Graphic Design

Nowadays we often hear about Graphics and Graphic Design, fuck the hell was that?.Graphics means the image, where each image contains a message that will be delivered the creator of the image to the public. While graphic design is a science and expertise in the design of communication media to convey messages to others whether it be information about a product and services, ideas into visual form.

graphic design

A product design that has been published to the public, created through a process of stages or levels.

Visual Comunicator
Is the first person to receive messages from clients in the manufacturing of a product information. Visual Comunicator learn to whom the message was transmitted, with the aim of what the message conveyed, who the maker of messages and create ideas on how a visual form of his message was.

Visualiser
People who follow up the idea or the idea of ​​Visual Comunicator, he was assigned to visualize / describe an original idea is still in imagination into the form of rough sketches (draft) of what they catch. It takes people who have high ability in drawing illustrations are in this position.

Copy Writer
Finished a draft, then became the task of copy writer to design the right words for the design, sometimes the success of a copy writer in processing her words could be a mascot and boost the attention to graphic design created. Landing copy writer should be able to capture ideas and communicate ideas to the audience for people who see it follow the messages we convey

Graphic Workers
The concept already exists, the draft has been made and the draft has been prepared words, then became the duty worker to arrange typographi graphics, layouts (layout), picture elements in order to become attractive, and has a high value artisitik. The next task is to prepare the work of graphic work is to be submitted goto the printing. A deainer is a designer, create a work that originally did not exist into existence, rather than repeating an existing work, if the designer to repeat the pre-existing works, more appropriately called a graphical workers. A designer has no reason to repeat the same elements in his work, because destination and delivery pesanya will never be the same.Even if the same course with good reason, for example in different periods ..

Works of fine art is different from the work of graphic design, graphic design has a purpose for receiving messages to or affected towards our message to the next follow what the message conveyed by the doer. More emphasis on graphic design principles of communicative than artisitik. Graphic works will be futile if a graphic work of high artistic value, but has no communicative value to say.

Hopefully Helpful
Thank you
Fery Gunawan

Smart Book, All in One Device Komputer

Progress in the world of gadgets raises various kinds of new, innovative gadgets. Look at the Smart Phone so many who have kecangihan in mobile convenience. Not only that, the notebook market also compete with various innovations. We also presented with acomputer tablet that also started a lot of gadgets ogled by the hunter.
Reported KabarIT of Crunchgear, Smart Book is one of the all in one solution kebuuhanthis. With Smart Book you have Notebook, Tablet PC and Smart Phone. All of them canwalk together and can also run each.
Tablet PC which is also the screen can be separated from the keyboard. Using theARM Cortex-A8 CPU with 512MB RAM storage device while an 8GB NAND flash and256MB microSD card. Wireless connection using 802.11b/g/n and Bluetooth 2.1.
Smart Bok also features a mini book that is more similar to the Smart Phone. SmartPhone can be used to launch applications, web browsing and can also be used forVOIP.
For the operating system, the company provides a choice between Ubuntu, OS Androidand Google Chrome. You can buy the whole device with a price of $ 549, or purchasedseparately at $ 199 permasing each device.
Kabar IT


Beware, 12 which is worth Cyber ​​Fraud Caution Ahead at End of Year

New Year holidays become cybercriminals' favorite time in recruiting the victims in the virtual world as much as possible. Given the habit of buying Christmas presents in a number of countries, the scammers (perpetrators of fraud) also offers the lure of a free product that actually is a trick to steal your important information, including credit card numbers.
Recently, security software company McAfee released a list of 12 scam (fraud) that should be wary of Christmas and New Year, read and find out more.

1. Offers Free iPad
This year is the year and iPad tablet computers no doubt become a thing everybody's dream. Utilizing fame iPad, scammers also took the opportunity to pretend to give a gift IPAD to customers if they buy certain products. Offers by email or spam will ultimately require the user to provide their credit card number. In addition to e-mail, the lure of free gadgets Apple output in also spreads via Facebook, Twitter and other social networks in the form of a quiz with prizes iPad. The victim then asked for his phone number and without them want they have become victims of mobile phone scam that sucked money as much as 10 USD per week.
2. 'Help! I Robbed '
Scam this travel has long been rampant in cyberspace. The strategy is to spread the message to family and friends that the sender of the message have tragedy theft when I travel. They also ask transferan money to be able to go home. Be careful, do not be fooled.

3. Promotions Gift Card
According to McAfee, via social networking, promotion gift gift scammers carddengan intent to steal information and money to the victim. The information will then get a brand sold at the marketer or thieves ID.

4. False Jobs
Fake job targeting job seekers who are looking for extra money during the holidays is another trick of the scammers. Scam Twitter known to have provided a malicious link that leads to jobs with high pay. Then, they will ask the victim's personal information such as email addresses, home addresses and other numbers as a condition of employment was false.

5. Smishing
Smishing is in the form of SMS phishing. The sender claimed to be from your own bank or online store that says that there is a mistake in your account. You also asked to call a certain number in order to check the account information you have. The personal information you also become targets. McAfee confirmed, during the holidays, the criminals are aware that consumers are put through a lot of shopping online and check their money in the bank on a regular basis.

6. Rental False
With many people looking for rental vehicle during the holidays, the scammerpun pretending to be a rental service which require payment at the front via credit card or transferan money.

7. Scam Recession Still Continues
Trickery offering low interest loans is continuing since the time of resesi.Scammer target customers who need loans in difficult times. Scammerpun ask the victim to transfer a processing fee that was entered into the pockets of scammers themselves.

8. Electronic Greeting Card or E-card
In the Internet era, sending greeting cards are tangible e-card of choice for some people. But be careful in choosing an e-card spread across the Internet. It turned out that the cyber criminals many of which have made a fake e-cards in which there is a link that contains computer viruses and other malicious programs.

9. Product with Price Italic
Do not be fooled if there is a product offering low prices. This offer is usually appear on auction sites or fraudulent sites. The goal still remains the same that is stealing money and your personal information.

10. Charity Scam
Community minded donors scammers targeted next. Via phone or e-mail, they pretend to ask you to donate money to the veterans foundation or other foundations engaged in the humanitarian field.

Dangerous
11.Download Themed Vacation
Do not be deceived by the holiday-themed screensavers, jingle and animation attractive for download. This is the easiest way for the scammers to spread viruses and other computer threats, especially when the link came from an e-mail or IM your friends.

12. Vulnerability in Wi-Fi Connection and Airport Hotels
Be careful in using public networks because hackers often infiltrate via this network. For those who will travel, as much as possible to avoid accessing your bank account while in the hotel or airport. Giving credit card numbers online in public places berWi-Fi is a very risky act of theft.
Source: ictwatch.com

Trend Virus Watch 2011!

Reading the news about the busy talking Stuxnet like reading a novel by Ian Fleming, because there informed that Stuxnet created in such a way to steal information and disrupt Iran's nuclear installations. And because his story like a novel 007 which does not happen to ordinary people, it makes the computer users do not realize that Stuxnet also threaten the company's computers and computer networks ... .. even if not using SCADA.
The bad news, Indonesia is also the largest victims Stuxnet after Iran. It is also a question, how Stuxnet could spread here? One reason is because of the spread of Stuxnet who rely UFD (USB Flash Disk) to spread itself. As we know, Indonesia is the pioneer of the local virus that uses the UFD as a factor in the spread of primary and UFD users in Indonesia are believed to be one of the largest in the world. But there is one thing that was not properly informed to the user's computer, all this time the focus was how to disrupt Stuxnet artificial Siemens SCADA program is only used by supporters of Iran's nuclear installed also used in large enterprise engaged in the Gas and Oil. But Stuxnet impact on non-SCADA computer users rarely discussed. And significantly, the successful Stuxnet infect non SCADA computer network will make an impact is no less fierce than the other viruses such as:
· Disable Print Sharing, so activity on the shared printer on the network to be disrupted.

· Causes disk (which regardless of size) into a full / Low Disk Space.

· Many company's internal applications could not walk.

· Computer became hangs / slow.

· Network connection is lost.

Beginning in 2010, in addition to Conficker and Sality, a virus that still wara Wiri and to worry about is a fake antivirus, Rogue Antivirus or Fake Antivirus. Fake antivirus is very stubborn and always remove the latest variant to infect the victim because there are financial benefits obtained by this fake antivirus products from the general public and victims innocently fear of false messages for viruses on their computer and follow the advice of these fake antivirus programs to purchase anti-counterfeit and enter credit card number to a site selling fake antivirus. The great thing is the appearance of fake antivirus is very convincing and in some very convincing display both the display and display interface sites (face to face) is not inferior to the original antivirus so easy to believe the victim. Action fake antivirus running throughout the year in which the early use of a vehicle suspected Zbot Zeus botnets spread the appalling world of the Internet because it suspected of being used by the Chinese government to spy on Google. For information Zbot dilahkan see http://vaksin.com/2010/0210/basmi% 20zbot/basmi% 20zbot.html. Then at the end of quarter 1 2010, anti-counterfeit by a virus called W32/Oficla.FA use the name of up to spread itself via email in order to deceive korbannyahttp: / / vaksin.com/2010/0410/oficla/oficla.html. Then at the end of quarter 3 2010, another fake antivirus issue new moment where if so far it looks just issued a threat display a very disturbing about the many malicious virus that infects the computer.At the end of quarter 3 2010 fake antivirus issued a new look as though the victim's computer to get the attack (and infected) from network viruses Conficker crate complete with the location of files on a computer that bersankutan, then this display enhanced again as if the victim's computer to send an email bervirus detected in large numbers.
May 2010, Candid Camera Prank, the first successful virus spread through Facebook and automatically spread themselves among the accounts up. If all this other viruses simply take advantage of the name up or conduct phishing on the site up in order to steal credentials, so this time really any application that uses API (Application Programming Interface) up and appear as if it were up a harmless application. In fact, if the user up to "allow" the application, all contacts can automatically be sent a fake message as if there naughty pictures (candid camera) interesting to see and when the click will start the application on another account up and spread itself to all contacts account. Due to spread through Facebook, the virus is not bound by a particular platform. Provided you have an account up, want to access from any OS, Windows, Linux, Mac or smartphone, this virus will be spread through the account up anda.http: / / vaksin.com/2010/0510/Candid% 20Camera% 20Prank/Candid% 20Camera% 20Prank.htm. In late October 2010, malicious malware authors with a very similar method using the issue of Mc Donalds in order to lure his victims berpengawet enable HD video applications in order to see the movie McDonalds berpengawet potatoes that actually contains malicious code to send the video contains McDonalds Event Invitation to all contacts. Event Invitation This is used by malware authors because apparently the administrator up very responsive and automatic blocking posts by apps up on "Candid Camera Prank." Perhaps because he felt the video theme McDonalds deemed less attractive, the malware authors change jurusnya by using two classic weapons in order to attract the victims as much as possible, sex and celebrity. This time the theme is Lindsay Lohan Sex Video (see Figure 1)

Figure 1, Lindsay Lohan Sex Videos promised by malware on Facebook
Local virus in the first half decreased significantly, and only lightmoon and autorun are detected, the rest is dominated by foreign viruses. Diselingin by a virus that utilizes Lunamaya name that was popular at that time (as the case of pornographic video that had catapulted name Trending Topics Peterporn become number one in his Twitter beat Steve Jobs Iphone 4) to disseminate dirinya.http: / / vaksin.com/2010 / 0610/lunamaya/lunamaya.htm
July 30, 2010 Stuxnet start detectable spread in Indonesia. Significant because the suspected virus used as a spy by the developed countries to steal confidential data from this enemy country and Indonesia, including most of the victims Stuxnet (number 2 after Iran). Maybe if the government of Indonesia to develop nuclear weapons will also be ribut2 against this Stuxnet attack that acts specifically to steal this data. But "fortunately" Indonesia does not develop nuclear weapons ... ... wong border officers who were performing their duties even catch fish thieves caught by police in neighboring countries and their governments are still stay calm and choose the path of peace.
1 September 2010 the work of the nation's first virus that spreads via Facebook chat and maybe learn from Lunamaya, this time the victim is a star who made Krissdayanti and Mulan Jameela.
In the final quarter of local virus began to rise again, this time driving a speed boat called Shortcut, local virus is rampant and beating a local antivirus that began to trouble detecting variants membasminya shortcut and completely.
In addition to the viruses mentioned above, some viruses were detected most infected computers in Indonesia in 2010 were:
·
Virut, this virus belongs to the virus that once infected komptuer will be very tough to eradicate http://www.vaksin.com/2009/0909/virut/virut.htm

Conficker, although not become virusn omor one in 2010 but was still detectable but much on corporate computers.

Sality, http://www.vaksin.com/2009/0309/Sality/sality.html together with Virut and conficker be the most difficult virus eradicated in 2010 and most widely infect corporate computers in Indonesia.


Antivirus False / Rogue Antivirus.
The mother of all malware in the year 2010 is false, aka Fake Antivirus Antivirus / Scareware or Rogue Antivirus. Is actually a fake antivirus malware (spyware) that managed to infect a computer if the victim would scare the victim with a message that is very scary as if his computer infected by malicious viruses that mencancam computer systems and data concerned. If the victim "not afraid", the latest variant found in the 2nd semester of 2010 even complete false information as if a lot of emails containing a virus is detected on the computer. If the victim still has not been afraid he will issue a message every few minutes as if there Conficker virus attack from the network. For computer users, surely they will lay frightened and decided to buy this fake antivirus.(See Figure 2)
Figure 2, which displayed a fake warning Rogue Antivirus for mengelabuui victim

Once the victim decides to buy the antivirus has to offer, besides having to pay these fake antivirus, credit card data that is used to buy these fake antivirus that will be used for fraud. In addition, like the proverb has fallen overwritten computer stairs in this fake antivirus installed in the fall will increasingly become victims of fake antivirus on her computer actually is because there never was a virus that is informed by this fake antivirus, fake antivirus instead install spyware and rootkit victim's computer. Fake antivirus is actively developing its variants and almost impossible to identify one by one because he will always take advantage of new methods to spread itself. This is evident with viruses that use the name Oficla up to spread the anti-counterfeit and Zbot virus that is suspected as the precursor of Zeus botnets. Just so you know, Zbot is one of the variants of fake antivirus. Because it is not wrong to say that the year 2010 as the year of anti-counterfeit and fake antivirus / rogue antivirus crowned as the Root of All Malware 2010.

Up
If the movie The Social Network about a creator up into the film number one, then do not be surprised if the users of Facebook, which amounted to 500 million people has become an enticing target for cyber criminals.
Phishing is the most widely increased during the year 2010 is phishing to steal user passwords up. This is evident from the cases that had been targeted phishing internet banking users in order to gain financial advantage. But along with the increase in internet banking security method and economic value account up that starts to look like a token game Zinga and ease of spreading malicious code through up a "considered" trusted (which may harm you and your friend will anyone with senanghati will accept and carry items from friend). Special smartphone users please be extra careful if you get a link that directs you to log in your facebook account, it is very difficult to identify the validity of a phishing site because of limited screen size then the full address of the site is not shown that it is difficult to check the validity of the site by looking at the address.Unfortunately, this is exacerbated by the popularity of the service URL, one of the most popular is the bit.ly, let your smartphone users. Computer users will not even be able to see the actual site address if the creators take advantage of services such as bit.ly. penyingkat URL Besides the account up, beyond the accounts of financial transactions such as Paypal and online banking, other accounts vulnerable to becoming victims of phishing is Yahoo and MSN accounts.

Local Viruses
Local virus in early 2010 looks saggy face of attacks from anti-virus, antivirus both local and foreign anti-virus and its spread has decreased significantly. But entering the third quarter looks to increase its distribution and its ability to avoid local and foreign anti-virus scanning further increased. This is evident from the latest virus that enter the lab Vaksincom until September 2010 that adopted the spread of the virus Shortcut de facto belong to the most widespread virus in the 3rd quarter of 2010. Apparently the local spread of the virus will use the same methods are emerging because the virus' ability to duplicate himself and the great shortcuts, although produced by the same virus, duplikasinya very difficult to be detected by other antivirus programs. Unless some antivirus programs that have the ability heuristic qualified.
Source: Vaksin.com

Flashpacker Indonesia

1. Flashpacker are the fans of the streets that position themselves in the middle of two extremes, namely Backpackers and tourists.

2. The difference between Flashpacker with Tourists: If tourists are the fans of the streets who do not bother to take care of stuff delivered all the way and travel with the consequences should be attached schedules and tour a rigid agenda, then Flashpacker prefer to plan the schedule and agenda journey and take care of themselves all the needs of his trip in order to explore and understand a destination with better and in travel time is more flexible.

3. The difference between Flashpacker with Backpacker: If Backpacker is the fans who love the streets of freedom of the time but very oriented to the budget (budget oriented), then Flashpacker also love the freedom of time but is more oriented to the experience (experience oriented) and more appreciative of the ease and comfort ( convenience & comfort) to be more flexible and moderate in terms of budget setting. Example: If you do intend to see the sunrise at Bromo, so even if cheap and comfortable lodging is full and only choice left-star hotel with room prices are more expensive, then Flashpacker usually will not mind as long as the destination to enjoy the sunrise can be achieved.

4. As the fan-oriented streets to experience (experience oriented), then usually Flashpacker be very time conscious or trying to use time wisely in order not wasted journey to the things that are inconsistent with the purpose of the trip or experience that would be obtained, even means have to spend extra funds. Example: Instead of traveling dozens of hours by bus to reach a place while the aircraft is actually available with the travel time is only 1-2 hours, usually Flashpacker more likely to choose to save time by using the plane just mean having to spend even more funds.

5. While appreciate the ease and convenience, does not necessarily mean that Flashpacker unable to tolerate the discomfort at all, as long as is necessary or not inconveniences can be avoided in order to get a certain experience. Example: If it's going to try to feel how the intention of camping on a mountain top, so even should bergemetaran cold in her bones poked through the night (obviously not comfortable), then for Flashpacker was just a consequence of experience who want to get and like it or not, like do not like, still to be lived.

6. Necessary to distinguish the meaning of comfort (comfort) with the luxury (luxury).Although the luxury is always synonymous with comfort, but comfort is not necessarily synonymous with luxury. Flashpacker are the fans of the streets that appreciate comfort, but not necessarily always looking for luxury in every way. Example: For a Flashpacker, traveling is not an absolute must with an expensive full service airlines budget airlines if it is available with affordable ticket prices but with comfortable cabin interior.

7. In conclusion, Flashpacking is understood the roads that meet the four following characteristics: a. Self Organized: Planned and organized by the participants themselves b. Experience Oriented: Oriented toward the experience or destination of travel c. Value Convenience & Comfort: Appreciate the ease and comfort d. Time Conscious: Trying to take advantage of travel time with the best

8. In profile, the fans usually Flashpacker are roads that have a steady job with sufficient income level (note: not necessarily high enough) but have limited time off, so try to take advantage of the time his journey with his best to get a memorable trip or memorable.Hopefully the explanation above is clear to explain what exactly Flashpacking and understand the differences between each of the existing roads.


http://www.kaskus.us/showthread.php?t=5978503

Seven core benefits of blogging

Why now do you like blogging?, I do not know the answer but certainly I am now more happy blogging and I do not intend to invite everyone to blog. After several years of blogging, for me it turns out blogging has 7 great benefit to most people who like to write in their personal blogs.

1. You Become A Pe-Reliable research
Blogging with good content requires continuous research, meaning that you will choose the articles that had previously been getting quite a lot of response from your readers, then you combine it with new articles that will surely attract readers for comment.

Or you want to research what keywords are a trend that you will shoot to bring visitors to your blog.

So basically you will be a pe-reliable research to bring new visitors and make your blog more lively.

2. You Become Who Like Helping People
The essence of blogging is to write the information needed by the people who come to your blog. The more information you write, the more people who love to come visit your blog.

Thus the more you are diligent in writing on a blog for the information people are looking for, then your blog more popular, and you also get a stamp, as a blogger that presents useful information.

3. You Learn to Become a Speaker
Blogging also channel the aspirations that exist in your mind, you have inadvertently spawned ideas for you you keep in your mind and say through your writing, well you have to be a great speaker.

Blogging has been a lot of helping people to understand the importance of good communication. So naturally if content is king, but content without good communication, just an ordinary item, agree?

Blogging also has proven the power of simple words are used in everyday life is more potent and powerful than the sentences that are too rigid to be discussed and not affect the reader.

4.Anda Will Find Ideas Faster
Consider the comments of your readers, along with the comments they give, you will definitely find a solution to your problem, so the sooner you find the ideas from your readers.

Suppose you write a post about SEO issues, to be sure readers who read your post provides a useful way out, for you and other readers.

5.you Will Know Who You Blogging

also one of the media to provide answers about who you during this, what you are looking for, what is your obsession, any kind of hell your hobbies other than blogging, iya khan?

Try to explore your world with the writings of your experience, you will surely find your identity in the abstract in your writing.

6.Anda Be Motivator For Yourself
I often experience this, dikala I feel "down", I immediately wrote an article about the motivation which indirectly is the cry of my conscience to rebel against the uncertainty of this life, and indeed this life is uncertain and frequently changing, and change is eternal in life.

Therefore I often read my postings about the motivation for me to keep moving with the spirit that is easy-easy is not extinguished in the middle of the road.

7.Anda Become A Great Writer
This is the most important point of all the benefits of blogging. With blogging you've definitely trained to make great writings and in the end you will be able to make good writings in book form or become a famous writer.

For years you blogging on a regular basis you will be trained to create a post that deserves all the other people to read. A good blogger is a great writer, but not every good writer is a great blogger.

Since you started blogging, what are the benefits and goodness that you feel?,