Twilight Saga Novel Series

Posted: November 23, 2011 in Uncategorized
Tags:

1. Twilight

untuk download klik dibawah ini :

versi inggris di ziddu atau di oron

versi indonesia di ziddu atau di oron

2. New Moon

untuk download klik dibawah ini :

versi inggris di ziddu atau di oron

versi indonesia di ziddu atau di oron

3. Eclipse

untuk download klik dibawah ini :

versi inggris di ziddu atau di oron

versi indonesia di ziddu atau di oron

4. Breaking Down

untuk download klik di bawah ini:

versi inggris di ziddu atau di oron

versi indonesia download dioron atau di ziddu

File download extensinya .rar jadi musti extract dulu pake winrar

setelah di extract

* untuk bukunya buka file yang format .djvu kalau belum punya software untuk buka file .djvu klik disini atau Disini *

 

Repost from:

http://jangkrikk.blogspot.com/2010/05/novel-twilight-saga.html

Advertisements

CCNA – Wireless

Posted: September 16, 2011 in Cisco
Tags: ,
  1. CCNA 640-721 Wireless Official Exam Certification Guide
  2. Wireless LAN Concepts
  3. CCNA 640-721 Wireless IUWEN 1.0

Samsung – Flashing Program (Odin)

Posted: September 11, 2011 in Android
Tags: , ,

Firmware Update Steps:

  1. Run Samsung S5830 Galaxy Ace Downloader.
  2. Select OPS file : Cooper_v1.0.ops in his field.
  3. Click BOOT button and select: APBOOT_S5830xxxxx_xxx…._user_low_true.tar.md5
  4. Click Phone button and select: MODEM_S5830xxxxx_xxx…._REV03.tar.md5
  5. Click PDA button and select: CODE_S5830xxxxx_xxx…._REV03_user_low_true.tar.md5
  6. Click CSC button and select: CSC_S5830xxxxxx_xxx……_REV03_user_low_true.tar.md5
  7. Put your phone into Download Mode: Press middle Key ( OK key ) + Power + Volume Down
  8. Connect USB cable to your phone and the program must read the Com number it takes.
  9. Click Start button and the update process will start.
  10. Do not touch or remove anything till the device rebooted and you can see PASS

Brizzan 3.2

Tutorial Penginstallan :
1. Download Hybrid ini
2. Back-up data Anda menggunakan BlackBerry Dekstop Manager dan 3rd Apps Anda menggunakan BBSAK
3. Run installer Hybrid ini, otomatis device Anda akan di Wipe, klik finish lalu loader.exe akan muncul, setelah muncul 507 Reload Software di Device Anda, klik next pada loader.exe dan lanjutkan penginstallan seperti biasa
4. Restore data dan 3rd Apps Anda

–PENTING–

Tidak Perlu Base OS jadi Langsung INSTALL sebelumnya INGAT di backup

Fiture and Additional Apps Included In All

1. CJK East Asian Language Font Support (Read and Write)
2. Included Bahasa Indonesia
3. BlackBerry Messenger v5.0.3.22
4. Facebook v1.9.0.28
5. Twitter v2.0.0.11
6. Yahoo Messenger v2.5.69
7. UberSocial v1.20
8. More..

WARNING!!!

1. Tidak perlu shrink os lagi, kalau ada aplikasi yg tidak di inginkan, jangan di check ketika load
2. Setelah Load OS bisa saja terjadi memory drain yg besar, batrei panas dan boros karena dalam tahap penyesuaian
3. Lakukan pullbat 3x dalam 2 hari pertama
4. Setelah load OS Selesai silahkan uninstall Hybrid ini melalui Control Panel, atau dengan cara run kembali Hybrid ini lalu pilih removed.
5. Ringtone yang tersedia hanya Ringtone OS 6, jika anda ingin ada Ringtone silahkan check Ringtone OS 6 ketika load

 

Composition Brizan 8520 v3.2
5.0.0.1067/5.0.0.1077/5.0.0.1082/6.0.0.600/7.0.0.xxx

About Screen/Help Screen
5.0.0.1067/5.0.0.1067

 

Credit to bzone

Custom ROM – FirstUA-ROM-v1.1

Posted: July 27, 2011 in Android
Tags:

Source

ROM: FirstUA-Rom-V1.0_without_warez.zip
ClockWorkMod4: CWM4-CF-ROOT.zip

Updates:
FirstUA-ROM-V1.1

How to install (only for FirstUA-Rom-V1.0):

  1. Make a backup of all user’s settings and programs with Titanium Backup
  2. Copy FirstUA-Rom-V1.0_without_warez.zip and CWM4-CF-ROOT.zip into your SD card
  3. Flash stock KPH with Odin (if you allready use KPH or other KPH based ROM, you can skip this step)
  4. Go to recovery, flash CWM4-CF-ROOT.zip (If you already use ClockWorkMod 4.0.0.9, you can skip it)
  5. Reboot into ClockWorkMod 4.0.0.9, check wipe data/factory reset. (wipe will delete all your data and settings, but it is necessary for stable work of this ROM)
  6. Flash FirstUA-Rom-V1.0_without_warez.zip from recovery. System partitions will converted into ext4(dont mount manually anything, all mounting automatically!)
  7. Reboot your phone (first boot will take some time)
  8. Restore your data with Titanium Backup.
  9. That’s all… Do not forget to activate your required tweaks in Tweaks program and reboot 

Read the rest of this entry »

VLAN Access Control Lists (VACLs) Tier 1

Posted: July 26, 2011 in Cisco
Tags:

Source

In this blog post, we will obtain some good solid Tier 1 level knowledge regarding VLAN Access Control Lists or VACLs. These are often also referred to as VLAN Access Maps or just VLAN Maps; thanks to the syntax that is used in their creation.

When you want to filter traffic that is moving from one VLAN to another, things are real CCNA-like and friendly :-) We use an Access Control List. In fact, we should elaborate on that term a bit now in light of this discussion. We actually use a Router-based Access Control List or RACL.

But what if we want to filter traffic that is flowing within a VLAN? On no, a Router-based Access Control List cannot help us! This is when we turn to the VLAN Access Control List. To help us understand this feature, let us create a topology and a sample scenario. Here is the simple topology:

VACLs

Notice the Fast Ethernet interfaces of R1 and R2 are within the same VLAN (VLAN 10). So, based on the theory we have discussed, we will need a VACL if we want to filter the ability of R1 to communicate with R2. For this experiment, let us use Telnet. Before we begin, let me try Telnetting from R1 to R2. We want to ensure that works before we try and prevent that capability with a VACL.

Read the rest of this entry »

Private VLAN

Posted: July 25, 2011 in Cisco
Tags: , , , ,

Source

Introduction

To begin with, recall that VLAN is essentially a broadcast domain. Private VLANs (PVANs) allow splitting the domain into multiple isolated broadcast “subdomains”, introducing sub-VLANs inside a VLAN. As we know, Ethernet VLANs can not communicate directly with each other – they require a L3 device to forward packets between separate broadcast domains. The same restriction applies to PVLANS – since the subdomains are isolated at Level 2, they need to communicate using an upper level (L3/packet forwarding) device – such as router.

In reality, different VLANs normally map to different IP subnets. When we split a VLAN using PVLANs, hosts in different PVLANs still belong to the same IP subnet, yet now they need to use a router (L3 device) to talk to each other (for example, by using Local Proxy ARP). In turn, the router may either permit or forbid communications between sub-VLANs using access-lists. Commonly, these configurations arise in “shared” environments, say ISP co-location, where it’s beneficial to put multiple customers into the same IP subnet, yet provide a good level of isolation between them.

Private VLANs Terminology

The following is the reference diagram that we are going to use to illustrate Private VLAN concepts and functionality.

Private VLANs

For our sample configuration, we take VLAN 1000 and divide it into three PVLANs – sub-VLAN 1012 (R1 and R2), sub-VLAN 1034 (R3 and R4) and sub-VLAN 1055 (router R5 only). Router R6 will be used as layer 3 device, to resolve the layer 3 communication issue. We name VLAN 1000 as “Primary” and classify the ports, assigned to this VLAN, based on their types:

  • Promiscuous (“P”) port: Usually connects to a router. This port type is allowed to send and receive L2 frames from any other port on the VLAN.
  • Isolated (“I”) port: This type of port is only allowed to communicate with “P”-ports – i.e., they are “stub” port. You commonly see these ports connecting to hosts.
  • Community (“C”) port: Community ports are allowed to talk to their buddies, sharing the same community (group) and to “P”-ports.

In order to implement sub-VLAN behavior, we need to define how packets are forwarded between different types of ports. We group the VLANs in “Primary” and “Secondary”.

  • Primary VLAN (VLAN 1000 in our example). This VLAN is used to forward frames downstream from “P”-ports to all other port types (“I” and “C” ports) in the system. Essentially, Primary VLAN embraces all ports in the domain, but only transports frames from the router to hosts (from “P” to “I” and “C”).
  • Secondary Isolated VLAN: forwards frames from “I” ports to “P” ports. Since Isolated ports do not exchange frames with each other, we can use just ONE isolated VLAN to connect all I-Port to the P-port.
  • Secondary Community VLANs: Transport frames between community ports (C-ports) within to the same group (community) and forward frames upstream to the P-ports of the primary VLAN.

 

How Private VLANs Work

Here are the key aspects of Private VLAN functioning:

  • The Primary VLAN delivers frames downstream from the router (promisc port) to all mapped hosts.
  • The Isolated VLAN transports frames from the stub hosts upstream to the router
  • The Community VLANs allow bi-directional frame exchange withing a single group, in addition to forwarding frames upstream towards “P”-ports.
  • Ethernet MAC address learning and forwarding procedure remain the same, as well as broadcast/multicast flooding procedure within boundaries of primary/secondary VLANs.

Private VLANs could be trunked. The secondary VLAN numbers are used to tag frames, just as with regular VLANs, and the primary VLAN traffic is trunked as well. However, you need to configure Private VLAN specific settings (bindings, mappings) on every participating swtich, as it’s not possible to use VTPv2 to dissiminate that information . This due to the fact that VTPv2 has no TLVs to carry private VLANs information. VTPv3 was designed to overcome this limitation among others.

Read the rest of this entry »