Follow us on...
Follow us on G+ Follow us on Twitter Follow us on Facebook Watch us on YouTube
Register

View Poll Results: Apakah Thread [SHARE]Menjadi Network Administrator Berguna Untuk Pembelajaran ato Ref

Voters
124. This poll is closed
  • Ya Berguna Banget

    115 92.74%
  • Biasa aja deh

    9 7.26%
Page 5 of 7 FirstFirst ... 34567 LastLast
Results 61 to 75 of 100
  1. Status
    Offline
    Member Senior Array
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0

    Jump to Comments

    [SHARE INFO] Bagaimana Menjadi Seorang Network Administrator

    99 Comments by hackersmooth88 Published on 06-12-2009 19:36
    Saya ingin berbagi ilmu dengan teman2 sekalian yang ingin belajar Networking dan Server

    Banyak orang yang bertanya kepada saya apa sih yang harus dipelajari pertama kali ketika ingin belajar Networking??
    Gimana sih caranya menjebol Situs Web??
    Apa yang harus dipilih Linux atau Windows??
    Bagaimana menahan Virus dan serangan ke komputer maupun Server??
    ....

    Masih banyak lagi pertanyaan seperti itu..
    Saya akan membantu Anda harus memulai darimana..

    Yang harus Anda Kuasai Adalah:

    1. Basic Hardware Networking = Kenapa mesti dipelajari?? Karena dari sinilah inti perjalanan packet yang akan dikirim dari komputer kita ke Server.
    ApA itu Switch, Hub, Wireless..Taukah Anda bahwa switch lebih aman daripada WIFI??
    Kapan saya menggunakan switch atau Wifi..Semua harus diperhitungkan dengan baik.
    Darimana kita belajar..Banyak buku yang mempelajari hal tersebut

    2. Basic IP dan Subnetting = Mungkin kalau saya bilang ini adalah yang sangaat penting dari semua-nya adalah IP dan subnetting..Hal ini akan sangat terasa
    apabila Anda bekerja di ISP..Anda akan mempelajari cara efisiensi IP,apa itu gateway??
    Bagaimana mengatur IP yang baik untuk mencegah terjadi Broadcasting..

    3. Technology Switching dan Routing = Kalau Anda sudah melebihi 1 jaringan di kantor Anda harus bisa melakukan routing terhadap jaringan.
    Tau tidak bahwa internet bisa terhubung ke mana-mana karena routing ini.
    Untuk switching Anda perlu mempelajari Teknologi VLAN

    4. Technology Server = Kalau yang satu ini Anda akan banyak berhubungan dengan Server LDAP, DHCP, DNS, Dll...Intinya adalah memberikan service yang
    dibutuhkan untuk client. Untuk mencari informasi silahkan minta bantuan Google..Ketikkan service server yang ingin dipelajari

    5. Security = Nah setelah terbentuk server dan infrastruktur yang baik barulah Anda memperhatikan Security mulai dari Server, Router, sampai Anda
    membuat IDS untuk mendeteksi serangan

    6. Monitoring = Monitoring ini mencangkup semua hal baik dari infrastruktur maupun dari sisi Server..Semakin baik monitoring maka Anda akan mudah..

    7. Backup = Hal ini sering dilupakan oleh para Network Administrator..Lakukan Backup Deferensial maupun Full untuk mengantisipasi Crash...
    Banyak teknologi yang dilakukan. Kalau saya lebih sering menggunakan RAID. Atau menggunakan Rsync ato NT Backup..Pelajari lah Metode BAckup Full dan Differential

    Darimana saya bisa mempelajari hal-hal tersebut:
    1. Dari Google yang pasti nya
    2. Buku atau Ebook
    3. DVD Tutorial


    Untuk membantu Agan agan sekalian saya sudah membuat Wiki Untuk Network Administrator dan System Administrator

    Silahkan di kunjungi



















    saya hanya dapat membantu bagi yang ingin belajar lebih..
    CEH-Forensic Security
    CCNA - CCNP
    Linux


    Masih ada Video Tutorial CCNA, CCNP,CCIP ,CCDP ,CCIE ,Wireshark ,Debian, Backtrack,Mikrotik,Oracle,dan masih banyak lagi..Cek di
    -----------------------------------------------------

    -----------------------------------------------------

    KHUSUS PECINTA MIKROTIK


    Collection DVD Tutorial Network/System Administrator


    Silahkan dipelajari semua hal tersebut untuk menjadi seorang Network Administrator yang handal..Tentu saja harus berjalan waktu pengalaman dan melakukan Trouble SHooting yang baik
    Semakin Anda banyak sertifikasi maka Anda akan dianggap lebih dari orang lain..

    Thread ini akan saya update dengan informasi yang terbaru di dunia Networking agar Newbies mampu menjadi lebih baik
    Click here to enlarge
    Trims
    Last edited by hackersmooth88; 14-03-2011 at 11:21.

  2. The Following 18 Users Say Thank You to hackersmooth88 For This Useful Post:

    + Show/Hide list of the thanked


  3. Total Comments 99

    Comments

  4. #61
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge


    Video2Brain – Unix Grundlagen
    Arbeiten mit der Unix-Kommandozeile
    Rohmaterial inkl. | 424 mb
    video2brain.com/de/products-647.htm

    Die ersten Schritte auf der Unix-Kommandozeile leicht gemacht – das ist das Ziel dieses Video-Trainings! Thomas Mitzka bringt über 10 Jahre Erfahrung als Unix-Trainer mit und führt Sie hier fundiert in die Grundlagen ein. Dabei kommen sowohl Einsteiger wie auch versierte Administratoren anderer Betriebssysteme gleichermaßen auf ihre Kosten, wenn er die wichtigsten Kommandos für den täglichen Gebrauch und deren Verwendung detailliert erläutert. Mit viel Hintergrundwissen, praktischen Übungen sowie Workshops zum Editor VI!

    Download Links: 3 files

  5. #62
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Perbedaan NAT, SNAT dan DNAT

    NAT (Network Address Translation)

    Adalah filter table yang seharusnya dipergunakan hanya untuk NAT. Dipergunakan untuk men-translate packet’s source atau destination source. Yang perlu diketahui bahwa paket yang pertama saja dalam stream (aliran data) yang akan diproses oleh filter NAT, dan paket selebihnya akan diperlakukan sama seperti paket yang pertama. Terdapat 3 macam NAT :

    DNAT (Destination Network Address Translation)
    Dipergunakan jika ingin meneruskan (redirect) paket dari IP PUBLIK melalui firewall kedalam suatu host (misalnya; dalam DMZ).

    Contoh :
    Kantor A berlangganan koneksi internet dan mendapatkan 1 ip publik (misal: 202.134.10.55) dari ISP. Kantor A ingin mambangun smtp server (10.10.10.1), pop3 server (10.10.10.2), dan web server (10.10.10.3). Ketiga layanan tersebut terdapat dalam 3 mesin yang berbeda dengan menggunakan ip lokal. Seharusnya kantor A membutuhkan 3 ip publik, berhubung kantor A hanya memiliki 1 ip publik maka dibuatlah DMZ.
    Dengan konsep DMZ, jika ada request layanan smtp maka request akan di-redirect ke smtp server (10.10.10.1) atau istilah lain dari DNAT adalah port forwarding.

    SNAT (Source Network Address Translation)
    Dipergunakan untuk merubah source address dari suatu paket data. Sebagai contoh peenggunaan SNAT adalah pada gateway internet, dimana ketika suatu host (pc) dalam LAN melakukan koneksi ke internet, yang terlihat dari internet adalah ip publiknya bukan ip lokalnya.


    MASQUERADE
    Sama dengan SNAT, cuman MASQUERADE biasanya dipergunakan jika menggunakan ip publik yang dinamis semacam koneksi ADSL. Sedangkan SNAT biasa digunakan untuk ip static seperti layanan dedicated.


    Ketiga hal (chain) diatas bisa diberikan parameter-parameter yang lebih spesifik sesuai dengan kebutuhan.



  6. #63
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge


    Hacking Ebook Collection
    English | PDF CHM | 1.07Gb

    Huge Hacking Ebook Collection for the hacking beginners and to the security experts to learn about the exploitation, sniffing, SQL attacks and more about the world of hacking...

    Booklist
    (Ebook – Computer) Hacking The Windows Registry.pdf
    (eBook – PDF) Hugo Cornwall – The Hacker’s Handbook .pdf
    (eBook pdf) Hacking into computer systems – a beginners guide.pdf
    (ebook_-_pdf)_Hacking_IIS_Servers.pdf
    0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
    0764578014.Wiley.The Database Hacker’s Handbook- Defending Database Servers.chm
    076459611X.John Wiley &amp_ Sons.Hacking GMail (ExtremeTech).pdf
    1246523-Hacking.Guide.V3.1.pdf
    1931769508.A-List Publishing.Hacker Linux Uncovered.chm
    2212948-Hacker’S.Delight.chm
    285063-Hacker.Bibel.pdf
    3077366-HackerHighSchool.pdf
    731986-Hacker’s Desk Reference.pdf
    A Beginners Guide To Hacking Computer Systems.pdf
    Addison Wesley – Hackers Delight 2002.pdf
















  7. #64
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge











  8. #65
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge


    Internet Security and Acceleration Server 2006
    Every Video in Our ISA Server Training Course

    The videos on this page are arranged in chapters. Some chapters have a series of videos; other chapters are just videos.

    NOTE: You will need the proper codec installed to view our videos.
    To view the video portion of our downloaded videos, you must install the proper codec. The installation only needs to be done one time per machine.
    * PC users: Download and install the TSCC codec ()
    * Mac users: Download and install the Ensharpen codec ()

    Chapter 1 – Technology Overview: An Introduction to ISA Server
    1 An Introduction to ISA Server 2006: What Is ISA Server and Why Should I Use It?

    Chapter 2 – Installing ISA Server 2006
    1 How to Install ISA Server 2006 Standard Edition
    2 A Pre-Installation of ISA Server 2006 Discussion: Requirements and Lecture
    3 Installation and Explanation of ISA Server 2006 Enterprise Edition

    Chapter 3 – Configuring ISA Server to Protect and Serve
    1 Assigning and Testing Administrative Roles in ISA Server 2006
    2 How to Set Up a Scheduled Job to Cache Websites
    3 Protect Your Network against Flood Attacks Using Mitigation Settings in ISA Server 2006
    4 How to Configure IP Protection to Deny Packets Based on Criteria
    5 How to Configure the Web Cache in ISA Server 2006
    6 How to Configure the Connectivity Verifier in ISA Server 2006
    7 Discussion of Enterprise and Array Configuration of ISA Server 2006


    Download




  9. #66
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge


    Book Description

    Make the Most of Today?s Smallest, Fastest Desktop Linux Distribution?Damn Small Linux!

    Damn Small Linux (DSL) is a super-efficient platform for everything from custom desktops to professional servers. Now, DSL?s creator and lead developer have written the first definitive, practical guide to this remarkable system. The Official Damn Small Linux Book brings together everything you need to put DSL to work in just minutes. Simply learn a few essentials, boot the live CD-ROM, and master the rest?one step at a time, hands-on.

    If you?re new to Linux, you can quickly discover how to use DSL to take your data on the road, safely running your programs and personal environment on nearly any computer. Easily adapt DSL to run on anything from an alternative device (Internet appliance, hand-held, diskless PC, or mini-ITX system) to an older PC that might otherwise be headed for landfill.

    Use this book and CD-ROM package to

    * Run DSL at blazing speed, from CD, USB pen drive, or directly from RAM
    * Run DSL from your hard drive or in a virtual environment within Windows
    * Add applications and create shareable extensions
    * Customize and remaster DSL to create your own distribution
    * Build a complete music and multimedia server
    * Use Skype VoIP phone service in DSL
    * Quickly set up an XAMPP Web server, complete with MySQL, PHP, and Perl, to host your personal Web pages


    download here



  10. #67
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge


    Microsoft Windows XP Registry Guide
    Publisher: Microsoft Press | ISBN: 0735617880 | edition 2002 | PDF | 440 pages | 13 mb
    This title for power users and IT professionals is the authoritative source for information on the Windows XP registry and how to modify it to suit your administrative and personal needs. The Windows registry contains profiles for each user of a computer plus information about system hardware, installed programs, property settings, and more. Modifying the Windows registry gives users the utmost control over the PC, but it’s been somewhat of a dangerous black art — until now. This title is the complete reference to working with the Windows XP registry — including everything from registry hacks for power users to management and deployment guidance for IT professionals. The book includes troubleshooting hints, common workarounds, and a guide to how to use the new registry editor.

    download here


  11. #68
    Status
    Offline
    hati_nyaman's Avatar
    Newbie
    Join Date
    Mar 2010
    Posts
    39
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    1 (100%)
    makasih gan udah share, manfaat banget nie tutorial2 nyaClick here to enlarge

  12. #69
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by hati_nyaman Click here to enlarge
    makasih gan udah share, manfaat banget nie tutorial2 nyaClick here to enlarge
    sama sama gan

    semoga membantu Ebook nya

  13. #70
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge


    Network Simulation Experiments Manual: A Systems Approach, 4th Edition
    Morgan Kaufmann; 2nd edition (November 7, 2007) | ISBN-10: 0123739748 | 197 Pages | PDF | 5 Mb

    Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information “stick” is to create an environment where networking professionals and students can visualize how networks work, utilizing a software tool that simulates the functions within a network. The tool itself is highly useful in that it provides a virtual environment for an assortment of desirable features such as modeling a network based on specified criteria and predicting its performance.
    The Network Simulation Experiments Manual takes this instructional tool a step further and provides detailed experiments on core networking topologies for use in this simulation environment. Various scenarios are presented within each topology and review questions, a lab report, and exercises accompany each assignment as well. The manual also comes with directions for downloading the free easy-to-install software, the OPNET IT Guru Academic Edition. This software provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies.
    Download






  14. The Following User Says Thank You to hackersmooth88 For This Useful Post:


  15. #71
    Status
    Offline
    willmen46's Avatar
    Baru Gabung
    Join Date
    Aug 2009
    Location
    Semarang - Indonesia
    Posts
    6
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Thanks for sharing gan
    bagi2 ilmu demi anak cucu Click here to enlarge

  16. #72
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by willmen46 Click here to enlarge
    Thanks for sharing gan
    bagi2 ilmu demi anak cucu Click here to enlarge
    ya gan silaahkan di download

  17. #73
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge


    You may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. Running Linux, now in its fifth edition, is the book you’ll want on hand in either case. Widely recognized in the Linux community as the ultimate getting-started and problem-solving book, it answers the questions and tackles the configuration issues that frequently plague users, but are seldom … addressed in other books.

    This fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always have made the book popular.

    Running Linux covers basic communications such as mail, web surfing, and instant messaging, but also delves into the subtleties of network configuration–including dial-up, ADSL, and cable modems–in case you need to set up your network manually. The book can make you proficient on office suites and personal productivity applications–and also tells you what programming tools are available if you’re interested in contributing to these applications.

    Other new topics in the fifth edition include encrypted email and filesystems, advanced shell techniques, and remote login applications. Classic discussions on booting, package management, kernel recompilation, and X configuration have also been updated.

    The authors of Running Linux have anticipated problem areas, selected stable and popular solutions, and provided clear instructions to ensure that you’ll have a satisfying experience using Linux. The discussion is direct and complete enough to guide novice users, while still providing the additional information experienced users will need to progress in their mastery of Linux.

    Whether you’re using Linux on a home workstation or maintaining a network server, Running Linux will provide expert advice just when you need it.

    LINKS DOWNLOAD:

    Filesonic


  18. #74
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge


    If you administer a network, you know that remote administration is a necessary, critical job that must also be done in a secure manner. Secure Shell (SSH) is the method of choice to securely administer a remote computer system. Older methods, such as Telnet, FTP, and ‘R’ services simply don’t provide the level of security to ensure confidentiality and integrity of sensitive data as it travels across non-secure networks. If you’ve never used Secure Shell, veteran VTC author Bobby Rogers will show you how to install, configure, and use secure shell on both Windows and Linux platforms, from the very basics to advanced techniques.

    Download Links:




    Masih ada Video Tutorial CCNA, CCNP,CCIP ,CCDP ,CCIE ,Wireshark ,Debian, Backtrack,Mikrotik,Oracle..Cek di
    -----------------------------------------------------

    -----------------------------------------------------

  19. #75
    Status
    Offline
    hackersmooth88's Avatar
    Member Senior
    Join Date
    May 2009
    Location
    www.bukunetwork.com
    Posts
    492
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge


    The past, present and future of the project. This talk will coincide with Opsview v3.0 release scheduled for early February 2009.

    Opsview is network monitoring software that significantly extends the functionality of Nagios and integrates tools such as MRTG, NMIS, RANCID and Net-SNMP. Opsview is developed using Catalyst web framework and MySQL database.

    Download




    Masih ada Video Tutorial CCNA, CCNP,CCIP ,CCDP ,CCIE ,CEH,Wireshark ,Debian, Backtrack,Mikrotik,Oracle,dan masih banyak lagi..Cek di
    -----------------------------------------------------

    -----------------------------------------------------

 

 
Page 5 of 7 FirstFirst ... 34567 LastLast

Thread Information

Users Browsing this Thread

There are currently 2 users browsing this thread. (0 members and 2 guests)

Similar Articles

  1. Tanya: Bagaimana mengakses page info dan logout.
    By komeng in forum Beginner Basics
    Replies: 3
    Last Post: 06-09-2009, 21:22
  2. Replies: 7
    Last Post: 23-04-2008, 22:58

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •