Pembelian Token Listrik Prabayar di Mandiri IB Gagal, tapi Berhasil …

April 2, 2012 – 19:18

mandiri internet banking logoNah lhoo kok bisa gagal, tapi berhasil ….

Begini lho maksudnya … di konfirmasi page setelah memasukkan PIN mandiri itu tertulis kalau transaksi gagal, dan juga jika kita lihat di Histori Transaksi saldo kita sudah terpotong …. Tetapi kalau kita check email kita yang kedaftar di Mandiri IB, disana ada email dengan status berhasil, lengkap dengan data token-nya segala.
Read the rest of this entry »

Primary Computer Networking

April 2, 2012 – 10:08

connectivity choice 3g hsdpa evdo

The invention of your pc undoubtedly revolutionized the community. As they rapidly evolved, new functions were added to make their operation simpler and increase their usefulness. Individuals adopted them into their homes, and companies began using them to shop and process details, as well. Soon, the need to reveal details between pc systems gave rise to more good ways to transport details on disks, but the need for two pc systems to communicate directly was still very high. Thus, the demand for networking was blessed.
Read the rest of this entry »

Wireless ear phones – An Absolute Must in Present-day Game playing Society

April 1, 2012 – 15:38

A wifi ear mobile phones that is not linked directly to its unique system is called a wifi wireless ear mobile phones and it can be a mobile cellphone, a computer, a TV, a laptop or a system. In some states it is unacceptable to discuss on the cellphone while driving if you do not have a wifi wireless ear mobile phones, so these they offer versatility and independence to do many elements as well.

Even though the word is used interchangeably with earphones, a wifi ear mobile phones generally indicates a mixture earphone plus a mic. The technology that has been used to sustain the wifi gadgets is infra-red or Wireless bluetooth and the latter is more well-known today because its only restriction is range whereas the former is restricted by both range and vision.
Read the rest of this entry »

5 Tips To Keep Your Information Secure

April 1, 2012 – 10:36

securing informationWe are currently living in a digital linked world. Everywhere you go, you will most likely have accessibility a laptop computer or computer, or maybe smartphone with an Online accessibility. Your laptop computer or computer, and even a smartphone is used for various things from finishing a school task to financial. It is therefore, extremely crucial to keep all your data files secured to be able not be have your individual details affected. Here are 5 guidelines on how you can keep your individual details and data files secured.
Read the rest of this entry »

How to securing your wireless router TP-Link MR3420

March 31, 2012 – 00:08

Who don’t want to be secure ?

I think everyone need securing their assets. The more meaning something to somebody, the better somebody protect/securing that something. Ehehehe sounds classy isn’t it ? … yeahh but i think in nowadays internet era, you should make sure everything is secure.

OK. Back to idea how to securing your wireless router TP-Link MR3420.

In radio world, or let say wireless era, nobody seems care enough how the data being transmitted and or receive. In my opinion it’s crucial for everyone need to know how data being transmitted via wireless.
Without security, the data you transmit to the router can be read by everyone in the wireless distribution range. Off course with specific effort they can read everything you send and or receive via wireless.
Scare enough ? if you feel not, than you can ignore what i write below, because i write for everyone who scare the data they send/receive is being read by someone else without permission.

With security set in place, it will reduce the possibility your data is being intercepted during send/receive between  your device and your wireless router.

How To
Oke first of all, you need to change the default root/admin password for that router. Why ? because everybody know what the default password is, and can access your router to modify what they like to modify.
If you already done that, good for you :)

MR3420 wireless menu Next step is setting wireless security. Look at the image in the left. Click Wireless menu, and then choose Wireless Security.
In the middle panel, choose option WPA/WPA2 – Personal(Recommended) . And select WPA2-PSK for Version, AES as Encryption. PSK Password set to whatever you like. This Password will be asked when you are trying to connect to the router wireless. And then click Save.
With this already done, you have secure data transmit between your device and wireless router.

To add more robust security, you can add one more security layer to the wireless router. What is that ? It is Wireless MAC Filtering .
What for ? For filtering who can connect to the wireless router.
How to do that ? Refer to picture above, just click at the  Wireless MAC Filtering.
And then do this steps :
Enable Wireless MAC Filtering, if it’s still Disabled
In Filtering Rules, choose Allow, and then you can Add New entry (your WiFi physical address (MAC Address) for allowing your specific wireless client that can connect to the network.