Follow Now......!

Kamis, 03 November 2011

Recipes - lodeh "banana"

Recipes - lodeh "banana"
ingredients:
1 piece of banana (1 / 2 kg)
4 cups coconut milk
5 pieces of green chillies (cut oblique))
4 tablespoons cooking oil

Seasonings:
5 pieces of red chilli
5 pieces of red onion
1 clove garlic
1 tablespoon dried shrimp
2 bay leaves
1 piece ginger (crushed)

How to make:
1. Boil until cooked banana, lift, washing,
cut into pieces, drain and set aside.
2. Blend the spices, stir-fry until fragrant spices,
enter the coconut milk, salt, sugar, let it boil (milk
do not get broken).
3. Enter the heart of banana, cooking until done,
lift, serve in a vegetable bowl, sprinkle

fried onions

Recipes - Recipes sambal tempoyak

Recipe Curried Tempoyak

Tempoyak is a local specialty foods Sumatra, Lampung and Palembang precisely. Tempoyak base material in the form of fermented durian fruit yield of sweet salty taste that you can not ever imagine. For those not familiar, stomach nausea race there must be much less see the manufacturing process. Tempoyak can be destroyed with the fish sauce or made separately disanding catfish with pineapple or mango. Lampung is the custom of making Tempoyak as sambal, imagine how it tastes and shapes.

But, for those who have never felt tempoyak, I assure you, your appetite will increase. Spicy sweet salty taste was really crowded make collecting. Well, instead of having far away to Lampung (tempoyak sauce if you want a message, comment below or PM me ya ..), there are recipes made ​​nie tempoyak, Curried tempoyak name. Curious ..?
Materials curry Tempoyak

     1 kg of catfish, potong2
     175 g tempoyak
     800 ml of water
     2 tablespoons cooking oil
     4 kaffir lime leaves
     2 bay leaves
     2 stalks lemongrass, crushed
     2 cm ginger

Subtle spice curry

     10 pieces of red chili
     8 pieces of red onion
     5 cloves garlic
     3 eggs hazelnut
     2 tsp salt
     1 tablespoon granulated sugar
     1 cm galangal
     2 cm turmeric

How to make curry tempoyak

     Sauté the ground spices, lime leaves, bay leaves and lemon grass until fragrant.
     Enter tempoyak and water, and cook until boiling.
     Enter the catfish, and cook until fish cooked and the flavors to infuse
     Remove and serve.

ter Recipes - Recipes Spicy Salted Fish

Recipes - Recipes Spicy Salted Fish

Materials - materials:

     250 grams of salted fish cork, cut uk 2 cm x 2 cm
     2 pcs red chilli, thinly sliced ​​oblique
     4 pcs of red onion, thinly sliced
     1 pc lemon juice, water course
     3 sdk husband ate fried

How to cook:

     Sprinkle fish with a cork salted boiling water, leave to cool, rinsed and drained
     Heat enough oil over medium heat pengorengan
     Enter the salted fish is then fried until cooked.
     Remove and drain.
     Heat the oil the recipe, put the onion and saute until fragrant
     Add the red pepper, stir, stir-fry until wilted
     Reduce the heat, then enter the already fried salted fish and lime juice.
     Stir well, remove and serve.

Di Tengah Kisruh, Dukungan Pulau Komodo Meningkat

The participation of the island of Komodo in Nusa Tenggara event held in the New Seven Wonders Foundation since the beginning of continued controversy. Starting from a dispute between the Ministry of Culture and Tourism and the New Seven Wonders related costs as the host. Until credibility is questionable foundation organizers and the cost of SMS or short message electoral swings.
Amid doubts about the credibility of the New7Wonders Foundation, a number of people admitted will continue to support the island of Komodo in the selection of the Seven Wonders of the New World.
According to Kalla, in the digital age as it is now possible for everyone to know the foundation's profile through internet services. "Switzerland is not as if searching for an address in the village have to RT or RW. We just go to the website, is obvious. Problems offices no longer need to be exaggerated, because only we in Indonesia are still like the big office, "Kalla said yesterday.
Chairman of Indonesia's Red Cross said the New-7Wonders is a foundation that takes care of the world so it is possible for the foundation board is always around the world. Especially now that the world has changed into the digital age so that the existence of the office is not too important. "Speaking of the office was not very important, and the office was not to be seen from the large and small," he said.
Kalla admitted, before being appointed as Ambassador of Komodo Island, he had to check the validity of the New7Wonders Foundation through the internet. He even claimed to have seen some beritadiinternet about how the involvement of the state president who was a finalist New7 Wonders of Nature is campaigning for the country as Barack Obama. "Only we are beberapapejabatnya justrumenantang it. Actually they are just less interested, "he said.
Support is also needed to promote Indonesia's tourism sector. "If the famous Komodo dragons, will be many who visit there so as to improve the welfare of local communities," he said. Deputy Minister of Tourism and Creative Economy Nirwandar asserted that the Government of Indonesia has no bearing whatever else in the New7Wonders contest.

Several techniques are used on the Wireless Security LAN

Below are some events and activities undertaken to mengamanan wireless networks:
Hiding the SSID
Many administrators hid Services Set Id (SSID) wireless network with the intention
that they only know the SSID can be connected to their network. This is not correct,
because the SSID is not completely masked. At a certain moment or
especially when the client will connect (associate) or when it will decide itself (deauthentication)
of a wireless network, then the client will still send the SSID in plain text
(Although the use of encryption), so if we intend to tap, can be easily
find information. Some tools that can be used to get the ssid
dihidden among others, kismet (kisMAC), ssid_jack (airjack), aircrack,
void11 ​​and much more.
Wireless security with WEP key only
WEP is a security standard & first encryption used on wireless, WEP has
many weaknesses, among others:
● A key problem is weak, the RC4 algorithm used can be solved.
● WEP uses static keys
● Problem initialization vector (IV) WEP
● Problem message integrity Cyclic Redundancy Check (CRC32)
WEP consists of two levels, namely 64 bit key, and 128 bits. Actually, the secret key in the lock
WEP 64 bit only 40 bit, 24bit is an Initialization Vector (IV). Similarly, the key
128-bit WEP 104bit secret key consists of. Seranganserangan
the weaknesses of WEP are:
1. The attack on the weaknesses of the initialization vector (IV), often called the FMS attack. FMS stands for
The third name the inventor of the IV weaknesses Fluhrer, Mantin, and Shamir. This attack
done by collecting a weak sebanyakbanyaknya IV.
The more IV
obtained weak, the sooner discovered the key that is used
(Www.drizzle.com/ ~ aboba/IEEE/rc4_ksaproc.pdf)
2. Obtain a unique IV data obtained through the packet to be processed for the
cracking the WEP key more quickly. This method is called chopping attack, the first time
found by h1kari. This technique only requires a unique IV, thereby reducing
IV needs of the weak in WEP cracking.
3. Both of the above attacks require considerable time and packet, to shorten the time,
hackers usually do traffic injection. Traffic Injection is often done
by collecting the ARP packet and then sends back to the access point. It is
vector resulted in an initial collection easier and faster. Unlike the attack
The first and second, to attack traffic injection, required specification of tools and applications
that start rarely encountered in tokotoko,
ranging from chipsets, firmware version, and versions
drivers, and not infrequently have to do the patching of drivers and applications.
MAC Filtering
Almost every wireless access point or router MAC filtering is facilitated by the security. It is
actually not much help in securing wireless communications, because the MAC address
very easy dispoofing or even altered. Tools ifconfig in OS Linux / Unix or a variety of tools such as
network utility, regedit, SMAC, machange on windows OS easily be used for spoofing
or change the MAC address.
I still often find wifi in the office and even the ISP (which is usually used by
warnetwarnet)
which only use MAC filtering protection. By using the application
wardriving like kismet / aircrack kisMAC or tools, we can obtain the MAC address of each client information
which is connected to an Access Point. After getting this information, we can
connected to the Access point to change the MAC in accordance with this client. In wireless networks,
MAC address duplication does not result in conflict. It only takes a different IP to client
the earlier.
Captive Portals
Captive Portal infrastructure originally designed for the purposes of community that enables all
people can connect (open network). Captive portal is actually a router or gateway machine
which does not protect or allow the traffic to the user registration / authentication.

Internet Traffic Analysis With Mikrotik Torch

Internet is very slow when you feel used? The first question might be how does the speed of internet connection that I get to feel slow. The next step taken is to measure the speed of internet connection in our place with some of the tools available on the internet. Do not rush to blame the ISP if this incident happened, the first step is a self check on our network. It may seem a simple enough, but it is very important for analyzing the events that exist in our internet network.

How to do it? If we use the network gateway mikrotik then there are tools that have been provided to analyze traffic passing the Torch. Torch is a Real Time Traffic Monitor is used to analyze the flow of passing traffic on an interface (ethernet, wireless, vlan, etc.). On a linux system may be likened to tcpdump. By Using Torch, Menu Tools -> Torch can be analyzed any traffic that passed and how much.

Having identified and analyzed the causes of the problem for subsequent follow-up. Step-by-step analysis as follows:
1. Login Menu Tools -> Torch.
2. Select Interface, in this instance a WLAN (Hotspot Assumption).
3. Select Interface, In this example an ethernet (Network with Cable Assumption.

Installing Memory Modules

4. Installing Memory Modules
Memory modules are generally installed sequentially from the smallest socket number. The order of installation can be seen from the diagram of the motherboard.
Each type of memory module that is SIMM, DIMM and RIMM can be distinguished by the position of grooves on the sides and bottom of the module.
How to install for each type of memory module as follows.
SIMM Type
1. Adjust the position of grooves on the module with the protrusions in the slot.
2. Insert the module by creating an oblique angle of 45 degrees to the slot
3. Push the module straight up in the slot, the locking lever on the slot will automatically lock the module.

Tips Buka Usaha

Some friends I Want Mungkin Opening a new business. In, trus confusion Proper determine what the business, the easy, inexpensive course that can provide big advantage.Actually What We Do not get confused. If we understand that all business with initial capital of Yang Yang at the same relative Tried And risks.No get Ragu FOR FOR "WITH Opens Small Business capital". BECAUSE Small Businesses Will Be constructed of NOW became big in the future. any tips on how to start a Simple Opening a Small Business FOR THE capital. Small-business type of capital to escape WITH Seekers The targets have not been getting work. Small Business Capital FOR WITH their choice BECAUSE Home Not All People can get loans WITH big amount of capital. WITH only the property owned, one may Opens Business Opportunities Business Opportunity Which if capital market.Small Good cheap abundant NOW Scattered In the Real World or virtual world, via the Internet NOW Everyone can have a Business Opportunity Marketing can even Buy cheap Without A home equity . (Without Buying a home can even capital) Here are the tips TO specify Type of Business: 1. Starting From What YOU like
    
YOU can Start Trying Opening Match of Business or favorite hobby WITH YOU. Like when I THEREFORE, YOU Will Not Give Up Easily Bored cheap fast run, although Mungkin ON Early days There will be a LOT tantangan.2. Starting from that you know well
    
Or Can YOU FOR Trying Opening a business that already mastered the art. Waluapun inexperienced entrepreneurship, trus I am sure YOU have the skills can be utilized. For example, WITH YOUR expertise in, bookkeeping (accounting), YOU can Start creating a service business where kecil.3.Search Enterprises FINANCE FOR YOUR Money Go
    
What other ways can do is trace where YOU WITH YOUR Money Going so far. Its purpose is to FOR From Opening a business to supplement their income instead, then see how to get YOUR money spinning. From Consumer Transferred to the seller, agent, low-cost producer so on. Try TO YOU Has Given that spending money to buy books, coffee, meals, boarding, transportation etc. cheap. Check the One by One Money flows TO YOU spend on transport driver, food entrepreneur, book stores so cheap. One Mungkin there any gaps where YOU can enjoy the benefits of cash flow sebelumnya.buka Enterprises, open business tips, how to open a new business, Step Preparation of running a business, go to the Small Business Capital.

Site Search