| 42 comments ]

At this time, I tried to take the time to share the post "Prostration" in connection with the email I received, transfers from the colleague Mr. Ros. Where is he sending the presentation file (. Pps) as the frame under this article. In this case, I respond to any posts from the last presentation, which combined with the knowledge of islam I receive from the teachers of Islam, also articles on the internet, any posts about the responses:

“We do not prostrate to discharge the electromagnetic waves, but to obey the Almighty Allah! We trust that in His commands, there is always a wisdom! Our trust is because He is the Creator, He knows everything! However, since a scientific reason is available, it was essential to show it to the people so that they can see that whatever Muslims do, is good for them!

One of the snippets from the sermon Rasulallah when the Ramadan holy month, "shoulder-shoulder you have bear the weight of 'burden' (sins). So the burden is easy, Prostration with a long time (in every prayer) you. " Prostration of a servant in the Lord is the symbol of obedience or adherence to the slave at the creator. In Hadist Rasulallah said: "There is no medium of communication in a primary approach for themselves a slave to the creator, but prostrate before Him." Surah al A'lâ, Allah SWT said :

سَبِّحِ اسْمَ رَبِّكَ اْلأَعْلَى Which means: "clean the name of thy Lord the Most High."

So instantly Rasulullah SAW. ordered while the friend said: "Make reading in prostration you,
That is: سُبْحَانَ رَبِّيَ اْلأَعْلَى

Furthermore, the opinion among many sects, such as: asy-Syafi'iyyah, al Malikiyyah, al-Hanabilah and others. In addition to history mentioned earlier, there is also a history which suggests for every Muslim who is conducting prayers, the prayers that fardhu or sunah "To have read the prayer" in a prostrate position. In addition there is also speech of the Prophet SAW. such as Abdullah bin Mas'ud ra. memutlakkan the prayer in the Prayer. Diriwayatkan by Amer bin Dinar, said Abdullah Ibn Mas'ud ra.: أَحْمِلُوْا حَوَائِجَكُمْ عَلَى الْمَكْتُوْبَةِ Which means: "Insert all application needs for day-in day (prayer) on the compulsory prayer."

Evidence suggests Pray WHEN THE PROSTRATION

Many of the Hadith of the Prophet saw. which allows even recommend to the Companions of the Prophet in particular, and Muslims in general in order to read the prayer when the prostration in which the Prophet saw. itself also continues to do so. Abdullah bin Abbas Ra., That the Prophet SAW. said: عَنِ ابْنِ عَبَّاسِ رَضِيَ اللَّهُ عَنٍهُمَا قَالَ: قَالَ رَسُوْلُ اللَّهِ (ص):
اَلاَ وَ إِنِّيْ نُهِيْتُ أَنْ أَقْرَأَ اْلقُرْآنَ رَاكِعًا أَوْ سَاجِدًا، فَأَمَّا الرُّكُوْعُ فَعَظِّمُوْا فِيْهِ الرَّبَّ، وَ أَمَّا السُّجُوْدُ فَاجْتَهِدُوْا فيِ الدُّعَاءِ، فَقَمِنٌ أَنْ يُسْتَجَابُ لَكُمْ.
"I am forbidden to read verses of the Qur'an in ruku 'and prostration, therefore if you are carrying ruku' (in the prayer), the name of thy Lord magnify, and if you're carrying bow down, then try (with a flat-out that have) read the prayer, then eligible for Allah SWT to grant the request. "

This is the prohibition before the ban that does not encourage reading verses of the Qur'an in such a position (but there are also opinions from some scholars in the tabi'in that allow it). However the prohibition does not include retroactive verses there is lots of prayer in the Qur'an, such as for example: رَبَّنَا آتِنَا فِي الدُّنْيَا حَسَنَةً وَ فِي اْلآخِرَةِ حَسَنَةً وَ قِنَا عَذَابَ النَّار "Lord, give us good in this world and good in the Hereafter, and guard us from the torment of hell."

other examples:
رَبِّ اجْعَلْنِيْ مُقِيْمَ الصَّلَوةِ وَ مِنْ ذُرِّيَّتِيْ رَبَّنَا وَتَقَبَّلْ دُعَآءِ رَبَّنَا اغْفِرْ لِيْ وَ لِوَالِدَيَّ وَ لِلْمُؤْمِنِيْنَ يَوْمَ يَقُوْمُ الْحِسَابُ "Lord, make me and the sons of those who keep up prayers, Our Lord, perkenankanlah prayer. Our Lord, forgive me and to my father and mother of two all believers on the day of a reckoning (the Day of Resurrection). "

history in Musnad Ahmad bin Hanbal:
اَلاَ وَ إِنِّيْ نُهِيْتُ أَنْ أَقْرَأَ اْلقُرْآنَ رَاكِعًا أَوْ سَاجِدًا فَأَمَّا الرُّكُوْعُ فَعَظِّمُوْا فِيْهِ الرَّبَّ، وَ أَمَّا السُّجُوْدُ فَاجْتَهِدُوْا فيِ الْمَسْأَلَةِ، فَقَمِنٌ أَنْ يُسْتَجَابُ لَكُمْ
"I am forbidden to read verses of the Qur'an in ruku 'and prostration, therefore if you are carrying ruku' (in the prayer), the name of thy Lord magnify, and if you're carrying bow down, then tried (with a flat-out) in order to propagate requests, then Allah SWT for in the grant request. "

the other in history: وَ إِذَا رَكَعْتُمْ فَعَظِّمُوْا اللَّهَ وَ إِذَا سَجَدْتُمْ فَادْعُوْا، فَقَمِنٌ... إلخ
"And when you're ruku 'magnify the Lord and if you bow down and pray, then ..." and so on.

In the book Tsawabul 'Charity, said Imam Ali ar Ridha as. "Proximity distance between a servant with a servant of the Lord when in the position of prostration", and that is the word of God in the Qur'an: وَ اسْجُدْ وَ اقْتَرِبْ "And the prostration and closer (to the souls of your Lord)."

History is almost the same in Shahih Muslim, such as the Messenger of Allah. He said: "Nearly the distance between a servant to the Lord, that is when the servant's position in the bow, then pray in a position to do prostration, the prayer is read by Allah SWT is granted."

After reading and studying and weighing of the Hadith-Hadith and the history-the history, I conclude that while praying in prostration is a way that is very qualified and effect and the extraordinary potential of the prayer is so granted by Allah SWT, such as what is said by the Hadith-Hadith past.

Insyaallah, after knowing all this, we will create more trust and confidence increase, and our faith to be more solid, more solid and serious, more solemn and devout in prayer, to be able to meet one of the requirements in prayer and ask Allah SWT. Which in the end, and every prayer request that we would want, and hopefully he will be granted. Terimakasih.. @Abrar2009


| 2 comments ]



As you request Abdulsalam, I post poto-poto my children on this blog for so memorable.

| 10 comments ]


THEORY & FORMULA

Transient Pressure BuildUp Analysis (Oilwell)
Pressure buildup (PBU) survey involves measuring the changes in wellbore pressure with time after a well has been shut in. PBU requires that the well produce at a stabilized rate before shut-in. The PBU equation introduced by Horner is given by:

<

>


where pws = sandface pressure, psig pi = initial reservoir pressure, psig Qo = stabilized oil rate, STB/day μo = oil viscosity, cp Bo = formation volume factor, rB/STB k = permeability of formation rock, mD h = formation thickness, ft tp = flowing time before shut-in, hr Δt = shut-in time, hr.
A plot of pws versus (tp+Δt)/Δt would ideally produce a straight line with an intercept at pi (or p*) and a slope of ,strong>-m. This plot is known as the Horner plot, a semi-log plot. In practice, there is a deviation from a straight line in the initial section of the plot due to skin and wellbore storage effects. The straightline portion of the plot can be graphically identified by interactively ignoring a number of early plot points and performing a straightline fit on the rest.
When a satisfactory straight line is obtained, the initial reservoir pressure pi is estimated by extrapolation to the pressure corresponding to (tp+Δt)/Δt = 1. That is, the extrapolated pressure (p*) = (pi) for an infinite reservoir or for wells tested early in the life of the reservoir.
Another pressure point of importance on the fitted straightline is the pressure corresponding to Δt = 1 hour. Also computed is the slope (m) of the straight line in units of psi/log cycle.
Finally, the permeability of the formation (k) and the skin factor (s) can be calculated according to the relationships:


<>
where m = slope of semi-log straight line, psi/log10cycle p1hr = pressure at time 1-hour on semi-log straight line, psig pwf(Δt=0) = sandface pressure immediately prior to shut-in, psig ct = total compressibility coefficient, 1/psi


Tips:

◊ Use link

EXAMPLE Of Input/Output to demo data entry expectations and results; you may edit & use it as starting point

◊ Between 15 to 30 measurements points may be entered

◊ Up to 11 points may be ingored in the staright-line fitting process

◊ If the required Java plug-in not installed on your computer, an auto-download of this plug-in will be initiated before the plot is displayed.

BIBLIOGRAPHY
Dake L.P.; Fundamentals Of Reservoir Engineering; Elsevier Scientific Publ. Co., Amsterdam, Netherlands, 1978.
Horne R.N.; Modern Well Test Analysis - A Computer-Aided Approach; Petroway Inc., Palo Alto, California, 1995.
Earlougher R; Advanced Well Test Analysis; Monograph Series Vol 5, SPE, Dallas, 1977.
Kansas Geological Survey, Oil & Gas Information, Gemini Project, Lawrence, Kansas, 2002.

Recreated by @Abrar2009

Use link:

* Effect of Oil Production Rate

* Science Direct Journal

* Haliburton Public Data

* Petroleum Engineering Calculator

| 4 comments ]

GEOMETRY/STRUCTURE:

A motor and gearbox supply power to turn the power shaft. There is a counterweight at the end of the crank. A pitman arm is attached to the crank and it moves upward when the crank moves counterclockwise. The Samson arms support the walking beam. The walking beam pivots and lowers or raises the plunger. The rod attaches the plunger to the horsehead. The horsehead (not rigidly attached) allows the joint (where rod is attached) to move in a vertical path instead of following an arc. Every time the plunger rises, oil is pumped out through a spout. The pump consits of a four bar linkage is comprised of the crank, the pitman arm, the walking beam, and the ground.

EXPLANATION OF HOW IT WORKS/ IS USED:

Here the plunger is shown at its lowest position. The pitman arm and the crank are in-line. The maximum pumping angle, denoted as theta in the calculations, is shown. L is the stroke length. After one stroke, the plunger moves upward by one stroke length and the walking beam pivots. The crank also rotates counterclockwise. At the end of the upstroke the pitman arm, the crank, and the walking beam are in-line.

For name and location of parts, see Figure A.
A motor supplies power to a gear box. A gearbox reduces the angular velocity and increases the torque relative to this input.
As shown in Figure B, (the crank turns counterclockwise) and lifts the counterweight. Since the crank is connected to the walking beam via the pitman arm, the beam pivots and submerges the plunger. Figure B also shows the horsehead at its lowest position. This marks the end of the down stroke. Note that the crank and the pitman arm are in-line at this position.
The upstroke raises the horsehead and the plunger, along with the fluid being pumped. The upstroke begins at the point shown in Figure B. At the end of the upstroke, all joints are in-line. This geometric constraint determines the length of the pitman arn.
Figures C(a) and C(b) show the plunger and ball valves in more detail. These valves are opened by fluid flow alone. On the upstroke, the riding valve is closed and the standing valve is open. Fluid above and within the plunger is lifted out of the casing while more fluid is pumped into the well. On the down stroke, the riding valve is opened and the standing valve is closed. Fluid flows into the plunger and no fluid is allowed to leave the well. [More Detail..]

Use link:
* Animate Softwere
* Oil Glosary Schlumberger
* Pump Accessories

| 1 comments ]


Some time ago the case of men, appear to kill his wife because the wife to change the status in Facebook to be single. Other cases, although not extreme, can appear at any time because the only kind of networking site Facebook. So, how to minimize this happen? Some of the 'ethics' of Facebook impressions of MSNBC cited below may be useful for you.

1. Your relationship status is paired with the decision. Do not ever change your relationship status, if not based on an agreement between you and your partner. Many cases occur due to bad someone unilaterally change the status. Do not forget, your friends or your friend can check it quickly.

2. Make friends with the friend of a friend you are, there is ethics.
When you want to be friends with your friends in Facebook, do not forget that the existence of your friend here as a 'relational'. Say from who you know their profile. You would not suspect as sales is not it?

3. Ready when are with someone who was dating with you.
Before you do, you are better prepared mentally first. Some states that he can write so make you jealous. It takes maturity to do this. However, if you do not get dizzy, do it.

4. Do not meet the profile with photos, video, and comments related to your relationship collapse. This is likely to be inappropriate in Facebook. If you want to ask for sympathy, call your friend, do not ask the people in the virtual world, especially in Facebook that are accessed by many people. You can even make fun of.

5. Do not open and foreverglo secret in Facebook.
If you want to foreverglo and the like, you better not do it in Facebook. Use any e-mail, phone, or do while eating with your friends for example. Many other facilities is not it? You certainly do not want to know your secret by the person who is not responsible.

6. Identify the difference between the Wall and Message. A statement that the personal relationship you should not need the exposure too. Sentences like "I luv u soo much .. I baaabyy Can not wait too see 2neit", may be more appropriate if the message is written.

7. Never Make False profile.
Perhaps the most traffic in your mind to create a false former girlfriend who has hurt you. Then, you post things on it. Of course, never really do this. If you are out of action, people were even able to give a negative stamp on you.

The idea is not too much information about you is especially personal. You will never know what can happen to the future. Remember, even though the virtual world still full of fun and also risk the evil.

Hopefully the fun, the pro-Facebook. @abrar2009

| 1 comments ]

Coutsonif.A virus attacks that threaten the user's Yahoo Messenger and Skype should be wary. This virus spreads by sending itself to all contacts in the address of the application from the infected computer.
Message at a glance like a message in general. But do not click the link to a given, though sent by your friend. The message was not sent by your colleagues, but by a successful virus infected to computer your colleagues.

Well, if already infected, then it will automatically create a random file name with the extension. Tmp and. Exe that will be stored in the directory [C: \ Documents and Settings \% username% \ Local Settings \ Temp] with the name of the different .
If you are like this, the user can only submission, and not quietly pro-activity on the internet again. Moreover, can-do reputation is damaged because of allegedly spreading the virus as well. For the friends of the recipient of a suspect who deliberately harm themselves with sending the virus.
So, before the incident occurred. There are 6 well you see how right to eradicate destructive virus that attacks the good name of a chat application such as this is written by Vaksincom:

1. Disable 'System Restore' during the cleaning process.
2. Disable Windows autorun, so the virus can not be activated automatically when the access to the drive / flash disk.

* Click the 'start'
* Click 'run'
* Type 'GPEDIT.MSC', without quotes. Then the screen will display 'Group Policy'
* In the 'Computer Configuration and User Configuration,' click 'Administrative templates'
* Click the 'System'
* Right click on 'Turn On Autoplay', select 'Properties'. Then the screen will appear 'on Tun Autoplay propeties'
* In the tabulation 'Settings', select' Enabled ' * In the 'Tun off Autoplay on' select 'All drives'
* Click 'Ok'

3. Turn off the virus, use the tools' security task manager 'and delete the file [sysmgr.exe, vshost.exe, winservices.exe, *. tmp] Just a note,. Tmp files that have indicated an extension TMP [example: 5755.tmp]. Right-click on the file and select 'Remove', select the option 'Move files to Quarantine.

4. Repair registry that has been modified by the virus. To speed up the process of elimination, please copy the script below on the notepad program and save it with the name repair.inf. Run the file in the following manner: repair.inf Right-click, and select install.

[Version]Signature="$Chicago$"Provider=Vaksincom Oyee[DefaultInstall]AddReg=UnhookRegKeyDelReg=del[UnhookRegKey]HKLM, Software\CLASSES\batfile\shell\open\command,,,"""%1"" %*"HKLM, Software\CLASSES\comfile\shell\open\command,,,"""%1"" %*"HKLM, Software\CLASSES\exefile\shell\open\command,,,"""%1"" %*"HKLM, Software\CLASSES\piffile\shell\open\command,,,"""%1"" %*"HKLM, Software\CLASSES\regfile\shell\open\command,,,"regedit.exe "%1""HKLM, Software\CLASSES\scrfile\shell\open\command,,,"""%1"" %*"HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon, Shell,0, "Explorer.exe"HKCU, SessionInformation, ProgramCount, 0x00010001,3HKCU, AppEvents\Schemes\Apps\Explorer\BlockedPopup\.current,,,"C:\WINDOWS\media\Windows XP Pop-up Blocked.wav"HKCU, AppEvents\Schemes\Apps\Explorer\EmptyRecycleBin\.Current,,,"C:\Windows\media\Windows XP Recycle.wav"HKCU, AppEvents\Schemes\Apps\Explorer\Navigating\.Current,,,"C:\Windows\media\Windows XP Start.wav"HKCU, AppEvents\Schemes\Apps\Explorer\SecurityBand\.current,,,"C:\WINDOWS\media\Windows XP Information Bar.wav"[del]HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run, Microsoft(R) System Manager HKCU, Software\Microsoft\Windows\CurrentVersion\Run, bMaxUserPortWindows Service help HKLM, SYSTEM\CurrentControlSet\Services\Tcpip\Parameters, MaxUserPort5. Hapus file virus berikut:C:\vshost.exe [all drive]C:\autorun.inf [all drive]C:\RECYCLER\S-1-5-21-9949614401-9544371273-983011715-7040\winservices.exeC:\Documents and Settings\%user%\Local Settings\TempA415.tmp [acak]034.exe [acak]Lady_Eats_Her_Shit--www.youtube.comC:\WINDOWS\system32\sysmgr.exeC:\WINDOWS\TEMP\5755.tmpC:\windows\system32\crypts.dllC:\windows\system32\msvcrt2.dll

6. For optimal cleaning and prevent re-infection, please use the antivirus can detect and eradicate this virus up to date. You can also download tools in Norman Malware Cleaner
http://download.norman.no/public/Norman_Malware_Cleaner.exe

Hopefully Success. @abrar2009



| 0 comments ]

Not all antivirus programs can clean up files that have been infected with the virus W32/Sality.AE. Even possible, it will be broken after the scan and cleaned by antivirus that is not appropriate. Sality virus will spread quickly through a network share using the default Windows folder or share, which has full access to the way the infection files have the extension exe / com / scr.Therefore, the security company Vaksincom suggest that computer users to turn off the Default Share (C$, D$.. ff), and avoid full folder sharing on your network. Next, 9 short way to clean the virus W32/Sality.AE received from analysts detikINET virus Vaksincom.

1. Disconnect the computer that will be cleared from the network and the Internet.

2. Turn off System Restore during the cleaning process takes place.

3. Turn off Autorun and Default Share. Please download the file and run the following ways: right-click install repair.inf ago.
http://www.4shared.com/file/82762498/f5dc1edd/repair.html?dirPwdVerified=feea1d94

4. Turn off the application programs active in memory, so that the cleaning process faster, especially programs that are in the startup list.

5. We recommend using a scan removal tools, with the first extension of the removal tools with an extension other [for example: CMD], so that does not diinfeksi back by W32/Sality.AE.

6. Computers that are infected that booting W32/Sality.AE safe mode, please restore the registry has been modified by the virus.
Please download the following files and then run on the OS that is infected W32/Sality.AE.
http://www.4shared.com/file/82761423/934fb170/_2__Sality.htmldirPwdVerified=feea1d94

7. Fix registry is modified by another virus, please download the following tools and run the file in the following manner: right-click install repair.inf ago
http://www.4shared.com/file/82874724/f485f1dd/repair.html?dirPwdVerified=3b1f2fa9

8. Restart the computer and re-scanned using the removal tools to ensure your computer has been clean from viruses.

9. For optimal cleaning and prevent re-infection should install and scan with the antivirus can detect Sality well.

Hopefully helpful. colected @abrar2009

| 0 comments ]

PIF Virus / Starter or a virus known as the shortcut to make the victim of sorts with lots of shortcuts made by the virus. The difficulty, how to handle the virus if it is not right then it will come back, again and again.
Therefore, follow the right way 7 of the virus analyst Vaksincom MG Lat shortcut to stop the flooding caused by this virus:

1. Previous first turn off system restore process.
2. Turn off the process of Wscript file located in C: \ Windows \ System32, by using tools such as CProcess, HijackThis or can also use the Task Manager of Windows.

3. Once off the process of Wscript, we need to remove or change the name of (rename) from the file, while not to be used by the virus.
As a note, if we change the file name of the file Wscript.exe with automatic, it will be copied again in the folder. Therefore, we must find where the file Wscript.exe the other, usually in C:\Windows\$ NtServicePackUninstall $, C:\ Windows\ServicePackFiles\i386.
No virus-like virus vbs other, we can change the "Open With" from the vbs file into Notepad, Extension virus is "mdb", which means that the Microsoft Access file. So Wscript will run the file DATABASE.MDB as though he is a vbs file.

4. Delete the files in the parent C:\Documents and Settings\\My Documents\database.mdb, so that every time the computer will not run load the file. And do not forget we are also open msconfig, disable the run command.

5. Now we will delete the files Autorun.INF. Microsoft.INF and Thumb.db. How, click the START button, type CMD, moved to the drive to be cleaned, for example, drive C:\, then we should do is:

Type C:\del Microsoft.inf /s, this command will delete all files in all microsoft.inf folder on drive C:. While the move would drive live just replaced the name drivenya example: D:\del Microsoft.inf /s.
For the autorun.inf file, type C:\autorun.inf del /s /ah /f, the command will delete the file autorun.inf (syntax /ah /f) is used because the file using the attrib RSHA, as well as to file Thumb.db also do the same.

6. For a delete files earlier than 4, we must find ways to search files with the extension .lnk size 1kb. In the 'More advanced options' option make sure that' Search system folders' and 'Search hidden files and folders' both are checked.
Please be careful, not all the shortcut files /LNK file size of 1 kb that is a virus, we can distinguish them from icons, size and type. To create a shortcut icon for the virus using icon 'folder', and the size of 1 kb type 'shortcut'. While the correct folder should not have 'size' and the type is' File Folder'.

7. Fix the registry is modified by the virus. To speed up the process of repair registry copy the script below on the program 'notepad' and save it with the name 'Repair.inf'. Run the file in the following manner:
Click right repair.inf and Click Install.

[Version]Signature="$Chicago$"Provider=Vaksincom Oyee[DefaultInstall]AddReg=UnhookRegKeyDelReg=del[UnhookRegKey]HKLM, Software\CLASSES\batfile\shell\open\command,,,"""%1"" %*"HKLM, Software\CLASSES\comfile\shell\open\command,,,"""%1"" %*"HKLM, Software\CLASSES\exefile\shell\open\command,,,"""%1"" %*"HKLM, Software\CLASSES\piffile\shell\open\command,,,"""%1"" %*"HKLM, Software\CLASSES\regfile\shell\open\command,,,"regedit.exe "%1""HKLM, Software\CLASSES\scrfile\shell\open\command,,,"""%1"" %*"HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon, Shell,0, "Explorer.exe"HKLM, SYSTEM\ControlSet001\Control\SafeBoot, AlternateShell,0, "cmd.exe"HKLM, SYSTEM\ControlSet002\Control\SafeBoot, AlternateShell,0, "cmd.exe"[del]HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Run, WinupdateHKCU,SOFTWARE\Microsoft\Windows\CurrentVersion\Run, explorer.

Colected @abrar2009

| 1 comments ]

How often do you let other people change your mood?

Do you let the driver bemo frivolous, servant of coarse, bunch of emotions, or work colleagues who do have a certain --- the heart? Except what your robot is, perhaps without realizing you often reply to curse / rebuke them.

"However, typical of the success is how quickly he can return her focus on what is important."

Six years ago, I learned this lesson.
I learned on the back of the taxi from New York. This happens. I jump into a taxi, and we depart from Grand Central Station. We drive on the right path, But all of a sudden, a black car jumped out of the parking space right in front of us. My taxi driver directly menghentak brakes to stop suddenly, slipped a little bit and almost hit / hit by another car (live only a few inch). Ukhh ...

Driving the other car (before the accident that almost caused big) head out from the car and started shouting abusive words at us. My taxi driver just smiled and wave (with a slowly) to the line. I think, supirku this people-friendly. So, I said, "Why did you do that? The earlier damage almost mobilmu and woe, and we almost enter hospital because of him!" And this is a taxi driver told me (see below) --- which I then used as the "Law of The Garbage Truck." ( "Trucks Waste Law")

Many people like garbage trucks. They run with full garbage, full of frustrating, full of anger, and full of disappointment. And when the trash-heap garbage they start, they need a place to remove them. And if you let them, they will dump garbage in-garbage to you. If someone want to throw garbage on you, not captured the hearts (not stored in the liver). You only need to smile, wave, and hope they recover quickly (improved), and you continue your work. Your heart will be happy to do so after.

So as this: "The Law of Garbage Truck" ( "Trash Trucks Law"). I started thinking, how often I leave the "Trash Trucks" affect me? And how often I take their garbage and spread it to other people in the workplace / house / street? I also promised, "I will not do it again." I began to see the "garbage truck".

As in the movie "The Sixth Sense," page a small child said, "I see Dead People." Well, now "I see Garbage Trucks." I see they are carrying the burden. I see them come to menumpahkannya. Taxi drivers and the like before, I will not enter to the heart (I do not make it a personal thing), I will just smile, wave, hoping they can recover quickly (improved), and I still continue working.

One of the favorite football players (Walter Payton) to do this every day on the football field. He will jump up as soon as he was urged to go after the land / tackled. He never remain silent in the land to be stricken by the others. Payton was ready to do their best for the next action.

A good leader - know they must be ready for the next meeting .. .
All parents know that they should welcome the children (who will return home schools) with a hug and kiss. Leaders and parents know that they must actually be present, and at the best for the people they care about.

People who work, never leave the "Trash Trucks" took over them. What about you? What will happen in your life, starting today, if you let more Garbage Trucks "through you?

It is alleged that you will be happy. Life is too short to wake up in the morning with regrets, so .. Love people who treat you well. And forget about the things people who do not behave well to you. ( @Ros) @abrar2009

| 0 comments ]

As business owners and/or marketers, we're all under pressure to cut costs. Unfortunately, many business owners get so intent on reducing costs, they lose sight of what it's going to do to the business. It's hard to grow - or even survive - if you don't have any customers.
Reducing marketing costs without screwing up your ability to grow is easier than you might think.
Here are five ways to do that.

1. Eliminate waste
Over the years I've looked at hundreds of marketing programs, and I can tell you honestly that nearly all of them have some kind of hole that either drains money directly or allows leads to be lost.
Before you cut anything, take a good hard look at what you're doing. Are there programs that aren't delivering the results you anticipated? Fix them or get rid of them. Is there anything that can't be traced to increasing sales opportunities? Unless you have a pile of extra money, now is not the time to be spending money on marketing efforts that don't generate more leads or develop the ones you have.


2. Make fewer mistakes
Another way to say this is: turn to people who know what they're doing.
Marketing - which has never been exactly simple - has changed a lot in the past few years. Customers and prospects are in charge now, and they're looking for you online. If you're not on the internet, you're not in the game.
While I admire business owners who try to figure marketing out for themselves, it wastes a lot of time and it leads to mistakes that could be avoided with some experience.
You may not need a proven marketing pro on staff, but if you don't have one somewhere on your team you're probably wasting money.


3. Nurture what you've got
Successful lead generation programs bring in people in different stages of the buying process. Some are ready to commit more to you than others are. Some are ready to talk to a sales person and some aren't.
Think of any lead generation activity you've ever done: search marketing, email, advertising, telemarketing, networking, trade shows - it doesn't matter. Were all of the people who responded ready to schedule a two-hour demo of your product? Of course not.
But that doesn't make those people any less likely to buy from you in the future as long as you maintain a relationship with them.
If you're one of those businesses that has a bunch of inactive prospects sitting in a database (or on your desk), you may be better off nurturing those people than paying to find new ones. And nurturing leads can be a lot less expensive than generating them in the first place.


4. Increase conversions - not just inbound leads or traffic
This point is similar to the one above it, but it's important enough to look at from a different angle.
Let's say you have 2000 visitors a month going to your website and 60% of them leave your homepage without going anywhere else. Which do you think would be cheaper, changing your website so that an additional 20% (400 visitors) stay on your site or doubling traffic to the site? The results are the same.
(Hint: if you picked the first option, you're right).
Complex purchases - such as technology, high ticket goods, and on-going services - are made up of many different conversion points where the buyer decides whether or not to spend any more time with you. Each of those conversion points can be tweaked to pass more prospects through and provide a better return on your investment.


5. Consider outsourcing
To have a successful marketing program today requires skills in multiple disciplines - some of which didn't even exist a decade or so ago. For example, you need:
Website strategy and development, search engine optimization, paid search marketing, prospect conversion optimization, lead nurturing and web marketing - just to name a few.
Staffing an in-house team with all of this expertise would cost more than most small to mid-sized businesses are willing or able to invest. Yet you can easily - and cost effectively - get this expertise from an outside firm or group of individuals.



It's worth looking into. @abrar2009


| 0 comments ]

Determining of reservoir characteristics is parameter that needed in reservoir description. One of method to know reservoir characterisctics is Pressure Transient Analysis that is called Pressure Build-up Test. This method is based on superposition principle where need a simplified production rate and production time. Parameter of characteristics on Pressure Transient Analysis can be observed from horner plot, semi-log plot, derivative pressure and type curve matching. It is supported by geological, petrophysics, laboratorium and logging data. Parameters that can be known from Pressure Build-up test are permeability reservoir, skin, wellbore storage, reservoir aspect (model), boundary, average pressure (finite acting). To get the best result which representate reservoir condition,so it's proven by making hipotetic reservoir model as bounded (closed) reservoir.

Result of this analysis well testing shows that when pressure build-up test is tested without produce in constant rate before the test, so recomanded production rate which is most appropriate with reservoir condition is values of last rate production (qlast). Using (qlast) on production time equivalent can be applied because it produces same values. However, if We use all modified (multiple) rate, results will produce the values that is not appropriate with reservoir condition. If we test by producing on constant rate before the test, so recomanded production time is from the beginning of production not only from time of last constant rate. If we test by closing the well and produce on constant rate before the test, so recomanded production time is only since time of constant rate condition, not from the beginning of production. Wrong using of production rate and production time will produce different interpretation. more detail..
colected @abrar2009

| 0 comments ]

What this name animals besides..?

Hehehe.. he is the history of the world for offshore oil & gas industry in Indonesian, Why? Concrete Barge, and the first LPG lifting conducted at the offshore is He "Ardjuna Sakti" which was born in 1975.

She's moored at the ONWJ (Offshore North West Java) SBM-5 Ardjuna Terminal.



But now somehow fate, because age is eaten accidentally go. if you want to know more can visit the Concrete Technology Corporation. Created by @abrar2009
Use link:
#
Large Floating Concrete LNG/LPG Offshore Platforms
#
Single Bouy Mooring
#
FPSO Brochure 0507
#
SBM-Imodco

| 0 comments ]


Ok do not worry .. If you have data in the format, or accidentally supplied preformatted, it can restore the software using the "get data back". Insyallah, your data will be back on God's permission ..:) if I want to download its software Click Here....... if you can not run the software you can send or fill out comment sheets.
Good luck.

| 0 comments ]


Definition of Web Proxy
Anonymous free web proxy can be used to access the website in the block, or in the filter and can also be used to improve security in your website. Web proxy can be used directly without the need to install any software on your computer, needed by the web proxy is just a browser and Internet connection. You can access the site easily on the block.

What can be done by the Web Proxy?
Web proxy can hide your ip address. Web Proxy can use to access the website in the block by the ISP or organization. Web proxy can improve the security of your privacy. Web Proxy able to filter cookies that do not want and all the cookies stored on encrypt. Web Proxy can be used easily without the need to set up or install any program on your computer, you need only a browser (Firefox, Internet Explorer, Opera, etc.).

| 1 comments ]

Linux Mikrotik artificial "Latvian State" is also support for proxy web server with a few to a few configuration items scription or by using the "Winbox tools." Especially if you use a PC as a Server, Memory is supported with adequate RAM and hard drive capacity is enough, it can save web cache memory that is big enough. This is sufficient to efficient usage bendwidth the Internet to reach 20 - 60%.

Mikrotik PC experience from the server that I have, with 512 Mb RAM memory and 20 GB hard drive, is able to reduce the internet bandwidth to achieve> 30% every day. This is quite beneficial and alleviate trafic internet on our local network. How Web Proxy calculation formula has been discussed in previous posts. As for how to set up as active for Mikrotik Web Proxy Server is as follows:

[admin@Mik] > /ip proxy set enabled=yes
[admin@Mik] > /ip web-proxy set cache-administrator= oracle.net
[admin@Mik] > /ip web-proxy print
enabled: yes
src-address: 0.0.0.0
port: terserah.. kamu cth (3128)
hostname: "proxy"
transparent-proxy: yes
parent-proxy: 0.0.0.0:0
cache-administrator: "email@proxy"
max-object-size: 8192 KiB
cache-drive: system
max-cache-size:unlimited
max-ram-cache-size: unlimited
status: running
reserved-for-cache: 4733952KiB
reserved-for-ram-cache: 2048KiB

Made rule for transparent proxy at firewall NAT, is precisely the rule NAT masquerading:


[admin@Mik] > /ip firewall nat add chain=dstnat in-interface=local src-address=192.168.0.0/24 protocol=tcp dst-port=80 action=redirect to-ports=erserah.. kamu cth (3128)
[admin@Mik] > /ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic0 chain=srcnat out-interface=public action=masquerade1 chain=dstnat in-interface=local src-address=192.168.1.0/24 protocol=tcp dst-port=80 action=redirect to-ports=3128

Finaly, Do not forget to go to Mikrotik's winbox go to ip--> web proxy .. so Click "box" transparent status.
Be nice work.. @abrar2009
use link:
* Mikrotik Latvia
* Mikrotik Id
* Wiki Mikrotik

| 45 comments ]

First, the proxy settings in the first Mikrotik his post as before, (see previous article on how to configure a transparent proxy) after successfully add the script below:

/ip web-proxy access add url=”http*youtube*get_video*” action=allow comment=”youtube” disabled=no

semoga berhasil

Please Read the link
* Last Posting Web Proxy Configure
* Mikrotik Forum
* Video Cache Server
* Mikrotik Id

| 0 comments ]

There are a few tips that we can do to maximize the capacity of RAM on the Operating System. Here is one of the steps:

Switch mode 'PAE', in Windows XP:
1. Right-click on the 'My Computer' and select "Properties".
2. Go to the Advanced tab and under the tab Startup and Recovery, Settings and click on "Edit".
3. This will open a notepad containing the boot.ini file. Any posts under the "[operating systems]" is written line: multi (0) disk (0) rdisk (0) partition (2) WINDOWS = "Microsoft Windows XP" / noexecute = OptIn / fastdetect try to change to: multi (0) disk ( 0) rdisk (0) partition (1) WINDOWS = "Microsoft Windows XP" / noexecute = OptIn / PAE4.

Save the file and exit earlier.

Activate PAE mode, in Windows Vista:
1. Press the Windows key + R, type cmd and then press and hold enter.
2. Press Ctrl + Shift + Enter to execute the prompt as administrator.
3. Enter command Bcdedit / Set and press forceenable SAP enter.A

Nice work.

| 0 comments ]

MS outlook is a software you used to set the messages you enter through email via POP3 and SMTP protocols. Therefore, before you make configuration in MS outlook, you had to first-setting your email account. Enable POP forwarding in the settings menu do you have email, and save the settings.

The next step you setting new MS outlook on a computer. following steps settings:

1. Run the application MS outlook. ago Click tools - options.
2. In the dialog box email accounts, click add a new email account, click next.
3. Select the type of server is the POP3, and click next.
4. Fill in your name field with your name, email address with your email address, incoming mail server (POP3) and outgoing mail server filled with
=> email for my indonesian filled mail.yahoo.co.id
=> yahoo email for international filled: mail.yahoo.com
=> for gmail filled: gmail.com ago for a username and password fill in your username and password you normally use for you to login to your account.

5. Make sure the settings for you if you do right or not, please click the test account settings. if successful, Click next.
6. Email setting process is complete, click finish.
7. You can send or receive email via MS outlook on the computer.

Be safe working..

| 0 comments ]

Did you know that Windows is using our 20% Bandwidth?
Yes indeed correct, windows that actually steal 20 percent of our internet access, why?

Because the windows OS that is always wanted, such as Up To Date Service Pack SP3 and, in consequence of that he deliberately automatic update in the background tasking us, so to take back our bandwidth and faster connection to do the following:

1. Click start, run trus type "gpedit.msc" (Do not use quotes).
2. In the computer configuration - administrative templates - click Network.
3. Click Qos packet scheduler - Double Click on Limit Reservable Bandwidth.
4. Click Enabled reservable bandwidth and change the setting to 0 (zero)% out that Click Apply and click OK.

Restart your Computer. But all of that also depends on the speed of your connection. Tips can speed connection if you use the OS Windows XP and Vista.

| 2 comments ]

Have tried Windows 7? Kuasai steps pro-fast computer with Windows 7, so that the performance of the operating system that is still testing it can be more steady.

1. MP3 song in order to remain intact, Windows 7 has a weakness in Windows Player 12 because it has a bad bug. This bug will automatically add the missing metadata, including album art. The problem this can cause the file is not intact anymore. To fix, install updatenya from the Microsoft site.

2. Right click the The Sakti, Right-click on the blank to set the desktop resolution screen, so no need to display the settings first. Right-click on the Explorer icon in the taskbar, to access the public folder system that is used as Documents, Pictures, and other more quickly. If do not want to use Internet Explorer and want to move from taksbar, just right-click on the IE icon, select "Unpin this program from the taskbar", then install another browser.

3. The keyboard shortcut Alt + P: To show or hide the display window Explorer.
Windows Logo + G: Showing the gadget in front of other windows-windows.
Windows Logo + + (plus key): Zoom in.
Windows Logo + - (minus key): Zoom out.
Windows Logo + Up: increase the size of window.
Windows Logo + Down: the window size.
Windows Logo + Left: Moving toward the left side of the screen.
Windows Logo + Right: Moving towards the right side of the screen.
Windows Logo + Home: Meminimize / restore window but that is being displayed.

4. Set the UAC (User Account Control) irritated with the number of 'warning' (alert) as in Windows Vista? Arrange the following steps: Start -> Control Panel -> Change User Account Control Settings.

5. Writing Cakram Digital Windows 7, finally provides a service for 'burning' ISO file directly to CD or DVD form. For the sake of convenience, live double click on the file, select the drive with a blank disc and click Burn.

6. More quickly access the video, right click on the Start menu, then go to Properties -> Start Menu -> Customize, and set the video options on the "Display as a link." Can now access the folder with the short video.

7. An account for Flickr in Flickr? To accelerate the opening, visit the site I Started Something, Connector and download it, and select Open. With this, "Flickr Search 'will be added in the Searches folder, can also find photos on the desktop. Easy huh?

Sumber : detikinet

| 0 comments ]

=> turn off the "autoplay", to actively prevent autorun.inf.

=> I Install antivirus on your computer to check, for example, Kaspersky, and update you as often as possible.

=> Use Deepfreezer, to protect the Directory "C:". so that each installation will not be mean, because when the computer restart, configuration Deepfreezer will restore the "C" to the original, so that every installation you do need a permit password Deepfreezer.

=> When you first use a computer or light Flashdisk, to open / execute the folder / file do not double-clicking (click 2x), but right click and select "open". because the virus often change this option, a "Test" command or the other, sometimes I make a folder open in a new window and flooded the window when you click on many folders.

This one sign of the virus and the file autorun.inf.

@abrar2009

| 0 comments ]

You are bored waiting for the process of booting? When you first install it already feels old. Moreover, if a lot of software already installed. There are ways to speed up booting Windows XP, including:


Open notepad and type "del c: windowsprefetchntosboot-*.* / q" and save the name ntosboot.bat.



Press winkey + R, then type gpedit.msc. and Open Computer Configuration> Windows Settings> Scripts.




Then, double-click Shutdown. In the Shutdown Properties window, click Add> Browse, then enter the file "ntosboot.bat" and click Open. Click OK.



Press and winkey + R, then type devmgmt.msc.Klik two IDE ATA / atapi controllers.


Klik dua kali Primary IDE Chanel untuk membuka Properties.

Click the Advanced Settings tab. On the device 0 or device 1, a change Device Type None. Click OK.

Double-click Secondary IDE Chanel to open Properties. Perform the same steps as before.

Hopefully useful.

| 0 comments ]

BP to sell W. Java upstream assetThursday, February 19, 2009 - 09:24PM GMT+7Anglo-American energy giant BP Plc plans to sell its entire interest in Offshore North West Java (ONWJ) PSC in West Java.Nico Kanter, BP Indonesia Head of Country told Petromindo.
Com that BP planned to conclude the divestment by year-end.“BP plans to sell BP West Java Limited, an entity that holds 46 percent interest in ONWJ to another entity that would be able to develop the block more efficiently,” Kanter said.Thus far, BP has yet identified definitive buyer for the asset, he said.
But industry sources said that Chinese oil firm CNOOC Ltd, which is the second biggest stake holder in the block with 36.7 percent interest might be the strong contender for the block.ONWJ is one of Indonesia's largest offshore oil and gas operators - supplying energy for the domestic market on the island of Java and beyond.


The ONWJ concession stretches from Cirebon in the east to the Seribu Islands in the west. The ONWJ facilities include 670 production wells, 170 platforms, over 40 processing and service facilities, along with approximately 1,600 km of sub-sea pipelines.According to data from Ministry of Energy and Mineral Resources, the block produced 270MMCFD of gas in 2008 and more than 20,000 BOPD of oil.
The block supplies gas to state gas distribution firm PGN, state electricity firm PLN and state fertilizer firm Pupuk Kujang.The sale would not affect BP’s other interest in Indonesia such as Tangguh LNG project, East Kalimantan gas producer VICO Indonesia, lubricant business Castrol and petrochemical assets, Kanter said. (godang)

| 0 comments ]

I folowed and used DD-WRT Firmware ver. 23 sp1 development since 2007 till right know has published the latest firmware version 24 sp1, I used it for my Access Point Linksys type WRT54GL as supplying internet benwitdh gateway to our user around my home. But so I has been using this unit WRT54GL just for Access point only, the routing of data to used The Board of Linux Mikrotik.

So anyway I just want to say this DD-WRT Firmware is realy easy to used and sure also open source development. Thanks for all of spesialist of DDWRT people to given contribution to developing this open source firmware.

At this time I shared to you all how to optimizing the latest firmware ver 24 sp2 for your Linksys WRT54GL, and expected can give to add known how to used it like tutorial below :

1. The Open Source WRT54G Story
2. DD-WRT Tutorial 1: Static DHCP
3. DD-WRT Tutorial 2: Extend Range with WDS
4. DD-WRT Tutorial 3: Building a Wireless Bridge
5. DD-WRT Tutorial 4: Defining Priorities with QoS
6. DD-WRT Tutorial 5: Wireless Repeater

Tips prior reading:
be prepare to make up coffee cup and take cigarate prior reading. Thanks @abrar2009

| 0 comments ]

The story of the Linksys Wireless-G Router (model WRT54G) and how you can turn a $60 router into a $600 router is a little bit CSI and a little bit Freaks & Geeks. It’s also the story of how the open source movement can produce a win-win scenario for both consumers and commercial vendors. What’s especially exciting is that tricking out this router doesn’t require any eBay sleuthing or other hunt for some off-the-wall piece of hardware. Instead, grab it off-the-shelf. The WRT54G is stacked high in every Best Buy and Circuit City across the country and, of course, most online retailers — Amazon.com sells it for $55. It’s ubiquitous and, some would say, a diamond in the rough.
Or a wolf in sheep’s clothing.While routers used to be the domain of networking specialists, they’ve gone mainstream along with residential broadband. Commodity routers can be had for as little as – well, "free after rebate” in some cases, and often not much more. To keep them cheap, consumer-grade vendors like Linksys repackage designs from OEM vendors rather than design the hardware and software in-house.The tradeoff for these sub-$100 routers can be reliability, particularly in the coding of the firmware – the software “brain” that controls the router’s functions.
Consumer-grade firmware may be buggy, and may be limited in functionality compared to commercial-grade routers designed for business such as those made by Cisco and SonicWall. The WRT54G was released in 2003 in anticipation of the 802.11g standard, with its theoretical maximum bandwidth of 54Mbps compared to 802.11b’s 11Mbps. In many respects the WRT54G is a typical wireless router – it accepts an incoming broadband link such as cable or DSL and shares it between its built-in four-port Ethernet switch and antennae for broadcasting the signal to wireless clients.In June 2003 some folks on the Linux Kernel Mailing List sniffed around the WRT54G and found that its firmware was based on Linux components. Because Linux is released under the GNU General Public License, or GPL, the terms of the license obliged Linksys to make available the source code to the WRT54G firmware.

As most router firmware is proprietary code, vendors have no such obligation. It remains unclear whether Linksys was aware of the WRT54G’s Linux lineage, and its associated source requirements, at the time they released the router. But ultimately, under outside pressure to deliver on their legal obligation under the GPL, Linksys open sourced the WRT54G firmware in July 2003. With the code in hand, developers learned exactly how to talk to the hardware inside and how to code any features the hardware could support. It has spawning a handful of open source firmware projects for the WRT54G that extend its capabilities, and reliability, far beyond what is expected from a cheap consumer-grade router. Feature-Packed FirmwaresSo the Linksys WRT54G can be loaded with replacement firmware with exciting new features. Which raises the question – like what?Of course, you can expect most replacement firmware to support the same basic functions Linksys provides out of the box for this wireless router. Often these features will be more stable, in cases where Linksys’ bugs have been fixed by other developers. But that’s not what makes open source firmware so exciting.
The real deal is what the WRT54G can do, with the right replacement firmware, that you’d only expect to find on a commercial-grade router costing several times as much.You could use the WRT54G as a repeater or a bridge. Create a wireless distribution system (WDS) or a mesh network. Run a VPN server. Or a VoIP server. Or a managed hotspot with a RADIUS server. Manage bandwidth use per protocol. Control traffic shaping. Support IPv6. Boost antenna power. Remotely access router logs. Operate the router as a miniature low-power PC, running a variety of Linux applications. That’s just the short list. Some firmware offerings support a wide range of these features while others are more tailored to specific router applications. Some sport friendlier configuration interfaces while some are command-line driven. And because these firmware files descend from Linksys’ open-source progenitor, they are freely available. The important caveat, of course, is that Linksys will not support alternative firmware, only their own official version. Should you run into a problem with replacement firmware, or wind up disabling your router (which is rare but possible – stay tuned), you’ll be on your own.
If you already own a WRT54G and it performs just the way you need it to, mucking around with replacement firmware might just break something that didn’t need fixing.On the other hand, if adding enterprise features to a $60 router sounds worth the minimal risk, you don’t need any special hacker skills to get there. If you’ve already setup an off-the-shelf router before, replacing the WRT54G’s stock firmware with a feature-laden substitute is well within reach. Choose Your FirmwareBesides Linksys’ own official firmware, there are more than a dozen varieties of firmware replacements available for the WRT54G. The most popular are named Alchemy and Talisman, released by a company called Sveasoft, and another named DD-WRT, by a guy named BrainSlayer. Sveasoft was one of the first developers of a WRT54G firmware based on Linksys’ open source version. Many branches in the firmware family tree, including DD-WRT, are themselves based on Sveasoft’s early modification. Buffeted by the success and enthusiasm generated by their firmware offerings, Sveasoft chose to build a business model around their subsequent releases. Because of the GPL roots of the original Linksys firmware, Sveasoft cannot prevent distribution of their own modifications. As a workaround, they’ve chosen to implement a membership fee of $20 per year to access the Sveasoft “community,” wherein support and new releases are made available. Some in the open source community object to the “wall” Sveasoft has built around its free firmware, and take it upon themselves to release Sveasoft’s work into the public.Infighting aside, Sveasoft’s older Alchemy and newer Talisman firmware are popular and widely available.
BrainSlayer’s DD-WRT is free of the Sveasoft culture war, and is itself an extremely powerful and actively maintained firmware.Numerous other, often more specialized, firmware is also available for the WRT54G. Service provider Earthlink has released its own firmware which supports the future-proof IPv6 protocol (along with IPv4 backward compatibility). Sputnik, a vendor for large scale WiFi business networks, has even released firmware so WRT54G can be used in managing Sputnik-based hotspot deployments. Other online sources for firmware include LinksysInfo and WRT54G.net. But for most of us, the Sveasoft and DD-WRT firmwares are the most feature-rich and easiest to install and configure.In the two years since Linksys originally released the WRT54G firmware, whether by design or not, this affordable, common router has become not just a playground for hobbyists, but an open platform for commercial business as well.
Flash Your FirmwareOver the years Linksys has released several hardware revisions of the WRT54G, from 1.0 to 5.0 and several point releases in between. What version WRT54G router you have can be determined from its serial number as per charts widely available on the firmware community sites. The serial number is printed on the outside of the box.The reason this matters is because some versions of firmware work only with some versions of WRT54G. While the newest firmware releases for the major distributions such as Talisman and DD-WRT are compatible with most WRT54G revision, it is important to double check the particular release notes for a firmware version against the WRT54G version. A mismatch, although unlikely, is one way the router could be “bricked” – rendered unusable.With all that said and done, let’s imagine you’ve decided to try the latest version of DD-WRT – currently v23, which supports all current versions of the WRT54G, and its speed-enhanced sibling, the WRT54GS.
At the DD-WRT web site you’ll find three variations of the firmware: mini, standard, and VOIP. The DD-WRT wiki describes what is and is not included with each; suffice it to say, the standard variety is the most popular choice.WRT54G firmware come a file with the extension .bin. Regardless of which firmware you choose, be it a Sveasoft release, DD-WRT, or any other, ultimately you are going to have in your possession a .bin file which needs to be uploaded in to the router.
Flashing the new firmware is a painless process. If you’ve ever managed your router before, you know that it is configured through a Web browser open to the router’s LAN address – by default, this is 192.168.1.1 unless you’ve changed it. Linksys routers are protected by a login whose default is a blank username with the password admin.It takes only a few minutes to flash the router with a new firmware, but you must note these key steps.Connect your PC with the . bin file to the router via Ethernet cable. Do not try to flash the firmware through a wireless link, which could be unstable and lead to a brick.Reset your router’s current firmware to factory defaults. You can do this through the current firmware’s configuration pages – Administration/Factory Defaults/Yes/Save Settings. As an alternative, you can physically reset the factory defaults by pressing and holding the reset button on the back of the router for 30 seconds.Now you can flash the new firmware. Connect to the router’s configuration pages with your browser, and navigate to Administration/Firmware Upgrade.
Open the browse dialog to select your .bin firmware file.Once you start the firmware upgrade – do nothing! Whistle. Whittle. Have a pint1. Just don’t touch your computer or the router. Leave them alone for this intimate moment. Hacker interruptus will only produce a new baby brick.After a minute or so you’ll see the upgrade progress bar complete. The router will now reset itself, and assuming everything worked, you’ll see a new page with a button marked Continue.Wait at least two more minutes before clicking the Continue button. Sometimes the router presents the continue screen before it has truly cleaned up from its upgrade, and you’re better safe than sorry. Drink another pint2.Now click Continue.
You should be forwarded to the main configuration page for your router. In the case of DD-WRT, it looks much like Linksys’ own page, except with DD-WRT markings and a whole lot more features to explore.What if you didn’t make it this far? What if something terrible has happened, and the router did not come back to life? This is a rare but possible event. It is very unlikely if you’ve followed steps one through six. Your router may be bricked, which is somewhat like being dead, except with the possibility of resurrection.First, try to reset the router to factory defaults by pressing and holding the reset button on its rear for 30 seconds. When and if it relights, try to connect to it with your browser. You may be lucky and have a chance to start the process over again. There are several more tricks you can try to revive a bricked router, also known as recovering from a bad flash. In this case, you want to consult the WRT54G Revival Guide.
1 Something non-alcoholic, of course.
2 Try a refreshing mixture of Orangina and a twist of lime.
Now What?Your router has a new brain. From here you’ll want to explore the configuration pages and follow any guides or documentation available for the firmware you’ve installed. Unless you already know exactly which configuration pages you want to change, your best bet is to first identify your goals with the router. Do you want to use it to setup a WDS? Or configure it as a wireless client to connect a remote wired LAN to a remote wireless AP? There are myriad possible goals. Explore the user community for your firmware where there may already be detailed guides for configuring the router for the functionality you want, or experienced voices to help you troubleshoot. @abrar2009

| 0 comments ]

By now, you probably know that upgrading the near-legendary Linksys WRT54G series routers with free, often open-source firmware is one of the best bargains going. Replacement firmware typically offers a plethora of advanced router and firewall features rarely found on sub-$100 hardware.
DD-WRT, a free, open-source firmware coded and distributed by “BrainSlayer,” has emerged as one of the leading, most powerful and also user-friendly firmware replacements for the WRT54G series. DD-WRT is available for an increasingly wide range of routers besides the WRT54G, including models by Asus, Belkin, Buffalo Devices, Motorola and Siemens.
There are caveats to upgrading your router, and the
process is not without risk, so beware. We'll assume you've got DD-WRT successfully installed, and forge ahead...
In this first detailed look at new features you can get from open source router firmware, prepare to be dazzled by the capabilities of... the Dynamic Host Configuration Protocol (DHCP) (
define).

Static DHCP
Out of the box, most routers and PCs are designed to manage their IP addresses automatically. The PC, whether wired or wireless, requests an IP address and related network parameters from the router using the DHCP protocol. The router plucks an unused address from its pool of available addresses, hands it to the client, and everyone is smiling.

This process results in what is called a “dynamic IP address” – every time the PC connects to the router (on boot-up, for example, or wireless association), it is assigned a new IP address. The router may assign the same address it assigned in the previous session. Or it may not. You don’t know and, usually, you don’t care.
There are cases, though, when you want your client to receive a predictable, consistent IP address. The most common scenario is when you run a server on your client PC. Suppose you run a Web site on a PC at home, and you need access to this server from elsewhere – work, school, your laptop in the park. Your router “hides” your server from the outside world, which is normally a good thing for security. This is why a higher power invented
Port Forwarding (define).
Your router will allow you to forward traffic destined for a specified port to a specific machine. In its simplest form, you can configure your router to forward incoming traffic destined for port 80 – the default port number for Web traffic – to the IP address of the PC running your Web server.
What is your Web server PC’s IP address? If it receives its address automatically from the router – you don’t know for sure. It could change, and your port forwarding would become unreliable.
One solution is to manually assign your Web server its IP address and network parameters, rather than use DHCP. However, this may limit your ability to easily connect that machine to other networks — a more likely problem for laptops. If your ISP changes name servers on occasion, this could also break your manual network configuration.
Ideally, if you continue using DHCP on your client yet can rely on always receiving the same IP address, you’re having your cake and eating it, too. Which begs the question – why would you have a cake if you weren’t going to eat it? Isn’t that the purpose of cake?

Step-By-Step
Fortunately, DD-WRT makes it easy to create static DHCP addresses for your network. Combining the best of both worlds, a static DHCP address allows your clients to continue receiving their network parameters automatically, yet you know exactly which IP address will be assigned.
=>Open a browser and connect to your router’s administration page. The default address for DD-WRT is http://192.168.1.1, but may vary if you’ve reconfigured it.
=>Go to the Setup/Basic Settings menu. The router may first ask you to log in with your administrator password. (The default is root/admin). Scroll down the page to “Network Address Server Settings (DHCP).”
=>Make a note of the pool of addresses the router uses when assigning dynamic IPs. Here, we see a pool of 100 addresses, beginning at 192.168.0.100 and ending at 192.168.0.200. It will be important later that your static DHCP address assignments fall outside this pool. (If you make any changes here, be sure to save your settings.)
=>Go to the page Administration/Services. Here’s where the action is. Below the “Static Leases” heading, click the “Add” button to create a new DHCP entry field.
=>Enter three values: the MAC address (
define)of your client machine’s network adapter, a host name for the machine, and the IP address you want it to be assigned. Choose any host name you like, such as “webserver” or “gameserver”. Choose an IP address which follows the same pattern as those in your DHCP address pool (in our example, 192.168.0.x). Choose a number for x which is outside the address pool seen in step 3 (in our example, 201).
You can find the MAC address for your network adapter in either Windows XP or Mac OS X with a few clicks.
Windows XP
Click Start/Settings/Control Panel/Network Connections and click the name of your network connection. Wired connections are typically named “Local Area Connection,” while wireless connections are called “Wireless Connection”. In the Status window, click Support, and in that window, click Details. Your MAC address is the series of hexadecimal pairs labeled “Physical Address”. Use colons rather than dashes to separate the pairs in the DD-WRT interface.
Mac OS X
Go to the Dock/System Preferences/Network. Click the Ethernet tab. Your MAC address is labeled “Ethernet ID”.
=>With your MAC address, host name and chosen IP address entered into DD-WRT, be sure to click Save Settings at the bottom of the page. If you want to add another static DHCP entry, you must save your settings first, then click Add to create a new entry.
=>If you like, add a port forwarding entry for your new static DHCP address. In our example, we set up a Web server on our client PC. Our Web server listens for traffic on the default port 80. But our ISP blocks incoming traffic to port 80, because they don’t want us running Web servers (ours is for private personal use, we totally swear).
Go to Applications & Gaming/Port Forwarding in the DD-WRT menu. Click Add to create a new forwarding entry. We enter an identifier into the “Application” field, in this case, “webserver”. The router will listen for traffic on port 8088, so that we can connect from outside without being blocked by the ISP. Our destination IP address is the static DHCP entry created in step 5, and our destination port is where our Web server is actually listening, port 80. Be sure to check Enable for this definition to take effect. And, of course, Save Settings.
You are now, as they say in the new Taco Bell ads which are vastly inferior to the ones with the talking Chihuahua, “good to go.” Even if you don’t run Web, game or other servers on your local machines, you never know when a stable, predictable IP address will come in handy. @abrar2009