"Welcome, Thanks for Coming ... Scroll Down To See All The Description ... (>> PLEASE INSERT COMMENT TO OUR SHOUTMIX WIDGET SYSTEM before ScRoLlInG DoWn - THANKS ... REPOST is FORBIDDEN but LINKBACK is OK" »


Senin, Januari 08, 2024

Core Banking

https://payments.mifos.org/

Jumat, Mei 15, 2009

Secure your Cisco Network Time Protocol

Network Time Protocol (NTP) is a client-server, UDP-based protocol used to synchronize time clocks amongst network devices. Time synchronization is critical for some feature functionality such as VPNs, time-based ACLs, and authentication and is also a critical element for event correlation, problem debug, and security.
NTP uses a hierarchical-based concept called a “stratum” to describe how many NTP “hops” away a machine is from an authoritative time source. A Stratum 0 source is the root and is based on an atomic clock, or series of them, and is incredibly accurate. A Stratum 1 clock would receive its source from a Stratum 0 clock and would therefore be one hop away. This pattern would follow for Stratum 2 and Stratum 3, etc. Since NTP provides a critical resource for your network, you need to be certain that it is correct. The most desirable way to provide an accurate, secure time source would be to have a Stratum 1 clock source directly on your network. Short of that, the most common implementation currently used is to have a device on your network, typically a router, synchronize with a public Stratum 1 or 2 time source, and then act as the local network master clock source.
Internal devices, servers, and hosts can then synchronize their clocks with this network source. This hierarchy allows you to configure strict NTP (UDP port 123) rules on your firewall.

Security can also be improved by implementing NTP authentication between your routers and implementing NTP Access Control Lists.
Protecting your NTP deployment
NTP authentication operates a bit differently than what you may think and is often a point of confusion. With NTP authentication on Cisco routers, a key is defined on the source host (master clock) and is used to MD5 hash the response to queries. However, in the case of NTP, it is up to the client to request authentication rather than the router to demand it.
In this sense, the requesting client is verifying the integrity of source rather than the source verifying the client validity. The net of this is that the router will also respond to queries that do not require authentication as well as those that do. However, if a client requests authentication and the router is not configured for it, the NTP synchronization will fail.
For reliability and security reasons, set up more than one router on your network to provide NTP synchronization, with each of them getting their time reference from a different Stratum 1 clock, and then set up peering with authentication between these routers.
Access Control Lists can also be great tools to protect your NTP deployment. You can implement a “peer group” ACL to define and control which IP addresses are allowed to peer with your router. Additionally, you can implement a “serve,” or “serve-only,” ACL to define which IP addresses or netblocks are allowed to make NTP queries to your router.
NTP accuracy is critical to your network. It takes a relatively small bit of time to set it up correctly and protect it with security measures but your efforts will pay off big time.




Lori Hyde
(CCNP, CCSP, and CCVP)
has worked in a variety of IT jobs in her career,
including user and network support,
pre-sales engineering for a Cisco reseller,
and security engineering for a large health insurance company.
She is currently a network and security engineer for
IT Business She also holds the GCIH and INFOSEC 4013 security certifications.

Info Division
http://blogs.techrepublic.com.com/networking/?p=1448&tag=nl.e115

Selasa, Mei 12, 2009

Selling and Buying

Mau iklan? atau mau beli product di bawah lebih murah?
ketik : NAMA_UMUR_TGLLAHIR
ke 0818 089 098 21
Dijamin


daniel_chang4jc said on
temen2...g ada jual pda... ada MWG ATOM V sama MWG ZINC II... harga miring dah... barang baru + segel... garansi... dijamin maknyus... buat harga pm aj yah... (08195678293)
May 12 2009, 08:08daniel_chang4jc said on
no sejoli nan indah buat sepasang:
0819 30 888009
0856 9 888009
harga sepasang 1jt - nego...

nomor cantik tahunan sudah aktif:
0812 1986 1989
0812 1986 1978
masing2 berharga 500rb - nego...

berminat hubungi : 0819 567 8293 (daniel)

-Sell and BuY-

Tips Hidup Sehat

7 Tips Hidup Sehat :
1. Jawablah Telepon dengan menggunakan TELINGA KIRI.
2. Jangan Minum Obat dengan AIR DINGIN.
3. Jangan MAKAN makanan Berat setelah jam 6 MALAM.
4. Minum Air Putih Lebih banyak pada pagi hari, dan pada malam hari lebih sedikit.
5. Jam Tidur yang paling baik adalah jam 10 malam sampai dengan jam 5 Pagi.
6. Jangan Terlalu cepat berbaring setelah minum Obat.
7. Ketika Batrai HP tinggal 1 bar, jangan angkat TELEPON karena Radiasi meningkat Hingga 100X !!!!!!!!

Tolong sebarkan pesan ini ke orang-orang yang KITA SAYANGI.... dan yakinlah bahwa kebaikan hati.... tidak akan pernah merugikan Kita ...

send ALL

[peace]

- Supra -
Resource Division

Senin, Mei 04, 2009

Try This MP3 Online by Google



Minggu, April 19, 2009

Kisi-kisi terbaru

Untuk sementara kisi-kisi TI dulu yah.... untuk SI belum ada line ke sana...
Soalnya pemiliknya juga anak TI... tp nice work anak SI... I love 'keaktivanmu' ciayyoo.. .^^

ini kisi-kisi buat yang merasa sekelas ama orang yang di foto ^.^ hua hua hua
[belum di validasi-tp kalau niat belajar boleh di baca, maklum yang bagus keluarnya lama neh...
tp inget, skynetwork assoc divisi-education-a.k.a kisi-kisi TIDAK MENJUAL SOAL, KUNCI JAWABAN, ataupun SEMACAMNYA (kl gak kpn INDONESIA maju!!!), kl kisi-kisi kan tetap aja mesti belajar ^^]

Jarkom :
-Teori Nyquist
-NRZ-L , NRZ-I
-CRC

PG : 20
Essay : 3

SBD :
-Pertemuan 1 - 14

AI :
- BFS, Astar (A*), lowest cost
- Predicate logic
- Backward
- CNF
- Probabilitas

Multimedia :
PG - Element : text, gambar, suara.
Essay - dirahasiakan ktanya (alias belum tahu)
Kasus - Story Board

RPL :
PG - quiz bapaknya
ESSAY - presentasi bapaknya and BiMay
Kasus : fan in, fan out, (hitung-hitungannya)

note :
KISI-KISI tetaplah KISI-KISI, ibarat berperang, kisi-kisi cuma perlengkapan perang darurat untuk melindungi diri dari bahaya 'E' alias SP...

nah barang siapa yang hendak 'A',(penulis jg pengen), mari bersama cari soal dan jawaban asli...(loh?!?!?!?) haha... bercanda... maksudnya
carilah kisi-kisi yang paling mendekati dan share dunk ke penulis linknya

isi aja widjet diatas dan upload/ tulis linknya :)

thanks yah...
[penulis lg pengen 'A' ada yang bersedia membantu? cara yang jujur yah (ga nyontek) ]

[Education Division]
a.k.a
Kisi-kisi division (kerenan kisi-kisi HQ kali yah :P)
[untuk sementara just for semester 4]
kalau ada yang mau lebih... penuhiin aja widget diatas dengan link...
coz memang blog ini temanya/konsepnya : creative.. so just use all the facility :)


NOTE :
KL dapet soal/jawaban asli gimana?
gw pengen bantu lu...
gw kasihan lihat foto u di site lu...
tp takut yang buka malah dosennya....

nah... : don't worry... bantu gw ke email aja yah :
henry_h2c@yahoo.com
-gak dibayar, ga digaji, ga diberi nafkah.... tp, percayahlah.. kl gw bs dapet 'A' u pasti dapet
sesuatu yang lebih dari yang gw sebutin sebelumnya (2x lipat)... ampe turun-temurun kalau perlu.... [sky belum pernah tidak menepati janji kan, pernah telat duank menepati] ^^ so yah.... u boleh ga ga percaya gw... ^^

Kamis, April 16, 2009

Kisi-kisi 2009 TI 4 Smster

Berikut ini Kisi-kisi yang sudah mengalir...
kalau ada yang terbaru dan mau diri Anda tercantum dan disaksikan banyak anak binus
sent email kisi-kisi/ disarankan YM ke :

henry_h2c@yahoo.com

Berikut dari sumber yang terpilih : saudara Yudi

jarkom:
- CRC-> humming code/division
- konsep2

  • OSI 7 layer, TCP/IP
  • ALOHA pure, slotted,CSMA
  • shanon + hitung-hitungan

- cara kerja ALOHA + bedanya


Sistem Basis Data
PG: 30%
essay: 30%
kasus: 40%
kasusnya syntax sql–>DDL DML (pastinya.,.,><)

sumber: 04PDT,..,><


Kisi2 IS from bpk. Trijoko:
1. problem space n search (hal 23)
2. heuristic search teknologi (hal 28)
3. knowledge representation (hal 59)
4. predicate logic
5. symbolic reasoning (hal 94)
6. statistical reasoning (hal 96)
7. bayes teorem (hal 90)
8. dempster-shater-teorema (hal 102)
9. semantic nets( hal 81)
10. frames(hal 82)
11. story slot ( ga ada d buku!)
12. minimax (hal 142)
13. alpha-beta circuit (hal 149 or 144)

sumber: 04PKT,..,nice,..,

IS
UTS pertemuan 1-5
PG 15 -> 30%
essay 5-> 70%
1. intro AI
2. search

  • blind
    • DFS
    • BFS
  • heuristic

    • Best First Search
    • A*
      • jarak
      • lama

3. RP(representasi pengetahuan)KR(knowledge representation)
4. Predicate logic

  • CNF
  • resolusi

5. certainly factor (1 event atau 2 event)
6. teorema bayes -> bedakan hipotesa dan evidence

sumber: 04PDT.,.,nice.,^^


-yang dari kelasku nanti dulu yah, izin dulu sama yg punya :) [keep the best at the last- wakkkkk] -


[Education Division] -pengen request ke Sky Jd [Kisi-Kisi Division]