View the original article here
Saturday, August 13, 2011
Cool Websites and Tools
Diposkan oleh Unknown di 2:16 PM 3 komentar
5 Tips and tricks for the pre-event problem Solving
You for months that everything runs smoothly for your event. They are in regular contact with speakers, you have to work with the cooking for many years and we know they are reliable and the guest list has far exceeded their expectations. So what could possibly go wrong? Even the most experienced event organizers have faced problems encountered during an event. But there are ways to circumvent the problems of planning in advance.
1 Review your event with someone not involved
There is always a good idea to plan your event and someone completely removed from your event to be monitored. A new pair of eyes can do a lot of good, because this person can do something that you do not notice. As the coordinator of the event, trying to manipulate a large part of the event moving parts, so someone who knows nothing of it, maybe find a new idea that you never thought, and might even improve your event.
2 Schedule a walk-through for a few weeks before the eventSit down with everyone (colleagues, suppliers, etc.), who worked with you to plan the event, and go through the day's activities. In reviewing the day's program (s) "events, brainstorm a list of everything that could go wrong. Make up scenarios of problems that arise, and that might solve the first time. If any of these questions come to fruition Finally, you will be happy to have a plan for the solution they have created.
3 Be Generous and Think MORE, Not LessThere will always be people to show up for your event fails, even though they said it would. But for every person who does not appear, there may be two other people to do the show (even though they said they would). Plan accordingly when you consider that many people decide at the last minute to hear about an event you can go for months total. When ordering food, gifts, chairs and other accommodation for longer than you think necessary. Maybe you spend a few dollars more, but you prefer to have more than enough to ensure that all your subscribers happy and the event runs smoothly.
4 Twitter to monitor any problems or complaintsDuring the conference, tweets dear presentation and content. Unfortunately, even the love Twitter, their complaints at the event, food, or the speakers' presentations. By following these tweets during the event, you can potentially eliminate any significant problems on the spot. Determine a hash tag for your event and monitor the flow of tweets as a way to keep track of all the problems that arise to maintain. Resolved through the immediate problems that occur, you can save on your event even bigger problems that could escalate and negatively on the success of your event as a whole.
5 The event will be annual, participate in surveys and use feedbackYou can have a lot of creative and innovative as part of your planned event, but participants will always prefer some event will offer over others. For example, they can have more time, you want to network and meet the speakers, or perhaps would have preferred a different location. Participants in the survey and their feedback to plan future events not only encourage people to return to the future, but will cause a positive feedback about the event.What do you do for problems that may arise during the preparation for an event?
Diposkan oleh Unknown di 1:17 PM 1 komentar
Friday, August 12, 2011
Change Hard-to-Find Ubuntu Settings Easily With Ubuntu Tweak [Linux]
posted on August 10, 2011 by Justin Pot
Ubuntu Software Center by now. Ubuntu Tweak also aims to make installing software a bit easier.
So what’s the difference with Ubuntu Tweak’s software center? Well, only popular software titles are listed. Browse and you’ll quickly find that there is no filler here:
Check any software you want to install; uncheck anything you want to uninstall. Then click the “Apply” button at the bottom-right to make the changes happen.
Then check out the “Package Cleaner“. Various buttons to the right of this interface let you scan your computer for excess files. You can then delete these files by clicking “Cleanup“, though you may need to click “Unlock” before you can do so.
This is similar to BleachBit, a CCleaner alternative for Linux.
It’s also possible to run updates from within Ubuntu Tweak, and to turn off the default Ubuntu update manager from running automatically (some find this annoying).
You’ll find today, as was true in 2008, a variety of tweaking options. For example, do you miss having a recycling bin or computer icon on your desktop? There’s a panel for that:
You can not only re-add icons but also name them whatever you want. You can even have the entire home folder on your desktop, if you want.
Do you want to change how the login screen looks? There’s a panel for that too:
Do you want to change what programs open certain file types by default?
You get the idea: there’s a lot this application can do, so explore to find it all out.
Want to change how your desktop’s 3D settings work? Click the ‘Compiz Settings” button and you’ll have a few options:
Mac users will recognize the “Corners” functionality. Play with it to learn how it works.
There is, unfortunately, very little Unity-specific elements to this. I’m sure this will grow with time, however.
Installing Ubuntu Tweak is simple. Just head to the Ubuntu Tweak home page and click the “Download Now!” button. You’ll have a .deb file; open it and the Ubuntu Software Center will take care of the installation process for you.
Do you like having easy access to these settings? Let us know in the comments below, and feel free to share any other Ubuntu tips and tricks.
Justin Pot
Justin Pot is a freelance journalist, blogger and IT professional based in Boulder, Colorado. Find all his work at JustinPot.com or chat with him on Twitter.
View the original article here
Label: Change, Easily, HardtoFind, Linux, Settings, Tweak, Ubuntu
Diposkan oleh Unknown di 4:37 AM 0 komentar
Nmap – Wi-Fi Security Auditing Software to Check Your Home Network [Windows]
posted on August 10, 2011 by Ryan Dube
You can see at the top of the main window that there is a field for the “target.” This is the IP address of the device or devices that you want to scan. One of the difficulties of monitoring for unknown devices that are on your network without permission is knowing what the IP address of those devices are. One way to make identifying hijackers much easier is by defining only a range of IP addresses in your router. This way, any computer that connects to your network must have one IP within a range.
You can do this by going to your router admin panel, clicking on network setup, enabling DHCP and enabling a range of IP addresses to lease out to new devices. In the example below, I’ve started at 192.168.1.100 and allowed for only 50 IP addresses (up to 192.168.1.149).
Once you do this, you will know what range of targets to scan to look for any surprises on your network. Getting back to Zenmap, if you do want to analyze an individual device, just type the IP address in the target field. Under “Profile“, you can choose what level of scan you want the software to conduct. “Intense Scan” is obviously more thorough, or you can just do a ping to see what devices are live, or a list of other scans as shown here.
An intense scan gives you a whole lot of information about a device. It’ll do a port scan and tell you what ports are open on that computer or server, what services are running, what operating system and other software is running, and a whole lot more. This is a brilliant way to see whether or not there are any surprises. If any viruses get installed on your machine and open up a new port to start relaying spam, this scan will pick up on it even if your antivirus software didn’t.
In the ports/hosts tab, you can see a visual display of all ports that are open, their state, protocol, and the service that’s using the port.
Click on the “Host Details” tab, and you can see a summary display of scanned properties for each host. This can really come in handy when you have a very slow Internet connection and want to see what’s eating up all of your bandwidth. You may be surprised to discover that a device has an odd port open with some unknown service reaching out over the Internet through that port.
A far more popular use of this software is as a regular network scanner for maintaining a network. You can scan the entire range of IP addresses you’ve defined in your router, and the software will go through each IP, one at a time, and conduct a full scan on each device. You can define a range by using the CIDR style of addressing. In the example below I used /24 numbits to have the software scan 256 hosts starting at 192.168.1.1.
Once the network scan is done, all active hosts on the network will show up on the list to the left. Keep an eye out for any surprises showing up on your Wi-Fi network. You can click on each host device, and the scan results for that device will show up in the Nmap Output display on the right.
In my opinion, one of the coolest features of this software is the Topology display, which will give you a graphical representation of all of the devices on your network, as well as the security level represented by the scan results. You can right-click on the host node and select to see more details about it.
For regular routine monitoring and maintenance of your home or small business network, this wi-fi security software is a must-have. At the very least, it’ll give you the peace of mind of knowing exactly what’s on your network and what sort of activity is going on, utilizing your precious bandwidth.
Give Nmap a try. Did it uncover anything interesting going on in your network? Share your experiences with using it in the comments section below.
Ryan Dube
Ryan Dube is a freelance writer and Electrical Engineer with Search Engine Optimization expertise. His writing and research focuses primarily on conspiracy theory investigations utilizing science and technology at TopSecretWriters.com.
View the original article here
Sunday, July 31, 2011
2011 Best Blog Software
Diposkan oleh Unknown di 12:09 AM 4 komentar
Saturday, July 30, 2011
Official Google Blog: Introducing the Google+ project: Real-life sharing, rethought for the web
Diposkan oleh Unknown di 11:50 AM 0 komentar
Sunday, June 05, 2011
MIRROR COLLECTION ISO / REPO DISTRO LINUX POPULAR
- FTP ITB
- FTP UGM
- Foss ID
- FTP UI
- Repo UKDW
- FTP UI (kambing)
- FKIP UNS
- http://shol.vlsm.org
- http://mirror.its.ac.id/
- http://ubuntu.pesat.net.id/ ( Khusus Ubuntu )
- http://repo.unnes.ac.id/ ( Hanya menyeduakan Repo · Debian · Mandriva · OpenSuse · Ubuntu · murattal
- http://idrepo.or.id/repositori/
- http://belajar.internetsehat.org/iso/
- http://mirror.aarnet.edu.au/pub/ ( australia )
- Silicon Hill Mirror
- http://mirror.unmul.ac.id/pub/
- http://tawon.amikom.ac.id/
Diposkan oleh Unknown di 1:23 PM 0 komentar