Breaking News

Tuesday, 3 February 2015

Using CloudFlare and WordPress

By on 11:18
Using the service cloudflare, what cloudflare tu? cloudflare is there that provide free services for website owners, Grati tis,,,,,, tis good guns tuh. Imagine now has thousands of websites menguunakan already stout cms wordpress and also the use of a CDN cloudflare to make their sites faster and more secure. Easy to use Cloudflare's CDN services, it was not until 10 minutes in fact we've been able to use a CDN service Cloudflare. To use the CDN service Cloudflare you can follow Lakah -langkan use Cloudflare services. for use within your own use Cloudflare CDN service on the website using the WordPress CMS. and want to optimize the use of CDN services Cloudflare to mempercepa t website and more mengamanannya, let us discuss the steps - his steps.

# 1

install the plugin cloudflare. can be downloaded at wordpress.org

note: if you want to use the plugin CDN cloudflare, do not use traditional plugin W3 Total Cache or the like.

# 2

To secure the wp-admin and wp-login page you can add the rule under the "settings".

example:

* namadomain.com / wp-admin / *

* namadomain.com / wp-login / *

# 3

frequently - often the one seeing the threat control and ip address whitelist. Here you can meliha status of your website, how often you use an ip address to login to your website. add the ip address that you frequently use to access the website IP whitelist menu.

note: the heart - the heart if you want to block ip address, so you can even block engine crawlers.

# 4

At the first sign serv CDN Cloudflare high service.

# 5

If you use a service like using .htaccess files do not try Cloudflare IP range is blocked.



Hopefully this artike useful to you. thank you.

Wednesday, 4 June 2014

Cyber Threat

By on 04:23
Cyber Threat
As it is a valuable item , certainly accompanied also with a number of interested parties to " have it " . Jewelry , for example , are often hunted man to be owned because its value is gradually increasing ( read : a worthwhile investment ) . But there are also those who want to have it in ways that evil , like to steal , rob , and even took it out of legitimate ownership . Similarly same thing happen to the internet . Increasing the value of the virtual world , the more the accompanying threats . The first threat in the form of a desire or a group of people and those who want to take a wide range of property or valuable goods traded or exchanged on the internet . Starting from the things that directly represent financial resources , such as digital cash , debit card value , wealth in bank accounts , the number of credit card bills , and so forth - to intangible entity that has a certain strategic value as intelligence data , bank account passwords , confidential information consumers , and others . The second threat in the form of bad guys intent is to make the Internet does not operate normally , or in other words, trying to make the mall a function on the internet . The hope is that an interruption in the process of trading , the activity of access to information, administrative procedures , and so forth . As more and more aspects of life are dependent on the internet , then this disorder can result in prolonged chaos . The third threat in the form of an effort to make modifications to the data or information flowing on the Internet for purposes destructive , such as defamatory , misleading , pitting , destroying the image , deceptive , and others . For nations that are physically and ideologically at war , the ways mentioned above is the activity of " war " everyday that can occur in cyberspace . The fourth threat in the form of the individual 's will to spread the wrong things to the whole population in the world , such as : schools - schools that are misleading , pornographic images and media , information supporting acts of terrorism , offer gambling activities , ways of doing evil in disguise , and so forth . Threats fifth or final form of the distribution and planting malicious programs ( read : malicious software) to computers connected to the internet with the intention that Berane - wide , ranging from non- destructive - such as the display is not diiginkan , disrupt the function letters on the board press ( read : keyboard ) , no operation of input-output equipment , etc. - until that is very destructive , such as deleting the contents on the hard disk , retrieve data without the owner's knowledge , spy on user activity , tie up the computer or better known as " hang " , degrading the performance of the processor speed , and other things that are very detrimental . The following information shows how terrible threats that exist in the virtual world today . For example , there is a site that sells 29,000 individual email addresses at a price of five dollars ; while there are other sites that only with the $ 300 can provide information related to bank accounts of individuals who have the money on the 100 million dollars ; or a site that offers services site damage ( read : website ) with rates range from three to five dollars per site. Overall this threat is a threat or a natural thing because of the high value of the Internet as described previously . Therefore , anyone with internet users , let vigilant and be wary of the risks accompanying threats .In addition, no information technology designed perfectly so free from insecurity ( read : vulnerabilities ) . Reports from various research institutions and Internet watchdog showed that latency to application programs ( read : software ) are increasingly growing quantity and quality. This is in line with the growing number and complexity of the number of incidents that occurred in the virtual world as a result of the exploitation of these vulnerabilities by parties who are not responsible . In short, in line with the information technology applications beneficial to mankind , also increased intrinsic risk contained in it ( read : embedded risk) . Mitigate against these risks - in the sense of reducing the high probability of exploitation on the threat , or at least reduce the impact of losses caused by the incident is not terindahkan - is a wise thing to do by everyone .

Cyber Space

By on 04:22
The Internet has become an indispensable part of today's modern society . Even for the generation born after 1995, the Internet has created a world of its own in place of the earth like a human being . In this virtual world , through a wide range of information and communication technology equipment , individuals and groups interact , exchange ideas , and collaborate to perform a number of activities of life . World which is the point of tangency between the physical world and the world of abstraction is becoming more and more visitors . The latest statistics show that in 2008 the Internet penetration has reached more than 21 % of the total 6.676 billion inhabitants of the earth . It means that one in five individuals in this world are Internet users ( read : internet user ) .Compared with other technology penetration in human history , internet penetration is the fastest , as illustrated in a graph that is exponential growth . At the same time allegedly happened billions of transactions per day with a value of billions of dollars of transactions per second - going on nonstop for 24 hours a day and 7 days a week . The frequency and volume of the trade that has never previously occurred in human history . All these facts imply that the domain " market " that forms on the internet has a value or a value that is so high , because gradually more and more transactions and interactions that occur there . Even a number of sources indicated , in the not too distant future , the value of trading on the internet will be much greater than is the case in the real world . In short, the Internet is an invaluable entity - which from time to time , will increase the price and value , as more and more activities going on there .

source

Creating mysql database connection from neatbean

By on 04:21
Earlier it used to create java class.
namaclass.java classroom write the following line of code


public class namaclass {
    private String url = "jdbc:mysql://localhost:3306/namadb";
    private String username  = "root";
    private String password= "";
    private Connection koneksi;
    private Statement stmt;
    ResultSet rsUser;

 
    public namaclass() {
        try {
            Class.forName("com.mysql.jdbc.Driver");
        } catch (ClassNotFoundException ex) {
             System.out.println(ex.getMessage());
        }
        //end
    }
    public void BukaKoneksi(){
        try {
            koneksi = DriverManager.getConnection(url,username,password);
            stmt = koneksi.createStatement();
        } catch (SQLException ex) {
            System.out.println(ex.getMessage());
        }
    }

How to connect to database config.php

By on 04:20
How is that we create a php fileto connect to the database
First we need to checkthe application is installed or not xampp and service for apache and mysqlnya already way or not?
if it had stayed we make koneksi.php file / config.php



<?php

$host = 'localhost'; 
$user = 'root'; 
$pass = '';


$dbname = 'dbname';
$connect = mysql_connect($host, $user, $pass) or die(mysql_error());
$dbselect = mysql_select_db($dbname);

?>

Install wordpress di cpanel

By on 04:19

The first open cpanel by typing
http://namadomain.com/cpanel
login to cpanel with the given username and password from your hosting.
after entering cpanel
look at the very bottom on the menu

1
after that select the framework that would be installed. will be directed to
2

select install on the top.
3
select the domain you want to be installed.
4

The column in the directory is emptied.

5
setting the same username password.
Last post click install. prossesnya and wait until finished.

Every programer have favorite text editor ?

By on 04:16
Every programer have favorite text editor ?
There stout text editor to create the code, each of the text editor has its own advantages and disadvantages of its own, here are some frequently used text editor.
1. notepad
notepad
2. notepad++
notepad++
3. eclipse
eclipe
4. netbean
netbean
5. sublime
sublime

and still more corpulent.
"Thanks for watching"