Wednesday, February 27, 2008

Mencegah Inputan Kosonsg

Banyak website yang menyediakan fasilitasn bukutamu, contact us, registrasi, dan yang lainnya. Tetapi ada suatu hal kecil yang menyebabkan website itu kacau. Banyak orang yang iseng mengisikan karakter kosong, ketika mengisikan bukutamu, contact us, dll. Kalau hal ini dibiarkan terus-menerus, bisa-bisa database penuh dengan karakter kosong, menyebalkan bukan ???

Bagi seorang webmaster, pasti sudah tahu mengenai hal ini, dan pasti tahu caranya mencegah inputan kosong pada form isian. Untuk mencegah inputan kosong bisa menggunakan javascript.
scriptnya :
Javascript
<script>

function cekinput(){

var doc = document.tracer;

if (doc.field.value==""){

alert ("Anda belum mengisi");

doc.field.focus();

return false;

}

return true;

}



HTML
<form action="" onSubmit="return cekinput();" method="post" name="tracer">

<input name="field" type="text" class="field" id="nis" size="30">

<input name="input" type="submit" id="input" value=" Input ">

</form>

NIC (Network Interface Card)


NICs are considered Layer 2 devices because each individual NIC throughout the world carries a unique code, called a Media Access Control (MAC) address. This address is used to control data communication for the host on the network. You will learn more about the MAC address later. As the name implies, the NIC controls the host's access to the medium.

In some cases the type of connector on the NIC does not match the type of media that you need to connect to. A good example is your Cisco 2500 router. On the router you will see AUI (Attachment Unit Interface) connectors and you need to connect the router to a UTP Cat5 Ethernet cable. To do this a transceiver (transmitter/receiver) is used. A transceiver converts one type of signal or connector to another (e.g. to connect a 15-pin AUI interface to an RJ-45 jack, or to convert electrical signals to optical signals). It is considered a Layer 1 device, because it only looks at bits, and not at any address information or higher level protocols.

NICs have no standardized symbol. It is implied that whenever you see networking devices attached to network media, there is some sort of NIC or NIC-like device present even though it is generally not shown. Wherever you see a dot on a topology, there is either a NIC or an interface (port), which acts like at least part of a NIC.

Tuesday, February 19, 2008

Pawon Coklat


Hi Guys .... Sorry kalau posting ini terlambat, seharusnya posting ini beredar tanggal 14 Februari. Tapi no problem, karena ini masih bulan Februari. kamu-kamu semua pasti tahu ada apa dengan tanggal 14 februari ( Hari Valentine gituuuu ). Valentine biasanya identik dengan cokelat. Pasti tahu kan yang namanya Cokelat.

Nah ... kebetulan nie ... aku punya teman yang ngejual berbagai macam cokelat. Jadi ga usah bingung deh ... kalau mo pesen coklat. Tinggal telp atau email aja bisa kok. Lokasinya tu ada di Batang ( tepatnya di Jl. Tentara Pelajar Kalisalak Batang Telp. 02854494312 ), tetapi kala temen-temen di Semarang juga masih bisa kok pesennya, telp aje ke 081514408881. Kalau mo lihat site nya, liat aja di sini "http://pawoncoklat.blogspot.com". Selamat menikmati.

Monday, February 18, 2008

Network ??? What this .... ?

A computer network is an interconnection of a group of computers. Networks may be classified by what is called the network layer at which they operate according to basic reference models considered as standards in the industry such as the four-layer Internet Protocol Suite model. While the seven-layer Open Systems Interconnection (OSI) reference model is better known in academia, the majority of networks use the Internet Protocol Suite (IP) as their network model.

Computer networks may be classified according to the scale: Personal area network (PAN), Local Area Network (LAN), Campus Area Network (CAN), Metropolitan area network (MAN), or Wide area network (WAN). As Ethernet increasingly is the standard interface to networks, these distinctions are more important to the network administrator than the end user. Network administrators may have to tune the network, based on delay that derives from distance, to achieve the desired Quality of Service (QoS). The primary difference in the networks is the size.

Personal Area Network (PAN)
A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that may be used in a PAN are printers, fax machines, telephones, PDAs or scanners. The reach of a PAN is typically within about 20-30 feet (approximately 6-9 Meters). PANs can be used for communication among the individual devices (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink).

Personal area networks may be wired with computer buses such as USB[3] and FireWire. A wireless personal area network (WPAN) can also be made possible with network technologies such as IrDA and Bluetooth.

Local Area Network (LAN)
A network covering a small geographic area, like a home, office, or building. Current LANs are most likely to be based on Ethernet technology. For example, a library will have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) connect to the internet. All of the PCs in the library are connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnection devices and eventually connect to the internet. The cables to the servers are on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 Gbps.

All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbps Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers.

The defining characteristics of LANs, in contrast to WANs (wide area networks), include their much higher data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 100 Gbit/s, and possibly 40 Gbit/s. Inverse multiplexing is commonly used to build a faster aggregate from slower physical streams, such as bringing 4 Gbit/s aggregate stream into a computer or network element with four 1 Gbit/s interfaces.

Campus Area Network (CAN)
A network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. A CAN, may be considered a type of MAN (metropolitan area network), but is generally limited to an area that is smaller than a typical MAN.

This term is most often used to discuss the implementation of networks for a contiguous area. For Ethernet based networks in the past, when layer 2 switching (i.e., bridging (networking) was cheaper than routing, campuses were good candidates for layer 2 networks, until they grew to very large size. Today, a campus may use a mixture of routing and bridging. The network elements used, called "campus switches", tend to be optimized to have many Ethernet-family (i.e., IEEE 802.3) interfaces rather than an arbitrary mixture of Ethernet and WAN interfaces.

Metropolitan Area Network (MAN)
A Metropolitan Area Network is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town, city, or metropolitan area. Multiple routers, switches & hubs are connected to create a MAN

Wide Area Network (WAN)
A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.

Saturday, February 16, 2008

Bitmap Graphics


Bitmap graphics are made up of colored pixels. Pixels are very small rectangles (usually square, although in some video applications they are wider than they are tall) of varying colors that once put together give you an image. You can see from the example below that zooming in on a bitmap image reveals the pixels that make up the image when viewed at 100%.

Bitmap graphics are usually (but not always) photographic in nature, capable of subtle graduated tones - often in the range of millions of colors per image. The problem with bitmap graphics is that they don't enlarge well as Photoshop needs to guess what color the extra pixels should be - this can result is loss of definition and a dramatic lowering in quality, depending on how much you enlarge the image. Common file formats for bitmap image data include GIF, JPEG and PNG for Internet usage and TIFF for print usage. As you can see from the example below, physically enlarging an image will degrade quality.

Pixels are also used to display the image on your computer screen. Common pixel dimensions of computer displays are 1024 wide by 768 high and 1600 wide by 1200 high. The size of a bitmap graphic when viewed on your computer screen is defined by the number of pixels that make up the image - so an image that is 50 pixels wide will look very small on your screen at 100% viewing percentage, whereas an image that is 4000 pixels wide will be larger than your screen at 100% viewing percentage.

The printable dimensions of an image are defined by the DPI (dots per inch) - this information is invisibly embedded in the image file. Digital cameras often embed information such as this, that may include the conditions the image was taken in, and even the camera model used. This information is not actually visible in the image, and requires software such as Photoshop to read it.

You should not confuse the output DPI of your printer with this figure, which may range from 600-2400DPI - this refers to the density of the dots of ink laid down on the page by the printer. You don't have to prepare your images to 2400 DPI to get the best results - in fact doing so will significantly slow down printing as your file could potentially be huge! Often an image DPI in the range of 175-250 will give very good results on home printers. Images prepared for high quality commercial print are usually prepared at 300 DPI for up to A3 in size; whereas very large images (for instance on billboards) can be as low as 50 DPI, as they are not made to be viewed as closely as a magazine or small poster. There is no need to go above 300 DPI when creating images as you will yield virtually no improvement in output quality, only increasing the size of your file when saved.

It is easy to understand the relationship between pixel dimensions and DPI - put simply, the DPI is how many pixels will be printed in an inch - so you could actually think of DPI as PPI (pixels per inch). Indeed, many experts believe this to be the true definition of DPI, and that Photoshop should refer to it as such. However, the term DPI is used throughout the professional print industry, so this is why it is referred to as DPI in Photoshop, not PPI.

Friday, February 15, 2008

Learning PHP - Hypertext Preprocessor

PHP is a powerful server-side scripting language for creating dynamic and interactive websites.

PHP is the widely-used, free, and efficient alternative to competitors such as Microsoft's ASP. PHP is perfectly suited for Web development and can be embedded directly into the HTML code.

The PHP syntax is very similar to Perl and C. PHP is often used together with Apache (web server) on various operating systems. It also supports ISAPI and can be used with Microsoft's IIS on Windows.

What is PHP?

* PHP stands for PHP: Hypertext Preprocessor
* PHP is a server-side scripting language, like ASP
* PHP scripts are executed on the server
* PHP supports many databases (MySQL, Informix, Oracle, Sybase, Solid, PostgreSQL, Generic ODBC, etc.)
* PHP is an open source software (OSS)
* PHP is free to download and use

What is a PHP File?

* PHP files may contain text, HTML tags and scripts
* PHP files are returned to the browser as plain HTML
* PHP files have a file extension of ".php", ".php3", or ".phtml"

What is MySQL?

* MySQL is a database server
* MySQL is ideal for both small and large applications
* MySQL supports standard SQL
* MySQL compiles on a number of platforms
* MySQL is free to download and use

PHP + MySQL

* PHP combined with MySQL are cross-platform (means that you can develop in Windows and serve on a Unix platform)

Why PHP?

* PHP runs on different platforms (Windows, Linux, Unix, etc.)
* PHP is compatible with almost all servers used today (Apache, IIS, etc.)
* PHP is FREE to download from the official PHP resource: www.php.net
* PHP is easy to learn and runs efficiently on the server side

Where to Start?

* Install an Apache server on a Windows or Linux machine
* Install PHP on a Windows or Linux machine
* Install MySQL on a Windows or Linux machine

Global Configuration (Config)

To configure any feature of the router, you must enter configuration mode. This is the first sub-mode of the parent mode. In the parent mode, you issue the command config.

Router#config
Router(config)#

As demonstrated above, the prompt changes to indicate the mode that you are now in.

In connfiguration mode you can set options that apply system-wide, also refered to as "global configurations." For instance, it is a good idea to name your router so that you can easily identify it. You do this in configuration mode with the hostname command.

Router(config)#hostname ExampleName
ExampleName(config)#

As demonstrated above, when you set the name of the host with the hostname command, the prompt immediately changes by replacing Router with ExampleName. (Note: It is a good idea to name your routers with an organized naming scheme.)

Another useful command issued from config mode is the command to designate the DNS server to be used by the router:

ExampleName(config)#ip name-server aa.bb.cc.dd
ExampleName(config)#ctrl-Z
ExampleName#

This is also where you set the password for privileged mode.

ExampleName(config)#enable secret examplepassword
ExampleName(config)#ctrl-Z
ExampleName#

Until you hit ctrl-Z (or type exit until you reach parent mode) your command has not been put into affect. You can enter config mode, issue several different commands, then hit ctrl-Z to activate them all. Each time you hit ctrl-Z you return to parent mode and the prompt:

ExampleName#

Here you use show commands to verify the results of the commands you issued in config mode. To verify the results of the ip name-server command, issue the command show host.

Suara itu Menggetarkan Jiwa

Seringkali kita mendengarkan suara, seperti suara kendaraan bermotor,
suara kereta, juga suara kekasih yang terdengar merdu namun berbeda
dengan suara dari jiwa yang masih suci yaitu suara anak-anak kita yang
mampu menggetarkan jiwa. Suara tangisnya, suara tawanya bahkan
teriakan-teriakanny a seolah mampu membelah bumi.

Begitu juga Hana, putri saya. Setiap Hana memanggil saya, "ayah.."
suara itu menggetarkan jiwa, suaranya mampu mengiris hati. Terbayang
Hana yang masih bayi, mulai tumbuh merangkak, berjalan sampai pernah
jatuh dari meja karena saya lalai menjaganya dan jidatnya menjadi
benjol. Ibunya marah-marah karena tidak tega melihat tangisnya Hana
yang sakit. Hati saya terasa perih mendengar Hana menangis yang kesakitan.

Keperihan hati seorang ayah adalah wujud cinta dan kasih sayang kepada
putrinya. Ikatan batin seorang ayah dengan putrinya begitu indah,
seindah wujud kasih sayang itu sendiri. Saya teringat satu kisah Nabi
SAW, ketika Nabi di Thaif, sekelompok anak anak kecil dan juga orang
dewasa berlomba menimpuki Nabi dengan batu dan kotoran unta, Fathimah
yang masih sangat belia tampil dengan perangai seorang ibu yang cemas
dengan putranya.

Dibersihkan kotoran dan darah yang berada pada pada wajah ayahnya.
Air mata Nabi tak mampu beliau sembunyikan ketika melihat putri
tercintanya. Seorang anak yang sepatutnya sedang asyik bermain dengan
teman seusianya sekarang justru berada dipangkuan ayahnya, menghalangi
siapapun yang akan melukai ayahnya. Fathimahpun menangis, dengan
suara bergetar penuh keharuan nabi menyeka tiap butiran air mata yang
mengalir di pipi mungil putrinya sambil berkata, ' habibati Fathimah
la tabki',' belahan jiwaku Fathimah janganlah engkau menangis'.

Begitulah ucapan Nabi ketika tangan suci putrinya menyeka darah yang
mengalir dikeningnya. Ummu Abiha, ibu dari ayahnya adalah gelar yang
Rasulullah peruntukkan kepada putrinya. Satu satunya gelar yang belum
pernah ada dalam sejarah kecuali untuk Fathimah Azzahra as. Duka dan
kesedihan selalu mengiringi kehidupan keluarga nabi, akan tetapi
Fathimah senantiasa menyembunyikan kedukaannya selama sang ayah berada
disampingnya. Kecintaan assayyidah Fathimah begitu tinggi terhadap
ayahnya dan begitu pula Rasul SAW kepada putrinya hingga beliau
bersabda, "Fathimah adalah belahan jiwaku, siapapun yang mencintai
Fathimah berarti dia mencintaiku. "

Wednesday, February 13, 2008

VSAT (Very Small Aperture Terminal)


VSAT Systems uses a satellite connection as a high-speed digital link between a customers location and the US Internet backbone. The data travels from the satellite equipment at the customers location to the satellite, and then to the teleport for routing to the Internet.

VSAT was originally intended for sporadic store-and-forward data communications but has evolved into real-time internet services. VSAT uses existing satellite broadcasting technology with higher powered components and antennas manufactured with higher precision than conventional satellite television systems. The satellite antenna at the customer's location includes, in addition to the receiver, a relatively high-powered transmitter that sends a signal back to the originating satellite. A very small portion of a transponder is used for each VSAT return path channel. Each VSAT terminal is assigned a frequency for the return path which it shares with other VSAT terminals using a shared transmission scheme such as time division multiple access.

An innovative feature of VSAT is that the technology has evolved to the point that something that previously could only be done with large, high-powered transmitting satellite dishes can now be done with a much smaller and vastly lower-powered antenna at the customer's premises. In addition, several return-path channels can co-exist on a single satellite transponder, and each of these return-path channels is further subdivided using to serve multiple customers.

In the system used by WildBlue, 31 different spot beams are used to serve the continental United States instead of the one beam used by conventional satellites. Thus, the same Ka-band transponders and frequencies are used for different regions throughout the United States, effectively re-using the same bandwidth in different regions.

The return path is transmitted from the customer's receiver in the L-band to a device called a low-noise block upconverter. There it is converted into the much higher frequency satellite transmission frequency, such as Ku-band and Ka-band, and amplified. Finally the signal is emitted to the dish antenna which focuses the signal into a beam that approximately covers the satellite with its beam. Because the transmission cannot be precise in these smaller dishes there is some effort to use frequencies for the uplink that are not used by adjacent satellites otherwise interference can occur to those other satellites.

Another satellite communications innovation, also used by satellite trucks for video transmission, is that only a small portion of a single satellite transponder is used by each VSAT channel. Previously a single transponder was required for a single customer but now several customers can use one transponder for the return path. This is in addition to time-based subdivision.

Monday, February 11, 2008

Monitoring Traffic "showtraffic"

Hi Friend, You all surely have at soybean cake which its name of virus ? So now I attacked by virus resulting dead LAN Office. Just because a virus in one of the computer LAN Office, as a result all dead LAN Office. Most really disturbing once

Initially I don't know, usually that virus attack system or attack data. But after there is software " Showtraffic" I know its cause ? In the reality this virus every second deliver big enough data package out. As a result LAN Office traffik only fulfilled by big packages, and other Computer don't get traffik to access to internet.

If friends wish to try this application, please download here. In fact this application many kok in internet, live in search later then download. With this application is we can know late traffik in LAN Office ethernet interface. Become we can know, which computer is which deliver factious data package, automatically mean the the computer there is which don't all right, He he He

Congratulation Try and Error ... Useful hopefully.

Wednesday, February 6, 2008

Configuring Cisco router interfaces

"Media type" refers to the type of media that the port is an interface for, such as Ethernet, Token Ring, FDDI, serial, etc. Slot numbers are only applicable for routers that provide slots into which you can install modules. These modules contain several ports for a given media. The 7200 series is an example. These modules are even hot-swapable. You can remove a module from a slot and replace it with a different module, without interrupting service provided by the other modules installed in the router. These slots are numbered on the router.

Port number refers to the port in reference to the other ports in that module. Numbering is left-to-right, and all numbering starts at 0, not at one.

For example, a Cisco 7206 is a 7200 series router with six slots. To refer to an interface that is the third port of an Ethernet module installed in the sixth slot, it would be interface ethernet 6/2. Therefor, to display the configuration of that interface you use the command:

ExampleName#show interface ethernet 6/2

If your router does not have slots, like a 1600, then the interface name consists only of:

media type port#

For example:

ExampleName#show interface serial 0

Here is an example of configuring a serial port with an IP address:

ExampleName#config
ExampleName(config)#interface serial 1/1
ExampleName(config-if)#ip address 192.168.155.2 255.255.255.0
ExampleName(config-if)#no shutdown
ExampleName(config-if)#ctrl-Z
ExampleName#

Then to verify configuration:

ExampleName#show interface serial 1/1

Note the no shutdown command. An interface may be correctly configured and physically connected, yet be "administratively down." In this state it will not function. The command for causing an interface to be administratively down is shutdown.

ExampleName(config)#interface serial 1/1
ExampleName(config-if)#shutdown
ExampleName(config-if)#ctrl-Z
ExampleName#show interface serial 1/1

In the Cisco IOS, the way to reverse or delete the results of any command is to simply put no infront of it. For instance, if we wanted to unassign the IP address we had assigned to interface serial 1/1:

ExampleName(config)#interface serail 1/1
ExampleName(config-if)#no ip address 192.168.155.2 255.255.255.0
ExampleName(config-if)ctrl-Z
ExampleName#show interface serial 1/1

Configuring most interfaces for LAN connections might consist only of assigning a network layer address and making sure the interface is not administratively shutdown. It is usually not necessary to stipulate data-link layer encapsulation. Note that it is often necessary to stipulate the appropriate data-link layer encapsulation for WAN connections, such as frame-relay and ATM. Serial interfaces default to using HDLC. A discussion of data-link protocols is outside the scope of this document. You will need to look up the IOS command encapsulation for more details.

Monday, February 4, 2008

High-Speed Downlink Packet Access (HSDPA)

High-Speed Downlink Packet Access (HSDPA) adalah sebuah protokol telepon genggam dan kadangkala disebut sebagai teknologi 3.5G. Teknologi ini dikembangkan dari WCDMA sama seperti EV-DO mengembangkan CDMA2000. HSDPA memberikan jalur evolusi untuk jaringan Universal Mobile Telecomunications System (UMTS) yang dapat memberikan kapasitas data lebih besar, bisa mencapai 14,4 Mbit/detik. HSDPA merupakan evolusi standar WCDMA dan dirancang untuk meningkatkan kecepatan transfer data 5x lebih tinggi.

Nah, ngomong masalah HSDPA jangan bingung-bingung deh, mendingan kita tengok aja di site http://indosatm2.com. Yuuuk kita sama-sama tengok ke site ini, Harganya ya lumayanlah ... sebanding dengan produk yang dijual dengan speed bisa mencapai 1.6 Mbps "Klik aja di sini". Saya sudah merasakan sendiri koneksinya 3.5 G IM2 "Dasyaaaat Meeen". Aku rasa koneksinya sangat cepat kalau dipake untuk personal, kemarin ada pameran di DP Mall, di sana ternyata koneksi 3.5 G dishare ke 1 PC dan disebar pake Hotspot. Dan ternyata walaupun dalam kondisi share, koneksinya pun masih "High Speed".

Memang sih, kalau masalah harga, lumayan juga sekitar 350rb untuk paket 1,2 Gb per bulan. Tapi kita bisa ngedapetin koneksi yang super cepat. Yang lebih saya suka ... menggunakan 3.5 IM2 adalah sistem billing administrasinya. Ternyata user 3.5 G IM2 ga hanya digunakan di 3.5 G aja lo ...

Kata CS nya bisa digunakan di Hotspot IM2, ama CDMA. Setelah saya praktikkan ternyata emang bisa kok. Wah enak nih .... kalau butuh koneksi cepet bisa pake 3.5 G. Tapi pas di luar kota ga ada sinyal 3.5 G saya masih bisa konek yang speed yang lumayan pake CDMA. Billingnya fleksibel.

OK d ... ini dulu yach .....

Sunday, February 3, 2008

IP Address - Network Numbering

ven without subnetting (explained later), hosts on the Internet or any other IP network are assigned a network number. Network numbering allows a group of hosts (peers) to communicate efficiently with each other. Hosts on the same network may be computers located in the same facility or all computers used by a workgroup, for example. Multi-homed hosts, that contain multiple network adapters, can belong to multiple networks, but each adapter is assigned exactly one network number.

Network numbers look very much like IP addresses, but the two should not be confused. Consider for example the host IP address 10.0.0.1, an address commonly used on private networks. Because it is a Class A address, with no subnetting employed, its leftmost byte (eight bits) by default refer to the network address and all other bits remain set at zero. Thus, 10.0.0.0 is the network number corresponding to IP address 10.0.0.1.

The portion of the IP address that does not refer to the network refers instead to the host address - literally, the unique identifier of the host on that network. In the above example, the host address becomes '0.0.0.1' or simply '1'. Also note that a network address becomes a reserved address that should not be assigned to any actual host. Configuring a live host at 10.0.0.0 in the example above could impact communications for all hosts on that network.

The table below illustrates the default numbering scheme for Class A, B, and C networks.

  • Clas A | 0.0.0.0 - 127.255.255.255 | x.0.0.0 | 255.0.0.0
  • Clas B | 128.0.0.0 - 191.255.255.255 | x.x.0.0 | 255.255.0.0
  • Clas C | 192.0.0.0 - 223.255.255.255 | x.x.x.0 | 255.255.255.0
In general, a network address uses the leftmost byte of its hosts' addressing if the hosts fall within the Class A range, the leftmost two bytes for hosts in Class B, and the leftmost three bytes for hosts in Class C. This algorithm is applied in practice through the use of a network mask. The above table shows the decimal representation of the default network masks that is commonly used by network operating systems. Note that the decimal value '255' corresponds to one byte that has all bits set to one (11111111).

Hallo Everybody

Dear All,

Gw seneng banget, karena akhirnya gw bisa bikin ini blog, Mungkin temen-temen pada ga tahu kenapa ini blog gw beri nama "SHFind". Sebenarnya gw juga bingung mo berinama apa ini blog.
But i can idea from my occupation. Yach gw punya punya usaha kecil-kecilan di Rumah, yach usaha kecil-kecilan gw berinama Shofura Computer. So from here, i can idea for the name this blog.

SHF = Shofura
ind = Indonesia

Jadi sekarang sudah tahu kan, kenapa gw berinama SHFind. Karena gw tinggal di Indonesia, dan gw cinlok (cinta lokal) alias cinta dalam negeri, gw tambahin aja Indonesia, biar tambah keren dan g kepanjangan, gw singkat aja, jadi SHFind.

Thank's you ....