• Recent Post

  • RSS R o o t s e c u r e

    • Heartbleed behind massive healthcare data breach
      Further details are emerging on the massive data breach at US hospital operator Community Health Systems (CHS) that saw around 4.5 million patient records being leaked. Security vendor TrustedSec claimed yesterday that the "Heartbleed" in the open source cryptographic library was to blame for the data breach.Tags: HeartbleedSecurityIndustry News […]
    • This 16-Year-Old Wants To Make Email More Secure Than Ever
      In the next two weeks, Abe Storey is aiming to launch his latest startup, an email product called Lock Up Mail. He’s on a self-imposed time crunch, because after that, he’s starting his junior year of high school. “In its most simple form, locked Up Mail is two things. One, it’s super secure email. The other is a new authentication system,” Storey told Busin […]
    • Apple preps final non-security OS X Mavericks update
      Apple is working its way toward releasing OS X Mountain Lion 10.9.5, very likely the last non-security update for the 10-month old operating system. Apple issued a new build of the beta of 10.9.5 yesterday, according to 9to5Mac.com. The build, the fourth in a series for 10.9.5, was identified as “13F18.”Tags: AppleOS X […]
    • UPS now the third company in a week to disclose data breach
      Credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 states this year may have been compromised as the result of an intrusion into the company's networks. In a statement Wednesday, UPS said it was recently notified by law enforcement officials about a "broad-based malware intrusion" of […]
    • Twitter suspends accounts sharing beheading images
      Twitter CEO Dick Costolo announced Wednesday that the social network was suspending all accounts that posted images from the appalling video allegedly showing the beheading of photojournalist James Foley. "We have been and are actively suspending accounts as we discover them related to this graphic imagery. Thank you," Costolo tweeted.Tags: Twitter […]
    • Scientists find traces of sea plankton on ISS surface
      An experiment of taking samples from illuminators and the ISS surface has brought unique results, as scientists had found traces of sea plankton there, the chief of an orbital mission on Russia’s ISS segment told reporters.Tags: Science […]
    • So why isn't there more app store competition?
       When consumers want to download applications on their smartphones and tablets, it's usually Google or Apple that's assigned the role of gatekeeper. But is that the way it has to be? Verizon on Wednesday denied a report by The Information that the carrier is prepping an app store for devices running Google's Android operating system.Tags: Indu […]
    • Smartphone Kill Switch, Consumer Boon Or Way For Government To Brick Your Phone?
      We're often told that having a kill switch in our mobile devices - mostly our smartphones - is a good thing. At a basic level, that's hard to disagree with. If every mobile device had a built-in kill switch, theft would go down. Who'd waste their time over a device that probably won't work for very long?Tags: Industry News […]
    • Hackers broke into Malaysian Department of Civil Aviation ONE DAY after MH370 incident
      The computers of high-ranking officials in agencies involved in the MH370 investigation were hacked and classified information was stolen. The stolen information was allegedly being sent to a computer in China before CyberSecurity Malaysia – a Ministry of Science, Technology and Innovation agency – had the transmissions blocked and the infected machines shut […]
    • Think crypto hides you from spooks on Facebook? THINK AGAIN
      Activists just got another reason to worry about what spooks might be able to learn about them, with boffins demonstrating that a decent traffic fingerprint can tell an attacker what's going on, even if an app is defended by encryption. The researchers from the Universities of Padua and Rome have found that for activities like posting messages on a frie […]

Cyrus Rico

.::Everything Must Be Share::.

Cara Membuat Jaringan LAN

kali ini saya ingin membahas tentang cara membuat JARINGAN LAN .Apabila sobat di rumah mempunyai komputer lebih dari satu, dan masing-masing komputer ingin terhubung antara satu dengan yang lainnnya supaya bisa sharing data, printer, sharing koneksi internet dll, kita bisa lakukan dengan membuat jaringan komputer LAN ( Local Area Network ) sederhana..

Kalau pada postingan yang lalu digunakan koneksi adhoc wireless, pada postingan kali ini kita gunakan koneksi kabel yaitu menggunakan kabel data UTP (Unshielded twisted pair), yaitu standard kabel untuk koneksi jaringan LAN.
Komputer yang dipakai pada saat ini umumnya sudah dilengkapi denganLAN Card atau disebut juga NIC (Network Interface Controller), atauEthernet Card.

• Kalau jumlah komputer yang akan dikoneksikan hanya dua buah, kita hanya cukup menyediakan satu buah kabel UTP dengan panjang sesuai jarak antara komputernya yang di kedua ujung kabelnya telah dipasangi konektor RJ-45(standard konektor untuk kabel LAN UTP) dengan konfigurasi Cross/ silang.

• Kalau Jumlah komputer yang akan dikoneksikan lebih dari 2 buah, maka kita harus menambahkan suatu alat yang bernama Switch atau Hub. Pada saat ini harga sebuah switch untuk standard rumahan sudah sangat terjangkau .
Dari masing – masing komputer dihubungkan ke switch menggunakan kabel UTP dengan konektor RJ-45 di kedua ujungnya dengan konfigurasiStraight/lurus.

• Pemasangan konektor pada kabel UTP bisa dibuat sendiri, tetapi untuk mudahnya sobat tinggal pergi saja ke toko komputer yang juga menyediakan peralatan jaringan, dan tinggal bilang untuk membeli kabel UTP sekalian pasangkan konektornya dengan konfigurasi cross/silang untuk koneksi komputer ke komputer(dua buah komputer), ataustraight/lurus untuk koneksi lebih dari 2 komputer /menggunakan switch.



Konfigurasi Alamat IP (Internet Protocol / TCP IP )
Agar dapat saling berkomunikasi , masing – masing komputer harus diberi alamai IP

• Masuk ke Network Connection (Start–>Control Panel –>Network Connection )
• Pilih/dobel klik Local Area Connection
• Dobel klik pada Internet Protocol (TCP / IP)
• Klik Use The following IP address, kemudian isi IP address dan subnet Mask
Misal,
komputer1 IP Address : 192.168.0.1
komputer2 IP Address : 192.168.0.2
komputer3 IP Address : 192.168.0.3
komputer4 IP Address : 192.168.0.4
dst..
Subnet Mask harus sama : 255.255.255.0

Untuk mengetahui berhasil tidaknya koneksi lakukan perintah ping dari komputer satu ke komputer lainnya
Misal dari komputer1 ke komputer2 :
• Di Komputer1 : Klik Start –>Klik Run–>ketik CMD –> klik OK, maka akan tampil Command Prompt
• Ketik ping 192.168.0.2 tekan enter
harus ada Reply dari komputer2
•Lakukan perintah yang sama untuk mengetahui koneksi ke komputer yang lainnya.

Semoga Bermanfaat

sumber : http://komputertipstrik.blogspot.com

Categories: Jaringan