Wednesday, October 21, 2015

SELAMAT ATAS WISUDANYA ERIK MARANGGA (UGM OKTOBER 2015)

SELAMAT ATAS WISUDANYA ERIK MARANGGA OKTOBER 2015



SEMOGA ILMUNYA BERMANFAAT

SEMOGA KEINGINAN YANG DIPRIORITASKAN SEGERA TERCAPAI



Bersama Bunda

Teman sesama wisuda dan Jeff







Syukuran makan BESAR di Je Jamuran YOGYAKARTA





Tuesday, December 6, 2011

Pengertian Karikatur dan jasa pembuatan Karikatur

Karikatur adalah gambar olok-olok yang mengandung pesan, sindiran, dan sebagainya yang dibuat dengan cara melebih-lebihkan gambaran seseorang atau sesuatu dengan tetap mempertahankan kemiripan visual dengan orang atau benda aslinya. Karikatur berasal dari bahasa Italia, caricare, yang artinya memuat (dalam hal ini memuat berlebihan). Kata caricatura baru populer dan digunakan orang dalam kehidupan dunia seni sekitar tahun 1665. Seniman yang mengenalkan kata itu adalah Gian Lorenzo Bernini, seorang pematung dan arsitek, ketika datang ke Perancis.

Sebuah karikatur dapat disebut sebagai kartun, akan tetapi kartun tidak bisa disebut karikatur. Namun dari keduanya ada persamaan, yaitu sama-sama memiliki unsur humor yang kata Freud adalah ’sebuah perang kecil terhadap diri sendiri’. Isi karikatur bisa berupa sindiran atau pujian dan dapat pula dimaksudkan untuk tujuan politis atau dibuat semata-mata untuk hiburan. Karikatur politik biasa ditemukan di kartun editorial, sementara karikatur selebriti sering ditemukan di majalah hiburan yang di buat menggunakan jasa karikatur profesional

Banyak seniman-seniman besar populer kartun di dunia ini memiliki gaya mereka sendiri menciptakan animasi tanda tangan Anda. Semua karakter kartun dibuat dengan berbagai gaya dan tema, anime, pahlawan dan dongeng adalah beberapa kartun populer. Baik anak-anak dan para orang dewasa bersenang-senang sambil menonton kartun kartun, karena mereka memberikan rasa humor saja.Sebagian besar dari mereka memiliki strategi mereka sendiri tentang cara menggambar satukartuNn Jadi berikut adalah beberapa cara sederhana untuk menggambar karikatur karikatur gambar untuk warna

Phone : 0341-6500606 hp 087859686791 (syarif)
Email : info@tatawarna.com

Kantor Pusat :
Jl. Raya Tlogomas 41 Kota Malang

Sunday, October 18, 2009

Testing Computer Network Security

So you want to know just how secure your computer network is. You can't really tell until you perform a text which assesses your system's weaknesses and how these could be taken advantage of. Companies and personal users do these tests so they can narrow down their locus of problems regarding their systems and come up with possible ways to remedy whatever irregularities are spotted. In a way, these so-called "Penetration Tests" are synonymous to ethical hacking which aims to get into a system to see how it can be further strengthened and guarded against black hats.

Doing a penetration test will, of course, begin with a plan where goals are defined as well as the time limits for the achievement of those goals. Here, the major problems will be discussed, as well as the specific parts of the system that should be tested, when and how long the process will take. Basically, this is where the structure of the test to be performed will be mapped out, beginning with pinpointing the actual potential sources of problems and the approach that will be used to solve them using the penetration technique.

Once everything has been detailed out, the role of the ethical hacker will be defined. The person who will pretend to be a hacker will now put himself in the shoes of a black hat and will try to do things as a black hat would to a system that he plans on attacking. After this, the tester will now go through the system and see from which actual points a hacker might possibly attack. In other words, this is where vulnerabilities of such a system will be exposed.

The last step is for the tester to "hack" the system as though he was a real hacker with real objectives for doing the hacking. For example, the tester would try to dig as much information from the system as he can. By knowing how this is possible, he will be able to come up with counter measures that will make such an intrusion impossible.

After the test, a report will be submitted to the company and will detail whatever vulnerabilities have been discovered with the system as well as how to best remove these weak points by providing solutions. In other words, the main goal of a penetration test is to see where a hacker might be successful in hacking a computer network and provide solutions to make sure these weaknesses are fixed before a real hacker makes a go for them.

Prevention is still, of course, the main thing when it comes to avoiding hackers. Companies must make it a point to ensure that their employees only visit clean sites or, if this is not possible, web surfing other than those directly related to the job, should be prohibited. However, as one can never totally get rid of the threats of hacking, it would be wise to install a software that isolates such risks significantly.

An IP change software, which allows a computer to go online with its real IP address hidden, could be a very good option. When the IP is hidden, any computer can run around freely on the Internet without being targeted for hacking. Or the computer may be targeted but the hacker's efforts will simply be in vain because such computer won't really be accessible to him since it's using a fake IP.

Sunday, October 11, 2009

Web Design Flaws to Avoid

In web design, the graphics part is as equally important as the back end. For a fully functional website there are a few design faux pas that need to be avoided. By that I mean, having a fast loading website with visitors not just clicking away. Before getting your website designed it is good to check the portfolio of the web design firm to be sure that the designer will avoid the following flaws.

Large Graphic Header

This is one thing that should definitely be avoided. You may think it looks nice on a high resolution screen. Know that there are still many people having 1024*768 screen resolution. If the header is too big, it may cover almost half of the page.

Too Many Colors

You may be tempted to use various colors to differentiate between elements on your website but doing it will not look attractive. It is something that was used long ago. So, if you have too many bright colors on your website it may look outdated to some people and you may lose potential clients.

Content Crammed in a Small Space

Leave enough white space on all your pages. It can be tiring to keep on scrolling to read a whole page. Best is to break the page in two or more to avoid scrolling.

Use of Fonts

You may want to use that font you just downloaded in your website. It looks way nicer than arial, verdana or all the other office default fonts. Unfortunately others will not see the font unless they have it installed on their computer. You may use these fonts for your header which is an image file.

Tuesday, September 1, 2009

Masking an IP

Some may wonder why there is a need to cover an Internet Protocal address. They may ask why mask my IP? Well, there are several reasons why someone would need to take the steps to hide an address. One of the core principles with masking an IP address centers on the ability to keep private information exactly that - private.

Yes, the main reason you need to protect the privacy of your Internet activity is you do not want any of your sensitive personal information to be compromised. Sadly, there is a worldwide network of individuals that exist solely to steal your private info. If they can gain access to such personal information, they could compromise bank accounts or credit cards. In some cases, they could even steal info for the purpose of identity fraud. The nightmare that can ensue from that scenario is frightening! When someone asks "Why mask my IP address?" they are doing so because they are not looking at the process from the perspective of maintaining their security.

Some may wonder if a firewall or an anti-virus is enough to protect personal privacy. Well, it might be....or it just might not be. The key here is it is best to take the right steps needed to make sure there are no breaches in the computer. The presence of openings which can allow for unauthorized access must be completely eliminated or else a seriously problematic situation could develop. As such, taking the steps to make sure no one can compromise your information via capturing your IP address.

So, how can I mask my IP address? There are two common means. The first involves performing your browsing through a proxy website. A proxy website is, in essence, a subdirectory web browser. In other words, you search the web through a static webpage. When you are browsing various pages, you will see them in a sub-frame of the proxy server site. This way, any website you visit will not see your IP address. Instead, it will see the IP address of the proxy server. This will be useless to them since they will not be able to access any information of value.

The second method involves using a masking software program. There are different types of software programs that serve this purpose. Some are better than others so it may be worth exploring consumer reviews prior to making a purchase. The way these programs work is they can hide the real IP address you are using to browse the net. When someone tries to appropriate the information, they will not be able to. Again, as with the proxy server, they will not be looking at the proper IP address.

Regardless of the method you choose to use, the main important point is that you hide your IP address from those who would use it to their own ends. Such people can prove enormously problematic and any impediments you place in front of them will prove helpful.

Friday, August 28, 2009

Proxy Sites and Their Benefits

Privacy has taken on a whole new meaning. When shopping, banking, updating medical history, applying for loans and requesting financial aid, to name a few, are all done online from the comfort of a desk chair, information that no one wants floating around is doing just that, floating. Each time a person 'surfs the web' their computer is communicating with each website, offering it the computer's IP (internet provider) address, among other things.

It can be fairly easy for a web master to trace that information to gather a person's physical address, phone number and more. The information is also stored on that person's computer, making it very simple for anyone with access to that computer to see exactly what sites have been browsed, and what was done on them. Public computers, and home ones as well, frequently have software that limits or blocks access to certain websites. Higher education campuses that offer free web service typically block sites such as Facebook, MySpace and more. There is a simple solution to all of the above problems. That solution is called a proxy site.

A proxy site allows the user to browse websites using a specific format. Using these sites bypasses the blocks that have been set on the computer and allows the user to 'hide' their own IP address behind the proxy, leaving the user anonymous. Once a proxy site is chosen, and there are many to choose from, the user simply types in a search, or the web address, using the specific format used by that proxy. This allows a user to access sites that are typically blocked by 'nanny' type software. When using proxy sites, the activity can't be tracked on the computer.

This means that if you are on a network server, the administrators of the network cannot see what sites you have been on. It also means that those people with access to the computer itself, such as family members or roommates, cannot browse the history of the previous user. All they will see is the URL of the proxy sites, everything else will be through an intermediary server.

To protect valuable personal information from the prying eyes of the world, proxy sites are the way to go. Experts recommend using a different site each time you browse the web. Then browse away, without worry.

In order to make your Internet browsing even more secure, many experts would recommend using a different proxy site for each session. DrProxies.com offers you a fresh list of all the best and latest proxies that'll keep you surfing in private for a long time.

Friday, August 14, 2009

How to Prevent Computer Viruses from Attacking Your PC?

Do you want to know how to prevent computer viruses attacking your PC? The first thing that you will want to do is to be careful when you use the Internet to surf various websites and download media files. The best prevention method would be to download and install an antivirus and antispyware software to run frequent scans on your system. It really is not as difficult to protect a computer from virus attacks as what most users would make it out to be.

1. Do You Really Need to Protect Yourself Against Virus and Spyware Attacks?

It is important that people know what these parasites are capable and how to protect against them. This is due to the fact that the majority of people today know how to use the web and their PC and personal information are constantly being exposed to the threats in the online world. Since research has shown that a majority of users who access the Internet have had their computers infected, it is crucial that you learn how to defend against them before it is too late.

2. What is a Computer Virus and What is It Capable of Doing?

A virus is a program that is capable of destroying folders, registries and files and finally aiming to wipe out the entire hard disk. It attacks and infiltrates the system without any knowledge from the user. Some viruses and spyware are also capable of deactivating any existing computer protection software installed to allow the hacker to use unauthorized means to access the system.

3. How to Prevent Computer Viruses from Attacking your PC?

The fastest and easiest way is to download virus removal software to run a scan and fix on your system. They are capable of reading signatures from all the files and registry entries in a system before finding all the erroneous and infected files. It is able to repair or remove them within minutes to leave your PC running like new again.