Tuesday, May 27, 2014

Cara install gambas

Wowwwwvv kakak Woowww ......
Ternyata vb yang ada di windows itu tuh yang katanya pro yang katanya bayar :3 -_-
Di ubuntu juga bisa loh gratis malahan wkwkwkwk *promosi*

Kalau di windows vb cukup tenar dan jangan salahkan linux enggak kalah tenar :p
Di linux applikasi pemrograman sangatlah banyak dan luas *oh iya apa benar??*
Tentunya bagi orang awam yang megang linux sama kek saya awam program App yang sama seperti vb di windows itu make apa ya ?
Eh enggak sia sia usahaku bermuter-muter ria ke mbah google eh ternyata dapat app nya ini.. nah appnya itu disibut dengan App Gambas

what is gambas ? *akurapopo* cari aja sendiri ya mas :v wkwkwk

Gak sabar pengen nyoba app ini ?
Yuk langsung install aja

Alat dan bahan

1. Yang jelas koneksi internet lah mas
2. Kopi dan rokok hehehe

Oke dah langsung saja lanjut ...

Buka Terminal di linux kalian

Ketikan Code ini dan masukan secara berurutan ya :)


sudo add-apt-repository ppa:gambas-team/gambas-daily

sudo apt-get update

sudo apt-get install gambas3



Jika untuk yang versi stabil bisa di pasang ini kok dengan code seperti ini :)


sudo add-apt-repository ppa:nemh/gambas3

sudo apt-get update

sudo apt-get install gambas3 
 
 
Keep smile :) ini gambasku mana gambasmu :p


Salam opensource :)

Panduan Pembuatan SMS Gateway di Linux Ubuntu

Kebutuhan Paket Software :
  1. Linux Ubuntu
  2. Apache 2.x.x
  3. PHP 5.x.x (with mysql, session, hash, json extension)
  4. PHP-CLI
  5. MySQL 5.x.x
  6. Gammu
  7. Kalkun

Instalasi

Install LAMP

  1. Install package ;
    $ sudo tasksel install lamp-server
  2. Dalam proses instalasi akan di tanyakan untuk membuat passsword user dan password mysql
    user : root
    passwd : root
  3. Install PHP-CLI [penting]
    $ sudo apt-get install php5-cli
  4. Install PHPMYADMIN [optional]
    $ sudo apt-get install phpmyadmin
  5. Dalam proses instalasi akan di tanyakan passsword user dan password mysql
    user : root
    pass : root

Install GAMMU

  1. Tambahkan source.list repo Gammu :
    $ sudo vim /etc/apt/sources.list.d/gammu.list
  2. Isikan baris berikut :
    deb http://repo.ugm.ac.id/ppa.launchpad.net/gammu lucid main
  3. Download gpg key gammu :
    $ wget ftp://repo.ugm.ac.id/ekstra/.ugos_tools/key_gammu
  4. Tambahkan gpg key gammu kedalam sistem :
    $ apt-key add key_gammu
  5. Update dan install aplikasi gammu dan gammu-smsd dengan perintah berikut ;
    $ sudo apt-get update
    $ sudo apt-get install gammu gammu-smsd
  6. Untuk melihat konfigurasi port device, gunakan perintah berikut :
    $ dmesg | grep tty
    [12321.308078] usb 5-3: GSM modem (1-port) converter now attached to ttyUSB0
    [12321.308275] usb 5-3: GSM modem (1-port) converter now attached to ttyUSB1
  7. Konfigurasi Gammu terlebih dahulu ;
    $ sudo gammu-config
  8. Maka akan keluar form berikut ;
  9. Isi dengan variabel seperti dibawah dan pilih Save ;
    port = /dev/ttyUSB0 # disesuaikan
    connection = at115200 # disesuaikan
    synchronizetime = yes
    logfile = /var/log/gammulog
    logformat = textall
    use_locking = # isi yes jika ingin resource modem di kunci
  10. Perintah diatas akan menyimpan file config dengan nama .gammurc di home user : ~/.gammurc
  11. Konfigurasi berkas /etc/gammu-smsdrc
    [gammu]
    port = /dev/ttyUSB0 # change this
    connection = at115200 # change this
    
    [smsd]
    PIN = ''
    service = sql
    driver = native_mysql
    DeliveryReport = sms
    logfile = /var/log/smsdlog
    debuglevel = 1 # change to 255 if you want to debug
    
    User = root # change this
    password = root # change this
    pc = localhost
    database = kalkun
    runonreceive = /var/www/kalkun/scripts/daemon.sh
  12. WARNING!! untuk menggunakan perintah gammu, matikan dulu service gammu-smsd. Pastikan dengan cara ;
    $ sudo /etc/init.d/gammu-smsd stop
  13. Kemudian baru bisa cek identify modem dengan perintah ;
    $ sudo gammu --identify
    Device               : /dev/ttyUSB0
    Manufacturer         : huawei
    Model                : E220 (E220)
    Firmware             : 11.117.10.02.00
    IMEI                 : 351827014879XXX
    SIM IMSI             : 510012541759XXX
  14. Untuk testing pengiriman SMS menggunakan perintah berikut ;
    $ sudo gammu --sendsms text 0857257XXXXX
    Enter the message text and press Ctrl+D:
    test server
    If you want break, press Ctrl+C...
    Sending SMS 1/1....waiting for network answer..OK, message reference=3
  15. Untuk cek pulsa (ex.simpati) ;
    $ sudo gammu --getussd *888#
    Press Ctrl+C to break...
    USSD received
    Status : No action needed
    Service reply : “Sisa Pulsa Anda Rp.4950. Penggunaan pulsa di periode ini Rp.11150. Aktif s.d. 14/05/2011. Cari t4 menarik dsekitarmu dgn TelkomselLacak. Hub *123*55#”
  16. Setelah itu, jalankan service gammu-smsd untuk aplikasi kalkun ;
    $ sudo /etc/init.d/gammu-smsd start

Install Kalkun

Kalkun merupakan open source berbasis web SMS (Short Message Service) manajemen, itu menggunakan gammu-smsd (bagian dari keluarga gammu) sebagai mesin SMS gateway untuk menyampaikan dan mengambil pesan dari telepon / modem.

Fitur-fitur

  • Memiliki lebih dari satu pengguna (Multi User);
  • Threated SMS.
  • Memiliki lebih dari satu telepon / modem? Beberapa modem yang tepat bagi Anda.
  • Kirim SMS berulang kali (SMS Bomber);
  • Ingin membuat SMS berbasis masyarakat? Anggota SMS akan membantu Anda.
  • Forward SMS ke Email;
  • SMS Iklan untuk pesan Anda.
  • Lelah mengetik SMS yang sama lagi dan lagi? Template SMS adalah yang Anda butuhkan.
  • Ingin membuat program Anda sendiri tetapi tidak ingin menyentuh kode Kalkun? Script eksternal adalah solusinya.
  • Mari kita menendang spammer dengan Spam Filter.
  • Jawaban SMS secara otomatis dengan Autoreply Sederhana.
  • Kirim SMS dari aplikasi lain menggunakan API.

Tahapan Installasi

  1. Download aplikasi Kalkun di sini http://sourceforge.net/projects/kalkun/files
    $ wget -c http://nchc.dl.sourceforge.net/project/kalkun/kalkun/X.X/kalkun_X.X.zip
  2. Buat folder web Kalkun dan ekstrak file ;
    $ sudo mkdir /var/www/kalkun
    $ sudo mv kalkun_X.X.zip /var/www/kalkun
    $ cd /var/www/kalkun/
    $ sudo unzip kalkun_X.X.zip
  3. Buat database kalkun
    $ mysql -u root -p
    mysql> CREATE DATABASE kalkun;
    mysql> quit
  4. Edit config Kalkun database di /var/www/kalkun/application/config/database.php
    $db['default']['hostname'] = "localhost";
    $db['default']['username'] = "root"; // change this
    $db['default']['password'] = "root"; // change this
    $db['default']['database'] = "kalkun"; // change this
    $db['default']['dbdriver'] = "mysql";
  5. Ekstrak example database struktur Gammu agar bisa di import, caranya ;
    $ sudo gunzip /usr/share/doc/gammu/examples/sql/mysql.sql.gz
  6. Import konfig database struktur Gammu;
    $ mysql kalkun -u root -p < /usr/share/doc/gammu/examples/sql/mysql.sql
  7. Konfigurasi path daemon di /var/www/kalkun/scripts/daemon.sh, menjadi dibawah ini ;
    #!/bin/sh
    
    # Configure this (use absolute path)
    PHP=/usr/bin/php # php cli path
    DAEMON=/var/www/kalkun/scripts/daemon.php # daemon.php path
    
    # Execute
    $PHP $DAEMON
    ~            
  8. Jangan lupa juga cek path konfigurasi /var/www/kalkun/scripts/daemon.php dibagian;
    $url = "http://localhost/kalkun";
  9. Buka web browser mengarah ke http://localhost/kalkun/ dan selanjutnya akan terjadi proses instalasi.
  10. Pada akhir instalasi ada pesan gagal untuk menghapus folder install, hapus secara manual ;
    $ sudo rm -rf /var/www/kalkun/install
  11. Akses http://localhost/kalkun/ kembali dengan user dan pass default user=kalkun pass=kalkun.

Troubleshooting

Startup Daemon

Untuk menjalankan daemon setiap kali komputer restart, ketik perintah berikut ;
$ sudo update-rc.d gammu-smsd defaults 

Log Membengkak

Agar log tidak membengkak, berikut tahapan untuk mengatasi hal tersebut, sebaiknya anda menggunakan hak akses superuser atau root :
  1. Sesuaikan tempat penyimpanan berkas log, misal di /etc/smsdlog
  2. Membuat berkas smsdlog di /etc/logrotate.d/
    $ sudo vim /etc/logrotate.d/smsdlog 
  3. Membuat berkas smsdlog di /etc/logrotate.d/ :
    /var/log/smsdlog {
    daily
    missingok
    rotate 7
    compress
    delaycompress
    create 640 root root
    endscript
    } 
  4. Selanjutnya membuat penjadwalan menggunakan perintah crontab :
    $ sudo su 
    # crontab -e 
  5. Isi dengan baris dibawah ini, agar daemon gammu-smsd di-restart setiap jam 06.50
    50 6 * * * /etc/init.d/gammu-smsd restart 

Error database struktur

Jika dilihat kembali pesan error-nya : Database structures version: 11, SMSD current version: 12, maka sebaiknya lakukan perintah dibawah ini pada database server yang digunakan dalam hal ini adalah MySQL.
$ mysql -u root -p
mysql> UPDATE `kalkun`.`gammu` SET `Version` = '12' WHERE `gammu`.`Version` =11;
mysql> quit

Connect/Disconnect di Kalkun

Connect/Disconnect di Kalkun hanya perkiraan dari waktu terakhir gammu-smsd mengupdate aktifitas dengan waktu sekarang. Defaultnya adalah 10 menit, bisa diganti di file /var/www/kalkun/application/config/kalkun_settings.php,
$config['modem_tolerant'] = ’10′;
Beberapa mungkin yang bisa di konfigurasi;
$config['sms_bomber'] = FALSE;
$config['enable_emoticons'] = FALSE;
$config['sms_advertise'] = FALSE;
$config['sms_advertise_message'] = "This is ads message";

Modem Tidak terdeteksi

Ketika melakukan perintah dmesg dan tidak menemukan modem terknoneksi, berikut langkah solusinya (ex. Modem Huawei e1550) ;
  1. Install package usb-modeswitch
    $ sudo apt-get install usb-modeswitch
  2. Buat rule baru untuk udev:
    $ sudo vim /etc/udev/rules.d/15-huawei-155x.rules
  3. Ketik dengan isian berikut :
    SUBSYSTEM=="usb",
    ATTRS{idProduct}=="1446",
    ATTRS{idVendor}=="12d1",
    RUN+="/lib/udev/modem-modeswitch --vendor 0x$attr{idVendor} --product 0x$attr{idProduct} --type option-zerocd"
  4. Simpan dan cabut modem dan colokkan kembali. Untuk keterangan idProduct dan idVendor dapat di temukan dari perintah berikut ;
    $ sudo lsusb -v | less
    Bus 005 Device 004: ID 12d1:1446 Huawei Technologies Co., Ltd. E220 HSDPA Modem / E270 HSDPA/HSUPA Modem
    Device Descriptor:
      bLength                18
      bDescriptorType         1
      bcdUSB               2.00
      bDeviceClass            0 (Defined at Interface level)
      bDeviceSubClass         0 
      bDeviceProtocol         0 
      bMaxPacketSize0        64
      idVendor               0x12d1 Huawei Technologies Co., Ltd.
      idProduct              0x1446 E220 HSDPA Modem / E270 HSDPA/HSUPA Modem
      bcdDevice            0.00
      iManufacturer           2 HUAWEI Technology
      iProduct                1 HUAWEI Mobile
      iSerial                 0 
      bNumConfigurations      1

Memindahkan Port USB Modem, Service menjadi tidak berjalan

Kasus ini terjadi jika Anda memindah modem ke port USB yang lain. Maka service tidak akan berjalan, karena config masih mendeteksi lokasi port USB sebelumnya.
  1. Cek perubahan port menggunakan perintah wvdial :
    $ sudo wvdialconf
    $ cat /etc/wvdial.conf 
    [Dialer Defaults]
    Init1 = ATZ
    Init2 = ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0
    Modem Type = Analog Modem
    ; Phone = <Target Phone Number>
    ISDN = 0
    ; Password = <Your Password>
    New PPPD = yes
    ; Username = <Your Login Name>
    Modem = /dev/ttyUSB1
    Baud = 9600 
  2. Tampak pada konfigurasi wvdial posisi modem pada ttyUSB1, kemudian ubah konfigurasi dan sesuaikan port USBnya pada file /root/.gammurc dan /etc/gammu-smsdlog.

Debugging Web Kalkun

Untuk mengidentifikasi error pada web Kalkun, aktifkan log debugging pada config Kalkun seperti cara berikut ;
$sudo vim kalkun/application/config/config.php
Ubah baris log_treshold menjadi seprti berikut
$config['log_threshold'] = 4;
Akses menggunakan browser dengan alamat berikut ;
http://localhost/index.php/daemon/message_routine

Startup Daemon Bermasalah Ketika Restart Server

Kendala ini ketika server sms restart secara tidak sengaja karena masalah kelistrikan service gammu-smsd tidak bisa melakukan auto startup daemon padahal sudah kita set secara automatis. Hal ini bisa diakali dengan menambahkan script start service gammu pada file rc.local. Langkah-langkahnya sebagai berikut :
Hapus Auto Daemon gammu dengan perintah dibawah ini
$ sudo update-rc.d -f gammu-smsd remove
Kemudian edit file /etc/rc.local, kemudian tambahkan baris menjadi seperti dibawah ini
#!/bin/sh -e
#
# rc.local
#
# This script is executed at the end of each multiuser runlevel.
# Make sure that the script will "exit 0" on success or any other
# value on error.
#
# In order to enable or disable this script just change the execution
# bits.
#
# By default this script does nothing.
sleep 10
/etc/init.d/gammu-smsd start
exit 0

Install Postgresql Pgadmin di ubuntu

Alhamdulillah disini saya masih bisa memberikan pengalaman dan masukan untuk keluarga Ubuntu ataupun linuxer :D

Selamat pagi dan selamatt beraktifitas :D hehehe

disini saya mau memberikan soal bocoran tentang proses instalasi postfresql pgadmin..
sebenrnya enggak asing bagi orang developer maupun webmaster tentang sofware ini :D heehe
tapi apa salahnya saya berbagi pada keluarga yang awam tentang apa itu postgresql pgadmin...

bahan yang digunakan adalah

1. Koneksi Internet buat download app.nya

2. Download app postfresqlnya menurut versinya ya jangan sampai salah versi

3. Download app.nya ada di sini
 *(disini saya menggunakan 32 bit)* 

4. Rokok dan Kopi hehehe

Yaudah lanjut ke dalam bentuk gambar ya :)





Nah kalau sudah di download cari app.nya di mana kalian menyimpnya
disini saya menyimpan di Downloads

nah kalau sudah sudah ketemu app yang kalian download

buka terminal

Oke lihat gambar lagi ya :D hehehe











Nb : Pada saat proses intalasi sudah selesei hampir finis jangan centang pad box karena apa ? karena biar enggak mendownload app yang lainya :) *bisa melihat dengan kebutuhan aja kok aku enggak maksa* hehehe
kalau sudah klik finish :)



dan jalankan pgadmin III nya hehehe



Nah mudah kan proses intalasinya :D hehehe
kalau bingung bisa tinggalkan komentar :) hehehe

salam opensource :) salam ubuntu :)

Upgrade Ubuntu 12.04 ke versi terbaru

Selamat pagi dan selamat beraktifitas :D hehehe
Kali ini saya mau memberikan bocoran nih tentang upgrade ubuntu 12.04 ke versi baru :D

#siapa sih yang enggak pengen mencoba ubuntu yang versi baru itu *saya aja juga pengen kok* ehehehe

daripada panjang lebar langsung saja masuk ke TKP

oh iya saya screenshot ubuntu 12.04 saya dulu ya :D
hehehe



oh iya sebelum menginjak ke langkah selanjutnya sebaiknya cek dulu reponya..
barang kali reponya oprekan *kaya apa aja bahasaku oprekan* wkwkwkw
kalau reponya oprekan silahkan ganti dengan repo yang ada di bawah ini :D


NB: Jika masih default langsung saja ke proses upgradenya




deb http://id.archive.ubuntu.com/ubuntu/ precise main restricted universe
deb-src http://id.archive.ubuntu.com/ubuntu/ precise main restricted universe multiverse

Oh iya lupa belum jelasinya soal penambahan tentang repo default ...
sebenernya sih simple kenapa saya suruh kalian pake repo ubuntunya yang default di karenakan takut kalau ada apa-apa pas waktu upgrade nanti.. kalau enggak pengen terjadi kenapa2 backup dulu aja repo yang kalaian punya ke dalam folder yang memungkinkan kalian ingat :D hehehe

Nah step yang di tunggu telah datang :D hehehe
udah pada bosen baca ocehanku ..
langsung saja
masuk pada terminal :)

Buka terminal / Ctrl+Alt+t dan masukan kode berikut :)



sudo update-manager -d

kalau bingung bisa lihat gambar di bawah ini kok :D hehehe






nah itu proses upgradenya mulai mau berjalan :)
NB : Pikir-pikir dulu sebelum di upgrade takutnya nyesel loh wkwkkw kalau sudah yakin upgrade klik upgrade



proses kalau bingung bisa lihat gambar di bawah ini :D hehehe











Dan setelah itu tunggu sampai proses upgradenya selesai.
di mohon untuk bersabar ya dikarenakan upgradenya membutuhkan waktu yang lumayan lama *tergantung koneksinya masing-masing" wkwkwkw


Semoga bermanfaat keep opensource :)

Oh iya kalau enggak salah Rencananya Ubuntu versi 14.10 akan diberi nama "Utopic Unicorn". Ubuntu ini bukan versi LTS. Seperti apa tampilan dan pembaharuan di dalamnya? Kita tunggu di bulan Oktober tahun ini / tahun 2014 ini .. selamat menunggu ya :) heheheeh 


salam ubuntu :)




Monday, May 26, 2014

Setelah Pengumuman Hasil SNMPTN, Segera Daftar Ulang

JAKARTA - Pada 27 Mei 2014, sebanyak 777.357 peserta jalur undangan Seleksi Nasional Masuk Perguruan Tinggi Negeri (SNMPTN) 2014 sudah bisa mengecek hasil nilai mereka. Pengumuman akan dilakukan secara online melalui laman resmi SNMPTN.

Mengutip laman resmi SNMPTN, Senin (26/5/2014), setelah kalian dinyatakan lulus masuk perguruan tinggi negeri (PTN) yang diincar, ada beberapa hal yang harus dilakukan.

Pertama, kalian harus mengcek jadwal pelaksanaan SNMPTN untuk pendaftaran ulang yang lulus seleksi di PTN masing-masing pada 17 Juni 2014. Jadwal ini bertepatan dengan pelaksanaan ujian tertulis Seleksi Bersama Masuk Perguruan Tinggi Negeri (SBMPTN) 2014.

Agar lebih rinci, kalian bisa langsung melihat informasinya di website PTN masing-masing yang menjadi incaran kalian. Segala perubahan ketentuan yang berkaitan dengan pelaksanaan SNMPTN 2014 akan diinformasikan melalui laman http://www.snmptn.ac.id.

Adapun untuk pengumuman hasil seleksi akan diumumkan pada 27 Mei 2014. Seleksi pun dilakukan untuk mendapatkan calon mahasiswa yang berkualitas secara akademik dengan menggunakan nilai rapor, prestasi-prestasi akademik lainnya, dan hasil ujian nasional (UN).

Seleksi juga dilaksanakan dengan memperhitungkan rekam jejak kinerja sekolah, menggunakan rambu-rambu kriteria seleksi nasional dan kriteria yang ditetapkan oleh masing-masing PTN secara objektif, adil, dan akuntabel, sehingga daya tampung PTN tidak harus dipenuhi.

./regards okezone

(best solution) Ubuntu fix broken package

After trying
sudo apt-get update –fix-missing
and
sudo dpkg –configure -a
and
sudo apt-get install -f
the problem of a broken package still exist the solution is to edit the dpkg status file manually.

  1. $ sudo nano /var/lib/dpkg/status    (you can use vim or gedit instead of nano)
  2. Locate the corrupt package, and remove the whole block of information about it and save the file.
———–
Unlock the dpkg – (message /var/lib/dpkg/lock)
sudo fuser -vki /var/lib/dpkg/lock
sudo dpkg –configure -a

For 12.04 and newer:

You can delete the lock file with the following command:
sudo rm /var/lib/apt/lists/lock
You may also need to delete the lock file in the cache directory
sudo rm /var/cache/apt/archives/lock

Sunday, May 25, 2014

Cara mempercepat peforma sistem kerja komputer

Dalam panduan ini saya akan mencoba memperkenalkan beberapa tips yang dapat berguna bagi Anda yang memiliki komputer lama dengan RAM rendah dan ingin mempercepat sistem mereka untuk kinerja yang lebih baik.
Tips-tips ini bisa diterapkan pada Ubuntu 12.04. Jika Anda memiliki tips lainnya, Anda dapat menuliskannya di kolom komentar di bawah artikel ini.
1. Preload
Preload merupakan daemon yang berjalan di background (tak terlihat) yang mendeteksi aplikasi yang paling sering digunakan dan menyimpannya dalam chace sehingga komputer bisa me-load lebih cepat, yang akan menyebabkan waktu load sistem lebih cepat. Untuk menginstalnya di Ubuntu 12.04, jalankan perintah berikut di terminal:
sudo apt-get install preload

Pengaturan standar untuk preload sudah cukup, tetapi jika Anda ingin menggunakan konfigurasi sendiri, Anda dapat mengedit file ini:
sudo gedit /etc/preload.conf

Untuk memonitor log file dari preload, jalankan perintah ini:
sudo tail -f /var/log/preload.log

2. Membersihkan APT Chace
Anda dapat membersihkan apt sources yang tidak dibutuhkan dengan menjalankan perintah ini:
sudo apt-get autoclean

3. Menonaktifkan Aplikasi Startup yang Tidak Perlu
Ada banyak aplikasi yang dikonfigurasikan untuk berjalan secara otomatis saat komputer dihidupkan. Anda dapat mengelola aplikasi ini dengan membuka Startup Aplication di Ubuntu 12.04:

Periksa aplikasi-aplikasi yang tidak diperlukan dari daftar (Bluetooth, Sharing Desktop, WiFi, dll), kemudian nonaktifkan.

Anda juga dapat menggunakan BUM (Boot Up Manager) untuk menonaktifkan layanan dan aplikasi yang tidak diperlukan. Anda dapat menginstalnya dengan perintah ini:

sudo apt-get install bum

4. Mengatur Swappiness
Untuk memeriksa swappiness Anda yang saat ini digunakan, jalankan perintah ini:

cat /proc/sys/vm/swappiness

Nilai standar adalah 60, untuk menggantinya, edit file ini:

sudo gedit /etc/sysctl.conf

Tambahkan script ini di baris paling bawah bila tidak ada:

vm.swappiness=10


Simpan file dan tutup kemudian restart sistem Anda.

5. Percepat Waktu Boot dengan Menonaktifkan Grub Boot Menu
Ketika memulai sistem Anda, layar akan berhenti pada menu boot grub2. Jika Anda ingin menonaktifkannya, Anda dapat mengedit file ini:

sudo gedit /etc/default/grub

Cari baris ini dan ganti nilainya menjadi nol kemudian simpan file dan tutup jendela gedit:

GRUB_TIMEOUT=0


6. Dapatkan Kinerja Handal dengan ZRAM
Jika Anda memiliki komputer lama dengan RAM rendah, Anda dapat mengoptimalkannya menggunakan ZRAM, yang akan menciptakan perangkat kompresi blog pada sistem Anda yang meniru disk swap untuk mengurangi file sampah pada disk. Untuk menginstalnya, jalankan perintah ini dengan urut:

sudo add-apt-repository ppa:shnatsel/zram
sudo apt-get update
sudo apt-get install zramswap-enabler

7. Gunakan Semua Core CPU saat Startup Sistem
Jika komputer Anda dilengkapi dengan CPU multi-core, Anda dapat mengkonfigurasi sistem Anda untuk menggunakan semua core yang tersedia saat startup denganmengedit file ini:

sudo gedit /etc/init.d/rc

Cari baris ini:

CONCURRENCY=none

Ganti dangan ini bilaperlu:
CONCURRENCY=makefile


Simpan dan tutup jendela gedit.
8. Tambahkan TMPFS untuk Mengurangi Disk I/O
Folder /tmp menerima banyak proses  read/write pada hard disk. Anda juga dapat menggunakan RAM pada sistem Anda untuk mempercepat proses read/write pada folder /tmp. Untuk melakukannya, Anda dapat menggunakan perintah ini:
sudo gedit /etc/fstab

Di akhir file tambahkan dua baris ini:

# Move /tmp to RAM
tmpfs /tmp tmpfs default,noexec,nosuid 0 0


Simpan file dan keluar kemudian Restart sistem Anda.

Selamat mencoba dan rasakan perubahannya.

Saturday, May 24, 2014

Akun Wifi@id terbaru

untuk aksesnya silahkan pilih yang speedy instan
#################
User : 89301412838
Pass : 89301016732230
#################

untuk yang satu ini cara aksesnya yang di FLEXI ZONE

#################
Username : 510002132713135@telkomflexi.com
Password : 0295982B
#################

Akun untuk akses SPIN

Username | Password

89302477648 | 97291477694635
89302477623 | 78279446463817
89302024051 | 75506146029436
89302477624 | 53168786956656
89302024052 | 15881732328643
89302024060 | 22761962376817
89302024059 | 93613297527468
89302024056 | 83720141438445
89302024053 | 87280686935224
89302024054 | 92399352005445
89302024057 | 10018272780846
89302344824 | 55023705930708
89302715787 | 13883358116827
89302715789 | 35277184619199
89302715790 | 85016093499066


Akun untuk Flexi :


Username = 510003617469670@telkomflexi.com
Password = 884A53C8
Username = 510003619148718@telkomflexi.com
Password = 88380ee1
Username = 510003619142956@telkomflexi.com
Password = 8836A768
Username = 510002261334812@telkomflexi.com
Password = 98B28C5F

Salam :) Silahkan bergratis-gratis ria :)

./rgards TCT-team  

Masih work atau enggak di coba aja

username : 89302477648
password : 97291477694635

username : 89302477623
password : 78279446463817

username : 89302477624
password : 53168786956656

Username : 89302024051
Password : 75506146029436

Username : 89302024052
Password: 15881732328643

Username: 89302024053
Password : 87280686935224

Username : 89302024054
Password : 92399352005445

Username: 89302024059
Password : 93613297527468

Username : 89302024057
Password : 10018272780846

Username : 89302024060
Password : 22761962376817

Cara menghemat daya pada ubuntu

Selamat siang dan selamat beraktifitas ....
Panasnya brrrrr.......

enggak ada ujan panaspun jadi -_-
tapi untung dah panas-panas gini dapat pengalaman yang bermanfaat :D hehehe
tapi sebelumnya numpang cerita dulu ya :D heheh





awalnya bigindang .

pada siang hari ada anak muda yang kebingungan habis install ubuntu yang terbaru. Kebingunganya bukan kebingungan karena soal instalasi ubuntu tapi bingung batrei laptopnya cepet habis. *kalau di pikir2 iya juga sih punyaku aja cepet habis*
akhirnya si anak itu pergi ke tempat toko reparasi komputer di daerahnya itu ...
setiba dia nyampai di toko tersebut dia bertanya kepada pemilik toko tersebut..

anak muda : Pak saya mau tanya kenapa batrei saya cepet habis ya pak setelah saya install ubuntu yang terbaru..
pemilik toko : Wah itu mungkin batreinya kali mas
anak muda : Padahal saya baru saja beli laptop pak
pemilik toko : wah mungkin batreinya aja yang enggak orsinil
anak muda : hmm .... *dipikir karo ngadem*
pemilik toko : beli aja mas yang baru disni barangnya orsinil semua kok mas ... murah-murah lagi
anak muda : wah sayangnya saya enggak punya duit pak *sambil pasang muka melas biar di kasih diskon* wkwkwk
pemilik toko : wah itu mungkin mas bisa jadi batreinya yang udah rusak/enggak asli

tiba-tiba di saat anak muda itu sama pemilik toko berbincang-bincang eh ada pelanggan cewek cantik yang dateng langsung saja aku pasang sok cute :D wkwkwkwk

si cewek : Pak mau beli minyak buat pembersih laptop
pemilik toko : oh iya mbak sebentar saya ambilkan dulu

disaat si pemilik toko itu mengambil barang yang di esen sama si cewek itu ..
anak muda itu berpura-pura bertanya ke si cewek itu

anak muda : mbk mbk ... berapaan itu mbak harganya segitu mbk ? maav mbk enggak pernah pake gituan akunya
si cewek : murah kok mas enggak sampai merogeh dompet :D hehehe *sambil senyam senyum*
anak muda : ohh
si cewek : masnya ngapain disini ?
si cowok : iya mbk saya bingung sama laptop saya. saya install ubuntu yang terbaru kok batreinya cepet habis :/ padahal saya baru beli laptop mbk
si cewek : oh mas pengguna ubuntu ya ?
si cowok : baru kok mbk *baru belajar maksudnya*
si cewek : saya juga pengguna ubuntu mas tapi saya juga baru. iya memang sih mas suka cepet batrei habis mas tapi ada kok cara biar menghemat daya batreinya mas.
si cowok : emang ada mbk ? kalau ada boleh minta tips-tipsnya mbk ? kalau enggak gitu minta nomernya dah atau enggak minta pin bbmnya biar bisa tanya-tanya saya mbk
si cewek : boleh mas ini pin saya mas **********
si cowok : terima kasih mbk *sambil kesenengen soalnya kalau malam minggu bisa di ajak pacaran* wkwkwk

gak lama kemudian si pemilik toko dateng mbak ini barangnya
si cewek : oh yaudah terima kasih ya pak.

akhirnya cewek itu pulang dan enggak lama kemudian si cowok itu pulang juga

setiba di rumah dia bbm.an sama si cewek itu biasa lah bbm.an pertama ngerayu2 dikit :v kwkwkwkw

si cowok : oh iya mbak saya coba terima kasih
si cewek iya mas sama2
si cowok : mbak gimana soal caranya tadi ?
si cewek : oh iya mas lupa saya belum kasih tau. ini mas caranya. pertama tama tambahkan ppa.nya

1sudo add-apt-repository ppa:shnatsel/zram
2. sudo apt-get update && sudo apt-get install zramswap-enabler


Brrrrrrrrrr..... capek juga nulis cerita segitu enggak kerasa udah banyak -_-
udah ah pada initinya cara mengirit daya batrai di linux itu ada caranya dan caranya itu adalah ini

1.  Tambahkan ppa.nya
2. update & install app.nya

kalau enggak tau caranya bisa di lihat di sini

pertama-tama ketikan di Term

1sudo add-apt-repository ppa:shnatsel/zram
2.
sudo apt-get update && sudo apt-get install zramswap-enabler





sebelumnya batrei bisa bertahan 4 jam sekarang bisa jadi lebih 4 dari 4 jam wkwkwwkwk

dan Semoga bermanfaat :) salam ubuntu-indonesia dan salam opensource :)




Friday, May 23, 2014

The Growing Role of UEFI Secure Boot in Linux Distributions

With the increasing prevalence of open-source implementations and the expansion of personal computing device usage to include mobile and non-PC devices as well as traditional desktops and laptops, combating attacks and security obstacles against malware is a growing priority for a broad community of vendors, developers and end users. This trend provides a useful example of how the flexibility and standardization provided by the Unified Extensible Firmware Interface (UEFI) technology addresses shared challenges in ways that help bring better products and experiences to market.
The UEFI specification defines an industry-leading interface between the operating system (OS) and the platform firmware, improving the performance, flexibility and security of computing devices. Designed for scalability, extensibility and interoperability, UEFI technology streamlines technological evolution of platform firmware. In 2013, developers of several open-source Linux-based operating systems, including Ubuntu 12.10, Fedora 18 and OpenSUSE 12.3, began using UEFI specifications in their distributions.
Additional features of UEFI include improved security in the pre-boot mode, faster booting, support of drives larger than 2.2 Terabytes and integration with modern 64-bit firmware device drivers. UEFI standards are platform-independent and compatible with a variety of platform architectures—meaning, users of several different types of operating systems, including both Linux and commercial systems, can enjoy the benefits of UEFI. Equally, because the UEFI specification includes bindings for multiple CPU architectures, these benefits apply on a variety of hardware platforms with these operating systems.
While UEFI Secure Boot may be one of the most talked about features, the complete set of features in the UEFI specification provide a standardized interoperable and extensible booting environment for the operating system and pre-boot applications. The attributes of this environment make it ideal for increased use in a rapidly widening array of Linux-based distributions. UEFI specifications are robust and designed to complement or even further advance Linux distributions. Industry experts expect to see continued expansion of their use during 2014 and beyond.

UEFI Secure Boot in Linux-Based Distributions

Malware developers have increased their attempts to attack the pre-boot environment because operating system and antivirus software vendors have hardened their code. Malware hidden in the firmware is virtually untraceable by the operating system, unless a search specifically targets malware within the firmware. UEFI Secure Boot assists with system firmware, driver and software validation. UEFI Secure Boot also allows users of Linux-based distributions to boot alternate operating systems without disabling UEFI Secure Boot. It provides users with the opportunity to run the software of their choice in the most secure and efficient manner, while promoting interoperability and technical innovation.
Secure Boot is an optional feature of the UEFI specification. The choice of whether to implement the feature and the details of its implementation (from an end-user standpoint) are business decisions made by equipment manufacturers. For example, consider the simplest and most usual case in which a platform uses UEFI-conformant firmware and a UEFI-aware operating system. When this system powers on (assuming it has UEFI Secure Boot enabled), the UEFI firmware uses security keys stored in the platform to validate the bootloader read from the disk. If the bootloader signature does not match the signature key needed for verification, the system will not boot.
In general, the signature check will succeed because the platform owner will have purchased the system with pre-installed software set up by the manufacturer to pre-establish trust between the firmware and operating system. The signature check also will succeed if the owner has installed an operating system loader that is trusted along with the appropriate keys that represent that trust if those keys are not already present in the platform. The case in which the signature check fails is most likely to arise when untrusted malware has insinuated its way into the machine, inserting itself into the boot path and tampering with the previously installed software. In this way, UEFI Secure Boot offers the prospect of a hardware-verified, malware-free operating system bootstrap process that helps improve system deployment security.
Without UEFI Secure Boot, malware developers can more easily take advantage of several pre-boot attack points, including the system-embedded firmware itself, as well as the interval between the firmware initiation and the loading of the operating system. The UEFI specification promotes extensibility and customization of security-enhanced interfaces, but allows the implementers to specify how they are used. As an optional feature, it is up to the platform manufacturer and system owner to decide how to manage UEFI Secure Boot. Thus, implementations may vary in how they express policy, and of course, UEFI Secure Boot is no panacea for every type of malware or security vulnerability. Nevertheless, in a variety of implementations that have already reached the market, UEFI Secure Boot has proven to be a practical and useful tool for improving platform integrity and successfully defending the point of attack for a dangerous class of pre-operating system malware.
The broadened adoption of UEFI Secure Boot technology, particularly by the Linux community, is not only a movement toward innovation, but also a progressive step toward the safeguarding of emerging computer platforms. The evolution of firmware technology in a variety of sectors continues to gain momentum, increasing the use of UEFI technology in Linux and commercial systems. This is a testament to the cross-functionality of UEFI between devices, software and systems, as well as its ability to deliver next-generation technologies for nearly any platform.

Disabling UEFI Secure Boot in Open-Source Implementations

A variety of models has emerged for the use of UEFI Secure Boot in the Open Source community. The minimal approach is to use the ability to disable the feature—a facility that is present in practically all platforms that implement UEFI Secure Boot. In so doing, the platform owner makes the machine compatible with any operating system that the platform supports regardless of whether that operating system supports UEFI Secure Boot. The downside of taking this approach is giving up the protection that having the feature enabled affords the platform, in terms of improved resistance to pre-operating system malware.
There are a couple key points to understand about the ability to enable or disable Secure Boot in any platform. The UEFI specification leaves both the choice of whether to implement Secure Boot—as well as the choice to provide an "on/off switch"—up to system designers. Practical considerations usually make appropriate choices obvious, depending on the intended use of the product. For example, a system designed to function as a kiosk that has to survive unattended by the owner in a retail store environment would likely choose to lock down the software payload as much as practical to avoid unintended changes that would compromise the kiosk's basic function. If the kiosk runtime booted using UEFI Secure Boot, it may make sense to provide no means to disable the feature as part of the strategy for maximizing kiosk availability and uptime.
General-purpose compute platforms present a different dynamic. In these cases, there is an expectation in the marketplace that the owner's choice of one or more operating systems can be installed on the machine, regardless of what shipped from the factory. For manufacturers of this class of systems, the choice of whether to allow enabling/disabling of UEFI Secure Boot takes into consideration that their customers want to choose from any available operating system, given than some may include no support for UEFI Secure Boot. This is true for open source as well as commercial operating system support. A vendor building a machine that supports all the operating system offerings from Microsoft's catalog, for example, must support older versions that have no UEFI Secure Boot support, as well as the newer ones from the Windows 8 generation that do have such support. Indeed, the need for the enable/disable feature appears in Microsoft's own platform design guide as a mandatory requirement, ensuring that conforming systems can run back catalog products as well as the newest products.
Following the same line of reasoning, most general-purpose platforms are shipping with not only the enable/disable feature, but also with facilities for the platform owner to manage the key store. This means owners can remove pre-installed keys, and in particular, add new ones of their own choosing. This facility then provides the basis for those who choose to roll their own operating system loader images, such as self-signing, or to select an operating system loader signed by the CA of their choice, regardless of whether or not the appropriate keys shipped from the factory.
In some cases, the creators of Linux distributions have chosen to participate directly in the UEFI Secure Boot ecosystem. In this case, a distribution includes an operating system loader signed by a Certificate Authority (CA). Today, the primary CA is the UEFI CA hosted by Microsoft, which is separate but parallel to the CA used for Microsoft's own software product management. At the time of this writing, no other CA has offered to participate; however, the UEFI Forum would welcome such an offer, as having a second source of supply for signing events would be ideal.
In other cases, Linux distributions provide users with a general-purpose shim-bootloader that will chain boot to a standard, more complete Linux bootloader in a secure manner. This process extends the chain of trust from UEFI Secure Boot to the Linux system environment, in which it becomes the province of the operating system-present code to determine what, if anything, to do with that trust.

Linux-Based Platforms that Leverage UEFI Secure Boot

The past year has marked the implementation of UEFI specifications in three popular Linux-based operating systems: Ubuntu 12.10, Fedora 18 and OpenSUSE. Below are additional details about their use of UEFI standards.
Canonical's Ubuntu 12.10
Support for a base-level compatibility between Canonical's Ubuntu and UEFI firmware began in October 2012, with the releases of 12.10 64-bit and 12.04.2 64-bit. At the time of release, industry experts projected that most machines would ship with a firmware compliant with version 2.3.1 of the UEFI standard. Currently, all Ubuntu 64-bit versions now support the UEFI Secure Boot feature. When deployed in Secure Boot configurations, the Ubuntu boot process uses a small "boot shim", which allows compatibility with the third-party CA.
Fedora 18
The UEFI Secure Boot implementation in Fedora 18 prevents the execution of unsigned code in kernel mode and can boot on systems with Secure Boot enabled. Fedora also boots on UEFI systems that do not support or have disabled Secure Boot. The bootloaders can run in an environment in which the boot-path validation process takes place without UEFI. In this mode, there are no restrictions on executing code in kernel mode. In Fedora 18, UEFI Secure Boot extends the chain of trust from the UEFI environment into the kernel. The verification process takes place before loading kernel modules.
OpenSUSE 12.3
The recent establishment of UEFI as the standard firmware on all x86 platforms was a milestone for the Open Source community, specifically for OpenSUSE. OpenSUSE 12.2 included support for UEFI, and the recent OpenSUSE 12.3 provides experimental support for the Secure Boot extension.

The Linux Community's Increasing Use of UEFI Technology for Security Solutions on Next-Generation Platforms

The increased reliance on firmware innovation across non-traditional market segments, combined with the expansion of personal computing from traditional desktops and laptops to an ever-wider range of form factors, is changing the landscape of computing devices. Although mobile devices have traditionally had a custom, locked-down environment, their increasing versatility and the growing popularity of open-source operating systems brings growing vulnerability to complex security attacks. While UEFI Secure Boot cannot unilaterally eradicate the insurgence of security attacks on any device, it helps provide a cross-functional solution for all platforms using UEFI firmware—including Linux-based distributions designed for tablets, smartphones and other non-PC devices. Currently, no one has claimed or demonstrated an attack that can circumvent UEFI Secure Boot, where properly implemented and enabled. The expansion of UEFI technologies into the Linux space addresses the growing demand for security, particularly across the mobile and non-PC application continuum.

What's Next for UEFI Technology in Linux-Based Applications?

As UEFI specifications continue to enable the evolution of firmware technology in a variety of sectors, their use will continue to gain momentum. In addition, the popularity and proliferation of Linux-based distributions will create even greater demand for UEFI technology. The recent use of UEFI specifications in Linux-based operating systems, such as Ubuntu 12.10, Fedora 18 and OpenSUSE 12.3, underscores this trend.
These distribution companies, along with the Linux Foundation and a number of other thought-leading groups from the Open Source community, are now members of the UEFI Forum. This is an important step forward for the ecosystem as a whole, improving innovation and collaboration between the firmware and operating system communities. For example, as mentioned above, many systems include facilities to self-manage the key stores in the platform, but today, limited potential for automating this exists. Proposals from the Open Source community address this limitation, with the promise of significant simplification for installing open-source operating systems in after-market scenarios. By providing a venue where discussion of such proposals reaches the ears of all the right stakeholders, the UEFI Forum helps speed up the arrival of such solutions in the market. This is exactly the kind of innovation and collaboration that the UEFI Forum is eager to foster.
The increasing deployment of UEFI technology in both Linux and commercial systems is a testament to its ability to deliver next-generation technologies for nearly any platform. A growing number of Linux distributions use UEFI specifications, allowing users to launch virtually any operating system of their choosing, while still enjoying the added security benefits of UEFI Secure Boot. With the expansion of UEFI specifications across numerous platforms, its intended purpose—to streamline and aid in firmware innovation by promoting interoperability between software, devices and systems—is realized.

Key Features of UEFI

  • Support of a more secure system, across multiple interfaces.
  • Faster boot times.
  • Speedier time to market.
  • Extensibility, modularity and easy prototyping during development.
  • UEFI specifications allow developers to reuse code during the building process, promoting more efficiency.
______________________Mark Doran is an Intel Fellow and the chief platform software architect within the System Software Division for the Software and Services Group at Intel Corporation.


Powrd by http://www.linuxjournal.com/content/growing-role-uefi-secure-boot-linux-distributions