Jumat, 16 November 2012
Sabtu, 20 Oktober 2012
Makalah Prilaku Sosial Kelompok PUNK
Makalah ISD : Prilaku Sosial Kelompok PUNK
Makalah ini berisi bagai mana aktivitas yang dilakukan oleh para PUNGers , Semoga Bermanfaat :)
Jumat, 12 Oktober 2012
Minggu, 07 Oktober 2012
Kamis, 04 Oktober 2012
Selasa, 02 Oktober 2012
Sabtu, 29 September 2012
Senin, 27 Agustus 2012
Mengatasi CPU Usage 100% Dan Windows Explorer Hang
Pada bahasan kali ini saya ingin berbagi tips untuk mengatasi
permasalahan pada Windows, yaitu permasalahan CPU Usage yang tinggi,
dimana menunjukan angka 100% terus, padahal hanya membuka beberapa file
dan program saja dan Windows Explorer yang sering hang/not responding
pada saat anda menggunakannya.
Permasalahan tersebut banyak sekali penyebabnya, seperti adanya virus, malware, spyware, WIndows yang bermasalah, atau permasalahan hardware (klo yang ini saya angkat tangan…hehe). Namun jika sebeumnya anda menggunakan laptop atau komputer anda tidak ada masalah, dan tiba-tiba anda menemui masalah seperti ini, anda perlu curiga dan mencari tahu permasalahannya, mungkin saja hal tersebut bukan permasalahan hardware.
Sebagai Technical Support saya memang sering menemui masalah ini di sisi user, dimana mereka mengadukan masalah ini dan minta dilakukan install ulang Windows, padahal belum lama sudah saya install komputer tersebut. Saya sempat berpikir masalah tersebut adalah karena virus, namun pada PC user tersebut sudah terinstall Antivirus yang update selalu.
Setelah melakukan troubleshoot dan Googling akhirnya saya temukan permasalahannya. Berikut cara mengatasinya:
1. Scan PC anda dengan program pembasmi Adware, Malware, Spyware.
Adware, Malware, dan Spyware berbeda dengan Virus, program-program di atas adalah program-program jahat yang memperlambat kinerja komputer (Adware dan Malware), dan memata-matai aktivitas komputer anda dari jauh (Spyware), apabila komputer anda terkoneksi internet.
Untuk menanganinya anda dapat menggunakan program Super Anti Spyware, program ini gratis dan dapat anda download di website resminya di http://www.superantispyware.com/ dan anda klik link Download SUPERAntiSpyware FREE Edition. Setelah install saya sarankan untuk melakukan update database terlebih dahulu sebelum melakukan scanning.
2. Disable program-program aneh yang dijalankan pada Startup Windows.
Tanpa anda sadari banyak program-program yang tidak anda kenal dijalankan pada Windows Startup, yang menyebabkan lambatnya kinerja komputer anda, untuk menghapusnya anda dapat menjalankan.
Start – Run - ketikkan msconfig, lalu akan muncul jendela System Configuration Utility, kemudian anda klik tab Startup, kemudian uncheck program-program startup yang tidak penting. Untuk mengetahui pentingnya program tersebut anda bisa mengeceknya yang ada pada program-program yang anda install yang penting dijalankan pada saat Startup Windows.
3. Hapus Key InProcServer32 pada Regedit (Windows XP only).
Apabila cara pertama dan kedua tidak berhasil, anda dapat menggunakan cara ini, yaitu menghapus key InProcServer32 pada Regedit, key ini berfungsi untuk membaca semua file media, seperti .AVI pada harddisk anda, sehingga membuat kerja Windows Explorer menjadi lebih berat, dan mengakibatkan Hang dan CPU Usage tinggi.
Cara menghapusnya:
Start – Run - ketikkan regedit, lalu akan muncul jendela Registry Editor, kemudian anda masuk ke
HKEY_CLASSES_ROOT\CLSID\{c5a40261-cd64-4ccf-84cb-c394da41d590}\InProcServer32
Backup terlebih dahulu dengan cara Klik kanan pada Key InProcServer32 – Export. Setelah selesai hapus key InProcServer32 tersebut, dan coba Restart Windows anda.
Dari cara-cara di atas, penulis melakukan cara terakhir dan terbukti kinerja Windows Explorer dan CPU Usage kembali normal, bagaimana dengan anda?
Bagi pengguna Windows 7 yang tidak ada key registry HKEY_CLASSES_ROOT\CLSID\{c5a40261-cd64-4ccf-84cb-c394da41d590}\InProcServer32, coba anda cek apakah ada aplikasi Media Player Classic/K-Lite pada komputer anda, jika ada coba anda uninstall terlebih dahulu, restart, dan coba cek apakah ada perbedaanya.
Semoga bermanfaat.
Source :
http://asus87.com
Permasalahan tersebut banyak sekali penyebabnya, seperti adanya virus, malware, spyware, WIndows yang bermasalah, atau permasalahan hardware (klo yang ini saya angkat tangan…hehe). Namun jika sebeumnya anda menggunakan laptop atau komputer anda tidak ada masalah, dan tiba-tiba anda menemui masalah seperti ini, anda perlu curiga dan mencari tahu permasalahannya, mungkin saja hal tersebut bukan permasalahan hardware.
Sebagai Technical Support saya memang sering menemui masalah ini di sisi user, dimana mereka mengadukan masalah ini dan minta dilakukan install ulang Windows, padahal belum lama sudah saya install komputer tersebut. Saya sempat berpikir masalah tersebut adalah karena virus, namun pada PC user tersebut sudah terinstall Antivirus yang update selalu.
Setelah melakukan troubleshoot dan Googling akhirnya saya temukan permasalahannya. Berikut cara mengatasinya:
1. Scan PC anda dengan program pembasmi Adware, Malware, Spyware.
Adware, Malware, dan Spyware berbeda dengan Virus, program-program di atas adalah program-program jahat yang memperlambat kinerja komputer (Adware dan Malware), dan memata-matai aktivitas komputer anda dari jauh (Spyware), apabila komputer anda terkoneksi internet.
Untuk menanganinya anda dapat menggunakan program Super Anti Spyware, program ini gratis dan dapat anda download di website resminya di http://www.superantispyware.com/ dan anda klik link Download SUPERAntiSpyware FREE Edition. Setelah install saya sarankan untuk melakukan update database terlebih dahulu sebelum melakukan scanning.
2. Disable program-program aneh yang dijalankan pada Startup Windows.
Tanpa anda sadari banyak program-program yang tidak anda kenal dijalankan pada Windows Startup, yang menyebabkan lambatnya kinerja komputer anda, untuk menghapusnya anda dapat menjalankan.
Start – Run - ketikkan msconfig, lalu akan muncul jendela System Configuration Utility, kemudian anda klik tab Startup, kemudian uncheck program-program startup yang tidak penting. Untuk mengetahui pentingnya program tersebut anda bisa mengeceknya yang ada pada program-program yang anda install yang penting dijalankan pada saat Startup Windows.
3. Hapus Key InProcServer32 pada Regedit (Windows XP only).
Apabila cara pertama dan kedua tidak berhasil, anda dapat menggunakan cara ini, yaitu menghapus key InProcServer32 pada Regedit, key ini berfungsi untuk membaca semua file media, seperti .AVI pada harddisk anda, sehingga membuat kerja Windows Explorer menjadi lebih berat, dan mengakibatkan Hang dan CPU Usage tinggi.
Cara menghapusnya:
Start – Run - ketikkan regedit, lalu akan muncul jendela Registry Editor, kemudian anda masuk ke
HKEY_CLASSES_ROOT\CLSID\{c5a40261-cd64-4ccf-84cb-c394da41d590}\InProcServer32
Backup terlebih dahulu dengan cara Klik kanan pada Key InProcServer32 – Export. Setelah selesai hapus key InProcServer32 tersebut, dan coba Restart Windows anda.
Dari cara-cara di atas, penulis melakukan cara terakhir dan terbukti kinerja Windows Explorer dan CPU Usage kembali normal, bagaimana dengan anda?
Bagi pengguna Windows 7 yang tidak ada key registry HKEY_CLASSES_ROOT\CLSID\{c5a40261-cd64-4ccf-84cb-c394da41d590}\InProcServer32, coba anda cek apakah ada aplikasi Media Player Classic/K-Lite pada komputer anda, jika ada coba anda uninstall terlebih dahulu, restart, dan coba cek apakah ada perbedaanya.
Semoga bermanfaat.
Source :
http://asus87.com
Transmission Media
In network communication work can not be separated from transmission
media, that all make communication and connected between all network
equipment to arround the world. Actually in transmission media divided
into two kind:
1. Conducted or guided media
Use a conductor such as a wire or a fiber optic cable to move the signal from sender to receiver.
2. Wireless or unguided media
use radio waves of different frequencies and do not need a wire or cable conductor to transmit signals.
The following is description about two kind transmission media above:
1. Guided Transmission Media:
Transmission capacity depends on the distance and on whether the medium is point-to-point or multipoint
Twisted Pair Wires
- Consists of two insulated copper wires arranged in a regular spiral pattern to minimize the electromagnetic interference between adjacent pairs
- Often used at customer facilities and also over distances to carry voice as well as data communications
- Low frequency transmission medium
Types of Twisted Pair
- STP (Shielded Twisted Pair)
The pair is wrapped with metallic foil or braid to insulate the pair from electromagnetic interference
- UTP (Unshielded Twisted Pair)
Each wire is insulated with plastic wrap, but the pair is encased in an outer covering
Ratings of Twisted Pair
Cat 3:
Data rates of up to 16 Mbps are achievable
Cat 5:
Data rates of up to 100mbps are achievable
More tightly twisted than Category 3 cables
More expensive, but better performance
Cat 6:
Cable standard for Gigabit Ethernet
PINOUT
RJ 11 Pinout
RJ 21 Pinout
RJ 45 Pinout
Cable Type:
Straight
Crossover
UTP Cable
Crimping tools
The equipment can help you to crimping cable in module Rj 45.
Tester
The function to do testing twisted pair about quality cable, potition pair after crimping, and segmentation point which problem.
PoE
Power over Ethernet (PoE) technology enables ordinary Ethernet network cables to function as power cords. In a PoE enabled network, direct electrical current (DC) flows over the network cable together with normal Ethernet data traffic.
Barel
Connector to connect UTP cable.
Roset
Connector to connect wired cable to connect Rj 11.
Coax Cable
Coax Advantages
- Higher bandwidth
400 to 600Mhz
up to 10,800 voice conversations
- Can be tapped easily (pros and cons)
- Much less susceptible to interference than twisted pair
Coax Disadvantages
- High attenuation rate makes it expensive over long distance
- Bulky
Fiber Optic Cable
- Relatively new transmission medium used by telephone companies in place of long-distance trunk lines
- Also used by private companies in implementing local data communications networks
- Require a light source with injection laser diode (ILD) or light-emitting diodes (LED)
Fiber Optic Types
- Multimode step-index fiber
The reflective walls of the fiber move the light pulses to the receiver
- Multimode graded-index fiber
Acts to refract the light toward the center of the fiber by variations in the density
- Single mode fiber
The light is guided down the center of an extremely narrow core
Fiber Optic Advantages
- Greater capacity (bandwidth of up to 100 Gbps)
- Smaller size and lighter weight
- Lower attenuation
- Immunity to environmental interference
- Highly secure due to tap difficulty and lack of signal radiation
Fiber Optic Disadvantages
- Expensive over short distance
- Requires highly skilled installers
- Adding additional nodes is difficult
Fiber Connectors
OTDR
An Optical Time Domain Reflectometer (OTDR)
An OTDR may be used for estimating the fiber’s length and overall attenuation, including splice and mated-connector losses. It may also be used to locate faults, such as breaks, and to measure optical return loss. To measure the attenuation of multiple fibers, it is advisable to test from each end and then average the results, however this considerable extra work is contrary to the common claim that testing can be performed from only one end of the fiber.
2. Wireless (Unguided Media) Transmission
- transmission and reception are achieved by means of an antenna
- directional
transmitting antenna puts out focused beam
transmitter and receiver must be aligned
- omnidirectional
signal spreads out in all directions
can be received by many antennas
Wireless Examples
- Terrestrial microwave
used for long-distance telephone service
uses radio frequency spectrum, from 2 to 40 Ghz
parabolic dish transmitter, mounted high
used by common carriers as well as private networks
requires unobstructed line of sight between source and receiver
curvature of the earth requires stations (repeaters) ~30 miles apart
Antena Radio
VSAT
Thats all my knowledge about that. I hope this article useful for readers.
Source:
Abud Susanto
Training at My Office by Luthfi
1. Conducted or guided media
Use a conductor such as a wire or a fiber optic cable to move the signal from sender to receiver.
2. Wireless or unguided media
use radio waves of different frequencies and do not need a wire or cable conductor to transmit signals.
The following is description about two kind transmission media above:
1. Guided Transmission Media:
Transmission capacity depends on the distance and on whether the medium is point-to-point or multipoint
Twisted Pair Wires
- Consists of two insulated copper wires arranged in a regular spiral pattern to minimize the electromagnetic interference between adjacent pairs
- Often used at customer facilities and also over distances to carry voice as well as data communications
- Low frequency transmission medium
Types of Twisted Pair
- STP (Shielded Twisted Pair)
The pair is wrapped with metallic foil or braid to insulate the pair from electromagnetic interference
- UTP (Unshielded Twisted Pair)
Each wire is insulated with plastic wrap, but the pair is encased in an outer covering
Ratings of Twisted Pair
Cat 3:
Data rates of up to 16 Mbps are achievable
Cat 5:
Data rates of up to 100mbps are achievable
More tightly twisted than Category 3 cables
More expensive, but better performance
Cat 6:
Cable standard for Gigabit Ethernet
PINOUT
RJ 11 Pinout
RJ 21 Pinout
RJ 45 Pinout
Cable Type:
Straight
Crossover
UTP Cable
Crimping tools
The equipment can help you to crimping cable in module Rj 45.
Tester
The function to do testing twisted pair about quality cable, potition pair after crimping, and segmentation point which problem.
PoE
Power over Ethernet (PoE) technology enables ordinary Ethernet network cables to function as power cords. In a PoE enabled network, direct electrical current (DC) flows over the network cable together with normal Ethernet data traffic.
Barel
Connector to connect UTP cable.
Roset
Connector to connect wired cable to connect Rj 11.
Coax Cable
Coax Advantages
- Higher bandwidth
400 to 600Mhz
up to 10,800 voice conversations
- Can be tapped easily (pros and cons)
- Much less susceptible to interference than twisted pair
Coax Disadvantages
- High attenuation rate makes it expensive over long distance
- Bulky
Fiber Optic Cable
- Relatively new transmission medium used by telephone companies in place of long-distance trunk lines
- Also used by private companies in implementing local data communications networks
- Require a light source with injection laser diode (ILD) or light-emitting diodes (LED)
Fiber Optic Types
- Multimode step-index fiber
The reflective walls of the fiber move the light pulses to the receiver
- Multimode graded-index fiber
Acts to refract the light toward the center of the fiber by variations in the density
- Single mode fiber
The light is guided down the center of an extremely narrow core
Fiber Optic Advantages
- Greater capacity (bandwidth of up to 100 Gbps)
- Smaller size and lighter weight
- Lower attenuation
- Immunity to environmental interference
- Highly secure due to tap difficulty and lack of signal radiation
Fiber Optic Disadvantages
- Expensive over short distance
- Requires highly skilled installers
- Adding additional nodes is difficult
Fiber Connectors
OTDR
An Optical Time Domain Reflectometer (OTDR)
An OTDR may be used for estimating the fiber’s length and overall attenuation, including splice and mated-connector losses. It may also be used to locate faults, such as breaks, and to measure optical return loss. To measure the attenuation of multiple fibers, it is advisable to test from each end and then average the results, however this considerable extra work is contrary to the common claim that testing can be performed from only one end of the fiber.
2. Wireless (Unguided Media) Transmission
- transmission and reception are achieved by means of an antenna
- directional
transmitting antenna puts out focused beam
transmitter and receiver must be aligned
- omnidirectional
signal spreads out in all directions
can be received by many antennas
Wireless Examples
- Terrestrial microwave
used for long-distance telephone service
uses radio frequency spectrum, from 2 to 40 Ghz
parabolic dish transmitter, mounted high
used by common carriers as well as private networks
requires unobstructed line of sight between source and receiver
curvature of the earth requires stations (repeaters) ~30 miles apart
Antena Radio
VSAT
Thats all my knowledge about that. I hope this article useful for readers.
Source:
Abud Susanto
Training at My Office by Luthfi
Memperbaiki Bootmgr Is Missing Pada Windows 7
Kali ini saya akan membahas masalah pada Windows 7, yaitu memperbaiki
file bootmgr yang corupt/missing, sehingga di layar monitor keluar
tampilan “bootmgr is missing” atau “bootmgr is corrupt”. Kejadian ini
terjadi karena beberapa hal, seperti pada kasus saya ini, yaitu setelah
selesai installasi theme untuk Windows 7 pada laptop saya, setelah
restart tiba-tiba tampilan OS Windows 7 tidak muncul, karena sebelumnya
saya di sini menginstallasi dual boot Linux dan Windows 7, jadi pilihan
OS juga tidak muncul.
Lalu bagaimana cara mengatasinya? Pertama-tama siapkan DVD installasi Windows 7, di sini saya menggunakan Windows 7 Ultimate, jadi saya siapakan DVD Windows Ultimate juga, saya tidak tahu apakah bisa menggunakan DVD Windows 7 versi lain, mungkin saya akan mencobanya lain kali. Oke kita langsung melakukan troubleshoot ya.
Berikut langkah-langkahnya:
1. Masukkan DVD Windows 7 Ultimate, dan ubah boot pada BIOS anda mejadi first boot DVD/CD.
2. Setelah masuk Windows anda pilih “Repair computer”
3. Selanjutnya anda akan dibawa ke jendela System Recovery Options, dimana ada programs-programs seperti Startup Repair, System Restore, System Image Recovery, Windows Memory Diagnostic, dan Command Prompt. anda pilih Command Prompt
4. Pada jendela Command Prompt anda ketikkan perintah:
“cd x:\Windows\System32” lalu tekan enter -> ini untuk masuk ke lokasi System 32 pada Windows anda.
Kemudian ketikkan perintah berikut:
bootrec /RebuildBCD
bootrec /fixmbr
bootrec /fixboot
5. Kemudian restart komputer/laptop anda dan lihat hasilnya.
Note:
Apabila sebelumnya anda menginstall OS lain di Windows (dual boot ex: Ubuntu), tentu pilihan OS anda akan hilang, untuk mengembalikannya anda tinggal mengembalikan grub OS yang hilang tersebut. Anda bisa cari di Google, atau mungkin akan saya bahas dilain waktu. Semoga bermanfaat.
Sumber : "Asus87.blogspot.com"
Lalu bagaimana cara mengatasinya? Pertama-tama siapkan DVD installasi Windows 7, di sini saya menggunakan Windows 7 Ultimate, jadi saya siapakan DVD Windows Ultimate juga, saya tidak tahu apakah bisa menggunakan DVD Windows 7 versi lain, mungkin saya akan mencobanya lain kali. Oke kita langsung melakukan troubleshoot ya.
Berikut langkah-langkahnya:
1. Masukkan DVD Windows 7 Ultimate, dan ubah boot pada BIOS anda mejadi first boot DVD/CD.
2. Setelah masuk Windows anda pilih “Repair computer”
3. Selanjutnya anda akan dibawa ke jendela System Recovery Options, dimana ada programs-programs seperti Startup Repair, System Restore, System Image Recovery, Windows Memory Diagnostic, dan Command Prompt. anda pilih Command Prompt
4. Pada jendela Command Prompt anda ketikkan perintah:
“cd x:\Windows\System32” lalu tekan enter -> ini untuk masuk ke lokasi System 32 pada Windows anda.
Kemudian ketikkan perintah berikut:
bootrec /RebuildBCD
bootrec /fixmbr
bootrec /fixboot
5. Kemudian restart komputer/laptop anda dan lihat hasilnya.
Note:
Apabila sebelumnya anda menginstall OS lain di Windows (dual boot ex: Ubuntu), tentu pilihan OS anda akan hilang, untuk mengembalikannya anda tinggal mengembalikan grub OS yang hilang tersebut. Anda bisa cari di Google, atau mungkin akan saya bahas dilain waktu. Semoga bermanfaat.
Sumber : "Asus87.blogspot.com"
How To Use Dig Command
The command dig is a command that is used for querying DNS name
servers for information about host addresses, mail exchanges, name
servers, and related information.
Dig is included in most Linux and Mac OS X installations by default via the Terminal. If you are using Windows you will need to install the BIND utilities package or any of the dig replacements that can be found by searching Google for Dig Windows.
The most typical, simplest query is for a single host. By default, however, dig is pretty verbose. You probably don’t need all the information in the default output, but it’s probably worth knowing what it is. Below is an example of the default output from a ‘dig liquidweb.com‘:
$ dig liquidweb.com
; <<>> DiG 9.5.1-P2-RedHat-9.5.1-2.P2.fc10 <<>> liquidweb.com
;; global options: printcmd
;; Got answer:
;; ->>HEADER< ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2
;; QUESTION SECTION:
;liquidweb.com. IN A
;; ANSWER SECTION:
liquidweb.com. 197 IN A 209.59.139.21
;; AUTHORITY SECTION:
liquidweb.com. 857 IN NS ns.liquidweb.com.
liquidweb.com. 857 IN NS ns1.liquidweb.com.
;; ADDITIONAL SECTION:
ns.liquidweb.com. 671 IN A 209.59.139.20
ns1.liquidweb.com. 806 IN A 64.91.251.155
;; Query time: 6 msec
;; SERVER: 69.16.222.254#53(69.16.222.254)
;; WHEN: Wed Jun 10 10:35:44 2009
;; MSG SIZE rcvd: 114
This result shows the 4 main sub-sections: Question, Answer, Authority, Additional.
Question Section
;; QUESTION SECTION:
;liquidweb.com. IN A
This section shows the query that is being made. In this case we are just looking for the host IP(or A record if you prefer) for liquidweb.com.
***For more information on the various types of DNS records please read this article***
Answer Section
;; ANSWER SECTION:
liquidweb.com. 197 IN A 209.59.139.21
This section shows the answer or result of the query that was made(provided one can be provided). In this case the answer the is IP address that liquidweb.com resides on.
Authority Section
;;AUTHORITY SECTION:
liquidweb.com. 857 IN NS ns.liquidweb.com.
liquidweb.com. 857 IN NS ns1.liquidweb.com.
This section shows the nameservers that provided dig with the answer to its query. For liquidweb.com the authoritative name servers are ns.liquidweb.com and ns1.liquidweb.com.
Additional Section
;; ADDITIONAL SECTION:
ns.liquidweb.com. 671 IN A 209.59.139.20
ns1.liquidweb.com. 806 IN A 64.91.251.155
The Additional Section provides any extra information that may be wanted but not specifically requested by dig. For this example the Additional Section displays the IP addressed of the authoritative nameservers.
Another example of a common lookup using dig would be to look up the mx, mail exchange, record for a domain. Below is an example of a mx lookup for liquidweb.com.
$ dig mx liquidweb.com
; <<>> DiG 9.5.1-P2-RedHat-9.5.1-2.P2.fc10 <<>> mx liquidweb.com
;; global options: printcmd
;; Got answer:
;; ->>HEADER< ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 4
;; QUESTION SECTION:
;liquidweb.com. IN MX
;; ANSWER SECTION:
liquidweb.com. 900 IN MX 5 mxgate-03.liquidweb.com.
liquidweb.com. 900 IN MX 10 backupmx.liquidweb.com.
;; AUTHORITY SECTION:
liquidweb.com. 396 IN NS ns.liquidweb.com.
liquidweb.com. 396 IN NS ns1.liquidweb.com.
;; ADDITIONAL SECTION:
mxgate-03.liquidweb.com. 900 IN A 209.59.139.131
backupmx.liquidweb.com. 900 IN A 209.59.139.28
ns.liquidweb.com. 363 IN A 209.59.139.20
ns1.liquidweb.com. 346 IN A 64.91.251.155
;; Query time: 3 msec
;; SERVER: 69.16.222.254#53(69.16.222.254)
;; WHEN: Wed Jun 10 10:58:25 2009
;; MSG SIZE rcvd: 181
The result of a MX query is fairly close to the same as the result of a standard dig. The only difference is howto interupt the Answer Section.
;; ANSWER SECTION:
liquidweb.com. 900 IN MX 5 mxgate-03.liquidweb.com.
liquidweb.com. 900 IN MX 10 backupmx.liquidweb.com.
For MX, mail records, the answer will also include the priority of the mail server. The lower the number the higher the priority. In this example when a domain attempts to send mail to liquidweb.com it will attempt to send mail to mxgate-03.liquidweb.com first and if that attempt fails it will try to send to backupmx.liquidweb.com next.
Source:
http://www.liquidweb.com/kb/how-to-use-dig/
asus87.com
Dig is included in most Linux and Mac OS X installations by default via the Terminal. If you are using Windows you will need to install the BIND utilities package or any of the dig replacements that can be found by searching Google for Dig Windows.
The most typical, simplest query is for a single host. By default, however, dig is pretty verbose. You probably don’t need all the information in the default output, but it’s probably worth knowing what it is. Below is an example of the default output from a ‘dig liquidweb.com‘:
$ dig liquidweb.com
; <<>> DiG 9.5.1-P2-RedHat-9.5.1-2.P2.fc10 <<>> liquidweb.com
;; global options: printcmd
;; Got answer:
;; ->>HEADER< ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2
;; QUESTION SECTION:
;liquidweb.com. IN A
;; ANSWER SECTION:
liquidweb.com. 197 IN A 209.59.139.21
;; AUTHORITY SECTION:
liquidweb.com. 857 IN NS ns.liquidweb.com.
liquidweb.com. 857 IN NS ns1.liquidweb.com.
;; ADDITIONAL SECTION:
ns.liquidweb.com. 671 IN A 209.59.139.20
ns1.liquidweb.com. 806 IN A 64.91.251.155
;; Query time: 6 msec
;; SERVER: 69.16.222.254#53(69.16.222.254)
;; WHEN: Wed Jun 10 10:35:44 2009
;; MSG SIZE rcvd: 114
This result shows the 4 main sub-sections: Question, Answer, Authority, Additional.
Question Section
;; QUESTION SECTION:
;liquidweb.com. IN A
This section shows the query that is being made. In this case we are just looking for the host IP(or A record if you prefer) for liquidweb.com.
***For more information on the various types of DNS records please read this article***
Answer Section
;; ANSWER SECTION:
liquidweb.com. 197 IN A 209.59.139.21
This section shows the answer or result of the query that was made(provided one can be provided). In this case the answer the is IP address that liquidweb.com resides on.
Authority Section
;;AUTHORITY SECTION:
liquidweb.com. 857 IN NS ns.liquidweb.com.
liquidweb.com. 857 IN NS ns1.liquidweb.com.
This section shows the nameservers that provided dig with the answer to its query. For liquidweb.com the authoritative name servers are ns.liquidweb.com and ns1.liquidweb.com.
Additional Section
;; ADDITIONAL SECTION:
ns.liquidweb.com. 671 IN A 209.59.139.20
ns1.liquidweb.com. 806 IN A 64.91.251.155
The Additional Section provides any extra information that may be wanted but not specifically requested by dig. For this example the Additional Section displays the IP addressed of the authoritative nameservers.
Another example of a common lookup using dig would be to look up the mx, mail exchange, record for a domain. Below is an example of a mx lookup for liquidweb.com.
$ dig mx liquidweb.com
; <<>> DiG 9.5.1-P2-RedHat-9.5.1-2.P2.fc10 <<>> mx liquidweb.com
;; global options: printcmd
;; Got answer:
;; ->>HEADER< ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 4
;; QUESTION SECTION:
;liquidweb.com. IN MX
;; ANSWER SECTION:
liquidweb.com. 900 IN MX 5 mxgate-03.liquidweb.com.
liquidweb.com. 900 IN MX 10 backupmx.liquidweb.com.
;; AUTHORITY SECTION:
liquidweb.com. 396 IN NS ns.liquidweb.com.
liquidweb.com. 396 IN NS ns1.liquidweb.com.
;; ADDITIONAL SECTION:
mxgate-03.liquidweb.com. 900 IN A 209.59.139.131
backupmx.liquidweb.com. 900 IN A 209.59.139.28
ns.liquidweb.com. 363 IN A 209.59.139.20
ns1.liquidweb.com. 346 IN A 64.91.251.155
;; Query time: 3 msec
;; SERVER: 69.16.222.254#53(69.16.222.254)
;; WHEN: Wed Jun 10 10:58:25 2009
;; MSG SIZE rcvd: 181
The result of a MX query is fairly close to the same as the result of a standard dig. The only difference is howto interupt the Answer Section.
;; ANSWER SECTION:
liquidweb.com. 900 IN MX 5 mxgate-03.liquidweb.com.
liquidweb.com. 900 IN MX 10 backupmx.liquidweb.com.
For MX, mail records, the answer will also include the priority of the mail server. The lower the number the higher the priority. In this example when a domain attempts to send mail to liquidweb.com it will attempt to send mail to mxgate-03.liquidweb.com first and if that attempt fails it will try to send to backupmx.liquidweb.com next.
Source:
http://www.liquidweb.com/kb/how-to-use-dig/
asus87.com
Langganan:
Postingan (Atom)
Topics
- Download (1)
- IT Learning (8)
- Makalah (12)
- My Article (4)
- Tugas Soft Skill (33)
Recent
Blogroll
Widget
Diberdayakan oleh Blogger.
About Me
Popular Posts
-
Sesuai janji gue yg ke II , gue mau buatin note ini sama temen" FB Khususnya buat cewek :) Nah ini udah jadi , maklum agak panjan...
-
Saya , Seftyan Fachrizki , Lahir Jakarta 25 September 1994 , saya adalah anak pertama dari 4 bersaudara , saya adalah seorang kakak dari k...
-
In network communication work can not be separated from transmission media, that all make communication and connected between all networ...
-
Nama : Seftyan Fachrizki Kelas : 1KA39 Npm : 16112897 Mata kuliah : IBD Judul : Tug...
-
Skema dasar sistem komputer Pada abstraksi tingkat atas, sistem komputer terdiri atas empat komponen. Keempat komponen bekerja sama dan s...
-
Organisasi adalah suatu perkumpulan atau kelompok yang dibentuk untuk tujuan tertentu dalam 1 tujuan yang pasti , oraganisasi dibentuk unt...
-
Apakah yang dimaksud dengan stored program computer ? Jawab: Storade program komputer yaitu program (kumpulan instruksi) disimpan di s...
-
2.1 Ciri-ciri Organisasi Adapun ciri-ciri dari organisasi adalah : - Adanya komponen ( atasan dan bawahan) - Adanya kerja sama (coope...
-
Ada beberapa aktivitas yang mungkin oleh sebagian orang dinilai dapat membatalkan puasa, termasuk mimpi basah. Padahal jika merujuk ...
Index
- Download (1)
- IT Learning (8)
- Makalah (12)
- My Article (4)
- Tugas Soft Skill (33)