• Recent Post

  • RSS R o o t s e c u r e

    • BlackBerry to acquire German firm Secusmart
      BlackBerry is buying privately held German firm Secusmart which specialises in voice and data encryption, in a bid to improve its credentials security as part of its strategy to target specific industries and niches. Secusmart specialises in encryption and anti-eavesdropping services for public sector, enterprise and telecommunications service providers.Tags […]
    • Former NSA director will file "at least" 9 patents to detect malicious hackers
      In an interview Monday with former National Security Agency Director General Keith Alexander, Foreign Policy's Shane Harris learned that Alexander plans to file “at least” nine patent applications—“and possibly more"—pertaining to technology for detecting network intruders.Tags: SecurityIndustry News […]
    • New "Fake ID" exploit allows new types of Malware on Android?
      A new Android design error discovered by Bluebox Security allows malicious apps to grab extensive control over a user's device without asking for any special permissions at installation. The problem affects virtually all Android phones sold since 2010. Bluebox calls the flaw "Fake ID" because it allows malware apps to pass fake credentials to […]
    • Microwave hacked into weapon, used to blow up a stereo
      There are some things in this world you're better off not trying, and dismantling a microwave to make a stick-mounted weapon is probably one of them. Still, as with all things, someone somewhere will eventually try it, as was the case with the person(s) behind Kreosan. Kreosan is the YouTube handle of a young Russian man who, featured in the video below […]
    • How do hackers breach institutions like Canada's NRC?
      Cyberattacks like the one against the National Research Council of Canada are increasing around the world. But by knowing the steps hackers would use for a sophisticated attack, security experts try to gain the upper hand. "Sometimes in breaches, companies call it a 'highly sophisticated cyberattack' (as the Government of Canada's chief t […]
    • US senator seeks strong curbs on NSA metadata collection
      A new Senate proposal to curb the government's bulk collection of Americans' telephone records and increase transparency about the program has White House backing, and may get more traction with critics who have dismissed other bills as too weak. Democrat senator Patrick Leahy, chairman of the Senate Judiciary Committee, introduced the legislation […]
    • Satya Nadella sounds the alarm, literally, to kick-off Microsoft hackathon
      Satya Nadella is pushing a lot of change across the Microsoft org and a new event is kicking off this week called //OneWeek. The week is dedicated to updating the employees on the corporate mission, boosting morale and holding one massive hackathon. The hackathon kicked off today and we have gathered images from the event that offers a peek inside the world […]
    • Amazon opens 3D printing store, sells customizable stuff
      Amazon has sure come a long way from their roots as an online bookstore. They've since expanded to sell everything from music to groceries and everything in between. The company even produces their own hardware now, including the Fire Phone and the set-top Fire TV, expanding into almost every aspect of what a customer may want to purchase.Tags: AmazonIn […]
    • Chinese authorities announce Microsoft anti-monopoly investigation
      Microsoft Corp appears to be the latest U.S. company targeted by China for antitrust investigation as government officials paid sudden visits to the software firm's Chinese offices on Monday. Representatives from China's State Administration for Industry & Commerce, which is responsible for enforcing business laws, made the visits to Microsoft […]
    • About those alleged backdoors in Microsoft products...
      Scott Charney, of Microsoft's Trustworthy Computing, said the government has "never" asked for a backdoor in Microsoft products. Yet a former engineer working on BitLocker claimed the government does ask, but those requests are “informal.”Tags: MicrosoftSecurity […]

Cyrus Rico

.::Everything Must Be Share::.

Cara Membuat Jaringan LAN

kali ini saya ingin membahas tentang cara membuat JARINGAN LAN .Apabila sobat di rumah mempunyai komputer lebih dari satu, dan masing-masing komputer ingin terhubung antara satu dengan yang lainnnya supaya bisa sharing data, printer, sharing koneksi internet dll, kita bisa lakukan dengan membuat jaringan komputer LAN ( Local Area Network ) sederhana..

Kalau pada postingan yang lalu digunakan koneksi adhoc wireless, pada postingan kali ini kita gunakan koneksi kabel yaitu menggunakan kabel data UTP (Unshielded twisted pair), yaitu standard kabel untuk koneksi jaringan LAN.
Komputer yang dipakai pada saat ini umumnya sudah dilengkapi denganLAN Card atau disebut juga NIC (Network Interface Controller), atauEthernet Card.

• Kalau jumlah komputer yang akan dikoneksikan hanya dua buah, kita hanya cukup menyediakan satu buah kabel UTP dengan panjang sesuai jarak antara komputernya yang di kedua ujung kabelnya telah dipasangi konektor RJ-45(standard konektor untuk kabel LAN UTP) dengan konfigurasi Cross/ silang.

• Kalau Jumlah komputer yang akan dikoneksikan lebih dari 2 buah, maka kita harus menambahkan suatu alat yang bernama Switch atau Hub. Pada saat ini harga sebuah switch untuk standard rumahan sudah sangat terjangkau .
Dari masing – masing komputer dihubungkan ke switch menggunakan kabel UTP dengan konektor RJ-45 di kedua ujungnya dengan konfigurasiStraight/lurus.

• Pemasangan konektor pada kabel UTP bisa dibuat sendiri, tetapi untuk mudahnya sobat tinggal pergi saja ke toko komputer yang juga menyediakan peralatan jaringan, dan tinggal bilang untuk membeli kabel UTP sekalian pasangkan konektornya dengan konfigurasi cross/silang untuk koneksi komputer ke komputer(dua buah komputer), ataustraight/lurus untuk koneksi lebih dari 2 komputer /menggunakan switch.



Konfigurasi Alamat IP (Internet Protocol / TCP IP )
Agar dapat saling berkomunikasi , masing – masing komputer harus diberi alamai IP

• Masuk ke Network Connection (Start–>Control Panel –>Network Connection )
• Pilih/dobel klik Local Area Connection
• Dobel klik pada Internet Protocol (TCP / IP)
• Klik Use The following IP address, kemudian isi IP address dan subnet Mask
Misal,
komputer1 IP Address : 192.168.0.1
komputer2 IP Address : 192.168.0.2
komputer3 IP Address : 192.168.0.3
komputer4 IP Address : 192.168.0.4
dst..
Subnet Mask harus sama : 255.255.255.0

Untuk mengetahui berhasil tidaknya koneksi lakukan perintah ping dari komputer satu ke komputer lainnya
Misal dari komputer1 ke komputer2 :
• Di Komputer1 : Klik Start –>Klik Run–>ketik CMD –> klik OK, maka akan tampil Command Prompt
• Ketik ping 192.168.0.2 tekan enter
harus ada Reply dari komputer2
•Lakukan perintah yang sama untuk mengetahui koneksi ke komputer yang lainnya.

Semoga Bermanfaat

sumber : http://komputertipstrik.blogspot.com

Categories: Jaringan