be interrupted by a carriage return). For example, find does not report a match for the string "tax file" wherever a carriage return occurs between the word "tax" and the word "file."
Examples
To display all lines from Pencil.ad that contain the string "Pencil Sharpener", type:
find "Pencil Sharpener" pencil.ad
To find a string that contains text within quotation marks, you must first enclose the entire string in quotation marks. Second, you must use two quotation marks for each quotation mark contained within the string. To find "The scientists labeled their paper "for discussion only." It is not a final report." in Report.doc, type:
find "The scientists labeled their paper ""for discussion only."" It is not a final report." report.doc
If you want to search for a set of files, you can use the find command with the for command. To search the current directory for files that have the extension .bat and that contain the string "PROMPT," type:
for %f in (*.bat) do find "PROMPT" %f
To search your hard disk to find and display the file names on drive C that contain the string "CPU," use the pipe (|) to direct the results of a dir command to find as follows:
dir c:\ /s /b | find "CPU"
Because find searches are case-sensitive and dir produces uppercase output, you must either type the string "CPU" in uppercase letters or use the /i command-line option with find.
Echo
Turns the command-echoing feature on or off, or displays a message. Used without parameters, echo displays the current echo setting.
Syntax
echo [{on|off}] [message]
Parameters
{on|off}
Specifies whether to turn the command-echoing feature on or off.
message
Specifies text you want to display on the screen.
/?
Displays help at the command prompt.
Remarks
• The echo message command is useful when echo is turned off. To display a message that is several lines long without displaying other commands, you can include several echo message commands after the echo off command in your batch program.
• If you use echo off, the command prompt does not appear on your screen. To display the command prompt, type echo on.
• To prevent echoing of a line, insert an at sign (@) in front of a command in a batch program.
• To echo a blank line on the screen, type:
echo.
• To display a pipe (|) or redirection character (< or >) when you are using echo, use a caret character immediately before the pipe or redirection character (for example, ^>, ^<, or ^| ). If you need to use the caret character (^), type two (^^).
Examples
The following example is a batch program that includes a three-line message preceded by and then followed by a blank line:
echo off
echo.
echo This batch program
echo formats and checks
echo new disks
echo.
If you want to turn echo off and you do not want to echo the echo command, type an at sign (@) before the command as follows:
@echo off
You can use the if and echo commands on the same command line. For example:
if exist *.rpt echo The report has arrived.
Bootcfg
Configures, queries, or changes Boot.ini file settings.
To view the command syntax, click a command:
bootcfg addsw
Adds operating system load options for a specified operating system entry.
Syntax
bootcfg /addsw [/s Computer [/u Domain\User /p Password]] [/mm MaximumRAM] [/bv] [/so] [/ng] /id OSEntryLineNum
Parameters
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/mm MaximumRAM
Adds the /maxmem switch to the specified OSEntryLineNum and sets the maximum amount of RAM that the operating system can use.
/bv
Adds the /basevideo switch to the specified OSEntryLineNum, directing the operating system to use standard VGA mode for the installed video driver.
/so
Adds the /sos switch to the specified OSEntryLineNum, directing the operating system to display device driver names while they are being loaded.
/ng
Adds the /noguiboot switch to the specified OSEntryLineNum, disabling the Windows XP Professional progress bar that appears before the CTRL+ALT+DEL logon prompt.
/id OSEntryLineNum
Specifies the operating system entry line number in the [operating systems] section of the Boot.ini file to which the operating system load options are added. The first line after the [operating systems] section header is 1.
/?
Displays help at the command prompt.
Examples
The following examples show how you can use the bootcfg /addsw command:
bootcfg /addsw /mm 64 /id 2
bootcfg /addsw /so /id 3
bootcfg /addsw /so /ng /s srvmain /u hiropln /id 2
bootcfg /addsw /ng /id 2
bootcfg /addsw /mm 96 /ng /s srvmain /u maindom\hiropln /p p@ssW23 /id 2
bootcfg copy
Makes another operating system instance copy, for which switches can be added.
Syntax
bootcfg /copy [/s Computer [/u Domain\User /p Password]] [/d Description] [/id OSEntryLineNum]
Parameters
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/d Description
Specifies the description for the new operating system entry.
/id OSEntryLineNum
Specifies the operating system entry line number in the [operating systems] section of the Boot.ini file to copy. The first line after the [operating systems] section header is 1.
/?
Displays help at the command prompt.
Examples
The following examples show how you can use the bootcfg /copy command:
bootcfg /copy /d "\ABC Server\" /id 1
bootcfg /copy /s srvmain /u maindom\hiropln /p p@ssW23 /d "Windows XP" /id 2
bootcfg /copy /u hiropln /p p@ssW23 /d "AB Ver 1.001" /id 2
bootcfg dbg1394
Configures 1394 port debugging for a specified operating system entry.
Syntax
bootcfg /dbg1394 {ON|OFF|EDIT} [/s Computer [/u Domain\User /p Password]] [/ch channel] /id OSEntryLineNum
Parameters
ON|OFF|EDIT
Specifies the value for 1394 port debugging.
Value Description
ON Enables remote debugging support by adding the /dbg1394 switch to the specified OSEntryLineNum.
OFF Disables remote debugging support by removing the /dbg1394 switch from the specified OSEntryLineNum.
EDIT Allows changes to port and baud rate settings by changing the channel values associated with the /dbg1394 switch for the specified OSEntryLineNum.
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/ch channel
Specifies the channel to use for debugging. Valid values are integers between 1 and 64. Do not use the /ch channel parameter if 1394 port debugging is being disabled.
/id OSEntryLineNum
Specifies the operating system entry line number in the [operating systems] section of the Boot.ini file to which the 1394 port debugging options are added. The first line after the [operating systems] section header is 1.
/?
Displays help at the command prompt.
Examples
The following examples show how you can use the bootcfg /dbg1394 command:
bootcfg /dbg1394 /id 2
bootcfg /dbg1394 on /ch 1 /id 3
bootcfg /dbg1394 edit /ch 8 /id 2
bootcfg /s srvmain /u maindom\hiropln /p p@ssW23 /dbg1394 off /id 2
bootcfg debug
Adds or changes the debug settings for a specified operating system entry.
Syntax
bootcfg /debug {ON|OFF|EDIT} [/s Computer [/u Domain\User /p Password]] [/port {COM1|COM2|COM3|COM4}] [/baud {9600|19200|38400|57600|115200}] [/id OSEntryLineNum]
Parameters
ON|OFF|EDIT
Specifies the value for debugging.
Value Description
ON Enables remote debugging support by adding the /debug switch to the specified OSEntryLineNum.
OFF Disables remote debugging support by removing the /debug switch from the specified OSEntryLineNum.
EDIT Allows changes to port and baud rate settings by changing the values associated with the /debug switch for the specified OSEntryLineNum.
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/port {COM1|COM2|COM3|COM4}
Specifies the COM port to be used for debugging. Do not use the /port parameter if debugging is being disabled.
/baud {9600|19200|38400|57600|115200}
Specifies the baud rate to be used for debugging. Do not use the /baud parameter if debugging is being disabled.
/id OSEntryLineNum
Specifies the operating system entry line number in the [operating systems] section of the Boot.ini file to which the debugging options are added. The first line after the [operating systems] section header is 1.
/?
Displays help at the command prompt.
Remarks
• If 1394 port debugging is required, use bootcfg /dbg1394.
Examples
The following examples show how you can use the bootcfg /debug command:
bootcfg /debug on /port com1 /id 2
bootcfg /debug edit /port com2 /baud 19200 /id 2
bootcfg /s srvmain /u maindom\hiropln /p p@ssW23 /debug off /id 2
bootcfg default
Specifies the operating system entry to designate as the default.
Syntax
bootcfg /default [/s Computer [/u Domain\User /p Password]] [/id OSEntryLineNum]
Parameters
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/id OSEntryLineNum
Specifies the operating system entry line number in the [operating systems] section of the Boot.ini file to designate as default. The first line after the [operating systems] section header is 1.
/?
Displays help at the command prompt.
Examples
The following examples show how you can use the bootcfg /default command:
bootcfg /default /id 2
bootcfg /default /s srvmain /u maindom\hiropln /p p@ssW23 /id 2
bootcfg delete
Deletes an operating system entry in the [operating systems] section of the Boot.ini file.
Syntax
bootcfg /delete [/s Computer [/u Domain\User /p Password]] [/id OSEntryLineNum]
Parameters
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/id OSEntryLineNum
Specifies the operating system entry line number in the [operating systems] section of the Boot.ini file to delete. The first line after the [operating systems] section header is 1.
/?
Displays help at the command prompt.
Examples
The following examples show how you can use the bootcfg /delete command:
bootcfg /delete /id 1
bootcfg /delete /s srvmain /u maindom\hiropln /p p@ssW23 /id 3
bootcfg ems
Enables the user to add or change the settings for redirection of the EMS console to a remote computer. By enabling EMS, you add a "redirect=Port#" line to the [boot loader] section of the Boot.ini file and a /redirect switch to the specified operating system entry line. The EMS feature is enabled only on servers.
Syntax
bootcfg /ems {ON|OFF|EDIT} [/s Computer [/u Domain\User /p Password]] [/port {COM1|COM2|COM3|COM4|BIOSSET}] [/baud {9600|19200|38400|57600|115200}] [/id OSEntryLineNum]
Parameters
ON|OFF|EDIT
Specifies the value for EMS redirection.
Value Description
ON Enables remote output for the specified OSEntryLineNum. Adds a /redirect switch to the specified OSEntryLineNum and a redirect=comX setting to the [boot loader] section. The value of comX is set by the /port parameter.
OFF Disables output to a remote computer. Removes the /redirect switch from the specified OSEntryLineNum and the redirect=comX setting from the [boot loader] section.
EDIT Allows changes to port settings by changing the redirect=comX setting in the [boot loader] section. The value of comX is reset to the value specified by the /port parameter.
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/port {COM1|COM2|COM3|COM4|BIOSSET}
Specifies the COM port to be used for redirection. BIOSSET directs EMS to get the BIOS settings to determine which port should be used for redirection. Do not use the /port parameter if remotely administered output is being disabled.
/baud {9600|19200|38400|57600|115200}
Specifies the baud rate to be used for redirection. Do not use the /baud parameter if remotely administered output is being disabled.
/id OSEntryLineNum
Specifies the operating system entry line number to which the EMS option is added in the [operating systems] section of the Boot.ini file. The first line after the [operating systems] section header is 1. This parameter is required when the EMS value is set to ON or OFF.
/?
Displays help at the command prompt.
Remarks
• For more information on the Emergency Management Services (EMS), see Help and Support Center.
Examples
The following examples show how you can use the bootcfg /ems command:
bootcfg /ems on /port com1 /baud 19200 /id 2
bootcfg /ems on /port biosset /id 3
bootcfg /s srvmain /ems off /id 2
bootcfg /ems edit /port com2 /baud 115200
bootcfg /s srvmain /u maindom\hiropln /p p@ssW23 /ems off /id 2
bootcfg query
Queries and displays the [boot loader] and [operating systems] section entries from Boot.ini.
Syntax
bootcfg /query [/s Computer [/u Domain\User /p Password]]
Parameters
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/?
Displays help at the command prompt.
Remarks
• The following is a sample of bootcfg /query output:
• Boot Loader Settings
• --------------------
• timeout: 30
• default: multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

• Boot Entries
• ------------
• Boot entry ID: 1
• Friendly Name: "Microsoft Windows XP Professional"
• Path: multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
OS Load Options: /fastdetect /debug /debugport=com1:
• The Boot Loader Settings portion of the bootcfg query output displays each entry in the [boot loader] section of Boot.ini.
• The Boot Entries portion of the bootcfg query output displays the following detail for each operating system entry in the [operating systems] section of Boot.ini: Boot entry ID, Friendly Name, Path, and OS Load Options.
Examples
The following examples show how you can use the bootcfg /query command:
bootcfg /query
bootcfg /query /s srvmain /u maindom\hiropln /p p@ssW23
bootcfg /query /u hiropln /p p@ssW23
bootcfg raw
Adds operating system load options specified as a string to an operating system entry in the [operating systems] section of the Boot.ini file.
Syntax
bootcfg [/s Computer [/u Domain\User /p Password]] /raw OSLoadOptionsString [/id OSEntryLineNum]
Parameters
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
OSLoadOptionsString
Specifies the operating system load options to add to the operating system entry. These load options will replace any existing load options associated with the operating system entry. No validation of OSLoadOptions is done.
/id OSEntryLineNum
Specifies the operating system entry line number in the [operating systems] section of the Boot.ini file to update. The first line after the [operating systems] section header is 1.
/?
Displays help at the command prompt.
Remarks
• Bootcfg raw is used to add text to the end of an operating system entry, overwriting any existing operating system entry options. This text should contain valid OS Load Options such as /debug, /fastdetect, /nodebug, /baudrate, /crashdebug, and /sos. For example, the following command adds "/debug /fastdetect" to the end of the first operating system entry, replacing any previous operating system entry options:
bootcfg /raw "/debug /fastdetect" /id 1
• For more information about optional OS Load Options and how Windows uses the Boot.ini file during startup, see article Q170756, "Available Switch Options for Windows NT Boot.ini File," in the Microsoft Knowledge Base. (http://www.microsoft.com/)
Examples
The following examples show how you can use the bootcfg /raw command:
bootcfg /raw "/debug /sos" /id 2
bootcfg /raw /s srvmain /u maindom\hiropln /p p@ssW23 "/crashdebug " /id 2
bootcfg rmsw
Removes operating system load options for a specified operating system entry.
Syntax
bootcfg /rmsw [/s Computer [/u Domain\User /p Password]] [/mm] [/bv] [/so] [/ng] /id OSEntryLineNum
Parameters
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/mm
Removes the /maxmem switch and its associated maximum memory value from the specified OSEntryLineNum. The /maxmem switch specifies the maximum amount of RAM that the operating system can use.
/bv
Removes the /basevideo switch from the specified OSEntryLineNum. The /basevideo switch directs the operating system to use standard VGA mode for the installed video driver.
/so
Removes the /sos switch from the specified OSEntryLineNum. The /sos switch directs the operating system to display device driver names while they are being loaded.
/ng
Removes the /noguiboot switch from the specified OSEntryLineNum. The /noguiboot switch disables the Windows XP Professional progress bar that appears before the CTRL+ALT+DEL logon prompt.
/id OSEntryLineNum
Specifies the operating system entry line number in the [operating systems] section of the Boot.ini file from which the OS Load Options are removed. The first line after the [operating systems] section header is 1.
/?
Displays help at the command prompt.
Examples
The following examples show how you can use the bootcfg /rmsw command:
bootcfg /rmsw /mm 64 /id 2
bootcfg /rmsw /so /id 3
bootcfg /rmsw /so /ng /s srvmain /u hiropln /id 2
bootcfg /rmsw /ng /id 2
bootcfg /rmsw /mm 96 /ng /s srvmain /u maindom\hiropln /p p@ssW23 /id 2
bootcfg timeout
Changes the operating system time-out value.
Syntax
bootcfg /timeout TimeOutValue [/s Computer [/u Domain\User /p Password]]
Parameters
TimeOutValue
Specifies the timeout value in the [boot loader] section. The value is the number of seconds the user has to select an operating system from the boot loader screen before NTLDR loads the default. If the value is 0, then NTLDR immediately starts the default operating system without displaying the boot loader screen.
/s Computer
Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer.
/u Domain\User
Runs the command with the account permissions of the user specified by User or Domain\User. The default is the permissions of the current logged on user on the computer issuing the command.
/p Password
Specifies the password of the user account that is specified in the /u parameter.
/?
Displays help at the command prompt.
Examples
The following examples show how you can use the bootcfg /timeout command:
bootcfg /timeout 30
bootcfg /s srvmain /u maindom\hiropln /p p@ssW23 /timeout 50
Selasa, 16 Juni 2009

postheadericon hack hotspot

Yang perlu ada:
1.Laptop/notbook/tabletPC/mobil phon
2.hotspot
3.Netcut
4.instal ampe selesai programnya
5.jalanin programnya.Caranya:
1.buka program netcut
2.Tungguin splesh screen
3.setelah muncul tampilan netcut klik aja Scan Net.ntar dikolom kiri bakal
Muncul banyak IP
4.Pilih target trus klik Cut Off
5.Matiin smua smua IPnya .
Ingat juga jangan amP ketahuan orang klo anda manipulasi smua
6.trus gunain internetnya buat download n browsing sepuas
7.Trus masuk lobang

Ini juga berfungsi sbg jaringan lan
Minggu, 15 Maret 2009

postheadericon Mencegah Copy atau Cut File Dari Komputer ke Flashdisk

Disini saya memberikan sebuah tips untuk mencegah pengambilan data dari komputer
anda ke flashdisk dalam arti seseorang tidak akan bisa mengambil data dari komputer
anda untuk
dimasukkan ke flashdisk orang tersebut, tetapi anda tetap bisa mengambil data
dari flashdisk
untuk dimasukkan ke komputer anda.

Berikut langkah-langkahnya :
1. Masuk ke Regedit ( Tekan Tombol Windows+R lalu ketik regedit)
2. Masuk ke HKEY_LOCALMACHINE\SYSTEM\CurrentControlSet\Control\
3. Klik kanan pada folder Control pilih New–>Key
4. Beri nama folder baru itu dengan “StorageDevicePolicies”
5. Lalu klik kanan di folder dengan nama “StorageDevicePolicies”,
lalu pilih New–>Dword
6. Beri nama “WriteProtect”
7. Klik 2x Dword dengan nama “WriteProtect” tersebut, lalu ganti Value
Data menjadi 1
8. Restart Komputer anda

*. Untuk mengembalikan seperti semula anda tinggal mengganti Value Data dari
key “WriteProtect” menjadi 0

postheadericon Tips dan Trik Membasmi Virus

Membasmi virus tanpa antivirus? Gimana caranya tuh? Simak
langkah-langkah umum berikut dalam membasmi virus:

1.
Nonaktifkan System Restore.

Fasilitas
System Restore pada Windows berguna untuk mengembalikan konfigurasi
sistem ke konfigurasi sebelumnya. Agar sistem yang telah pulih tidak
kembali rusak, matikan fasilitas ini dengan klik kanan pada My
Computer dan pilih Properties. Lalu pilih tab System Restore dan
centang bagian Turn off System Restore on All Drive.

2.
Matikan proses virus.

Bagaimanapun
caranya, matikan proses virus. Biasanya proses virus memiliki
ikon berupa folder atau dokumen MS Word. Gunakan aplikasi seperti
Process Explorer, Pocket Killbox, Show Kill Process, The Killer
Machine, dan sebagainya.

3.
Pulihkan registry.

Pulihkan
registry yang telah diotak-atik oleh virus. Jika tidak, maka virus
dapat menginfeksi komputer Anda lagi. Gunakan Hijack This, Registry
Cleaner, atau The Killer Machine. Hapus juga entry Scheduled
Task yang dibuat oleh virus jika ada.

4.
Hapus file-file virus.

Gunakan
fasilitas Search pada Windows untuk menemukan file-file virus.

5.
Munculkan file-file yang disembunyikan virus.

Virus
pada umumnya tidak begitu kejam dengan menghapus dokumen-dokumen
kita. Biasanya file-file tersebut hanya disembunyikan. Gunakan
perintah attrib -s -h pada Command Prompt
untuk memunculkannya kembali.

6.
Saran terakhir untuk pencegahan. hati-hatilah saat melakukan transfer
data baik melalui disket, USB Flash Disk, maupun dari jaringan.
Tunjukkan file hidden dan ekstensi file pada Windows Explorer.
Selain itu, jangan mudah tergoda oleh file-file dengan nama yang
menggoyahkan iman

Sidik
Jari Virus

Virus,
dan juga file-file lain, ternyata juga memiliki sidik jari. Namanya
adalah CRC32 (Cyclic Redudancy Check). Nilai checksum
untuk CRC ini unik untuk setiap file. Dengan demikian kita dapat
mengenali apakah sebuah file merupakan virus atau bukan melalui CRC
ini. Salah satu contoh antivirus yang menggunakan teknik pengenalan
CRC ini adalah WAV yang bisa diunduh dari virologi.info/download.

postheadericon Mempercepat Proses Shutdown Pada Windows

Mungkin anda pernah mengalami proses shutdown yang begitu lama pada saat anda ingin mematikan komputer anda. Memang proses shutdown yang memakan waktu begitu lama akan sangat menjengkelkan bagi kita dan terlebih lagi jika kita memang ingin segera mematikan komputer tersebut karena ada pekerjaan yang lain.
Berikut ada beberapa teknik yang bisa digunakan untuk mempercepat proses shutdown windows anda yaitu dengan cara memodifikasi beberapa registry pada windows anda.

1. Digunakan untuk menutup semua aplikasi pada saat shutdown (auto kill ).
- Masuk ke registry editor anda ( Start –> Run –> Ketik regedit )
- Masuk ke registry berikut
HKEY_CURRENT_USER\Control Panel\Desktop
- Cari key dengan nama “AutoEndTasks” dan klik kanan key tersebut lalu pilih Modify, ubah Value Data menjadi 1.

2. Digunakan untuk merubah waktu menutup suatu aplikasi jika ada aplikasi yang Hang.
- Masuk ke registry editor anda ( Start –> Run –> Ketik regedit )
- Masuk ke registry berikut
HKEY_CURRENT_USER\Control Panel\Desktop
- Cari key dengan nama “WaitToKillAppTimeout” dan “HungAppTimeout”.
- Klik kanan masing-masing key tersebut lalu pilih Modify dan ubah Value Data menjadi 1000.

3. Digunakan untuk menonaktifkan fasilitas Clearing Paging File.
Sebelum menggunakan langkah ini anda bisa lihat apa kegunaan paging file disini http://en.wikipedia.org/wiki/Paging_file.
- Masuk ke registry editor anda ( Start –> Run –> Ketik regedit )
- Masuk ke registry berikut
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager\Memory Management
- Cari key dengan nama “ClearPageFileOnShutdown”.
- Klik kanan key tersebut lalu pilih Modify dan ubah Value Data menjadi 0 jika Value Data belum sama dengan 0.

Semoga Bermanfaat

postheadericon Mempercepat Proses Shutdown Pada Windows

Mungkin anda pernah mengalami proses shutdown yang begitu lama pada saat anda ingin mematikan komputer anda. Memang proses shutdown yang memakan waktu begitu lama akan sangat menjengkelkan bagi kita dan terlebih lagi jika kita memang ingin segera mematikan komputer tersebut karena ada pekerjaan yang lain.
Berikut ada beberapa teknik yang bisa digunakan untuk mempercepat proses shutdown windows anda yaitu dengan cara memodifikasi beberapa registry pada windows anda.

1. Digunakan untuk menutup semua aplikasi pada saat shutdown (auto kill ).
- Masuk ke registry editor anda ( Start –> Run –> Ketik regedit )
- Masuk ke registry berikut
HKEY_CURRENT_USER\Control Panel\Desktop
- Cari key dengan nama “AutoEndTasks” dan klik kanan key tersebut lalu pilih Modify, ubah Value Data menjadi 1.

2. Digunakan untuk merubah waktu menutup suatu aplikasi jika ada aplikasi yang Hang.
- Masuk ke registry editor anda ( Start –> Run –> Ketik regedit )
- Masuk ke registry berikut
HKEY_CURRENT_USER\Control Panel\Desktop
- Cari key dengan nama “WaitToKillAppTimeout” dan “HungAppTimeout”.
- Klik kanan masing-masing key tersebut lalu pilih Modify dan ubah Value Data menjadi 1000.

3. Digunakan untuk menonaktifkan fasilitas Clearing Paging File.
Sebelum menggunakan langkah ini anda bisa lihat apa kegunaan paging file disini http://en.wikipedia.org/wiki/Paging_file.
- Masuk ke registry editor anda ( Start –> Run –> Ketik regedit )
- Masuk ke registry berikut
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager\Memory Management
- Cari key dengan nama “ClearPageFileOnShutdown”.
- Klik kanan key tersebut lalu pilih Modify dan ubah Value Data menjadi 0 jika Value Data belum sama dengan 0.

Semoga Bermanfaat

postheadericon Merubah Nama Processor Komputer Anda.

Ini bisa anda gunakan jika anda ingin mengelabui seseorang agar mengira komputer anda adalah Pentium 4, tetapi padahal komputer anda adalah pentium 2 atau 3.
Caranya sebagai berikut :
1. Masuk ke registry editor anda ( Start –> Run –> Ketik regedit )
2. Masuk ke registry berikut
HKEY_LOCAL_MACHINE\HARDWARE\DISCRIPTION\System\CentralProcessor\
atau
HKEY_LOCAL_MACHINE\HARDWARE\DISCRIPTION\System\CentralProcessor\0\
atau
HKEY_LOCAL_MACHINE\HARDWARE\DISCRIPTION\System\CentralProcessor\1\
3. Cari key dengan nama “ProcessorNameString”
4. Klik kanan key tersebut lalu pilih Modify dan ubah Value Data tersebut sesuai keinginan anda (Contoh : Intel Pentium 4).

Sekarang anda bisa melihat perubahannya di System Properties anda (klik kanan icon My Computer dan pilih Properties ).
Jumat, 13 Maret 2009

postheadericon hacking fs

Dalam artikel saya sebelumnya mengenai Friendster palsu, teknik yang digunakan untuk me-redirect suatu profile dari Friendster adalah dengan menggunakan flash. Sekarang saya ingin memberikan contoh bagaimana kita me-redirect profile Friendster seseorang menuju URL yang kita inginkan. Pertama kita buat script flash sederhana seperti kode dibawah ini. Untuk yang menggunakan linux, install Ming package terlebih dahulu. Ming adalah library yang dapat menghasilkan file Macromedia Flash (.swf). Jika anda menggunakan ubuntu dan belum menginstall, jalankan perintah berikut :

apt-get install libming-util

Jika Ming berhasil diinstal, buat sebuah file dengan editor anda yang berisi kode berikut dan simpan dengan nama flash.as :

getURL("http://www.contoh.com");

misalkan seperti berikut :

getURL("http://chaidir.wordpress.com");

Setelah itu buat file flash (.swf) dengan menjalankan perintah berikut :

chaidir@osxbuntu:~$ /usr/lib/libming/bin/makeswf flash.as

Jika berhasil, maka akan dihasilkan file Flash bernama out.swf. File ini ketika diakses dari browser, akan me-redirect ke URL yang kita definisikan sebelumnya. Contohnya silahkan akses flash yang telah saya buat disini. Apabila anda mengakses url tersebut, maka anda langsung ‘diarahkan’ menuju http://chaidir.wordpress.com.

Selanjutnya upload file flash tadi (out.swf) ke tempat yang mudah diakses. Misalkan di http://numpang.com/out.swf. Setelah itu, kirim testimonial ke orang yang ingin di berikan testimonial dengan memasukkan file flash ini.

Jangan mengirimkan testimonial ini keteman anda, karena profile teman anda tidak akan bisa diakses!

Caranya masukkan kode berikut :




Untuk mencoba apakah testimonial ini berhasil, klik priview. Agar sang penerima testimonial bisa meng-approve testimonial, hapus ganti file flash tadi terlebih dahulu (http://numpang.com/out.swf) dengan flash animasi yang menarik perhatian. Misalnya dengan flash dari Babaflash Forum. Baru setelah di approve, aktifkan ganti lagi (upload lagi) dengan file flash tadi.

Nah, dalam contoh kasus di Friendster palsu, sang cracker me-redirect setiap user yang ingin melihat profile yang sudah disusupi flash tadi dan mengarahkannya ke http://www.friendster.co.nr. Dan celakanya disitu dibuat halaman yang menyerupai halaman login Friendster dan seolah-olah terjadi kesalahan yang mengharuskan setiap user memasukkan email dan passwordnya.

‘Fasilitas’ untuk mengirimkan testimonial di Friendster inilah yang dimanfaatkan cracker untuk ‘mengelabuhi’ orang-orang yang sering bermain-main dengan Friendster. Oleh karena itu, berhati-hatilah terhadap testimonial yang menggunakan flash. Jika mendapatkan testimonail dari orang yang tidak dikenal (emang bisa ya?) atau flash yang ngga penting, lebih baik tidak usah di approve aja.

Pesan buat anak2 ABG pecinta Friendster :

Dan buat anak2 ABG yang sering ke warnet hanya untuk ber-Friendster ria.. apakah tidak ada aktivitas lain di internet selain ber-Friendsteran?! Sangat sayang sekali jika kamu ke warnet cuman liat cowo2 ato cewe2 yang friendsterGenic (keren di friendster doang!) Mendingan belajar cari informasi yang menarik atau belajar apapun dari Internet. Atau lebih baik lagi klo kamu buat buat blog sendiri. Selain belajar nulis, kamu kan juga bisa nambah temen baru. Rugi loh klo bayar 3000 - 4000 perak cuman buat ngeliat Friendster doang, mendingan buat beli bakso!

Referensi :

http://ezinearticles.com/?Redirect-Your-MySpace-Traffic-With-Flash&id=364276

Sekilas info :

ternyata http://www.friendster.co.nr dah diubah toh… hihihi :-D . Maaf ya kk.. dah publish ‘karya’ kamu :-D
Senin, 12 Januari 2009

postheadericon Install Radhat berbasis text



Masukkan cd Radhat
Setalah ada tampilan instalasi Ketik text lalu enter
Menu test cd skip
Pada menu welcome OK
Language English
Keyboard US
Mouse wheel mouse (ps/2)(*)emulate 3botons
Instalationtipe SERVER
Disk partition diskdruit
Buat:/dev/hdd1 ext3 /boot
/ dev/hdd2 ext3 /
/ dev/hdd3 swap(swap ini lebih baik ukurannya lebih dr RAM karena ini adalah memoritambahanyang ada pada hardisk)
Boot loader (*)lilo ok
Boot loader (kosongkan semua) ok
Boot loader ok
Boot loader (*) (MBR)
Network config:( )us boot p/dhcp
Isi ip sesuai yang tlah diberikan oleh pemberi ip yang lebih tinggi
Firwoll ok
Language English Usa ok
Time zone Asia/Jakarta
Isi root password minimal 6 digit
Pilih pakec group yang akan diinstal
Pilih pakec yang akan diinstal (*) instal pakeges to statisfy dependencies ok
Istalations to begin ok
Bila cd 1 keluar  ganti dengan cd 2, Bila cd 2keluar ganti dengan cd 3
Boot disket No
Complete ok
Cd akan keluar
Computer akan restart dan selesai

postheadericon Free Web Hosting Gratis yang Full Fitur

Free Web Hosting Gratis yang Full Fitur

free web hosting

Free hosting merupakana salah satu incaran para newbie yang ingin belajar membuat web. Dengan free hosting kita nggak perlu dipusingkan dengan biaya bulanan dan bandwidth hosting yang habis. Memang banyak web hosting yang memberikan layanan hosting gratis, tapi dengan kapasitas bandwidth dan disk space yang terbatas dan iklan yang berjejal.

Kemarin saya coba searching “free hosting” di google dan dapat free hosting yang keren banget fiturnya, Webhost. Free hosting ini memberikan layanan yang nggak tanggung-tanggung lho. Bandwidht 100GB, disk space 250 MB, unlimited domains, POP3 de el el. Pingin lihat feature lengkapnya ?


Feature

* 250 MB of Disk Space
* 100 GB Bandwidth!
* Host your own domain
* cPanel Powered Hosting
* Host unlimited domains!
* Over 500 website templates
* Free POP3 Email Box
* Enjoy unrestricted POP3 email
* Webmail access
* FTP and Web based File Manager access
* Unrestricted PHP with MySQL
* No-ads (nggak ada iklannya)

So, buat yang ingin belajar membuat website atau install CMS seperti wordpress dan joomla di hosting, sepertinya Webhost memang ok tuh untuk level hosting gratisan.

Biasanya untuk hosting gratisan kan pasti ada embel-embel nama hostingnya, biar nggak terlalu terlihat pakai aja domain forwarding yang gratis :D

Update:
Ada domain yang benar-benar gratis dan kita bisa setting DNS nya dan bisa forward domain.
Amat Sugy. Diberdayakan oleh Blogger.

Pengikut

WEB TUTORIALS

Related Websites

About Me

Foto Saya
amat sugy
gambar berikut adalag logo dari blog kami
Lihat profil lengkapku