Wikipedia Definition of Computer Science

Computer science (English : Computer Science ) , generally defined as the study of both computing hardware ( hardware ) and software (the software ) . Computer science includes a variety of computer-related topics , ranging from abstract analysis of algorithms to more concrete subjects such as programming languages ​​, software , including hardware . As a discipline , Computer Science more emphasis on computer programming , and software engineering ( software ) , while computer engineering is more likely related to such things as computer hardware ( hardware ) . However, these two terms are often misunderstood by many people .Church - Turing thesis states that all the computational tools that have been commonly known is the same in terms of what they can do , albeit with different efficiencies .This thesis is sometimes regarded as the basic principles of computer science . The experts in computer science typically emphasize the von Neumann computers or Turing machines ( computers small tasks and deterministic at any given time ) , because things like that most computers in use today . The experts also studied computer science other types of machines , some of which can not be used practically ( such as neural computers , DNA computers , and quantum computers ) and some of which are still fairly theoretical ( such as computers and computer random oracle ) .Computer Science learn what can be done by several programs , and what is not ( computability and artificial intelligence ) , how the program should evaluate the results ( algorithm ) , how programs should store and retrieve specific bits of an information ( data structures ) , and how to program and communicate user ( user interface and programming language ) .Computer science is rooted in electronics , mathematics and linguistics . In the last three decades of the 20th century , computer science has become a new discipline and has developed its own methods and terminology .The first computer science department at Purdue University was founded in 1962 . Nearly all universities now have departments of computer science .The highest award in computer science is the Turing Award , the winner of this award are all pioneers in their field .
Edsger Dijkstra said :

    
Computer science is not about computers as astronomy is not about telescopes
Renowned physicist Richard Feynman said :

    
Computer science is not as old as the age of physics ; several hundred years younger . Even so , this does not mean that the " dish " computer scientists much less than physicists . Indeed younger , but grew up in a much more intensive !

Introduction to Computer Installation

To do that , first you must be able to understand the information that is written in the English language manual and computer electronics computer programs , if necessary, prepare the English dictionary . English used in this case is quite simple and easy to understand , just by knowing little English grammar you can understand the intent of the manufacturer's instructions hardware and operating system programs and application systems .
In assembling a computer , your hands should not be wet ( sweaty ) and you should not hold the middle IC chip includes processor and memory .Sweat can cause a short on the motherboard electronic circuit when you turn it on . Handrails at the center of the IC chip can damage it because your hands contain static electricity . If necessary it will be better if when assembling your hand wearing a bracelet made ​​of metal wires ( wires that have been exfoliated skin ) and connected to the floor or ground ( grounding ) , so that electricity from your hands but do not damage the IC chip forwarded to ground .
COMPONENTS OF A PC
To assemble a personal computer required electronic equipment at least as follows :1 . Screen Monitor , shaped like television because it has a glass tube RGB . There is also a type of monitor screen LCD (liquid crystal display ) that only requires little electricity . You can choose one type of VGA , SVGA or LCD ( these types are widely used as standard fittings on a personal computer at this time ) .2 . Motherboard ( mainboard ) , a component where its installed with another devicepersonal computer , can be selected from the type of motherboard that is capable of controlling both AMD and Intel processors . Single or Dual Processor Processor .3 . Processor , as the central control throughout the process , for now there are 2 types that you can choose which products from INTEL or AMD . This processor is usually paired with Heat Sink and Fan ( HSF ), which consists of a metal heat sink and fan , serves as a coolant .4 . Memory RAM ( random access memory ) , which can be selected according to the type that matches the motherboard you have. There are several types of RAM and you can ask the store to match the type of RAM your motherboard will buy . A common type of RAM used today include RAM SDR , DDR RAM and DDR2 RAM , with capacities ranging from 64 Mbyte , 256 Mbyte to 1 GB per piece . Memory function temporarily storing application programs and the operating system and work files during computer operation . The larger size is used more so reliable that you raft on the computer while typing or drawing .5 . VGA ( Video Graphics Array ) card , a component whose function is to process the video data / graphs . For the moment there that is integrated with the motherboard ( on board ) and there is attached to the motherboard ( add on ) . Type , such as type VGA Card PCI slots , an AGP slot and a PCI Express slot .6 . Floppy drive and cord , you can choose the standard and commonly installed in PCs that exist today are the type of floppy drive 3.5 inch with 1.44 Mbyte capacity .7 . Following hard drive cable , you can choose the type of disk in accordance with needs ranging from a capacity of 1 Gbyte , 2.3 Gbyte s / d 120 GByte . The current hard drive there are 2 types commonly used for personal computers is the type of IDE and SATA type .8 . Keyboard , the keyboard can be chosen to suit your taste . Based on the connector ,the keyboard has a kind of PS / 2 , USB and Wireless .9 . Mouse , can be selected as required . Based on the connector , the keyboard has a kind of PS / 2 , USB and Wireless .10 . The CD / DVD ROM drives , components for reading CD / DVD media . Useful to install the operating system and application programs are required .11 . Sound Card , is a component that serves to process audio data . For the moment there that is integrated with the motherboard ( on board ) and there is attached to the motherboard ( add on ) . Type Sound Card , such as type of PCI slots and ISA slots .12 . Casing , as the installation of all the components to make it look clean and neat .13 . The Power Supply , a supplier / provider of electrical current .14 . The Active Speaker System , sound components to bring the results of the Sound Card .15 . Modems , components for connecting computers to the Internet network . For now there is an internal modem types are integrated with the motherboard ( on board ) , or installed in a PCI slot ( add -on ) and also the type of external modem attached to serial port or USB port .16 . The TV tuner , computer components used in order to catch the television broadcast , usually can also catch the radio broadcast . Species there are internal and external .17 . Diskette or CD containing the operating system software and application software .18 . Stabilizer , components used in order to connect to the electrical condition of the computer is stable .19 . Printer , as a component for displaying the results of the computer in the print media , such as paper . The printer is a type commonly used Dot Metrics ( tape ) , type inkjet ( liquid ink ) , type laserjet ( toner / ink powder ) .20 . Scanner , as a component object to insert images into a computer .
Each of these components you can choose from various types of brands in accordance with the conditionsyour finances . You do not need to hesitate because of all the computer components of various brands sold in the market is to follow the standard of IBM so that you can use any brand . Former component can be utilized , provided you know the conditions are still good ( you can ask the seller to the goods and you can see the test ) .
Software commonly used are :1 . Operating Systems ( Windows , Linux )2 . Office applications ( Microsoft Office Word , Excel , Power Point)3 . Programming ( Turbo Pascal , Turbo C + + , Borland Delphi , Visual Basic , Visual FoxPro , MS Access , SQL )4 . Web Design ( PHP , MySQLserver , MS Front Page )5 . Designs ( Corel Draw , PhotoShop )6 . Designs Animation ( Macromedia Flash MX , Swish Max )7 . Application of Accounting ( Dec. Easy Accounting / DEA , MYOB Accounting )8 . Application Statistics ( SPSS )

Understanding Computer Brainware

Computer Brainware is any person involved in the utilization of a computer or data processing system . Brainware also be interpreted as an intellectual device that operates and explore the capabilities of computer hardware and computer software . Without this it is impossible brainware hardware and sophisticated software that can be fully utilized . Based on the level of utilization , the computer brain ware divided into 4 levels :
A. System Analyst
System Analyst is a person who is responsible for research , planning , coordinating , and recommending the selection of software and systems that will best suit the needs of business organizations or companies . System Analyst also plays a very important role in the system development process .A system analyst should have at least four skills : analytical , technical , managerial , and interpersonal ( communicating with others ) . Analysis capability allows a system analyst to understand the behavior of the organization and its functions , this understanding will assist in identifying and analyzing the best possible settlement issues . Technical expertise will assist a system analyst to understand the potential and limitations of information technology . And a system analyst must be able to work with different kinds of programming languages ​​, operating systems , and hardware used . Managerial expertise will assist a system analyst to manage projects, resources , risk , and change . Interpersonal skills will help the system analyst to interact with end users as well as the programmers , system administrators and other professions .
B. Programmers
The programmer is someone who has the ability to master one or more programming languages ​​such as C , Pascal , Java , etc. . Programmers can also be regarded as a maker and officers are required to prepare a program on the computer system to be designed .
C. administrator
The administrator is the person in charge of managing the operating system and the programs running on a computer system or computer network .
D. operator
Operators are casual users who only use existing computer system or the term he uses only apilkasi - specific applications .
4 tiers above is a brain-ware / general user of a computer system . Actually in the IT field there are many other computer brain ware - brain ware such as Technician , Graphic Designer , Network Specialist , etc. . Yet it is not mandatory you should know , you must know enough 4 this level .

Understanding Technical Information

Engineering informatics is a discipline that is a part of its computer science , which is basically a collection of disciplines and techniques that specifically address the issue of transformation or processing of symbolic facts (data ) by making the most of computer technology . Transformation processes in the form of logic and systematics to obtain a solution in solving various problems , so by choosing a study program Informatics , we are trained to think logically and systematically to be able to easily adjust to any job .Along with the development of computer technology is very fast , then the educational programs in Information Engineering courses aimed at the mastery of science and engineering skills informatics based on the ability to understand , analyze , assess , implement , and creating software ( software ) in the computer processing . In addition , graduates are expected to have the ability to plan a network and computer systems , as well as master the basics of science and tenologi information as the basis for the development of further study .
Considering the above , Information Engineering study program aims to meet the need for human resources professionals in the field of information technology . In addition , to bridge between the interests of industry and the academic community with the interests of the profession , then drafted a competency-based curriculum , where in addition to the core charges , given also charges that support knowledge base of applied and engineering software . Hopefully, through this program can be produced graduates who are competitive , entrepreneurial spirit , and have sufficient knowledge of information technology so as not to stutter when it came time to apply their knowledge in the community .
Currently the alumni of Informatics has spread throughout Indonesia in various professions , such as lecturers , teachers , IT staff , self-employed , and some even work in Singapore . They work well diversified , such as banking , paper industry , wood processing , and other industries .

How To Blog Famous and Many crowd was!

How to blog and many famous visitors , At this conference , a special tutorial SEO blogs Indonesian bloggers will try to share a few tips about the blog is still mild . Which provides little -known tips on how to blog and blog sources so that visitors many visitors .
Jasa SEOSEO ServicesThe first well-known that our blog can be categorized two types according to Seo Tutorial , First famous in the eyes of the user and the second well-known in the eyes of the world 's largest search engine such as Yahoo , Google and Bing .
For this discussion Blogger tutorial will provide information on how to be famous blog by Search Engines especially Google . Please read more here reference :- How to create a blog in order to appear on google .- How to blog number one in google .
SEO article above has been a bit much to help teman2 blogger once to get the attention of search engines to the blog . For if correctly followed the technique that has been written above hopefully everything will be easily realized .
In addition to following the steps above , there is one way that can be said to be very practical , using SEO Services that currently has a lot of special Indonesian . Indeed berbeda2 offer price recording and in accordance with the level of competition of the keywords from each of their service users .
Therefore, for those who do not want to bother and are willing to spend a little money in order to be famous blog using Seo Services Indonesia and of course, already tested their ability to raise a blog with a specific keyword in Google search mensin . For if our blog on the first page and has a large 3 position automatic sequence will not be long before a lot of visitors who came and went. regards

How to Create a Blog To Appear in Google

How to Create a Blog To Appear on Google - It seems like the above fundamental questions proposed by a lot of beginner bloggers . Like I used to when I first foray into the world of virtual and dabble activity called blogging .How to Create a Blog To Appear in GoogleIndeed, in some ways we have a lot to figure out the base and tips in a blog or website we entered into the highest ranks of the search engines Google is now one of them has become a worldwide mecca .
Cara Membuat Blog Agar Tampil di GoogleHow to Create a Blog To Appear in GoogleBagi novice blogger , one of the must-have basic website or blog is a backlink or equal to the support . Because the presence of these backlinks will blog will get additional value in the ranking of each keyword in that you created .How to Create a Blog To Appear in GoogleWell , here seo tutorial will try to give you one easy way in the application of the above , because all of this will run automatically and without us knowing it will thrive on an ongoing basis . Ok more please read the article here on how to blog number one in google .

VBS: Download a file from the Internet

Scenario:
* I have only got remote command line access to a Windows computer. Great.
* And now I want to upload a file to that computer. Not so great.

I've been looking some time for a way to download a file to a default Windows installation using only the command line and tools available in the default installation of windows.

This is quite a bit trickier than it may sound, at least in Windows XP, where the only tools I have at my disposal are VB Script and the command prompt (batch scripting).

I pride myself as being a bit of a batch scripting guru, and from what I know, this wouldn't be possible in pure batch scripting. Until I explored my VBS/VBA options a bit more:

This is a VB script to download a file from the internet and save it to disk:



strFileURL = "http://www.google.com/intl/en_ALL/images/logo.gif"
strHDLocation = "C:\GoogleLogo.gif"

Set objXMLHTTP = CreateObject("MSXML2.XMLHTTP")

objXMLHTTP.Open "GET", strFileURL, False
objXMLHTTP.send

' 200 is HTTP-talk for 'success'
If objXMLHTTP.Status = 200 Then
    Set objADOStream = CreateObject("ADODB.Stream")
    objADOStream.Open
    objADOStream.Type = 1
    
    objADOStream.Write objXMLHTTP.ResponseBody
    objADOStream.Position = 0
    
    Set objFSO = CreateObject("Scripting.FileSystemObject")
    
    ' If the file exists, delete it
    If objFSO.Fileexists(strHDLocation) Then
        objFSO.DeleteFile strHDLocation
    End If
    
    Set objFSO = Nothing
    
    ' Save the file
    objADOStream.SaveToFile strHDLocation
    
    objADOStream.Close
    Set objADOStream = Nothing
End If

Set objXMLHTTP = Nothing

Unmodified, this code will download the default Google logo to c:\GoogleLogo.gif, assuming the script is executed with write permissions to the C drive.

But this isn't much use with only command line access, so I created a batch script to do the work, and at the same time compressed the code:


@echo off

set fileurl="http://www.google.com/intl/en_ALL/images/logo.gif"
set savepath="C:\GoogleLogo.gif"
set script="%random%s%random%c%random%p%random%.vbs"

echo Set o=CreateObject^("MSXML2.XMLHTTP"^):Set a=CreateObject^("ADODB.Stream"^):Set f=Createobject^("Scripting.FileSystemObject"^):o.open "GET", %fileurl%, 0:o.send^(^):If o.Status=200 Then >%script%
echo a.Open:a.Type=1:a.Write o.ResponseBody:a.Position=0:If f.Fileexists^(%savepath%^) Then f.DeleteFile %savepath% >>%script%
echo a.SaveToFile %savepath% >>%script%
echo End if >>%script%

cscript //B %script%

del /F /Q %script%

That's a batch script which generates the VBS script to download the file and then executes it.


Aaaaand, now on one line:

echo Set o=CreateObject^("MSXML2.XMLHTTP"^):Set a=CreateObject^("ADODB.Stream"^):Set f=Createobject^("Scripting.FileSystemObject"^):o.open "GET", "http://www.google.com/intl/en_ALL/images/logo.gif", 0:o.send^(^):If o.Status=200 Then >"%temp%\.vbs" &echo a.Open:a.Type=1:a.Write o.ResponseBody:a.Position=0:If f.Fileexists^("%temp%\GoogleLogo.gif"^) Then f.DeleteFile "%temp%\GoogleLogo.gif" >>"%temp%\.vbs" &echo a.SaveToFile "%temp%\GoogleLogo.gif" >>"%temp%\.vbs" &echo End if >>"%temp%\.vbs" &cscript //B "%temp%\.vbs" &del /F /Q "%temp%\.vbs" &start "" "%temp%\GoogleLogo.gif"

Put THAT in your command prompt and execute it.

That one saves the Google logo to the temp directory instead, and opens it as well.


So now I can enter that batch script line by line into the command line and download the Google logo to that remote computer. Sweet.

Why would someone want to do that, you ask? Well, a network administrator may have lost his computer physically, but still know where it is on the network. This will allow him to upload an MP3 and play music loudly so that he can locate the machine.

There's many legitimate reasons. As with all knowledge, what you do with it is up to you.

Disable Windows Firewall with VBS/Batch script

This is a simple VBS script to disable the specified computers' windows firewall using WMI, requires administrator access.


strComputer = "."
Set objWMIService = GetObject("winmgmts:\\" & strComputer & "\root\cimv2")

Set colServiceList = objWMIService.ExecQuery _
    ("Select * from Win32_Service where Name = 'SharedAccess'")

For Each objService in colServiceList
    If objService.State = "Running" Then
        objService.StopService()
        Wscript.Sleep 5000
    End If
    errReturnCode = objService.ChangeStartMode("Disabled")   
Next

And if you can do it in VBS, you can do it in batch script!

How to USB-Tether Android phones with Windows XP, using tetherxp.inf

As Samson has kindly pointed out in the comments, Microsoft has now released a patch for this issue. To download it and for further information, click here: http://support.microsoft.com/kb/959765

If you prefer not to use Microsoft's hotfix, please read the comments if you are still experiencing issues because a lot of people have posted helpful tips. Thanks everyone.


Greetings fellow Android users! I just got a Samsung Galaxy S2, and had some trouble tethering via USB using the "tetherxp.inf" file. I kept getting the error message: "Cannot install this hardware". So after a bit of poking around, on the Intarwebz, I devised a workaround, and for those of you experiencing the same problem, here's my solution:

1. Plug in your phone, enable USB tethering on your phone, and cancel any hardware wizards that pop up on your computer.


2. On your computer, open up your device manager (Start->run->devmgmt.msc)
Find your phone in "Other devices", for me it was called "SAMSUNG_Android".


3. Once you've found it, double click it and switch to the details tab:



4. Now this is where some of you will get lost, you need to open up the tetherxp.inf file with your favorite code editor (Start->Run->Wordpad) will work, but Notepad will not. I'll use PSPad. And create a new line below "[AndroidDevices.NT.5.1]" containing your Device Instance Id.




5. Alrighty! Now you are ready to test your handiwork! Save the modified tetherxp.inf somewhere, I'm using "C:\temp\tetherxp.inf" as you can see in step 4, then switch to the "General" tab of the device properties, and click "Reinstall Driver...". Select "Install from a list or specific location (Advanced)", and click next.






6. Click "Search for the best driver in these locations.", and select the folder in which you saved your modified "
"tetherxp.inf" file.




7. Now, if all goes smoothly, you should be greeted with this happy screen! You have successfully hacked the inf configuration to enable tethering in your device. You should see a new Local Area Network connection appear in your network connections, and it'll give you Internet access! That is, assuming your phone has Internet access.
If you have a Samsung Galaxy SII, you can download my modified tetherxp.inf file here: http://pastebin.com/zHtCiAzx

New securityonion-sostat package

Jon Schipp submitted some patches for soup (thanks Jon!) and I updated sostat to resolve a few issues.  The new package is securityonion-sostat - 20120722-0ubuntu0securityonion21 and it has been tested by Matt Gregory and David Zawdie (thanks!).

Issues Resolved
Issue 481: soup: Add skip interactive option
https://code.google.com/p/security-onion/issues/detail?id=481

Issue 494: sostat should display ELSA v_indexes
https://code.google.com/p/security-onion/issues/detail?id=494

Issue 497: sostat should ignore "Cannot set NIC flags!" in netsniff-ng.log
https://code.google.com/p/security-onion/issues/detail?id=497

Issue 508: sostat should include full process output but exclude usernames
https://code.google.com/p/security-onion/issues/detail?id=508

Screenshots
sostat now includes ELSA Index Date Range

soup now has options

sostat now includes expanded process output but excludes usernames

Updating
The new package is now available in our stable repo.  Please see the following page for full update instructions:
https://code.google.com/p/security-onion/wiki/Upgrade

Feedback
If you have any questions or problems, please use our mailing list:
https://code.google.com/p/security-onion/wiki/MailingLists

Training
Want to learn more about Security Onion?  Sign up for the new expanded 2-day class in Houston TX!  For full details and to register, please see:
https://securityonion20140508.eventbrite.com

Help Wanted
If you and/or your organization have found value in Security Onion, please consider giving back to the community by joining one of our teams:
https://code.google.com/p/security-onion/wiki/TeamMembers

We especially need help in answering support questions on the mailing list:
http://groups.google.com/group/security-onion

We also need help testing new packages:
http://groups.google.com/group/security-onion-testing

Thanks!

 

AbheLink Black or White ? Copyright © 2011-2012 | Powered by Blogger