 
Selasa, 14 Desember 2010
ATURAN DASAR TURUNAN
2. Jika f(x) = x, maka f ’(x) = 1.
3. Aturan Pangkat: Jika f(x) = xn (n є N), maka f ’(x) = n.xn-1.
4. Aturan Kelipatan Konstanta: (kf )’(x) = k.f ’(x).
5. Aturan Jumlah: (f + g)’(x) = f ’(x) + g’(x).
6. Aturan Hasil kali: (f.g)’(x) = f ’(x).g(x) + f(x).g’(x).
7. Aturan Hasil bagi:
8. Aturan Rantai: (f ° g)’(x) = f ’(g(x)).g’(x).
MAHA PRIVATE
1. PEMROGRAMAN VISUAL BASIC
2. PEMROGRAMAN BORLAND DELPHI
3. PEMROGRAMAN C++/PASCAL (ALGORITMA PEMROGRAMAN)
4. KALKULUS
5. ALJABAR LINIER
6. METODE NUMERIK
KETENTUAN:
1. JUMLAH PERTEMUAN 2 KALI SEMINGGU
2. SATU (1) PERTEMUAN SELAMA 2 JAM
3. SETIAP KELOMPOK MINIMAL 5 ORANG
4. BIAYA TERJANGKAU
HUBUNGI: NO. HO: 081917044860
Jumat, 10 Desember 2010
lombok material bangunan
Kerikil (pecah) =875 ribu, Kerikil (utuh) =725 ribu, Pasir sesaot (pasir sungai) =350 ribu, Pasir sedau (pasir kebun) = 275 ribu, Batu sungai = 375 ribu + Belum termasuk ongkos kirim . Hubungi No. HP : 081917044860
Jumat, 27 Agustus 2010
cara compile code program c dengan gedit di ubuntu 9.10
sapa yang gak kenal bahasa C. mungkin semua sudah tahu, tetapi untuk mengingatkan tidak salahnya saya perkenalkan bahasa c dahulu.
pendahuluan:
Bahasa C dikembangkan pertama kali pada laboratorium Bell (USA)
sekitar tahun 1972 oleh Dennis Ritchie pada komputer DEC PDP-11
dengan sistem operasi UNIX.
- Beberapa versi C mulai dikembangkan oleh beberapa pakar untuk
dijalankan pada sistem operasi selain UNIX, seperti PC-DOS dan
MS-DOS.
- Untuk melaksanakan pembakuan (standardisasi) terhadap bahasa C,
ANSI (American National Standards Institute) membentuk team
untuk membuat bahasa C standard ANSI, yang dimulai tahun 1983.
Standard ANSI inilah yang selanjutnya digunakan sebagai acuan dari
berbagai versi C yang beredar dewasa ini.
untuk lebih lebih mengenal silahkan saja searching di internet, banyak sekali tutorial mengenai bahasa C.
pembahasan selanjutnya mengenai bahasa C, dapat anda download di:
PENGENALAN BAHASA C!!!
jika mengcompile code program bahasa C, di windows mudah karena ada compilernya biasa yang sering saya gunakan yaitu turbo c++ atau borland c++ ( versinya banyak kok).
sekarang yang jadi permasalahannya adalah mengcompile code program bahasa c di ubuntu linux.
setelah mencari-cari referensi dan bertanya sama seorang sahabat yah walaupun informasi tidak begitu lengkap, dengan modal belojar, try en error akhirnya saya bisa ngerti, hehehe...
untuk itu sapa tahu bisa bermanfaat buat temen2, sehingga tidak salahnya jika saya berbagi-bagi dengan temen-temen.
oke langsung saja.
langkah-langkahnya:
1. membuat folder di home directory, dengan dua cara:
a. cara pertama: buka saja langsung home directorynya kemudian buat folder baru ( nama folder bebas). ( cara buat folder: klik kanan create folder)
b. cara kedua dengan menggunakan perintah:, biasanya dengan bantuan terminal
perintahnya:
mahayadi@mahayadi-laptop:~$ mkdir folder_c
untuk melihat apakah berhasil perintah tersebut, silahkan saja lihat di home directorynya.
2. untuk bisa membuat, mengedit, dan mengcompile/menjalankan code program yang dibuat. terlebih dahulu kita harus masuk ke dalam folder yang dibuat tersebut (folder_c)
perintahnya:
mahayadi@mahayadi-laptop:~$ cd folder_c
setelah berhasil maka baris perintah berikutnya seperti di bawah ini:
mahayadi@mahayadi-laptop:~/folder_c$
berarti jika muncul seperti perintah di atas, maka kita berhasil masuk ke dalam folder yang dibuat(folder_c).
3. membuat code program bahasa c yang akan di compile, tetapi terlebih dahulu kita harus membuka aplikasi editor ( yang kita gunakan yaitu GEDIT),perintahnya:
mahayadi@mahayadi-laptop:~/folder_c$ sudo gedit
biasanya setelah dienter maka muncul perintah untuk memasukkan password ( tahu sendiri lah password masinh-masing), isi saja dan enter lagi. maka akan muncul window gedit seperti gambar di bawah ini:

gambar sebelum window gedit di isi.
selanjutnya kita mengisi code program, misalnya program tampil, ketik code program dan jangan lupa disimpan (nama file bebas tetapi harus bertip "nama file".c misalnya coba.c).
seperti gambar dibawah ini:

setelah selesai membuat code program tersebut, window gedit ditutup.
4. mengcompile code program tersebut, (jumlah.c) dengan perintah:
mahayadi@mahayadi-laptop:~/c++$ gcc coba.c
5.membuat file .exe dari code program yang dibuat tersebut (coba.c), yang nama file .exe namanya bebas, boleh sama dengan nama file code program tersebut atau boleh beda. misalnya saja program_pertamaku.exe.
perintahnya adalah:
mahayadi@mahayadi-laptop:~/c++$ gcc coba.c -o program_pertamaku
6. langkah terakhir mengeksekusi code program tersebut dengan perintah:
mahayadi@mahayadi-laptop:~/c++$ ./program_pertamaku
sehingga hasil outputnya dapat dilihat seperti tampak dibawah ini:
Mahayadi lagi Belajar coding C di ubuntu dengan gedit,muancieepp
Mahayadi lagi Belajar coding C di ubuntu dengan gedit,muancieepp
Mahayadi lagi Belajar coding C di ubuntu dengan gedit,muancieepp
okeh, SELAMAT MENCOBA!!!
bermaen game di ubuntu 9.10
hai semua pecinta game strategi...yang ngaku maniak game strategi pasti tahu mengenai game
stronghold crusader. game stronghold crusader memiliki banyak versi mulai dari yang jadul sampai yang versi terbaru, versi terbarunya dalah stronghold crusader extreme (setahuku sih!!!).
awal mulanya canggung dan ragu-ragu untuk go linux!!! soalnya takut game-game kesayangan yang sering saya mainkan di windows tidak bisa berjalan dengan baik atau mungkin gak bisa jalan sama sekali...
setelah mencari-cari referensi dan niat nekat untu try en error ternyata, banyak game yang awalnya merupakan basic game windows sekarang bisa di jalankan atau dimainkan di linux khususnya yang saya gunakan yaitu ubuntu 9.10 ( tetapi kayaknya semua versi linux bisa karena jika salah satu versi dari linux bisa pasti yang lain juga bisa).
jika teman-teman menginstall ubuntu 9.10 sebagai OS (sistem operasi) yang digunakan tetapi hanya install cd bootingnya saja tanpa disertai dengan install cd reponya(cd repository) maka ada beberapa hal yang harus diperhatikan:
1. setelah selesai menginstall cd booting ubuntu 9.10 biasanya OS gak berjalan dengan baik karena ada yang belum di update. untuk bisa mengupdate OS yang pertama kali dilakukan adalah mengupdate software sources, biasanya: cari menu system--->administration--->software souces.
catatan: harus connect internet dulu dungs,hehehehhe
2. setelah selesai mengupdate software sources bisa dilanjutkan dengan mengupdate synaptic package manager
3. setelah semua selesai, baru mengupdate atau menginstall software/aplikasi yang namanya WINE.
WINE bisa di update dengan dua cara yaitu:
a.cara pertama: buka ubuntu software center ( menu applications-->ubuntu software center-->get free software-->games-->wine microsoft windows compability layer)
b.cara kedua: buka terminal (menu applications-->accessories-->terminal)
di dalam jendela terminal ketik perintah:
sudo apt-get install wine
langkah selanjutnya:
setelah wine selesai di install sekarang waktunya mencoba, cari file game stronghold crusader extreme biasanya tipe file (stronghold crussader_extreme.exe).
pada file .exe klik kanan--> pilih open with wine windows program loader
ENJOY GAME!!!
(UNTUK GAME-GAME YANG LAIN SILAHKAN DICOBA SENDIRI)
SELAMAT MENCOBA!!!
Senin, 23 Agustus 2010
GIMP Image Editor's Photoshop in LInux
bagi temen-temen yang doyan membuat gambar baru, yang suka mengedit foto atau gambar dengan photoshop jangan takut go to LINUX...karena di linux sudah ada photoshop juga tetapi bukan photoshop namanya melainkan " GIMP Image Editor".
Gimp Image editor memiliki kesamaan dengan photoshop bahkan memiliki kemampuan yang lebih baik ddibandingkan dengan photoshop. Gimp Image Editor yaitu program komputer desktop publishing yang berfungsi dalam hal penyuntingan, pemanipulasian, pemodifikasian dan pembuatan image atau citra atau gambar bitmap.
GIMP singkatan dari GNU Image Manipulation Program dan pernah mendapatkan OSI Merit Award pada 10 juni 2004. GIMP memiliki kemampuan yang tidak perlu diragukan lagi terutama dalam proses retouching photo atau komposisi gambar dan warna.
GIMP merupakan aplikasi desain grafis yang terdapat pada setiap distro linux. Dengan kata lain, apabila kita menginstal distro linux terkenal, maka secara otomatis GIMP akan ikut serta di dalamnya.
kebetulan saya menggunakan ubuntu 9.10, di dalamnya sudah ada program GIMP Image Editor tersebut.
sekian pengantar saya mengenai GIMP Image Editor yaitu Photoshop di Linux,hehehe...
Selamat Mencoba, moga bermanfaat bagi temen-temen yang mau ancang-ancang go to LINUX!!!
GO LINUX!!! GO LINUX!!! GO LINUX!!!
cara mengganti theme ubuntu 9.10
hai semua temen-temen pemula..buat linux khusunya ubuntu 9.10....
kali ini mau share tentang cara mengganti theme ubuntu 9.10...
walaupun mungkin dah banyak yang tahu tetapi setidaknya bisa membantu, sapa tahu entar kepengen ganti theme...(orangya cepet bosen sama theme-theme yang sudah ada).
oke langsung aja.
1. untuk mengganti theme sebenarnya udah ada ilmunya dibeberapa buku-buku yang membahas mengenai ubuntu itu sendiri:
caranya:
menu SYSTEM----->PREFERENCES---->APPEARANCE, selanjutnya pilih tab THEME , pilih list menu theme yang anda suka yang tersedia (biasanya secara default sudah ada pada saat di install) di window appearance preference.
2. mengganti theme dengan menambahkan dari theme hasil downloadan.
untuk menambakan theme hasil downloadan, caranya:
dengan mendrag /menggeser file theme yang di download (biasanya berektensi .tar.gz contoh: GTK2-AeroIon.tar.gz) ke window Appearance Preference.
untuk theme downloadan bisa didownload di link ini:
http://art.gnome.org/themes/gtk2?page=1
wassalam.
selamat mencoba!!!
Selasa, 17 Agustus 2010
Sistem Informasi Proses Belajar Mengajar
1. Form login
Username: “Visual Basic”
Password: ”Amikom”
Dalam Form Login tambahkan tiga button yaitu LOGIN, CANCEL dan EXIT
2. Form Utama ( FORM PROSES BELAJAR MENGAJAR)
Yang didalamnya berisi menu: Identitas Mahasiswa, Perhitungan Nilai Mahasiswa, About Sistem Informasi dan EXIT.
3. Form Identitas Mahasiswa
Toolbox terdiri dari:
Nama, NIM, Kelas, Jurusan, Semester, Jenis Kelamin, Agama, Asal SMA/Aliyah, & HandPhone.
( untuk Jurusan, Semester & Agama menggunakan ComboBox)
Jenis kelamin menggunakan radio button.
Button: PROCESS, CANCEL, EXIT
Keterangan: Identitas Mahasiswa di Tampilkan dalam satu Output (contohnya: LABEL atau TEXT) ketika menekan button PROCESS.
4. Form Perhitungan Nilai Mahasiswa
Toolbox:
Nama Mata Kuliah, Jumlah SKS, Nama Dosen Pengampu, Nilai Harian, Nilai MID, NIlai UAS, Nilai Akhir, Grade
Button: HITUNG, CANCEL, EXIT
Keterangan:
Nilai akhir= (0.3*Nilai Harian) + (0.3*Nilai MID) + (0.4*Nilai UAS)
Grade yaitu:
A >=80
80>B>=65
65>C>=50
50>D>=40
40>E
NB: nilai akhir dan grade akan terisi jika kita menekan button HITUNG, syarat nilai harian, nilai MID dan nilai UAS sudah terisi.
5. Form About Sistem Informasi
keterangan:
Form ini berisi tentang system informasi yang dibuat dan orang yang membuat system informasi ini. ( Harus ada Animasi menggunakan Timer).
Adapun apliasinya dapat anda download.
SISTEM INFORMASI PROSES BELAJAR MENGAJAR!!!
program kelulusan dengan c++.
susun program untuk menginput tiga buah bilangan yang menyatakan nilai ujian tiga buah mata kuliah. cetak perkataan " ANDA LULUS " bila nilai rata-rata ketiga buah bilangan tersebut lebih besar atau sama dengan 60 atau, walaupun nilai rata-rata lebih kecil dari 60, tetapi bila ada salah satu mata kuliah yang nilainya lebih besar atau sama dengan 80 maka kategorinya juga dinyatakan lulus dan cetak " ANDA LULUS". bila syarat di atas tidak dipenuhi maka cetak perkataan " ANDA TIDAK LULUS".
ADAPUN JAWABAN PROGRAMNYA:
#include
#include
void main()
{ int nilai1,nilai2,nilai3,total,rata2;
cout<<"masukan nilai mata kuliah pertama anda:";
cin>>nilai1;
cout<<"masukan nilai mata kuliah kedua anda :";
cin>>nilai2;
cout<<"masukan nilai mata kuliah ketiga anda :";
cin>>nilai3;
cout<<"\n";
cout<<"\n";
total=nilai1+nilai2+nilai3;
rata2=total/3;
if (rata2>=60 || nilai1>=80 || nilai2>=80|| nilai3>=80)
{
cout<<" ANDA LULUS";
}
else
{
cout<<"ANDA TIDAK LULUS";
}
getche();
}
SELAMAT MENCOBA!!!
program kelulusan dengan c++.
soal versi 1.
susun program untuk menginput tiga buah bilangan yang menyatakan nilai ujian tiga buah mata kuliah. cetak perkataan "ANDA LULUS" bila nilai rata-rata ketiga buah bilangan tersebut lebih besar atau sama dengan 60. bila rata-rata lebih kecil dari 60, maka cetak perkataan "ANDA TIDAK LULUS".
jawaban programnya adalah:
#include
#include
void main()
{ int nilai1,nilai2,nilai3,total,rata2;
cout<<"masukan nilai mata kuliah pertama anda:";
cin>>nilai1;
cout<<"masukan nilai mata kuliah kedua anda :";
cin>>nilai2;
cout<<"masukan nilai mata kuliah ketiga anda :";
cin>>nilai3;
cout<<"\n";
cout<<"\n";
total=nilai1+nilai2+nilai3;
rata2=total/3;
if (rata2>=60)
{
cout<<" ANDA LULUS";
}
else
{
cout<<"ANDA TIDAK LULUS";
}
getche();
}
SELAMAT MENCOBA!
Jumat, 23 Juli 2010
It's Linux, Mom! Not Lennox.
 It's Linux, Mom! Not Lennox.
Lennox is a global corporation  specializing in air conditioning, heating, and commercial refrigeration.  Dave Lennox helped to develop what has been described as the first  riveted-steel furnace in 1895.
His "machine" having come a long  way is amazing in it's own right, but it is not necessarily suited for  business productivity.  While it is surely compatible with outsourced  services, Old Dave's Lennox may not readily lend itself to remote  helpdesk or repair over the internet.
Linux, on the other hand,  is a Unix-like computer operating system which not only fully lends  itself to remote helpdesk, outsourced IT services, and computer repair  over the internet, but can also be used to accomplish those tasks.
Unlike  Lennox hardware, Linux is one of the most prominent examples of free  software  and open source development; its underlying source code can be  freely modified, used, and redistributed by anyone (try that with  Lennox).
Although it had already been around a few years, the  Linux kernel was first released to the public  17 September 1991, for  the Intel x86 PC architecture.
The kernel was augmented with  system utilities and libraries from the GNU project to create a usable  operating system, which later led to an alternate term, GNU/Linux. 
Linux  is now packaged for different uses in Linux distributions, which  contain the sometimes modified kernel along with a variety of other  software packages tailored to different requirements.
Predominantly  known for its use in servers, Linux in gaining more and more popularity  as a desktop operating system garnering the support of corporations  such as IBM, Sun Microsystems, Dell, Hewlett-Packard and Novell.
It  is used as an operating system for a wide variety of computer hardware,  including desktop computers, supercomputers, video game systems  (PlayStation 2 and 3 for example) and embedded devices such as mobile  phones and routers most if not all of which lend themselves readily to  repair over the internet, outsourced repair and even remote helpdesk  services.
1960ish:  A computer operating system known as UNIX was  conceived.
1970:  UNIX was released and widely used, modified  and improved by business, academia, and the government .
1984;   Richard Stallman quits his job at MIT and starts working on the GNU  Project.
1985:  Free Software Foundation, an organization for  creating and promoting free software, is founded by Richard Stallman.
The  GNU manifesto, a statement by Richard Stallman advocating the cause of  free software movement, is published in the March 1985 issue of Dr.  Dobb's Journal
1991:  MINIX was written from scratch by Andrew S.  Tanenbaum, a US-born Dutch professor who wanted to teach his students  the inner workings of a real operating system. It was designed to run on  the Intel 8086 microprocessors that had flooded the world market.
MINIX  was by no stretch of the imagination a supberb operating system.  But  for the first time the source code was available. Anyone who happened to  get the book 'Operating Systems: Design and Implementation' by  Tanenbaum could get hold of the 12,000 lines of code, written in C and  assembly language. For the first time, an aspiring programmer or hacker  could read the source codes of the operating system, which to that time  the software vendors had guarded vigorously.
Following in quick  succession, Linux was first envisaged by a a second year student of  Computer Science at the University of Helsinki and a self-taught hacker,  Linus Torvalds. At the time it was just another hackers hobby. But from  the humble Intel 386 machine of Linus that ran the first kernel, Linux  has come a long way. Its most notable use now is in the field of  massively parallel supercomputing clusters.
Version 0.01 is  released on the Internet in September.
1992: 
January:   First Linux Newsgroup: alt.os.linux founded in the UseNet
April:   Ari Lemmke starts the popular Linux newsgroup comp.os.linux in the  UseNet
November:  Adam Richter announces the release of the first  Linux Distribution from his company: Yggdrasil
1993:
June:   Slackware, the famous Linux distribution is released by Peter  Volkerding
August:  Matt Welsh releases Linux Installation and  getting started: version 1
1994:  Linux kernel version 1.0 is  released in March.
While Lennox has several models, Linux has  many more.  And even though Lennox has been around a lot longer (you  know Dave Lennox died in 1947), Linux has achieved between 50-80% market  share of the web server, render farm, and supercomputer markets and is  growing daily on desktops a feat even old Dave couldn't pull off.
So,  Mom, now do you understand?  Mom!  Mom!
tmm
Source: Free Articles
VIRUS KOMPUTER
Virus komputer dapat merusak ( misalnya dengan merusak data pada dokumen), membuat pengguna komputer merasa terganggi, maupun tidak menimbulkan efek sama sekali.
Virus komputer umumnya dapat merusak perangkat lunak komputer dan tidak secara langsung merusak perangkat tertentu misalnya VGA, memory, bahkan processor.
...
...
...
ada beberapa langkah untuk melakukan pencegahan agar virus tidak masuk dan merusak file yang ada pada komputer anda.
1. pastikan pada komputer anda terinstall anti virus terbaru dan terbaik menurut anda.
2. pastikan anti virusnya terupdate dalam suatu periode tertentu.
3. waspadai pemakain flashdisk, memory card, harddisk eksternal dan media penyimpanan lainnya.
4. jangan mengunjungi situs-situs tertentu seperti situs-situs porno, situs cracking dan hacking.
5. dan masih banyak lagi
materi lengkap mengenai VIRUS KOMPUTER dapat anda download.
selamat mencoba!!!!
anti virus free
nama antivirus seh ANSAV, filenya gak terlalu besar tetapi punyak ketangguhan dalam membunuh virus-virus yang relatif gak terlalu ganas dan ada juga yang ganas seperti virus sality32 (virus yang merusak system windows) nb: dari pengalamnku loh...hehehehehe, dicobain aja...capa tahu cocok...
silahkan download anti virus ansav-beta di sini.
Minggu, 18 Juli 2010
PROSEDURE FUNGSI
Anda dapat menggunakan prosedur fungsi untuk menyuplai nilai ke dalam sebuah ekspresi dan memasukannya ke dalam procedur fungsi lain.
...
...
Menuliskan prosedur funngsi.
Di dalam visual basic, prosedur dan fungsi sngatlah dibedakan. Perbedaan yang utama:
1. prosedur tidak menghasilkan nilai
2. fungsi menghasilkan nilai
Sedangkan dari segi pendeklarasian dan penulisannya:
-prosedur menggunakan kata kunci sub dan diakhiri dengan end sub
-fungsi menggunkan kata kunci fungsi dan diakhiri dengan end fungsi
...
...
ATURAN PENULISAN:
Fungsi PanjStr(teks)
PanjStr=Len(trim(teks))
End fungsi
...
...
MATERI LENGKAP DAN CONTOH PROGRAM DAPAT ANDA DOWNLOAD DI
...
PROSEDURE FUNGSI.
...
selamat belajar!!!!
array satu dimensi pada c++
....
array satu dimensi atau kadang-kadang disebut array dimensi satu biasa disebut vector karena hanya mempunyai satu arah.
....
materi lengkapnya dapat download di ARRAY SATU DIMENSI PADA C++.
contoh kode program untuk input dan cetak isi array:
#include
#include
void main()
{int i,x,A[11];
for (i=0; i<=4; i++)
{
...
...
getche();
}
untuk kode program dengan contoh lain dapat anda download di KODE PROGRAM ARRAY.
selamat mencoba dan banyak latihan yah!!!!!!!!!!
Kamis, 15 Juli 2010
Tips&Trik Mempercepat Komputer & Laptop
selamat mencoba!!!
jika ada pertanyaan dan hambatan silahkan komentar disini...
tetap semnagat belajar dan belajar!!!
Selasa, 13 Juli 2010
peripatetic article animation to right and to is left.
before us step into project, beforehand we draw up toolbox, like hereunder:
1. two timer
2. one label
3. four commandbutton
clarification toolbox:
-->timer
- timer1 ( name=timer_right, enable=true, interval=100)
- timer2 (name=timer_left, enable=true, interval=100)
- label1 (name=lbl_anim, autosize=true, caption= peripatetic article animation to right and to is left, font=MS Sans Serif, style=bold, size=24)
- commandbutton1 ( name=btnright, caption=move right, font=MS Sans Serif, style=bold, size=18)
- commandbutton2 ( name=btnleft, caption=move left, font=Ms Sans Serif, style=bold, size=18)
- commandbutton3 (name=btnstop, caption=stop, font=Ms Sans Serif, style=bold, size=18)
- commandbutton4 ( name=btnexit, caption=exit, font=Ms Sans Serif, style=bold, size=18)
code program:
Private Sub btnexit_Click()
End
End Sub
Private Sub btnleft_Click()
Timer_left.Enabled = True
End Sub
Private Sub btnright_Click()
Timer_right.Enabled = True
End Sub
Private Sub btnstop_Click()
Timer_right.Enabled = False
Timer_left.Enabled = False
End Sub
Private Sub Form_Load()
Timer_right.Enabled = False
Timer_left.Enabled = False
End Sub
Private Sub Timer_left_Timer()
Dim yadi As String
yadi = lbl_anim.Caption
yadi = Mid(yadi, 2, Len(yadi) - 2) & Left(yadi, 2)
lbl_anim.Caption = yadi
End Sub
Private Sub Timer_right_Timer()
Dim maha As String
maha = lbl_anim.Caption
maha = Right(maha, 2) & Mid(maha, 2, Len(maha) - 2)
lbl_anim.Caption = maha
End Sub
as for code project complete, download here.
presentation items can you download here, process string.
Senin, 12 Juli 2010
speed up Computer - What to Do to Make Computer Run Fast ?
It is for sure that every computer will run slow as days by and an upgrade of the RAM module /graphics card helps to directly fix a slow computer. Here, we will discuss what will cause and how to fix a slow computer.
First of all, let's have a look at what will result in a slow computer:
1) Too many startup items. These will take up lots of PC resources and then slow down computers at startup.
2) Too fragmented hard drive. Fragments on the hard drive will make the data non-continuous and difficult to be read /written, which will extend the disk visiting time.
3) A non-compact windows registry. As we install /uninstall programs or browse websites, there will be lots of invalid registry items left over. These will result in computer sluggishness, freezing-up or crashes.
For the above reasons, we can quickly fix a slow computer with the simple solutions here:
1) Disable the programs that do not need to automatically run at windows startup: go to Start -> Run -> type "msconfig" and press Enter to access System Configuration Utility, and then disable the unneeded startup items in "Startup" tab.
2) Regularly defragment the hard drive. Though a disk defragmentation seems rather easy, it helps to reassemble files on the hard disk, making them always stay close contiguously. Hence, it will not only fix a slow computer, but also extend the lifespan of hard drive.
3) Clean up windows registry frequently. Windows registry is the main soul of the computer, which decides its proper running. So it is highly recommended that you should run a registry cleaner rather than manually to fix registry errors, whose advanced technology will return you a compact registry and faster computer quickly.
In a word, all tips above are really useful to fix a slow computer. If you are so annoyed with your computer which runs as slow as a snail, please do not miss the points here.
(ArticlesBase SC #2809432)
Computer Virus
 In 1983, Fred Cohen coined the term “computer virus”,  postulating a virus was "a program that can 'infect' other programs by  modifying them to include a possibly evolved copy of itself.” The term  virus is actually an acronym for Vital Information Resources Under  Seize. Mr. Cohen expanded his definition a year later in his 1984 paper,  “A Computer Virus”, noting that “a virus can spread throughout a  computer system or network using the authorizations of every user using  it to infect their programs. Every program that gets infected may also  act as a virus and thus the infection grows.” Computer viruses, as we  know them now, originated in 1986 with the creation of Brain - the first  virus for personal computers. Two brothers wrote it (Basid and Farooq  Alvi who ran a small software house in Lahore, Pakistan) and started the  race between viruses and anti-virus programs which still goes on today. 
Using the above explanation, it can be said that viruses infect program  files. However, viruses can also infect certain types of data files,  specifically those types of data files that support executable content,  for example, files created in Microsoft Office programs that rely on  macros.
Compounding the definition difficulty, viruses also exist that  demonstrate a similar ability to infect data files that don't typically  support executable content - for example, Adobe PDF files, widely used  for document sharing, and .JPG image files. However, in both cases, the  respective virus has a dependency on an outside executable and thus  neither virus can be considered more than a simple ‘proof of concept’.  In other cases, the data files themselves may not be infectable, but can  allow for the introduction of viral code. Specifically, vulnerabilities  in certain products can allow data files to be manipulated in such a  way that it will cause the host program to become unstable, after which  malicious code can be introduced to the system. These examples are given  simply to note that viruses no longer relegate themselves to simply  infecting program files, as was the case when Mr. Cohen first defined  the term. Thus, to simplify and modernize, it can be safely stated that a  virus infects other files, whether program or data.
Computer viruses are called viruses because they share some of the  traits of biological viruses. A computer virus passes from computer to  computer like a biological virus passes from person to person.
There are similarities at a deeper level, as well. A biological virus is  not a living thing. A virus is a fragment of DNA inside a protective  jacket. Unlike a cell, a virus has no way to do anything or to reproduce  by itself -- it is not alive. Instead, a biological virus must inject  its DNA into a cell. The viral DNA then uses the cell's existing  machinery to reproduce itself. In some cases, the cell fills with new  viral particles until it bursts, releasing the virus. In other cases,  the new virus particles bud off the cell one at a time, and the cell  remains alive.
A computer virus shares some of these traits. A computer virus must  piggyback on top of some other program or document in order to get  executed. Once it is running, it is then able to infect other programs  or documents. Obviously, the analogy between computer and biological  viruses stretches things a bit, but there are enough similarities that  the name sticks.
A computer virus is a program that replicates. To do so, it needs to  attach itself to other program files (for example, .exe, .com, .dll) and  execute whenever the host program executes. Beyond simple replication, a  virus almost always seeks to fulfill another purpose: to cause damage.
Called the damage routine, or payload, the destructive portion of a  virus can range from overwriting critical information kept on the hard  disk's partition table to scrambling the numbers in the spreadsheets to  just taunting the user with sounds, pictures, or obnoxious effects.
It’s worth bearing in mind, however, that even without a ”damage  routine”, if viruses are allowed to run unabated then it will continue  to propagate--consuming system memory, disk space, slowing network  traffic and generally degrading performance. Besides, virus code is  often buggy and can also be the source of mysterious system problems  that take weeks to understand. So, whether a virus is harmful or not,  its presence on the system can lead to instability and should not be  tolerated.
Some viruses, in conjunction with "logic bombs," do not make their  presence known for months. Instead of causing damage right away, these  viruses do nothing but replicate--until the preordained trigger day or  event when they unleash their damage routines on the host system or  across a network.
Impact of Viruses on Computer Systems
Virus can be reprogrammed to do many kinds of harm including the  following.
1.Copy themselves to other programs or areas of a disk.
2.Replicate as rapidly and frequently as possible, filling up the  infected system’s disk and memory rendering the systems useless.
3.Display information on the screen.
4.Modify, corrupt or destroy selected files.
5.Erase the contents of entire disks.
6.Lie dormant for a specified time or until a given condition is met,  and then become active.
7.Open a back door to the infected system that allows someone else to  access and even control of the system through a network or internet  connection.
8.Some viruses can crash the system by causing some programs (typically  Windows) to behave oddly.
How viruses spread from one system to another?
The most likely virus entry points are email, Internet and network  connections, floppy disk drives, and modems or other serial or parallel  port connections. In today's increasingly interconnected workplace  (Internet, intranet, shared drives, removable drives, and email), virus  outbreaks now can spread faster and wider than ever before.
The following are some common ways for a virus to enter the users’  computer system:
•Email attachments
•Malicious scripts in web pages or HTML email
•FTP traffic from the Internet (file downloads)
•Shared network files & network traffic in general
•Demonstration software
•Pirated software
•Shrink-wrapped, production programs (rare)
•Computer labs
•Electronic bulletin boards (BBS)
•Diskette swapping (using other people’s diskettes for carrying data and  programs back and forth)
High risk files
The most dangerous files types are:
.EXE, .COM, .XLS, .DOC, .MDB
Because they don't need any special conversion to infect a computer --  all they've got to do is run and consequently the virus spreads. It has  been estimated that 99% of all viruses are written for these file  formats.
A list of possible virus carriers includes:
EXE - (Executable file)
SYS - (Executable file)
COM - (Executable file)
DOC - (Microsoft Word)
XLS - (Microsoft Excel)
MDB - (Microsoft Access)
ZIP - (Compressed file, common in the USA)
ARJ - (Compressed file, common in the USA)
DRV - (Device driver)
BIN - (Common boot sector image file)
SCR - (Microsoft screen saver)
Common Symptoms Of Virus Infection
Computer does not boot.
Computer hard drive space is reduced.
Applications will not load.
An application takes longer to load than normal time period.
Hard dive activity increases especially when nothing is being done on  the computer.
An anti virus software message appears.
The number of hard drive bad sectors steadily increases.
Unusual graphics or messages appear on the screen
Files are missing (deleted)
A message appears that hard drive cannot be detected or recognized.
Strange sounds come from the computer.
Some viruses take control of the keyboard and occasionally substitute a  neighboring key for the one actually pressed. Another virus "swallows"  key presses so that nothing appears on the screen.
Also interesting are system time effects. Clocks going backwards are  especially frightening for workers who cannot wait to go home. More  seriously though, this type of virus can cause chaos for programs which  depend on the system time or date.
Some viruses can cost the user dearly by dialing out on his modem. We  do not know of one which dials premium telephone numbers but no doubt we  shall see one soon. One particularly malicious virus dials 911 (the  emergency number in the USA) and takes up the valuable time of the  emergency services.
Categories of viruses
Depending on the source of information different types of viruses may be  categorized in the following ways:
PDA VIRUSES
The increasing power of PDAs has spawned a new breed of viruses.  Maliciously creative programmers have leveraged the PDA's ability to  communicate with other devices and run programs, to cause digital  mayhem.
The blissfully safe world where users of these devices could synchronize  and download with impunity came to an end in August 2000 with the  discovery of the virus Palm Liberty. Since then, many more viruses have  been discovered.
Though not yet as harmful as their PC-based cousins, these viruses still  pose a threat to unsuspecting users. Their effects vary from the  harmless flashing of an unwanted message or an increase in power  consumption, to the deletion of all installed programs. But the threat  is growing, and the destructiveness of these viruses is expected to  parallel the development of the devices they attack.
MULTIPARTITE VIRUSES
A virus that combines two or more different infection methods is called a  multipartite virus. This type of virus can infect both files and boot  sector of a disk. Multi-partite viruses share some of the  characteristics of boot sector viruses and file viruses: They can infect  .com files, .exe files, and the boot sector of the computer’s hard  drive. On a computer booted up with an infected diskette, the typical  multi-partite virus will first make itself resident in memory then  infect the boot sector of the hard drive. From there, the virus may  infect a PC's entire environment. Not many forms of this virus class  actually exist. However, they do account for a disproportionately large  percentage of all infections. Tequila and Anticad are the examples of  multipartite viruses.
BOMBS
The two most prevalent types of bombs are time bombs and logic bombs. A  time bomb hides on the victim’s disk and waits until a specific date  before running. A logic bomb may be activated by a date, a change to a  file, or a particular action taken by a user or a program. Bombs are  treated as viruses because they can cause damage or disruption to a  system.
BOOT SECTOR VIRUSES
Until the mid-1990s, boot sector viruses were the most prevalent virus  type, spreading primarily in the 16-bit DOS world via floppy disk. Boot  sector viruses infect the boot sector on a floppy disk and spread to a  user's hard disk, and can also infect the master boot record (MBR) on a  user's hard drive. Once the MBR or boot sector on the hard drive is  infected, the virus attempts to infect the boot sector of every floppy  disk that is inserted into the computer and accessed. Examples of boot  sector viruses are Michelangelo, Satria and Keydrop.
Boot sector viruses work like this: Let us assume that the user received  a diskette with an infected boot sector. The user copied data from it  but forgot to remove it from drive A:. When he started the computer next  time the boot process will execute the infected boot sector program  from the diskette. The virus will load first and infect the hard disk.  Note that this can be prevented by changing the boot sequence in CMOS  (Let C: drive boot before A:).  By hiding on the first sector of a disk,  the virus is loaded into memory before the system files are loaded.  This allows it to gain complete control of DOS interrupts and in the  process replaces the original contents of the MBR or DOS boot sector  with their own contents and move the original boot sector data to  another area on the disk. Because the virus has infected a system area  of the hard disk it will be loaded into memory each time the computer is  started. It will first take control of the lowest level disk system  services before executing the original boot sector code which it has  stored in another part of the hard disk. The computer seems to behave  exactly as it should. Nobody will notice the extra few fractions of a  second added to the boot sequence.
During normal operation the virus will happily stay in memory. Thanks to  the fact that it has control of the disk services it can easily monitor  requests for disk access - including diskettes. As soon as it gets a  request for access to a diskette it will determine that there is a  diskette in the floppy drive. It will then examine its boot sector to  see if it has already been infected. If it finds the diskette clean it  will replace the boot sector with its own code. From this moment the  diskette will be a "carrier" and become a medium for infections on other  PC's.
The virus will also monitor special disk requests for access to the boot  sector. The boot sector contains its own code, and a request to read it  could be from an anti-virus program checking for virus presence. The  virus will not allow the boot sector to be read and will redirect all  requests to the place on the hard disk where it has backed up the  original contents. In this way nothing unusual is detected. Such methods  are called stealth techniques and their main goal is to mask the  presence of the virus. Not all boot viruses use stealth but those which  do are common.
Boot viruses also infect the non-file (system) areas of hard and floppy  disks. These areas offer an efficient way for a virus to spread from one  computer to another. Boot viruses have achieved a higher degree of  success than program viruses in infecting their targets and spreading.
Boot virus can infect DOS, Windows 3.x, Windows 95/98, Windows NT, and  even Novell Netware systems. This is because they exploit inherent  features of the computer (rather than the operating system) to spread  and activate.
Cleaning up a boot sector virus can be performed by booting the machine  from an uninfected floppy system disk rather than from the hard drive,  or by finding the original boot sector and replacing it in the correct  location on the disk.
CLUSTER VIRUSES
This type of virus makes changes to a disks file system. If any program  is run from the infected disk, the program causes the virus to run as  well. This technique creates the illusion that the virus has infected  every program on the disk.
E-MAIL VIRUSES
These types of viruses can be transmitted via e-mail messages sent  across private networks or the internet. Some e-mail viruses are  transmitted as an infected attachment- a document file or program that  is attached to the message. This type of virus is run when the victim  opens the file that is attached to the message. Other types of email  viruses reside within the body of the message itself. To store a virus,  the message must be encoded in html format. Once launched many e-mail  viruses attempt to spread by sending messages to everyone in the  victim’s address book; each of those contains a copy of the virus.
The latest thing in the world of computer viruses is the e-mail virus  called Melissa virus which surfaced in March 1999. Melissa spread in  Microsoft Word documents sent via e-mail, and it worked like this:
Someone created the virus as a Word document uploaded to an Internet  newsgroup. Anyone who downloaded the document and opened it would  trigger the virus. The virus would then send the document (and therefore  itself) in an e-mail message to the first 50 people in the person's  address book. The e-mail message contained a friendly note that included  the person's name, so the recipient would open the document thinking it  was harmless. The virus would then create 50 new messages from the  recipient's machine. As a result, the Melissa virus was the  fastest-spreading virus ever seen and it forced a number of large  companies to shut down their e-mail systems at that time.
The ILOVEYOU virus, which appeared on May 4, 2000, was even simpler. It  contained a piece of code as an attachment. People who double clicked on  the attachment allowed the code to execute. The code sent copies of  itself to everyone in the victim's address book and then started  corrupting files on the victim's machine. This is as simple as a virus  can get. It is really more of a Trojan horse distributed by e-mail than  it is a virus.
The Melissa virus took advantage of the programming language built into  Microsoft Word called VBA, or Visual Basic for Applications. It is a  complete programming language and it can be programmed to do things like  modify files and send e-mail messages. It also has a useful but  dangerous auto-execute feature. A programmer can insert a program into a  document that runs instantly whenever the document is opened. This is  how the Melissa virus was programmed. Anyone who opened a document  infected with Melissa would immediately activate the virus. It would  send the 50 e-mails, and then infect a central file called NORMAL.DOT so  that any file saved later would also contain the virus! It created a  huge mess.
FILE INFECTING VIRUSES
File infectors operate in memory and usually infect executable files  with the following extensions: *.COM, *.EXE, *.DRV, *.DLL, *.BIN, *.OVL,  *.SYS. They activate every time the infected file is executed by  copying themselves into other executable files and can remain in memory  long after the virus has activated.
Thousands of different file infecting viruses exist, but similar to boot  sector viruses, the vast majority operates in a DOS 16-bit environment.  Some, however, have successfully infected the Microsoft Windows, IBM  OS/2, and Apple Computer Macintosh environments.
File viruses can be separated further into sub-categories by the way  they manipulate their targets:
TSR FILE VIRUSES
A less common type of virus is the terminate-and-stay-resident file  virus. As the name suggests these infect files usually these are .com  and .exe files. there are however some device driver viruses, some  viruses that infect overlay files, and although over 99% of executable  programs have the extension .com and .exe, some do not .For a TSR virus  to spread some one has to run an infected program. The virus goes memory  resident typically looking at each program run thereafter and infects  it. Examples of TSR file viruses are Dark Avenger and Green Caterpillar.
OVERWRITING VIRUSES
These viruses infect by overwriting part of their target with their own  code but, by doing so, they damage the file. The file will never serve  another purpose other than spreading the virus further. Because of this  they are usually detected quickly and do not spread easily.
PARASITIC VIRUSES
These viruses attach themselves to executables without substantially  changing the contents of the host program. They attach by adding their  code to the beginning, end, or even middle of the file and divert  program flow so that the virus is executed first. When the virus has  finished its job, control is passed on to the host. Execution of the  host is a little delayed but this is usually not noticeable.
MACRO VIRUSES
Many older applications had simple macro systems that allowed the user  to record a sequence of operations within the application and associate  them with a specific keystroke. Later, the user could perform the same  sequence of operations by merely hitting the specified key.
Newer applications provide much more complex macro systems. User can  write entire macro-programs that run within the word processor or  spreadsheet environment and are attached directly onto word processing  and spreadsheet files. Unfortunately, this ability also makes it  possible to create macro viruses.
Macro viruses currently account for about 80 percent of all viruses,  according to the International Computer Security Association (ICSA), and  are the fastest growing viruses in computer history. Unlike other virus  types, macro viruses aren’t specific to an operating system and spread  with ease via email attachments, floppy disks, Web downloads, file  transfers, and cooperative applications.
Macro viruses are, however, application-specific. A macro virus is  designed to infect a specific type of document file, such as Microsoft  word or excel files. They infect macro utilities that accompany such  applications as Microsoft Word and Excel, which means a Word macro virus  cannot infect an Excel document and vice versa. A macro virus is  embedded in a document file and can travel between data files in the  application and can eventually infect hundreds of files if undeterred  and in the process do various levels of damage to data from corrupting  documents to deleting data.
Macro viruses are written in "every man's programming language" --  Visual Basic -- and are relatively easy to create. They can infect at  different points during a file's use, for example, when it is opened,  saved, closed, or deleted
A typical chronology for macro virus infection begins when an infected  document or spreadsheet is loaded. The application also loads any  accompanying macros that are attached to the file. If one or more of the  macros meet certain criteria, the application will also immediately  execute these macros. Macro viruses rely upon this auto-execution  capability to gain control of the application’s macro system.
Once the macro virus has been loaded and executed, it waits for the user  to edit a new document, and then kicks into action again. It attaches  its virus macro programs onto the new document, and then allows the  application to save the document normally. In this fashion, the virus  spreads to another file and does so in a completely discrete fashion.  Users have no idea of the infection. If this new file is later opened on  another computer, the virus will once again load, be launched by the  application, and find other unsuspecting files to infect.
Finally, as far as a macro virus is concerned, the application serves as  the operating system. A single macro virus can spread to any of the  platforms on which the application is installed and running. For  example, a single macro virus that uses Microsoft Word could conceivably  spread to Windows 3.x, Windows 95/98, Window NT, and the Macintosh.
Macro viruses for Word
In the summer of 1995, Microsoft Word 6 was the first product affected  with macro virus. The first one (WM/Concept.A) was really only a proof  of concept - one of the installed macros (called Payload) contained only  this remark:
“That's enough to prove my point”
Most macro viruses for Word use a feature called 'automacros'. The basic  principle is that some macros with special names are automatically  executed when Word starts, opens a file, or closes a file. The macro  virus then inserts macros into NORMAL.DOT - a standard template which is  loaded every time Word starts.
In Word there are some ways to disable automacros but this isn't the  ultimate solution. Some macro viruses use other methods to take control  over the Word environment.
Another method of self-protection may be to set NORMAL.DOT to read only.  But this can also be bypassed and, in addition, it prevents the user  from customizing the template.   
Macro viruses for Excel
Excel has the same opportunities for virus authors as Word. It has  automacros and a directory called XLSTART from which templates are  automatically loaded.
But Excel does not have just normal VBA macros like Word. In Excel there  are so called 'formulas' - macros stored in spreadsheet cells. The  first macro virus using this technology was XF/Paix.   
Macro viruses for other MS Office products:
Writing a macro virus for other Office products is not difficult. There  have been already some viruses for Access, and it is expected that there  will be macro viruses for Power Point in the near future.
But those macro viruses are not as dangerous as the macro viruses for  Word or Excel. Not because of some limitation of these other Office  products, but because data files from these products are not so  frequently shared.
There is one danger which can be seen in today's Power Point even  without native macro viruses written for this product. Programmers can  include in their presentation any number of objects from Excel or Word.  And these objects can be infected with macro viruses - if they edit the  presentation and open the infected object with its parent application,  then the virus can spread further.   
But the current situation may change dramatically over the next few  years. Microsoft has licensed VBA technology to many firms, so one can  expect to see more macro viruses for other products, too.
POLYMORPHIC VIRUSES
This type of virus can change itself each time it is copied, making it  difficult to isolate. Most simple viruses attach identical copies of  themselves to the files they infect. An anti-virus program can detect  the virus’s code (or signature) because it is always the same and  quickly ferret out the virus. To avoid such easy detection, polymorphic  viruses operate somewhat differently. Unlike the simple virus, when a  polymorphic virus infects a program, it scrambles its virus code in the  program body. This scrambling means that no two infections look the  same, making detection more difficult. These viruses create a new  decryption routine each time they infect, so every infected file will  have a different sequence of virus code.
STEALTH VIRUSES
Stealth viruses actively seek to conceal themselves from attempts to  detect or remove them. They also can conceal changes they make to other  files, hiding the damage from the user and the operating system.
Stealth viruses, or Interrupt Interceptors, as they are sometimes  called, take control of key DOS-level instructions by intercepting the  interrupt table, which is located at the beginning of memory. This gives  the virus the ability to do two important things: 1) gain control of  the system by re-directing the interrupt calls, and 2) hide itself to  prevent detection. They use techniques such as intercepting disk reads  to provide an uninfected copy of the original item in place of the  infected copy (read-stealthing viruses), altering disk directory or  folder data for infected program files (size-stealthing), or both. For  example, the Whale virus is a size-stealthing virus. It infects .EXE  program files and alters the folder entries of infected files when other  programs attempt to read them. The Whale virus adds 9216 bytes to an  infected file. Because changes in file size are an indication that a  virus might be present, the virus then subtracts the same number of  bytes (9216) from the file size given in the directory/folder entry to  trick the user into believing that the file’s size has not changed.
An antivirus program which is not equipped with anti-stealth technology  will be deceived.
COMPANION VIRUSES
A companion virus is the exception to the rule that a virus must attach  itself to a file. The companion virus instead creates a new file and  relies on a behavior of DOS to execute it instead of the program file  that is normally executed. These viruses target EXE programs. They  create another file of the same name but with a COM extension containing  the virus code. These viruses take advantage of a property of MS-DOS  which allows files to share the same first name in the same directory  (e.g. ABC.EXE and ABC.COM) but executes COM files in preference to EXE  files.
For example, the companion virus might create a file named CHKDSK.COM  and place it in the same directory as CHKDSK.EXE. Whenever DOS must  choose between executing two files of the same name where one has an  .EXE extension and the other a .COM extension, it executes the .COM  file. This is not an effective way of spreading but has one big  advantage - it does not amend files in any way and so can escape  integrity tests or resident protection. Another method which can be used  by companion viruses is based on defined path. A virus simply puts an  infected file into the path listed before the directory within the  original program.
PROGRAM VIRUSES
Like normal programs, program viruses must be written for a specific  operating system. The vast majority of viruses are written for DOS but  some have been written for Windows 3.x, Windows 95/98, and even UNIX.  All versions of Windows are compatible with DOS and can host DOS viruses  with varying degrees of success. Program viruses infect program files,  which commonly have extensions such as .COM, .EXE, .SYS, .DLL, .OVL, or  .SCR. Program files are attractive targets for virus writers because  they are widely used and have relatively simple formats to which viruses  can attach.
Malicious Programs and Scripts
Viruses that infect agent programs (such as those that download software  from the Internet; for example, JAVA and ActiveX).
WORM
A worm is a computer program that has the ability to copy itself from  machine to machine. Worms normally move around and infect other machines  through computer networks. An entire LAN or corporate e-mail system can  become totally clogged with copies of a worm, rendering it useless.  Worms are commonly spread over the internet via e-mail message  attachments and through internet relay chat channels.
For example, the Code Red worm replicated itself over 250,000 times in  approximately nine hours on July 19, 2001.
A worm usually exploits some sort of security hole in a piece of  software or the operating system. For example, the Slammer worm (which  caused mayhem in January 2003) exploited a hole in Microsoft's SQL  server.
Worms use up computer time and network bandwidth when they are  replicating, and they often have some sort of evil intent. A worm called  Code Red made huge headlines in 2001. Experts predicted that this worm  could clog the Internet so effectively that things would completely  grind to a halt.
The Code Red worm slowed down Internet traffic when it began to  replicate itself, but not nearly as badly as predicted. Each copy of the  worm scanned the Internet for Windows NT or Windows 2000 servers that  do not have the Microsoft security patch installed. Each time it found  an unsecured server, the worm copied itself to that server. The new copy  then scanned for other servers to infect. Depending on the number of  unsecured servers, a worm could conceivably create hundreds of thousands  of copies.
The Code Red worm was designed to do three things:
•Replicate itself for the first 20 days of each month
•Replace Web pages on infected servers with a page that declares "Hacked  by Chinese"
•Launch a concerted attack on the White House Web server in an attempt  to overwhelm it
The most common version of Code Red is a variation, typically referred  to as a mutated strain, of the original Ida Code Red that replicated  itself on July 19, 2001.
TROJAN HORSES
Trojans, another form of malware, are generally agreed upon as doing  something other than the user expected, with that “something” defined as  malicious. Most often, Trojans are associated with remote access  programs that perform illicit operations such as password-stealing or  which allow compromised machines to be used for targeted denial of  service attacks. One of the more basic forms of a denial of service  (DoS) attack involves flooding a target system with so much data,  traffic, or commands that it can no longer perform its core functions.  When multiple machines are gathered together to launch such an attack,  it is known as a distributed denial of service attack, or DDoS.
Because Trojan horses do not make duplicates of themselves on the  victims disk (or copy themselves to other disks), they are not  technically viruses. But because they can do harm, many experts consider  them to be a type of virus. Trojan horses are often used as by hackers  to create a back door to an infected system. Trojans, such as  BackOrrifice are very dangerous. If anyone runs this program and his  computer is connected to the internet, then the hacker can take control  of that computer - transfer files to or from the computer, capture  screen contents, run any program or kill any running process, etc.
Once a Trojan is installed onto the system this program has the same  privileges as the user of the computer and can exploit the system to do  something the user did not intend such as:
Delete files
Transmit to the intruder any files that the user can read
Change any files that the user can modify
Install other programs with the user’s privileges
Execute privilege-elevation attacks—the Trojan can attempt to exploit a  weakness to raise the level of access beyond the user running the  Trojan. If successful, the Trojan can operate with increased privileges.
Install viruses
Install other Trojans
The Following Tips Will Help The User To Minimize Virus Risk:
If the users are truly worried about traditional (as opposed to e-mail)  viruses, they should be running a more secure operating system like  UNIX. One should never hear about viruses on these operating systems  because the security features keep viruses (and unwanted human visitors)  away from the hard disk.
If the users are using an unsecured operating system, then buying virus  protection software is a nice safeguard. Some popular anti virus  programs include:
•McAfee Virus Scan
•Norton Anti Virus
•Virex
•PC—cillin
•Avast!
•AVG Anti Virus System
Automatic protection of anti-virus software should be turned on at all  times.
The users should perform a manual scan (or schedule a scan to occur  automatically) of their hard disks weekly. These scans supplement  automatic protection and confirm that the computer is virus-free.
Scan all floppy disks before first use.
Disable floppy disk booting -- most computers now allow the user to do  this, and that will eliminate the risk of a boot sector virus coming in  from a floppy disk accidentally left in the drive.
The users should Enable Automatic Update option of their anti-virus  software in order to update their virus definition files.
Creation and maintenance of a rescue disk should be done by the user in  order to facilitate recovery from certain boot viruses.
Periodic backups of the hard disk should be done.
Users’ should buy legal copies of all software they use and make  write-protected backups. 
 Email messages and email attachments from unknown people should not be  opened. Attachments that come in as Word files (.DOC), spreadsheets  (.XLS), images (.GIF and .JPG), etc., are data files and they can do no  damage (noting the macro virus problem in Word and Excel documents  mentioned above). A file with an extension like EXE, COM or VBS is an  executable, and an executable can do any sort of damage it wants.  Further it should be verified that the "author" of the email has sent  the attachments. Newer viruses can send email messages that appear to be  from a person user know.
The potential users should make sure that Macro Virus Protection is  enabled in all Microsoft applications, and they should never run macros  in a document unless they know specifically the functionality of the  macros.
Appropriate Passwords should be assigned to the shared network drives.    
Things that are not viruses!
Joke programs
Joke programs are not viruses and do not inflict any damage. Their  purpose is to frighten their victims into thinking that a virus has  infected and damaged their system. For example, a joke program may  display a message warning the user not to touch any keys or else the  computer’s hard disk will be formatted.
Droppers
A dropper is a program that is not a virus, nor is it infected with a  virus but when run it installs a virus into memory on to the disk, or  onto a file. Droppers have been written sometimes as a convenient  carrier for a virus and sometimes as an act of sabotage.
Hoaxes
There must be very few people on email who haven't received a chain  letter with the subject line warning of a virus doing the rounds. These  are often hoaxes and meant to scare people and have fun at their  expense. The warnings encourage the recipient of the e-mail to pass the  warning to the netizens and thus create an unnecessary furor, besides  clogging mailboxes, as it usurps an air of credibility.
Methodology of virus detection applied by antivirus softwares:
Three main methods exist for detecting viruses: integrity checking (also  known as checksumming), behavior monitoring and pattern matching  (scanning).
Integrity checking
Antivirus programs that use integrity checking start by building an  initial record of the status (size, time, date, etc.) of every  application file on the hard drive. Using this data, checksumming  programs then monitor the files to see if changes have been made. If the  status changes, the integrity checker warns the user of a possible  virus.
However, this method has several disadvantages, the biggest being that  false alarms are altogether too common. The records used by checksumming  programs are often rendered obsolete by legitimate programs, which, in  their normal course of operations, make changes to files that appear to  the Integrity checker to be viral activity. Another weakness of  integrity checking is that it can only alert the user after a virus has  infected the system.
Behavior monitoring
Behavior Monitoring programs are usually terminate and stay resident  (TSR) and constantly monitor requests that are passed to the interrupt  table. These programs are on the lookout for activities that a virus  might engage in--requests to write to a boot sector, opening an  executable program for writing, or placing itself resident in memory.  The behavior these programs monitor is derived from a user-configurable  set of rules.
Pattern matching
Using a process called "pattern matching," the anti-virus software draws  upon an extensive database of virus patterns to identify known virus  signatures, or telltale snippets of virus code. Key areas of each  scanned file are compared against the list of thousands of virus  signatures that the anti-virus software has on record.
Whenever a match occurs, the anti-virus software takes the action the  user has configured: Clean, Delete, Quarantine, Pass (Deny Access for  Real-time Scan), or Rename.
Self Defense Mechanisms Evolved By Viruses
Virus authors of course wish that their child successfully lives. For  this reason there are many viruses outfitted with some self-defense  mechanisms against anti virus systems.
Passive Defense :
Viruses use a variety of methods to hide themselves from antivirus  programs. Passive defense uses programming methods which make analysis  of the virus more difficult, e.g. polymorphic viruses which were  developed to counter scanners looking for constant strings of virus  code.
Today antivirus systems are capable of analyzing polymorphic code and  searching for virus identifiers in the decrypted body. The virus authors  reacted by making the encryption too complex for antivirus software to  unravel, thus mistaking it for a clean program.
Active Self-defense :
Viruses actively defend themselves by protecting their own code or by  attempting to damage antivirus software. A simple method is to locate  antivirus software databases and amend or delete them.
More sophisticated resident viruses use stealth techniques. When they  detect a request to use an infected file, they can temporarily "clean"  it or report its original (uninfected) parameters. They can monitor  which programs are being executed and react if it is antivirus software.  The list of such reactions is endless. Usually, the execution of the  antivirus program is refused, but it could be erased (often accompanied  by a bogus error message) or the virus suspends its activities while it  runs. There are occasionally extremely 'clever' viruses which modify the  code of a specific AV program to partially disable it.
There are very rare viruses which consider an attempt to run an  anti-virus program as arrogant and immediately reply with some revenge  action - for example hard disk formatting.
Trap
A trap is the most malicious form of self-defense and works as follows.  Although the user’s computer is infected but everything appears to work  correctly. Once the user discovers the virus and removes it things get  complicated - programs no longer run properly or the hard disk may  become inaccessible even when booting from a clean system diskette.
The best known trap virus is One_Half. It continuously encrypts the data  on a hard disk (two tracks on every boot). If it is removed from the  partition sector before data files are decoded then some files will  become inaccessible. At this stage the situation is serious but recovery  of the data is still possible. However, if the user runs a disk utility  (Scandisk etc.) to repair the damage then the data will almost  certainly be lost forever.
These utilities are designed to repair relatively minor damage to file  system and do not recognize the encrypted data.
REFERENCE:
1.   Mary Landesman “What is a virus?”
http://antivirus.about.com/cs/tutorials/a/whatisavirus.htm
2.   NetGuide “What are computer viruses? “–
http://www.netguide.co.nz/knowhow/tutorials/print.php?iid=38
3.   Marshall Brain “How Computer Viruses Work”
http://www.Howstuffworks How Computer Viruses Work.htm
4.  AVG Anti Virus Free Edition Help
Developed by Grisoft Inc
5.  Norton Anti-virus Help
Developed by Symantec Corporation
6.  Trend Micro PC-cillin Help
Developed by Trend Micro Inc
7.  Peter Norton “Computer Viruses”
Introduction to Computers, Tata McGraw Hill Co:
8. Dr.Solomon ”About Viruses” &”Virus Prevention”
Dr.Solomon’s Virus Encyclopedia, Dr.Solomon’s Software Ltd.
9.  C.A.Schmidt ”Virus”
The Complete Computer Upgrade And Repair Text Book,Dreamtech
10. S.Jaiswal “Virus Detection And Elimination”
Information Technology Today, Galgotia Publication Pvt. Ltd.                                                                                                                
(ArticlesBase SC #213214)
M.Com,M.C.A, Master in Multimedia Development (Equiv: M.E)
Lecturer-Pailan School of International Studies
Part time Lecturer -Prafulla Chandra College
Membuat Menu dan Toolbar
Jika anda ingin aplikasi nada memiliki daftar perintah yang diperuntukkan kepada user, anda dapat menyusun daftar menu untuk aplikasi tersebut. Menu merupakan cara yang efisien dan konsisten untuk mengelompokkan perintah sehingga user mudah dalam mengaksesnya.
Khusus pada pemrograman aplikasi berbasis windows, umumnya sebuah program selalu dilengkapi dengan fasilitas Menu Bar dan Toolbar. Dalam pemrograman Visual BASIC, kita juga dapat membuat menu dan toolbar melalui fasilitas menu editor dan toolbox-toolbox yang telah disediakan Visual BASIC. Pada bahasan ini kita akan membahas tata cara pembuatan menu dan toolbar menggunakan Visual BASIC secarasingkat.
Pembuatan Menu.
Untuk membuat menu pada sebuah form, pertama kali kita harus membuat desain dari menu dan sub menu yang akan kita buat. Sebagai contoh kita akan membuat sebuah menu utama untuk mengakses program animasi yang telah kita buat.
Langkah pertama anda harus menambahkan sebuah form (Project - Add Form).
Kemudian Klik Menu Tools – Menu Editor untuk menampilkan jendela menu editor.
Pada jendela yang muncul desain menunya sehingga pada menu editor akan didapat tampilan lengkap sebagai berikut:
seperti berikut :
Materi Lengkap mengenai cara mudah membuat menu dan toolbar dapat didownload di sini.
Aplikasi Animasi yang dibuat seperti animasi tulisan kedap kedip, animasi tulisan berpindah, animasi tulisan zigzag dan lain sebagainya, program lengkapnya dapat anda download di sini.
selamat mencoba!!!
(referensi: -Komunitas eLearning IlmuKomputer.Com
-pemrograman Visual Basic 6.0 penerbit ANDI yogyakarta)
Minggu, 11 Juli 2010
Animasi Huruf Berjalan versi 1 dengan VB
materi lengkapnya dapat didownload di sini.
untuk bisa membuat animasi huruf berjalan maka kita harus membutuhkan bantuan timer. timer merupakan salah satu toolbox yang terdapat pada visual basic.
oke langsung saja...
persiapan:
-form
-timer
-label
-commandbutton
properties:
form:startupposition=2-centerscreen, caption=animasi huruf berjalan versi 1,name=form1.
timer:enable=true, interval=100
label:caption=Belajar Animasi Huruf Berjalan versi Satu! , autosize=true, font=Ms Sans Serif, bold,24.
commandbutton: caption=keluar
kemudian desain seperti nampak pada gambar dibawah ini:
selamat mencoba!!!!!
animasi huruf kedap-kedip dengan VB
oke langsung saja...
persiapan:
-form
-timer
-label
-commandbutton
properties:
form:startupposition=2-centerscreen, caption=animasi huruf kedap kedip,name=form_animasi1.
timer:enable=true, interval=100
label:caption=Belajar Animasi Kedap Kedip!, autosize=true, font=Ms Sans Serif, bold,24.
commandbutton: caption=keluar
catatan: untuk name tidak perlu diganti biarkan saja name nya default.
kemudian desain seperti nampak pada gambar dibawah ini:
selamat mencoba!!!!
perusahaan terdashyat abad ini
ayo gabung ke bisnis aku..bisnis yang menjanjikan...
setiap orang mempunyai impian dimasa yang akan datang...
semua akan terwujud..dan akan tercapai...
solusinya ayo gabung ke..
perusahaan terdashyat abad ini!!!
Dengan Pelopor : Bpk. RICHAT.dkk
untuk lebih lengkapnya..silahkan hubungi nomor hape: 081917044860 dan download informasinya di sini.
REKURSIF
Proses yang bersifat Rekursif, terjadi apabila dalam sebuah fungsi ada intstruksi yang memanggil (mengCALL) fungsi itu sendiri, atau lebih sering disebut memanggil dirinya sendiri.
...
materi lengkapnya dapat didownload di sini.
contoh kasus:
susun algoritma dan buat program untuk menginput sebuah nilai integer ( misal masuk ke variabel N), kemudian hitung N faktorial ( N!).
contoh bila N=4, maka N!=4*3*2*1=24 (jadi 4!=24)
adapun code program dengan C++ sebagai berikut:
//rekursif menaik
#include
#include
void main()
{
int i, hasil,n;
cout<<"masukan nilai INTEGER :";
cin>>n;
hasil=1;
for (i=1;i<=n;i++)
.......
.......
.......
adapun kode program fullnya (dengan rekursif menaik dan rekursif menurun) dapat didownload di sini.
 
