• Recent Post

  • RSS R o o t s e c u r e

    • Verizon: Espionage hacking grows, with more from east Europe
      Hacking for espionage purposes is sharply increasing, with groups or national governments from Eastern Europe playing a growing role, according to one of the most comprehensive annual studies of computer intrusions. Spying intrusions traced back to any country in 2013 were blamed on residents of China and other East Asian nations 49 percent of the time, but […]
    • Google to refund buyers of 'fake' anti-virus app
      Google has decided that a smallish (for The Chocolate Factory) wad of cash is a trivial price to pay for maintaining its reputation, and has begun refunding punters who fell for the fake “virus shield” scam. Uncovered by Android Police earlier this month, the fake virus scanner was nothing more than an icon that changed shape when a user tapped it. The app h […]
    • Active malware campaign steals Apple passwords from jailbroken iPhones
      Security researchers have uncovered an active malware campaign in the wild that steals the Apple ID credentials from jailbroken iPhones and iPads.Tags: AppleiPhoneSecurity […]
    • Digging for answers: The "strong smell" of fraud from one Bitcoin miner maker
      For many crypto-minded libertarians, Bitcoin is the future of money. But that dream hasn't been helped much by the numerous high-profile legal cases involving the currency in recent years: The Bitcoin Savings and Trust hedge fund collapsed; uncertainty fueled the implosion of Mt. Gox, the currency's largest exchange; and the high-profile Silk Road […]
    • Former GitHub CEO leaves the company
      Tom Preston-Werner — founder of the immensely popular social coding site GitHub and its most prominent executive — has left the company in the wake of widely publicized sexual harassment investigation. GitHub, a tech-industry darling whose coding software is used by millions of developers worldwide, launched the investigation last month after one of the comp […]
    • 12 ethical dilemmas gnawing at developers today
      The tech world has always been long on power and short on thinking about the ramifications of this power. If it can be built, there will always be someone who will build it without contemplating a safer, saner way of doing so, let alone whether the technology should even be built in the first place. The software gets written. Who cares where and how it' […]
    • Even the most secure cloud storage may not be so secure, study finds
      Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are.Tags: cloudSecurity […]
    • Most but not all sites have fixed Heartbleed flaw
      The world's top 1,000 websites have been patched to protect their servers against the "Heartbleed" exploit, but up to 2% of the top million were still vulnerable as of last week, according to a California security firm. On Thursday, Menifee, Calif.-based Sucuri Security scanned the top 1 million websites as ranked by Alexa Internet, a subsidia […]
    • Six clicks: Top six camera phones compared
      It's difficult to judge the camera capture capability of most high-end phones today because with the right lighting and setup you can capture great photos with nearly all of them. I took the latest and greatest phones out for a spin this weekend and tried to see if any device stood out from the rest. I took photos using the Samsung Galaxy S5, Apple iPho […]
    • Aereo analysis: Cloud computing at a crossroads
      The question of whether online broadcast television is to remain in the hands of a stodgy industry that once declared the VCR the enemy is being put directly before the Supreme Court. Broadcasters' latest legal target is 2-year-old upstart Aereo—which retransmits over-the-air broadcast television using dime-sized antennas to paying consumers, who can wa […]

Cyrus Rico

.::Everything Must Be Share::.

Cara Membuat Jaringan LAN

kali ini saya ingin membahas tentang cara membuat JARINGAN LAN .Apabila sobat di rumah mempunyai komputer lebih dari satu, dan masing-masing komputer ingin terhubung antara satu dengan yang lainnnya supaya bisa sharing data, printer, sharing koneksi internet dll, kita bisa lakukan dengan membuat jaringan komputer LAN ( Local Area Network ) sederhana..

Kalau pada postingan yang lalu digunakan koneksi adhoc wireless, pada postingan kali ini kita gunakan koneksi kabel yaitu menggunakan kabel data UTP (Unshielded twisted pair), yaitu standard kabel untuk koneksi jaringan LAN.
Komputer yang dipakai pada saat ini umumnya sudah dilengkapi denganLAN Card atau disebut juga NIC (Network Interface Controller), atauEthernet Card.

• Kalau jumlah komputer yang akan dikoneksikan hanya dua buah, kita hanya cukup menyediakan satu buah kabel UTP dengan panjang sesuai jarak antara komputernya yang di kedua ujung kabelnya telah dipasangi konektor RJ-45(standard konektor untuk kabel LAN UTP) dengan konfigurasi Cross/ silang.

• Kalau Jumlah komputer yang akan dikoneksikan lebih dari 2 buah, maka kita harus menambahkan suatu alat yang bernama Switch atau Hub. Pada saat ini harga sebuah switch untuk standard rumahan sudah sangat terjangkau .
Dari masing – masing komputer dihubungkan ke switch menggunakan kabel UTP dengan konektor RJ-45 di kedua ujungnya dengan konfigurasiStraight/lurus.

• Pemasangan konektor pada kabel UTP bisa dibuat sendiri, tetapi untuk mudahnya sobat tinggal pergi saja ke toko komputer yang juga menyediakan peralatan jaringan, dan tinggal bilang untuk membeli kabel UTP sekalian pasangkan konektornya dengan konfigurasi cross/silang untuk koneksi komputer ke komputer(dua buah komputer), ataustraight/lurus untuk koneksi lebih dari 2 komputer /menggunakan switch.



Konfigurasi Alamat IP (Internet Protocol / TCP IP )
Agar dapat saling berkomunikasi , masing – masing komputer harus diberi alamai IP

• Masuk ke Network Connection (Start–>Control Panel –>Network Connection )
• Pilih/dobel klik Local Area Connection
• Dobel klik pada Internet Protocol (TCP / IP)
• Klik Use The following IP address, kemudian isi IP address dan subnet Mask
Misal,
komputer1 IP Address : 192.168.0.1
komputer2 IP Address : 192.168.0.2
komputer3 IP Address : 192.168.0.3
komputer4 IP Address : 192.168.0.4
dst..
Subnet Mask harus sama : 255.255.255.0

Untuk mengetahui berhasil tidaknya koneksi lakukan perintah ping dari komputer satu ke komputer lainnya
Misal dari komputer1 ke komputer2 :
• Di Komputer1 : Klik Start –>Klik Run–>ketik CMD –> klik OK, maka akan tampil Command Prompt
• Ketik ping 192.168.0.2 tekan enter
harus ada Reply dari komputer2
•Lakukan perintah yang sama untuk mengetahui koneksi ke komputer yang lainnya.

Semoga Bermanfaat

sumber : http://komputertipstrik.blogspot.com

Categories: Jaringan