Thursday, 18 June 2015

  
  
  1.Mengapa Sistem Operasi Lynux tidak bisa mengalahkan kepopuleran Sistem Operasi Windows jika dilihat dari pemakaian masyarakat pada umumnya?
Jawab:
Karena sebagian besar masyarakat umum lebih sering menggunakan OS Windows daripada Linux. Dan kebiasaan tersebut sudah di biasakan dari dulu, contohnya saya dari SMP sudah di kenalakan dan hanya di kenalkan dengan OS Windows, dan belum dikenalakan dengan OS yang lain sampai lulus SMA. Hal tersebut juga yang mendasari kepopuleran Windows jika dibandingkan Linux, fitur atau aplikasi yang di berikan oleh Windows lebih mudah dan tidak memerlukan banyak setingan, jika dibandingkan dengan Linux yang memiliki banyak setingan sebelum menggunakan aplikasi OS.

  2.Bagaimana menurut pendapat anda, mengapa Sistem Operasi berlisensi semisal windows dan mac bisa lebih banyak dipilih oleh user sedangkan yang tidak berlisensi seperti linux dan android kurang begitu menjadi pilihan oleh kebanyakan user?
Jawab:
Karena sebagian masayarakat memiliki pandangan jika membeli sesuatu yang berlisensi akan memberikan tempat dan kepuasan tersendiri. Begitu juga dengan menggunakan OS yang berlisensi seperti Windows dan MacOS, jika dilogika ketika kita membayar terhadap sesuatu yang kita inginkan maka kita akan di beri beberapa kelebihan. Selain itu, Sistem Operasi yang berlisensi juga dapat menambah rasa yakin para user bahwa Sistem Operasi tersebut sudah di percaya karena berlisensi dan banyak di gunakan.

   3.Sebutkan sedikitnya 5 versi virus yang sering kita jumpai, dan beri penjelasan asal dan penyebabnya?
Jawab:
a)    Backdoor Alnica
Virus yang juga berbahaya ini merupakan salah satu tipe virus Trojan Horse. Merupakan salah satu virus backdoor yang jika berhasil menginfeksi komputer akan mampu melakukan akses dari jarak jauh dan mengambil segala informasi yang diinginkan oleh si penyerang. Sistem operasi yang diserang oleh virus tersebut antara lain : Windows 200, Windows 95, Windows 98, Windows Me, Windows NT dan Windows XP. Virus ini berukuran sebesar 57.856 byte.
b)  Virus: W32/Mytob-GH
Virus penyebar email massal dan merupakan Trojan untuk IRC pada komputer berbasis Windows. Pesan-pesan dikirimkan oleh virus ini dengan judul yang dipilih secara acak dari list yang sudah ada seperti : peringatan pembatasan suatu akun, suspensi akun email, ukuran keamanan, member support, peringatan penting.
c)  Virus: W32/Mytob-EX
Virus yang menyebarkan email massal dan Trojan IRC yang mirip dengam W32-mytob-gh. W32/mytob-ex terus menerus di belakang layar, menyediakan pintu belakang bagi server yang untuk menjangkau komputer lain via IRC channel. Virus ini menyebar dengan sendirinya terutama kepada attachments email address.
d)  Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
Keluarga virus ini mempunyai karasteristik yang sama atas apa yang mereka lakukan. Mereka menyebarkan email massal yang bisa dikendalikan melalui Internet Relay Chat (IRC) network. Sebagai tambahan, mereka bisa menyebarkan email melalui bermacam-macam sistem operasi komputer yang lemah seperti LSASS (MS04-011).
e)  Virus Makro
Virus ini mempunyai cara kerja yaitu menginfeksi Aplikasi Microsoft Office, seperti Word dan Excel.
Biasanya Dokumen yang terinfeksi oleh Virus Makro akan memodifikasi perintah yang ada di Microsoft Office seperti perintah “Save” untuk menyebarkan dirinya saat perintah tersebut dijalankan.
f)   Virus Multipartite
Virus ini mempunyai cara kerja yaitu menginfeksi file-file komputer sekaligus boot sector pada harddisk. Virus jenis ini akan menimbulkan banyak masalah karena menyebabkan kerusakan yang fatal.

4. Menurut anda langkah apa sajakah yang digunakan dalam mengoptimalkan kinerja Windows 8, sebutkan dan jelaskan!
Jawab:
1)  Selalu Update Windows
Dengan Windows yang selalu up-to-date, kita akan mendapatkan patch dan perbaikan dari Microsoft yang dapat membuat perfoma Windows menjadi lebih baik Untuk mengupdate Windows buka Control panel > System and Security > Windows update. Untuk mengetahui apakah ada update Windows terbaru, pilih Check for updates. Setelah selesai kamu dapat langsung menginstall semua patch yang tersedia di Windows Update.
2)  Disable Software pada saat Startup
Ini berguna untuk mempercepat pada saat proses booting serta untuk mengurangi banyaknya task proses yang berjalan. Disable software yang kurang begitu kita butuhkan untuk berjalan di Startup. Caranya klik kanan tombol start dan pilih Task Manager, pada bagian Startup disable saja software yang tidak begitu penting untuk kamu jalankan.
3)  Mematikan Proses yang tidak di gunakan
Terkadang meskipun aplikasi sudah kita close, tetapi prosesnya masih nyangkut dan berjalan secara background. Banyaknya background proses yang berjalan ini ikut andil bagian dalam menghabiskan resource memory di PC kita. Periksalah background process yang tidak kamu butuhkan dengan cara membuka Task manager, lalu pada tab Processes navigasilah ke bagian background proses.
4)  Scan dengan Antivirus secara teratur
Windows 8 / 8.1 yang lemot seringkali juga disebabkan karena banyaknya virus atau malware yang menginfeksi sistem. Dengan kita melakukan scan menggunakan Anti virus secara teratur, maka kita dapat mencegah munculnya berbagai hal yang merugikan sistem seperti Virus, Malware, Trojan, Worm, dsb. Pastikan kita rajin mengupdate antivirus dan rajin juga melakukan scan PC dengan antivirus.
5)  Disable Hibernate
Jika kamu tidak menggunakan Hibernate, maka kamu bisa mendisablenya dengan cara buka Command prompt as admin, kemudian ketikan powercfg -h off > Enter. Dengan begitu dalam proses Shutdown akan menjadi lebih cepat karena kamu tidak perlu menunggu memory menyimpan file hiberfil.sys.

  5.Jelaskan jenis-jenis software yang anda kenal!
Jawab:
Berdasarkan materi yang saya ketahui Software adalah Program yang berisi instruksi/ perintah untuk melakukan pengolahan data. Jika di kategorikan berdasarkan jenisnya, software komputer terbagi dalam 4 (empat) jenis yaitu:
    » Software System (Sistem Operasi)
Sistem Operasi Merupakan perangkat lunak yang berfungsi mengorganisasikan semua komponen yang terdapat pada mesin komputer.
    » Sofware Bahasa (Bahasa Pemrograman)
Bahasa Pemograman Merupakan suatu bahasa pemrograman yang terdapat dalam bentuk assembler compiler ataupun interpreter.
    » Software Application ( Program Apliaksi)
Program Aplikasi Merupakan suatu program yang ditulis dengan bahasa pemrograman tertentu untuk diterapkan pada bidang tertent.
    » Software Utility (Program Bantu)
Program Utility Merupakan suatu program yang befungsi untuk membantu sistem operasi.

  6.Jelaskan apa yang dimaksud dengan sistem operasi!
Jawab:
Sistem Operasi Merupakan perangkat lunak yang berfungsi mengorganisasikan semua komponen yang terdapat pada mesin komputer. Sistem Operasi juga dikenal sebagai produk sebuah program yang didalamnya terdapat perintah-perintah untuk menjalankan komputer. Menurut saya Sistem Operasi merupakan bapak dari semua program yang ada di komputer, dan program tersebut dapat berjalan sesuai dengan versi dari Sistem Operasi tersebut.

  7. Sebutkan dan jelaskan tentang langkah-langkah yang dilakukan oleh komputer saat pertama kali dijalankan!
Jawab:
Langkah pertama yang dilakukan komputer saat pertama kali dinyalakan adalah Bios memeriksa Boot Sector untuk boot record di ROM selanjutnya bios mengambil OS Loader di dalam RAM kemudian OS Loader memeriksa System File dan OS Loader memindahkan OS ke RAM.

  8.Sebutkan sistem operasi yang anda ketahui dan jelaskan!
Jawab:
a)   Sistem Operasi Windows
Microsoft windows atau yang lebih dikenal dengan sebutan Windows adalah keluarga sistem operasi yang dikembangkan oleh Microsoft, dengan menggunakan antarmuka pengguna grafis.
b)   Sistem Operasi Android
Android adalah sistem operasi untuk telepon selular yang berbasis linux dan juga berbasis open source yang menyediakan platform terbuka bagi para pengembang untuk menciptakan aplikasi baru, os android dinilai akan berkembang secara pesat dan mengalahkan vendor ternama seperti microsoft mobile, plam os atau iphone.
c)   Sistem Operasi Linux
Linux merupakan software sistem operasi open surce yang gratis untuk di sebarluaskan di bawah lisensi GNU, dengan kata lain, kita di perbolehkan untuk menginstal di komputer maupun laptop serta menyebarluaskan tanpa harus membayar.
d)   Sistem Operasi MacOs
MacOs adalah operating sistem yang dikembangkan oleh Apple Corp. MacOs sendiri merupakan singkatan dari Machintosh Operating System, dan Macintosh merupakan komputer pertama yang memperkenalkan sistem antar muka grafis atau sering di sebut GUI.

  9.Jelaskan kegunaan sistem operasi!
Jawab:
Sistem Operasi juga merupakan penghubung antara perangkat keras dan pengguna, sistem operasi juga berfungsi sebagai program pengendali dengan tujuan untuk menghindari kesalahan penggunaan komputerdan mengatur pengelolaan sumber daya yang terdapat pada sistem komputer dan menyediakan layanan kepada pengguna sehingga memudahkan pengguna dalam mengoperasikan komputer.

  10.Mengapa Sistem Operasi Windows lebih rentan terkena virus?
Jawab:
Alasan yang paling sederhana kenapa windows lebih rentan terkena virus adalah pengguna windows yang sangat banyak. Hal ini jelas karena windows merupakan Sistem Operasi yang paling populer jika di bandingkan dengan sistem operasi yang lain, hal ini justru menjadi makan empuk para attacker untuk menyerang windows. Jika kita telisik lebih jauh lagi, sebetulnya windows tidak memiliki tempat download apilkasi resmi. Berbeda dengan dengan android, Distro Linuxdan Mac OS X, Windows tidak memiliki tempat download secara resmi untuk mendownload beberapa aplikasi penunjang.
Jika di logika dengan tidak memiliki tempat download resmi tersebut memungkinkan para pengguna untuk mendownload program aplikasi di sembarang situs yang kurang terpercaya, akhirnya bukan mendowload software malah mendownload Malware. Akan tetapi hal ini telah di jawab microsoft dengan mendirikan Windows Store unutk windows 8, namunwindows store tidak mencakup untuk aplikasi desktop dan juga kebanyakan aplikasi-aplikasi Windows store tidak terlalu berguna.

Rohmat MH, 2015


Sunday, 24 May 2015


Oleh: Rohmat Muflikhul Huda

Kali ini saya menginstal Ubuntu 14.04  menggunakan laptop dengan spesifikasi sebagai berikut:
Quick Spec: Intel Pentium Dual Core 2117U, 2GB DDR3, 500GB HDD, DVD±RW, WiFi, VGA NVIDIA GeForce GT720M 2GB , Camera, 14" HD. Untuk mengetahui spesifikasi laptopnya lebih lanjut dapat Klik disini.

Langsung saja kita kembali ke topik pembahasan utama yaitu langkah-langkah untuk menginstal Ubuntu 14.10 dengan menggunakan VMWare Workstation, berikut langkah-langkahnya.
  • Buka program VMWARE WORKSTATION

  • Kemudian Pilih Create a New Virtual Machine

  • Pilih Mode Typical (Recomended) kemudian Next
  • Kemudian Pilih Installer Disc Image To Continue
  • Kemudian pilih Browse dan cari lokasi dimana anda menyimpan Master Ubuntu 14.10
  • Kemudian Klik Next.
  • Setelah muncul kotak dialog seperti gambar di bawah ini, isilah form tersebut dengan beberapa ketentuan yang tertera pada kotak dialog, untuk Full name, isi nama kamu, username: dengan toor, dan Password silahkan isi dengan root.

  • Kemudian klik Next, maka muncul kotak dialog seperti gambar di bawah ini,

  • Kemudian klik Next

Selanjutnya pilih Split Virtual disk into multiple files kemudian klik Next pada tahap ini, maka setelah selesai akan muncul kotak dialog seperti di bawah ini.



  •  Kemudian Klik Finish.
  • Setelah itu, tunggulah beberapa menit dan biarkan Ubuntu menyeting beberapa hal, seperti nampak pada gambar di bawah ini.
  • Pada tahap ini Ubuntu sudah mulai berjalan di laptop teman-teman semua, tinggal menunggu beberapa Konfigurasi yang memakan banyak waktu. Tampilannya seperti nampak pada gambar di bawah ini.







  • Entah kenapa ketika saya menginstal Ubuntu 14.10 ini begitu cepat dan ringan di bandingkan dengan versi 11 dan 13. jika biasanya membutuhkan waktu hingga 2 jam lebih, untuk Ubuntu 14.10 ini saya hanya membutuhkan waktu 1 jam untuk menginstalnya.
  • Setelah tampilan beberapa konfigurasi di atas selesai maka kita akan dibawa ke tampilan awal Login untuk menggunakan Ubuntu 14.10. Seperti nampak pada gambar di bawah ini.

  • Setelah tampilan tersebut keluar, silahkan temen-temen login berdasarkan akun yang telah temen-temen buat di awal tadi, ingat jangan lupa password ya :D, setelah itu langsung Login.
  • Begitu teman-teman berhasil untuk login maka temen-temen langsung dapat membuka Ubuntu dan bisa menjalankan Operating System Ubuntu tersebut, Seperti nampak pada gambar di bawah ini. 


  • Sampai tahap ini, maka selesailah tahapan untuk menginstal Ubuntu 14.10 dengna menggunakan VMWare Workstation. Terimakasih semoga dapat berkenan dan dapat memberikan ilmu serta pengetahuan bagi temen-temen semua, aminnnn.... :D

untuk yang ingin mendapatkan file PDF dari cara Menginstal Windows XP dengan Menggunakan VMWare ini dapat mendownload di sini.
 Download cara menginstal windows 7 dengan VMWare


SEKIAN DAN TERIMAKASIH
Oleh: Rohmat Muflikhul Huda

Kali ini saya menginstal Ubuntu 13.10  menggunakan laptop dengan spesifikasi sebagai berikut:
Quick Spec: Intel Pentium Dual Core 2117U, 2GB DDR3, 500GB HDD, DVD±RW, WiFi, VGA NVIDIA GeForce GT720M 2GB , Camera, 14" HD. Untuk mengetahui spesifikasi laptopnya lebih lanjut dapat Klik disini.

Langsung saja kita kembali ke topik pembahasan utama yaitu langkah-langkah untuk menginstal Ubuntu 13.10 dengan menggunakan VMWare Workstation, berikut langkah-langkahnya.
  • Buka program VMWARE WORKSTATION

  • Kemudian Pilih Create a New Virtual Machine

  • Pilih Mode Typical (Recomended) kemudian Next
  • Kemudian Pilih Installer Disc Image To Continue
  • Kemudian pilih Browse dan cari lokasi dimana anda menyimpan Master Ubuntu 13.10
  • Kemudian Klik Next.
  • Setelah muncul kotak dialog seperti gambar di bawah ini, isilah form tersebut dengan beberapa ketentuan yang tertera pada kotak dialog, untuk Full name, isi nama kamu, username: dengan toor, dan Password silahkan isi dengan root.

  • Kemudian klik Next, maka muncul kotak dialog seperti gambar di bawah ini,

  • Kemudian klik Next

Selanjutnya pilih Split Virtual disk into multiple files kemudian klik Next pada tahap ini, maka setelah selesai akan muncul kotak dialog seperti di bawah ini.



  •  Kemudian Klik Finish.
  • Setelah itu, tunggulah beberapa menit dan biarkan Ubuntu menyeting beberapa hal, seperti nampak pada gambar di bawah ini.
  • Pada tahap ini Ubuntu sudah mulai berjalan di laptop teman-teman semua, tinggal menunggu beberapa Konfigurasi yang memakan banyak waktu. Tampilannya seperti nampak pada gambar di bawah ini.





  • Setingan Konfigurasi seperti nampak pada gambar di atas memerlukan waktu cukup lama. Pada Instalan di laptop saya konfigurasi tersebut memakan waktu kurang lebih 3 jam, hehehe saya sampai bosan menunggunya, bahkan sampai saya tinggal cari makan dan menghadiri rapat. Namun hal itulah yang menjadi tantangan buat tean-teman untuk menginsatal Ubuntu 13.10, SABAR Teman :D 
  • Setelah tampilan beberapa konfigurasi di atas selesai maka kita akan dibawa ke tampilan awal Login untuk menggunakan Ubuntu 13.10. Seperti nampak pada gambar di bawah ini.

  • Setelah tampilan tersebut keluar, silahkan temen-temen login berdasarkan akun yang telah temen-temen buat di awal tadi, ingat jangan lupa password ya :D, setelah itu langsung Login.
  • Begitu teman-teman berhasil untuk login maka temen-temen langsung dapat membuka Ubuntu dan bisa menjalankan Operating System Ubuntu tersebut, Seperti nampak pada gambar di bawah ini. 


  • Sampai tahap ini, maka selesailah tahapan untuk menginstal Ubuntu 11.04 dengna menggunakan VMWare Workstation. Terimakasih semoga dapat berkenan dan dapat memberikan ilmu serta pengetahuan bagi temen-temen semua, aminnnn.... :D

untuk yang ingin mendapatkan file PDF dari cara Menginstal Windows XP dengan Menggunakan VMWare ini dapat mendownload di sini.
 Download cara menginstal windows 7 dengan VMWare


SEKIAN DAN TERIMAKASIH

Sunday, 17 May 2015

Windows 8 is the name of the latest version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business computers, laptops, netbooks, tablet PCs, servers, and media center PCs. The operating system uses ARM microprocessors in addition to the traditional x86 microprocessors made by Intel and AMD. The user interface was changed to be able to use on touch screen devices other than the mouse and keyboard, so that Windows 8 is designed for touch tablet device.

Microsoft officially released Windows 8 on October 26, 2012 in conjunction with the launch of the inaugural computer using the trial version of Windows 8. Windows 8 Consumer Preview and Release form Preview. On June 26, 2013, Microsoft released a version of Windows 8.1 Trial (formerly known as Windows Blue), an enhancement to Windows 8, Windows 7, Windows Vista, and Windows XP. On October 18, 2013, Microsoft released Windows 8.1 as a free update to Windows 8.

New Features of Windows 8

  1. Windows 8 UI application design, which can be made from any programming language, such as: HTML / CSS, JavaScript, C, C ++, C #, etc.
  2. The loss of the Start button (replaced by the Start screen and Charms).
  3. Compatible with the architecture of Intel, AMD, and ARM (especially tablets).
  4. Compatible with low spec devices such as Tablets, Laptops, Netbooks, and even Smartphone.
  5. Portable USB (Windows To Go).
  6. Windows Explorer using a ribbon like Office 2010 and 2007, also renamed the 'File Explorer.
  7. Hybrid Boot, features to speed start-up time by storing the Windows core memory to the hard disk and its load of each boot.
  8. Features of return (recovery) new, Refresh and Reset. Refresh will restore all Windows file to its original state without changing the settings, files, or applications Windows 8 UI. Reset will restore the computer to factory default condition.
  9. The new design of Windows Task Manager.
  10. The activation process is easy.
  11. The introduction of Lock Screen (Lock Screen).
  12.  Exchange Windows, as a place to buy or install applications Windows 8 UI.
  13. Application of new Cloud Storage Media called Skydrive.
  14. Antivirus is already integrated with Windows Defender.
  15. Log-In type options are diverse, namely Microsoft account password / local, Sandi images, and PIN.

Edition of Windows 8

1. Windows 8, the equivalent Windows 7 Starter, Home Basic, and Home Premium.
2. Windows 8 Pro, the equivalent of Windows 7 Professional.
3. Windows 8 Enterprise, is equivalent to Windows 7 Enterprise and Ultimate.
4. Windows RT, a version of Windows specifically for the ARM processor.

Windows 8 is available in four editions: one called simply Windows 8, aimed at mainstream consumers. Windows 8 Pro provides additional features intended for expert users and professional environment .Windows 8 Enterprise contains additional features geared towards the business environment, and is only available through licensing volume.Windows RT is only available that have been installed by the manufacturer on the new ARM based devices and built specifically for OS.
Windows Media Center is not included by default in every edition of Windows 8, but is available for purchase as an add -on for Windows 8 Pro, or as part of the "Pro Pack" upgrade for the basic version of Windows 8, which also includes Pro upgrade.Windows Media Center add -on are offered for free until January 31, 2013.


Minimum requirements of Windows 8 and Windows 8.1

A. Excess Ubuntu 14.04
Some of the reasons are much better using Ubuntu instead of Windows is:

  1. Price windows are expensive, while Ubuntu free! Apart from simply getting pirated Windows operating system in Indonesia, and the lack of confirmation regarding this piracy, but still you can not just use windows. I sometimes think that if a person uses his laptop to generate a lot of dollars, while the laptop was running pirated Windows OS, then how the laws of dollars that he acquired? This is not a simple issue, given even at the cafe is still widespread use of pirated Windows OS. This excess ubuntu, because it is much safer to install Ubuntu!
  2. Ubuntu has a higher compatibility. It means that the default ubuntu requires less hardware than Windows. In other words, Ubuntu can run on many hardware with low specifications without difficulty (hank, slow, etc.).
  3. Ubuntu has facilities look very impressive. This display can be in 3D settings and create desktop effects we became very attracted people's attention. This has become one of the advantages of Ubuntu for the audience of visual graphics.
  4. Ubuntu Cloud Computing facilities. In the era of the virtual world is unstoppable, someone could have been in demand to display the file anywhere, with Ubuntu one where each person can save the file to free (5GB) then this represents the excess of ubuntu. This file can be accessed whenever and wherever you are. With this facility all your important data will be safe in cyberspace storage (cloud computing).
  5. No Virus Computer. One of the most makes me recommend Ubuntu is, as long as I use it I have never encountered a virus! So all the data we will be safe, and keep safe, flash disk with the virus most dangerous .exe though no problems in colokin to the laptop. Immune Men!

B. Lack of Ubuntu 14.04

  1. Less common for Indonesian society. In this case, the lack of teachers teaching the native OS computers will have made the Indonesian Foreign children with Ubuntu, but the power that is hidden in this OS was amazing.
  2. Small Damage. Ubuntu is sometimes has the disadvantage of some damages due to errors in pengoprasian or when performing settings, but with the number of existing Ubuntu community almost all the existing problems will be able to find the solution in Google.

C. New Features Ubuntu 14.04

  1. Lock Screen: changes become more elegant lock screen no longer monotonous gan, so it is more convenient and enjoyable nih zoom.
  2. Global Menu: Menu maximize and minimize the above will change, if maximize would be in the top right corner when minimized will go along with the application, or we can arrange.
  3. Minimize Launcher: taskbar on windows and unity in ubuntu, if in Windows click the icon of the application can show and hide the application.
  4. Responsive USCU: I think ngadopsi web feature ya, there responsivenya, so pleasing to the eye and easy on the eyes.
  5. Size Launcher: Now we can change the size of the launcher us to measure the 'mini' too big so ga gan.

D. Minimum specifications required by ubuntu 14.04 namely:

  1. Processor 700MHz
  2. 384MB RAM
  3. HDD 5GB
  4. VGA support a resolution of 1024 x 768
  5. CD / DVD or USB installer.
E. For the specifications recommended by ubuntu:


  • Processors are already using two-core or Dual Core processor
  • 1GB RAM
  • The empty space of 10GB hard drive
  • VGA / graphics cards that support OpenGL 1.4
  • CD / DVD or USB Installer ubuntu
  • Internet connection (make it easier for third-party applications)
A. Differences Linux and Windows
As an Operating System (OS) server, Linux was designed to not often shut down in the operation. The Linux memory leak prevention portion received greater attention than in Windows. That is, the availability of the portion of memory that can be used may be reduced in Windows because after all in the not too distant future the system will be run to start all over again.

1. Early development.
          Windows evolved from a micro computer world personal.Karena paced specifically to the needs of the desktop, Windows is very focused on the simplicity of use, approaches to the end user so on. Linux evolved from the Unix world with all the problems of multi-tasking and multi-user. In other words, Linux is designed with the characteristics of a server or high-end workstations. Linux was developed with networking capabilities quite high and since the beginning of his life has been trying to run on a variety of computer architectures, so it does not make the Linux desktop needs as a great destination.

2. Intellectual Property Rights (IPR)
If viewed from the side of the IPR, SO Windows and most application programs, license ownership (average cost $ 200 USD) is an absolute laden to its consumer. While Linux and programs licensed application on the other hand is free and encouraged users to distribute the software.

3. Completion Program
          Windows does not provide many programs once installed. Even if there may be just Internet Explorer, Media Player, Notepad, and several small programs lainnya.Sekalipun Linux as well as SO, once installed, will encounter many programs of almost all categories of programs such as Office Suite, Multimedia (Sound, Video, Graphics), Internet (Browser, Email, Chat, Downloader, Messenger, Torrent, News), 3D, Games, Utility, etc.

4. Program Application
          Windows superior to Office applications-nya.Diakui that Microsoft Office includes a very good tool to work on the PC such as preparing presentations, writing, reports, agendas dll.Linux excels in web server application, proxy server, firewall, mail server, Samba etc.At the application servers generally X-Windows is no longer used in Linux, therefore Linux is usually more efficient resources (memory and disk) in Windows.Sementara compare Linux community is also trying hard to catch up in its Office applications by developing StarOffice led by Sun Microsystems that can be used freely on top of Linux.

5. System Configuration
          Unlike the Windows programs that are ready-made, in Linux there are times when the need to edit the files manually through a command line. But with the PCLINUX Control Center, the system configuration can be done with mudah.PCLINUX have good hardware detection so that almost everything is automated. And almost all of the programs in PCLINUX accompanied by configuration also has ready-made.

6. Support Hardware
          Unlike the conveniences found in Windows, a hardware sometimes can not work in this Linux.Hal can occur because hardware makers do not provide drivers Linux.Untungnya version, lately quite a lot of vendors that already provide support for Linux drivers. And the introduction of Linux to be hardware progressively increasing so began rarely heard in Linux hardware problems.

7. Process Management
          When we press the Crtl-Alt-Del at the time of system running Windows will look a number of running processes. If the count of 10 and a typical user can recognize most of these processes. When we send the command ps ax on a Linux system will be visible statement that there are more than 20 process is running. Those who do not go into the operating system will not be able to recognize most of these processes.

8. File System
          Windows uses the FAT and NTFS. Windows does not distinguish between the use of the name of the file with uppercase and lowercase letters (case insensitive). Windows recognize also the term drive for devices and partitions. Windows has MyComputer as a root, in which there are a variety of drives and devices. Windows also can not read the Linux file system (without the benefit of a separate program). The file system, the file name extension in Windows has an important role. While Linux uses ext2, ext3, reiserfs, xfs, jfs and other sebagainya.Linux can read and write to FAT32, and can read and write NTFS (experimental and utilize a separate project) .Linux distinguish the use of uppercase and lowercase letters in the various aspects of the use of the system operation. On Linux, the term drive is not in use. Used is an ordinary directory. When compared with Windows, Linux recognize the root directory (symbolized by /), in which there are various directories and devices. On Linux, the file name extension does not have an important role.

9. Time Operation
          As SO personal workstation, Windows will often shut down when abandoned to save electricity because there will be others who will use the computer. Linux systems are designed to be used jointly by many people. Therefore protection of files and processes belong to a person against another person becomes large portion of the designer's attention. On Linux systems (and Windows NT / 2000 / XP) user identification determine the user permissions. Because it will be found many Linux users who work with the root user (super user name in the Unix world).

10. Protection System
          Because Windows systems typically use a particular person, the protection system files on the computer is not a major concern in the design of Windows. Whenever Windows users can delete, rename, move any file directory location in the system. Login is not a requirement for Windows 9x users. With cancel the login prompt, can be obtained permissions everything. Though equally as operating system (OS) computers, Linux and Windows differ in many hal.Karena are two different worlds, then almost everything can be different. Software designed specifically for Windows will not run on Linux, and vice versa.

11. Handle Crash
          Compared with Windows 95/98 / ME, Linux is much more stabil.Namun if follow instructions well system, Windows XP is also quite stabil.Unix and Linux have the nature of a multi-user.Linux running applications differently with Windows.Ketika an application is locked, mudah.Cukup you can turn it off by pressing the key combination Ctrl + Esc, and can choose which applications (or processes) which are problematic. And if the graphics system is locked, it could move to the command-prompt (by pressing Ctrl + Alt + F1) and manually kill the process software. Also available is the option to restart the desktop just by pressing Ctrl + Alt + Backspace. It means not having to reboot the system even though Linux is experiencing problems.

12. System Sistribusi
          Windows only know one distribution that is Microsoft.Sementara, Linux know many distribution is a collection of Linux kernel, libraries - library systems, and software - software that is wrapped with the procedure tertentu.Yang distinguish between the distribution could have on all parts of the (different kernel version and settings, software and different libraries), including pemaketannya procedure.

13. Possible Migration
          On the one hand, Windows in its development together with the production line NT servers to Windows 2000 and later Windows XP. On the other hand, open source community continues to develop a graphical user interface to enhance the comfort of Linux for use as a personal workstation. Since the appearance of Windows 2000 and the development of graphical user interface in Linux, Windows equality began to be visible and the Linux operating system for servers and for workstations.

          Migrating users from Windows to Linux and vice versa can not occur spontaneously because of habit hard to break. During the use of Windows and application programs are not hindered by having to pay a license, many Windows users would not switch to Linux. The success of Linux in Indonesia grabbed the attention of computer users rely on the right of the authorities in the campaign for respect for intellectual property rights.


B. Equation Command Or Command Windows And Linux
It turns Linux and Windows that not only had many differences but there are also some similarities just as below:
1. Copy / copy one or more files from one location to another is determined.
Windows command: copy
Linux command: cp
2. Create a directory.
Windows command: mkdir
Linux command: mkdir
3. Change the current directory to another directory specified in the parameter.
Windows command: cd
Linux command: cd
4. Removing a directory
Windows command: rmdir
Linux command: rmdir
5. Out of the box or terminal.
Windows command: exit
Linux command: exit
6. Move files from one directory to another directory
Windows command: mv
Linux command: mv
What is the RFID?
Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna (the chip and the antenna together are called an RFID transponder or an RFID tag). Antenna enables the chip to transmit the identification information to a reader. Readers changing the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can use it.


Is RFID better than using bar codes (BARCODE)?
RFID is not necessarily "better" than bar codes. Both are different technologies and have different applications, which sometimes overlap. The big difference between the two is the bar code is
line-of-sight technology. That is, the scanner must "see" the bar code to read it, which means people usually have to steer towards the barcode scanner to read the code. Radio frequency identification (RFID), by contrast, does not require line of sight to read the tag. RFID tags can be read as long as they are within range of the reader. Bar codes have other shortcomings as well. If the label is torn or soiled or has a disability, there is no way to scan items, and standard bar codes identify only the manufacturer and product, not the unique item. Bar code on one milk carton is the same as every other, making it impossible to identify which one might pass its expiration date first.


RFID will replace bar codes?
It's highly unlikely. Bar codes are inexpensive and effective for certain tasks, but RFID and barcode will coexist for many years.


Is the new RFID?
RFID is a proven technology that has been around at least since the 1970s. Until now, relatively expensive and too limited to be practical for many commercial applications. But if the tag can be made cheap enough, they can solve many problems associated with the bar code. The radio waves travel through most non-metallic materials, so that they can be embedded in packaging or encased in protective plastic to leak and greater durability. And tags have microchips that can store a unique serial number for every product manufactured around the world.


What is the purpose of the RFID?
RFID allows data to be transmitted by products containing RFID microchip tag, which is read by the RFID reader. Transmitted data may provide identification or location information about the products, or specify information such as the date of purchase or price.


What are the advantages of using RFID technology?
No contact or line-of-sight is required to read data from a product that contains an RFID tag. This means no more scanners cashier at the grocery store, there are more unpack the shipping box, and the key to getting no more out of your pocket to start your car. RFID technology can also work in the rain, snow and other environments where bar code or optical scanning technology will be in vain.


Is there a standard for RFID?
Yes. International standards have been adopted for some very specific applications, such as for animal tracking and for smart cards, which require encryption to keep data secure. Many other standards initiatives currently underway. International Organization for Standardization (ISO) is working on a standard for tracking goods in the supply chain using a high-frequency tags (ISO 18000-3) and ultra-high frequency tags (ISO 18000-6). EPC global, a joint venture company established to commercialize Electronic Product Code technology, has its own process standard, which is used to create bar code standards. EPC Global has filed a second generation EPC UHF protocols to ISO, and have been approved as ISO 18000-6C, an international standard.


Any type of RFID standards?
ISO 15693-Smart Label
Contactless ISO 14443-payment
ISO 11784-Livestock
EPC-Retail
ISO 18000-frequency range, a wide range of applications


What type of RFID application?
- Tracking for Livestock
- Automotive immobilizer
- Contactless payment
- Anti-theft
- Application Library
- Toll Ticket fast-
- Access Control
- Production / Inventory Tracking
- Retail
- Asset Management


What is the difference between the low (LF), high (HF) and ultra-high frequency (UHF)?
Just as radio tune to a different frequency to hear different channels, RFID tags and readers have to be tuned to the same frequency to communicate. RFID systems use different frequencies, but generally the most common are low frequency (about 125 KHz), high frequency (13.56 MHz) and ultra-high-frequency or UHF (860-960 MHz). Microwave (2.45 GHz) is also used in some applications. Radio waves behave differently at different frequencies, so you have to choose the right frequency for the right application


Applications for different frequencies:
Applications LF (125kHz): access control, livestock, race time, pallet tracking, automotive immobilizers, animal identification pets


Applications HF (13.56MHz): Supply chain, wireless commerce, ticketing, product authentication, identification clothes, library books identification, smart cards


Applications UHF (860-960MHz): Supply chain, Tags Tool, RTLS, EPC Case and Pallet

What are the characteristics transponder?
RFID tags are small microchips with memory and an antenna coil, thinner than paper and a few mm. RFID tags listening to radio signals sent by the RFID reader. When the RFID tag receives a query, it responds by sending a unique ID code and other data back to the reader. Basically there are three types of tags Passive-Active, Passive and Semi.


What is the difference between RFID passive, semi-passive and active?
Active RFID uses an internal power source, such as a battery, the tag to continuously power-tag and its RF communication circuitry. Active RFID enables extremely low level RF signal to be received by the tag (as the reader / interrogator not authorized tags), and tags can produce a high level signal back to the reader / interrogator. Active RFID tags continue to be supported, both in the field of reader / interrogator or not, and is typically used when a longer reading distance desired tag.


Passive RFID relies on RF energy transferred from the reader / interrogator to the tag to power the tag. Passive RFID tags reflect energy from the reader / interrogator or receive and temporarily store a small amount of energy from the signal reader / interrogator to generate a tag response. Passive RFID requires a strong RF signal from the reader / interrogator, and the strength of the RF signal returned from the tag is limited to very low levels by limited energy. Passive RFID tags are best used when tags and interrogators will be close to one another.


Semi-passive RFID use internal resources to monitor the environmental conditions, but require RF energy transferred from the reader / interrogator similar to a passive tag to power the tag's response. Semi-passive RFID tags use the process to produce a response similar to the passive tags tags. Semi-passive tags differ from passive to semi-passive tags have an internal power source (battery) for this tag circuit which allows the tag to complete other functions such as monitoring environmental conditions (temperature, shock) and that can extend the reach of the tag signal.


What is the difference between read-only and read / write tag?
Chips in RF tags can be read-write or read-only. With read-write chips, you can add information to the tag or write over existing information when the tag is within range of the reader, or interrogator. Read-write tags are useful in some specific applications, but because they are more expensive than read-only chip, they are not practical for tracking inexpensive item. Some read-only microchips have information stored in it during the manufacturing process. The information on the chip can not be changed. A more flexible option is to use something called electrically erasable programmable read-only memory, or EEPROM. With EEPROM, data can be overwritten by using a special electronic process.


How much information can be stored by the RFID tag?
Tags are available with a storage capacity of 512 bytes to 4KB. It really depends on the vendor and whether the tag is passive or active. The data stored in the tag will be determined by the application of appropriate systems and standards. For example, the tag could provide identification for manufactured items, goods in transit, or even short distances location and identity of vehicles, animals, or people. This baseline data is often referred to as "code plate," is similar to the information stored in the bar code label. When connected to a database, additional information can be accessed through the reader such as the number of stock items, current location, status, selling price, and batch code. Alternatively, an RFID tag can carry specific information or instructions immediately available after the reading, without the need of a reference database to determine the meaning of the code. For example, the desired color of paint on a car entering the assembly area paint on the production line, or manifest to accompany the shipment.


Transponders, smart labels, tags. What is the difference?
Initially, in the technical field, the transponder is a term used to refer to an electronic module that is able to Transmit information and respond to information. More recently, different areas in which Radio Frequency Identification is prevalent have developed new jargon to refer to the same thing, such as Smart Label or Tag. "Smart labels" is a highly innovative form of RFID tag and operate in much the same way. However, smart label consists of an adhesive label that is embedded with "inlay" ultra-thin RFID tag (the tag IC plus printed antenna). Smart labels combine a variety of reading and unattended processing capability of RFID with the convenience and flexibility of on-demand label printing. Smart labels can also be pre-printed and pre-coded for use. In the on-demand applications, inlay tags can be encoded with fixed data or variable and tested before the label is printed, while labels can contain all the bar codes, text, and images used in applications that are built. Smart labels are called "smart" because of the flexible capabilities provided by the silicon chip embedded in the tag inlay. A label reading / writing intelligent can also be programmed and reprogrammed to use, following the initial coding during the label production process.


Can I mark metal objects? Can I mark an item that has a high moisture content?
Yes. Radio waves bounce off metal and are absorbed by the air at higher frequencies. While that can make tracking metal objects or people with high water content problematic, planned system design and engineering can solve this problem.


What RFID reader?
The reader is basically a radio frequency transmitter and receiver, controlled by a microprocessor or digital signal processor. Reader, using an antenna attached, capture data from tags then passes the data to a computer for processing. Such as tags, readers come in various sizes and offer different features. Readers can be affixed in a stationary position (for example, in addition to a conveyor belt in a factory door or dock at a warehouse), portable (integrated into mobile computers that also can be used to scan bar codes), or even embedded in electronic equipment such as print-on- demand label printers


Whether the characteristics of the reader?
• Stationary or mobile (different RFID Reader Module)
• Hold the weather or industry standards
• Typical read range varies from a few centimeters to several meters
• Read range depends on:
o Broadcast signal strength
o The size of the transmitting antenna
o The size of the transponder antenna
o Environmental factors: metals, Liquid
• Reader with Multi-frequency capability


Read-only RFID reader device can only request or read information from the RFID tag nearby. The readers are found in fixed, stationary applications as well as portable and handheld varieties.


Read-write RFID reader Also known as encoders, these devices read and write (change) information in an RFID tag. Such as RFID encoders can be used to program information into an RFID tag empty. A typical application is to combine as RFID readers with barcode printers to print smart labels. Smart labels contain UPC bar code on the front with an RFID tag embedded in the rear.


What kind of antenna characteristics?
- Send and receive RF signals
- Usually made of copper or aluminum, new technologies for printed antenna
- Stationary or mobile
- Weather-proof / Industrialized


What considerations RFID system?
Read the terms of the distance
- Reading of various length
- Short Range read


Frequency
- All the frequencies have their pros and cons


ISO standard
- Proprietary or standards-based


Government regulations
- Varies from country to country


Some Tag Reading the Same Field.
- Can be overcome by Anti-collision


Sensitivity to Orientation
- A single orientation or Omni-directional


Hardware Set-up
- The environment can affect the performance