Follow us on...
Follow us on G+ Follow us on Twitter Follow us on Facebook Watch us on YouTube
Register
Page 28 of 48 FirstFirst ... 18262728293038 ... LastLast
Results 406 to 420 of 713
  1. #406
    Status
    Offline
    pocipto's Avatar
    Baru Gabung
    Join Date
    Nov 2010
    Posts
    2
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    bro maap ne... ane pemula...blh minta tutor lengkap os mikrotik via console g? thx ya

  2. #407
    Status
    Offline
    pocipto's Avatar
    Baru Gabung
    Join Date
    Nov 2010
    Posts
    2
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    boleh minta tutor console buat setting mikrotik ga?

  3. #408
    Status
    Offline
    yo90's Avatar
    Baru Gabung
    Join Date
    Nov 2010
    Posts
    1
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0

    Smile

    Click here to enlarge Originally Posted by exabytemediainc Click here to enlarge
    Apakah ada buku yang membahas lengkap tentang mikrotik dalam bahasa indonesia? jika ada, mohon informasinya.Click here to enlarge

    Click here to enlargeMIKROTIKClick here to enlarge


    Click here to enlargeClick here to enlargeClick here to enlargeUNTUK E-BOOKS YANG LAINNYA ADA DI PAGE SELANJUTNYA...Click here to enlargeClick here to enlargeClick here to enlarge

    Jangan Lupa Say THANK'S bagi yang terbantu..


    Click here to enlarge


    hmmmm... ada nya di hosting rapidshare...

    yg selain di raidshare ada ga yahhh.....???

    cekiwit benwit nih coy....



    Click here to enlarge

  4. The Following 2 Users Say Thank You to yo90 For This Useful Post:


  5. #409
    Status
    Offline
    dilarang's Avatar
    Baru Gabung
    Join Date
    Nov 2010
    Location
    Indonesia
    Posts
    2
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    saya sangat awam dan ingin sekali bekajar mikrotik tapi Dengan adanya thread ini jadinya saya sangat terbantu. makasih dengan sebesar2nya semoga kebaikan agan2 dibales dengan pahala yang besar, dijauhkan dari marabahaya dan dimudahkan rejekinya serta yg belum nikah didekatkan jodohnya amin....

    maafkan kalo kata2 saya sedikit lebay, tapi ini tulus dari saya yg masih nubie ini dan sangat ingin sekali bisa mikrotik. minimal y buat diri sendiri aja.

    Click here to enlargeClick here to enlarge

    Click here to enlarge

  6. The Following User Says Thank You to dilarang For This Useful Post:


  7. #410
    Status
    Offline
    sidikarif's Avatar
    Baru Gabung
    Join Date
    Aug 2010
    Posts
    5
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0

    Talking

    ok gan mantap ni.....Click here to enlargeClick here to enlarge

  8. #411
    Status
    Offline
    kemple's Avatar
    Baru Gabung
    Join Date
    Aug 2010
    Posts
    3
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by donipermono1982 Click here to enlarge
    System Requirements: Windows NT/2000/XP/2003/Vista
    Duration: 10 hours/40 Videos on 1-DVD



    LinuxCBT Proxy Edition feat. Squid encompasses: 1. Proxy Security.
    LinuxCBT Proxy Edition feat. Squid is unparalleled in content, depth and expertise. It entails 10-hours, or over 1-day of classroom

    training. LinuxCBT Proxy Edition feat. Squid prepares you or your organization for successfully securing GNU/Linux & Open

    Source-based solutions. As a by-product, many of the covered concepts, utilities and tricks are applicable to heterogeneous

    computing environments, ensuring your coverage of the fundamentals of securing corporate infrastructures.

    Let LinuxCBT Proxy Edition feat. Squid cost-effectively sharpen your GNU/Linux & Open Source Security skills!

    Recommended Prerequisites for:

    * Any LinuxCBT Operating System Course (Classic/EL-4/SUSE/Debian Editions)
    o Open mind & determination to master Linux and related open-source applications
    o Basic understanding of networking concepts
    o Access to a PC to follow the exercises

    Proxy Security - Module 1

    * Squid Proxy Initialization
    o Discuss Squid concepts & applications
    o Discuss DNS application
    o Configure DNS on primary SuSE Linux server for the Squid Proxy environment
    o Confirm DNS environment
    o Start Squid and evaluate default configuration
    o Install Squid Proxy server
    *
    * General Proxy Usage
    o Configure web browser to utilize proxy services
    o Grant permissions to permit local hosts to utilize proxy services
    o Discuss ideal file system layout - partitioning
    o Explore key configuration files
    o Use client to test the performance of proxy services
    o Discuss HIT/MISS logic for serving content
    o Configure proxy support for text-based (lftp/wget/lynx) HTTP clients
    *
    * Squid Proxy Logs
    o Discuss Squid Proxy logging mechanism
    o Identify key log files
    o Discuss & explore the Access log to identify HITS and/or MISSES
    o Discuss & explore the Store log to identify cached content
    o Convert Squid logs to the Common Log Format (CLF) for easy processing
    o Discuss key CLF fields
    o Configure Webalizer to process Squid-CLF logs
    o Revert to Squid Native logs
    o Discuss key Native log fields
    o Configure Webalizer to process Squid Native logs
    *
    * Squid Network Configuration & System Stats
    o Discuss cachemgr.cgi Common Gateway Interface(CGI) script
    o Explore the available metrics provided by cachemgr.cgi
    o Change default Squid Proxy port
    o Modify text/graphical clients and test communications
    o Discuss Safe Ports - usage & applications
    *
    * Squid Access Control Lists (ACLs)
    o Intro to Access Control Lists (ACLs) - syntax
    o Define & test multiple HTTP-based ACLs
    o Define & test ACL lists - to support multiple hosts/subnets
    o Define & test time-based ACLs
    o Nest ACLs to tighten security
    o Implement destination domain based ACLs
    o Exempt destination domains from being cached to ensure content freshness
    o Define & test Anded ACLs
    o Discuss the benefits of Regular Expressions (Regexes)
    o Implement Regular Expressions ACLs to match URL patterns
    o Exempt hosts/subnets from being cached or using the Squid cache
    o Force cache usage
    o Configure enterprise-class Cisco PIX firewall to deny outbound traffic
    o Configure DNS round-robin with multiple Squid Proxy caches for load-balancing
    o Discuss delay pool concepts & applications - bandwidth management
    o Configure delay pools - to support rate-limiting
    o Examine results of various delay pool classes
    o Enforce maximum connections to deter Denial of Service (DoS) attacks
    o Verify maximum connections comply with security policy
    *
    * Squid Proxy Hierarchies
    o Discuss Squid cache hierarchy concepts & applications
    o Ensure communications through a primary cache server - double-auditing
    o Discuss and configure parent-child bypass based on ACLs
    o Configure Intranet ACLs for peer-cache bypass
    o Discuss & implement Squid cache hierarchy siblings
    o Configure transparent proxy services











    semoga berguna buat yang lagi setting squid dan yang ingin belajar squid

    yang serius ya belajarnya
    Click here to enlarge

    kalau tanggapan nya positif akan gw kasih link video berikutnya .. .ada Cisco, Suse10, and manymore available now


    jangan lupa klik " thanks " yg ikhlas....Click here to enlarge

    ebook squid nya ada yang bahasa indo gak om ??
    ane lagi belajar squid nih ... hehe
    mohon bantuan nya ya Click here to enlarge Click here to enlarge

  9. The Following User Says Thank You to kemple For This Useful Post:


  10. #412
    Status
    Offline
    hengky_ti's Avatar
    Newbie
    Join Date
    Oct 2010
    Posts
    25
    Reviews
    Read 0 Reviews
    Downloads
    1
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by donipermono1982 Click here to enlarge
    System Requirements: Windows NT/2000/XP/2003/Vista
    Duration: 10 hours/40 Videos on 1-DVD



    LinuxCBT Proxy Edition feat. Squid encompasses: 1. Proxy Security.
    LinuxCBT Proxy Edition feat. Squid is unparalleled in content, depth and expertise. It entails 10-hours, or over 1-day of classroom

    training. LinuxCBT Proxy Edition feat. Squid prepares you or your organization for successfully securing GNU/Linux & Open

    Source-based solutions. As a by-product, many of the covered concepts, utilities and tricks are applicable to heterogeneous

    computing environments, ensuring your coverage of the fundamentals of securing corporate infrastructures.

    Let LinuxCBT Proxy Edition feat. Squid cost-effectively sharpen your GNU/Linux & Open Source Security skills!

    Recommended Prerequisites for:

    * Any LinuxCBT Operating System Course (Classic/EL-4/SUSE/Debian Editions)
    o Open mind & determination to master Linux and related open-source applications
    o Basic understanding of networking concepts
    o Access to a PC to follow the exercises

    Proxy Security - Module 1

    * Squid Proxy Initialization
    o Discuss Squid concepts & applications
    o Discuss DNS application
    o Configure DNS on primary SuSE Linux server for the Squid Proxy environment
    o Confirm DNS environment
    o Start Squid and evaluate default configuration
    o Install Squid Proxy server
    *
    * General Proxy Usage
    o Configure web browser to utilize proxy services
    o Grant permissions to permit local hosts to utilize proxy services
    o Discuss ideal file system layout - partitioning
    o Explore key configuration files
    o Use client to test the performance of proxy services
    o Discuss HIT/MISS logic for serving content
    o Configure proxy support for text-based (lftp/wget/lynx) HTTP clients
    *
    * Squid Proxy Logs
    o Discuss Squid Proxy logging mechanism
    o Identify key log files
    o Discuss & explore the Access log to identify HITS and/or MISSES
    o Discuss & explore the Store log to identify cached content
    o Convert Squid logs to the Common Log Format (CLF) for easy processing
    o Discuss key CLF fields
    o Configure Webalizer to process Squid-CLF logs
    o Revert to Squid Native logs
    o Discuss key Native log fields
    o Configure Webalizer to process Squid Native logs
    *
    * Squid Network Configuration & System Stats
    o Discuss cachemgr.cgi Common Gateway Interface(CGI) script
    o Explore the available metrics provided by cachemgr.cgi
    o Change default Squid Proxy port
    o Modify text/graphical clients and test communications
    o Discuss Safe Ports - usage & applications
    *
    * Squid Access Control Lists (ACLs)
    o Intro to Access Control Lists (ACLs) - syntax
    o Define & test multiple HTTP-based ACLs
    o Define & test ACL lists - to support multiple hosts/subnets
    o Define & test time-based ACLs
    o Nest ACLs to tighten security
    o Implement destination domain based ACLs
    o Exempt destination domains from being cached to ensure content freshness
    o Define & test Anded ACLs
    o Discuss the benefits of Regular Expressions (Regexes)
    o Implement Regular Expressions ACLs to match URL patterns
    o Exempt hosts/subnets from being cached or using the Squid cache
    o Force cache usage
    o Configure enterprise-class Cisco PIX firewall to deny outbound traffic
    o Configure DNS round-robin with multiple Squid Proxy caches for load-balancing
    o Discuss delay pool concepts & applications - bandwidth management
    o Configure delay pools - to support rate-limiting
    o Examine results of various delay pool classes
    o Enforce maximum connections to deter Denial of Service (DoS) attacks
    o Verify maximum connections comply with security policy
    *
    * Squid Proxy Hierarchies
    o Discuss Squid cache hierarchy concepts & applications
    o Ensure communications through a primary cache server - double-auditing
    o Discuss and configure parent-child bypass based on ACLs
    o Configure Intranet ACLs for peer-cache bypass
    o Discuss & implement Squid cache hierarchy siblings
    o Configure transparent proxy services











    semoga berguna buat yang lagi setting squid dan yang ingin belajar squid

    yang serius ya belajarnya
    Click here to enlarge

    kalau tanggapan nya positif akan gw kasih link video berikutnya .. .ada Cisco, Suse10, and manymore available now


    jangan lupa klik " thanks " yg ikhlas....Click here to enlarge
    bang minta link local-nya kalo ada ? Click here to enlarge

  11. The Following User Says Thank You to hengky_ti For This Useful Post:


  12. #413
    Status
    Offline
    hengky_ti's Avatar
    Newbie
    Join Date
    Oct 2010
    Posts
    25
    Reviews
    Read 0 Reviews
    Downloads
    1
    Uploads
    0
    Feedback Score
    0

    Link-nya mati

    Bang Don,, minta tolong dong upload lagi link yang ini :









    soalnya dah mati
    thx banyak bg

  13. The Following User Says Thank You to hengky_ti For This Useful Post:


  14. #414
    Status
    Offline
    ha54n's Avatar
    Baru Gabung
    Join Date
    Nov 2009
    Posts
    15
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    ijin sedot oms... masih nyoba yang remote winbox dari jauh,
    IP publik itu berubah setiap hari ya??
    karena mau di tinggal keluar kota nich, siapa tau ada error jadi bisa di luar sana ane urus.. Click here to enlarge

  15. #415
    Status
    Offline
    cyber_5566's Avatar
    Member
    Join Date
    Apr 2009
    Location
    Palembang
    Posts
    127
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by ha54n Click here to enlarge
    ijin sedot oms... masih nyoba yang remote winbox dari jauh,
    IP publik itu berubah setiap hari ya??
    karena mau di tinggal keluar kota nich, siapa tau ada error jadi bisa di luar sana ane urus.. Click here to enlarge
    ip publik gak berubah setiap hari pak..kecuali ip lan(lokal) disetting DHCP...
    karena ip publik udh permanen gitu seperti speedy kecuali tergantung dari ISP yang kita ambil..Click here to enlarge

  16. #416
    Status
    Offline
    ha54n's Avatar
    Baru Gabung
    Join Date
    Nov 2009
    Posts
    15
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    tapi kok ip saya di myip itu kemarin 110.xx.xx.xx
    sekarang jadi 61.xx.xx.xx
    Click here to enlarge

    apa ada yang salah dengan spedol saya??

  17. The Following User Says Thank You to ha54n For This Useful Post:


  18. #417
    Status
    Offline
    why_you's Avatar
    Member
    Join Date
    May 2010
    Posts
    130
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by project21 Click here to enlarge
    Bang Don,, minta tolong dong upload lagi link yang ini :









    soalnya dah mati
    thx banyak bg
    baca2 lagi bro diatas, om akangage ada ngelokalin linknya ,Click here to enlarge

  19. #418
    Status
    Offline
    fauzi100's Avatar
    Baru Gabung
    Join Date
    Sep 2010
    Posts
    2
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0

    Smile mantap ini yg gw cari2 thanks

    Click here to enlarge Originally Posted by donipermono1982 Click here to enlarge
    System Requirements: Windows NT/2000/XP/2003/Vista
    Duration: 10 hours/40 Videos on 1-DVD



    LinuxCBT Proxy Edition feat. Squid encompasses: 1. Proxy Security.
    LinuxCBT Proxy Edition feat. Squid is unparalleled in content, depth and expertise. It entails 10-hours, or over 1-day of classroom

    training. LinuxCBT Proxy Edition feat. Squid prepares you or your organization for successfully securing GNU/Linux & Open

    Source-based solutions. As a by-product, many of the covered concepts, utilities and tricks are applicable to heterogeneous

    computing environments, ensuring your coverage of the fundamentals of securing corporate infrastructures.

    Let LinuxCBT Proxy Edition feat. Squid cost-effectively sharpen your GNU/Linux & Open Source Security skills!

    Recommended Prerequisites for:

    * Any LinuxCBT Operating System Course (Classic/EL-4/SUSE/Debian Editions)
    o Open mind & determination to master Linux and related open-source applications
    o Basic understanding of networking concepts
    o Access to a PC to follow the exercises

    Proxy Security - Module 1

    * Squid Proxy Initialization
    o Discuss Squid concepts & applications
    o Discuss DNS application
    o Configure DNS on primary SuSE Linux server for the Squid Proxy environment
    o Confirm DNS environment
    o Start Squid and evaluate default configuration
    o Install Squid Proxy server
    *
    * General Proxy Usage
    o Configure web browser to utilize proxy services
    o Grant permissions to permit local hosts to utilize proxy services
    o Discuss ideal file system layout - partitioning
    o Explore key configuration files
    o Use client to test the performance of proxy services
    o Discuss HIT/MISS logic for serving content
    o Configure proxy support for text-based (lftp/wget/lynx) HTTP clients
    *
    * Squid Proxy Logs
    o Discuss Squid Proxy logging mechanism
    o Identify key log files
    o Discuss & explore the Access log to identify HITS and/or MISSES
    o Discuss & explore the Store log to identify cached content
    o Convert Squid logs to the Common Log Format (CLF) for easy processing
    o Discuss key CLF fields
    o Configure Webalizer to process Squid-CLF logs
    o Revert to Squid Native logs
    o Discuss key Native log fields
    o Configure Webalizer to process Squid Native logs
    *
    * Squid Network Configuration & System Stats
    o Discuss cachemgr.cgi Common Gateway Interface(CGI) script
    o Explore the available metrics provided by cachemgr.cgi
    o Change default Squid Proxy port
    o Modify text/graphical clients and test communications
    o Discuss Safe Ports - usage & applications
    *
    * Squid Access Control Lists (ACLs)
    o Intro to Access Control Lists (ACLs) - syntax
    o Define & test multiple HTTP-based ACLs
    o Define & test ACL lists - to support multiple hosts/subnets
    o Define & test time-based ACLs
    o Nest ACLs to tighten security
    o Implement destination domain based ACLs
    o Exempt destination domains from being cached to ensure content freshness
    o Define & test Anded ACLs
    o Discuss the benefits of Regular Expressions (Regexes)
    o Implement Regular Expressions ACLs to match URL patterns
    o Exempt hosts/subnets from being cached or using the Squid cache
    o Force cache usage
    o Configure enterprise-class Cisco PIX firewall to deny outbound traffic
    o Configure DNS round-robin with multiple Squid Proxy caches for load-balancing
    o Discuss delay pool concepts & applications - bandwidth management
    o Configure delay pools - to support rate-limiting
    o Examine results of various delay pool classes
    o Enforce maximum connections to deter Denial of Service (DoS) attacks
    o Verify maximum connections comply with security policy
    *
    * Squid Proxy Hierarchies
    o Discuss Squid cache hierarchy concepts & applications
    o Ensure communications through a primary cache server - double-auditing
    o Discuss and configure parent-child bypass based on ACLs
    o Configure Intranet ACLs for peer-cache bypass
    o Discuss & implement Squid cache hierarchy siblings
    o Configure transparent proxy services











    semoga berguna buat yang lagi setting squid dan yang ingin belajar squid

    yang serius ya belajarnya
    Click here to enlarge

    kalau tanggapan nya positif akan gw kasih link video berikutnya .. .ada Cisco, Suse10, and manymore available now


    jangan lupa klik " thanks " yg ikhlas....Click here to enlarge
    Click here to enlargeClick here to enlarge
    mantap.... bikin gereget..siip moga sukses gan

  20. The Following User Says Thank You to fauzi100 For This Useful Post:


  21. #419
    Status
    Offline
    big_down's Avatar
    Baru Gabung
    Join Date
    Nov 2010
    Posts
    1
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by donipermono1982 Click here to enlarge
    System Requirements: Windows NT/2000/XP/2003/Vista
    Duration: 10 hours/40 Videos on 1-DVD



    LinuxCBT Proxy Edition feat. Squid encompasses: 1. Proxy Security.
    LinuxCBT Proxy Edition feat. Squid is unparalleled in content, depth and expertise. It entails 10-hours, or over 1-day of classroom

    training. LinuxCBT Proxy Edition feat. Squid prepares you or your organization for successfully securing GNU/Linux & Open

    Source-based solutions. As a by-product, many of the covered concepts, utilities and tricks are applicable to heterogeneous

    computing environments, ensuring your coverage of the fundamentals of securing corporate infrastructures.

    Let LinuxCBT Proxy Edition feat. Squid cost-effectively sharpen your GNU/Linux & Open Source Security skills!

    Recommended Prerequisites for:

    * Any LinuxCBT Operating System Course (Classic/EL-4/SUSE/Debian Editions)
    o Open mind & determination to master Linux and related open-source applications
    o Basic understanding of networking concepts
    o Access to a PC to follow the exercises

    Proxy Security - Module 1

    * Squid Proxy Initialization
    o Discuss Squid concepts & applications
    o Discuss DNS application
    o Configure DNS on primary SuSE Linux server for the Squid Proxy environment
    o Confirm DNS environment
    o Start Squid and evaluate default configuration
    o Install Squid Proxy server
    *
    * General Proxy Usage
    o Configure web browser to utilize proxy services
    o Grant permissions to permit local hosts to utilize proxy services
    o Discuss ideal file system layout - partitioning
    o Explore key configuration files
    o Use client to test the performance of proxy services
    o Discuss HIT/MISS logic for serving content
    o Configure proxy support for text-based (lftp/wget/lynx) HTTP clients
    *
    * Squid Proxy Logs
    o Discuss Squid Proxy logging mechanism
    o Identify key log files
    o Discuss & explore the Access log to identify HITS and/or MISSES
    o Discuss & explore the Store log to identify cached content
    o Convert Squid logs to the Common Log Format (CLF) for easy processing
    o Discuss key CLF fields
    o Configure Webalizer to process Squid-CLF logs
    o Revert to Squid Native logs
    o Discuss key Native log fields
    o Configure Webalizer to process Squid Native logs
    *
    * Squid Network Configuration & System Stats
    o Discuss cachemgr.cgi Common Gateway Interface(CGI) script
    o Explore the available metrics provided by cachemgr.cgi
    o Change default Squid Proxy port
    o Modify text/graphical clients and test communications
    o Discuss Safe Ports - usage & applications
    *
    * Squid Access Control Lists (ACLs)
    o Intro to Access Control Lists (ACLs) - syntax
    o Define & test multiple HTTP-based ACLs
    o Define & test ACL lists - to support multiple hosts/subnets
    o Define & test time-based ACLs
    o Nest ACLs to tighten security
    o Implement destination domain based ACLs
    o Exempt destination domains from being cached to ensure content freshness
    o Define & test Anded ACLs
    o Discuss the benefits of Regular Expressions (Regexes)
    o Implement Regular Expressions ACLs to match URL patterns
    o Exempt hosts/subnets from being cached or using the Squid cache
    o Force cache usage
    o Configure enterprise-class Cisco PIX firewall to deny outbound traffic
    o Configure DNS round-robin with multiple Squid Proxy caches for load-balancing
    o Discuss delay pool concepts & applications - bandwidth management
    o Configure delay pools - to support rate-limiting
    o Examine results of various delay pool classes
    o Enforce maximum connections to deter Denial of Service (DoS) attacks
    o Verify maximum connections comply with security policy
    *
    * Squid Proxy Hierarchies
    o Discuss Squid cache hierarchy concepts & applications
    o Ensure communications through a primary cache server - double-auditing
    o Discuss and configure parent-child bypass based on ACLs
    o Configure Intranet ACLs for peer-cache bypass
    o Discuss & implement Squid cache hierarchy siblings
    o Configure transparent proxy services











    semoga berguna buat yang lagi setting squid dan yang ingin belajar squid

    yang serius ya belajarnya
    Click here to enlarge

    kalau tanggapan nya positif akan gw kasih link video berikutnya .. .ada Cisco, Suse10, and manymore available now


    jangan lupa klik " thanks " yg ikhlas....Click here to enlarge
    Click here to enlarge Originally Posted by rantanplan Click here to enlarge
    yah bro pake nanya, kirim aje kali aja bisa menambah ilmu kita....apalagi buat nubi seperti saya Click here to enlarge

    terutama buat yang mau bikin server lain diluar mikrotiknya....Click here to enlarge
    Click here to enlarge Originally Posted by rantanplan Click here to enlarge
    wah..thnks bro...ijin sedot ya...hehehe

    jika berkenan ditunggu video yang lain Click here to enlarge
    mohon paswordnya......aminmmikrotik@yahoo.co.id terimakasih

  22. #420
    Status
    Offline
    black.door's Avatar
    Newbie
    Join Date
    Feb 2011
    Posts
    36
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Mantaps OM,ijin belajar dulu Click here to enlarge

 

 
Page 28 of 48 FirstFirst ... 18262728293038 ... LastLast

Thread Information

Users Browsing this Thread

There are currently 3 users browsing this thread. (0 members and 3 guests)

Similar Threads

  1. Replies: 19
    Last Post: 17-04-2012, 09:53
  2. [jual] Tower second lengkap,barang OK,harga nego (Jogja)
    By setiawans in forum Others Hardware
    Replies: 3
    Last Post: 16-05-2008, 15:15

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •