2012-01-26

Cara Jitu Hack Nokia S60v3

Kalian punya Nokia s60v3? Jika memilikinya, pasti sudah tahu betapa jengkelnya setiap mau pasang aplikasi selalu gagal. Sudah keluar biaya pulsa buat unduh filenya, gagal dipasang! Oke, ada triknya jika ingin pasang aplikasi yang tidak ada sertifikatnya alias unsigned biar bisa dipasang ke ponsel yaitu dengan cara hack ponsel Anda! Saya sudah mencoba trik ini di Nokia E63 dan berhasil.

Jalani langkah-langkah di bawah ini dengan teliti, jika tidak teliti akan gagal buat hack ponsel:

1. Anda unduh aplikasi dan file di bawah berurutan dalam format file .zip dan .sisx. Jadi Anda harus meng-ekstrak nya terlebih dahulu file zip nya, dan selalu gunakan aplikasi X-plore untuk langkah-langkahnya.

2. Unduh dulu Norton Symbian Hack disini.

3. Pasang aplikasi Norton nya.

4. Buka aplikasi Norton.

5. Pilih Option, Quarantine list, Restore all, keluar dari Norton.

6. Buka Manager Aplikasi, lalu hapus aplikasi "Symantec Symbian Hack". Setelah berhasil dihapus, keluar dari Manager Aplikasi dan buka X-plore, cari lalu hapus c:\shared\folder.

7. Selanjutnya unduh file Patches nya disini, buka X-plore dan ekstrak folder Patches ke drive C:\ (memori telepon).

8. Unduh aplikasi ROMPatcher nya disini, lalu pasang aplikasi ROMPatcher nya ke drive C:\ (memori telepon).

9. Buka aplikasi ROMPatcher nya, lalu klik Pilihan, pilih "Add to Auto" Open4All RP+, lalu tekan tengah tombol navigasi ponsel supaya berubah menjadi cek list berwarna hijau.
"Matikan dan hidupkan kembali ponsel Anda!"

10. Unduh Install Servers nya disini, lalu buka X-plore, klik file Install Server.zip, pilih Install Servernya sesuai dengan ponsel Anda, selanjutnya ekstrak file installserver.exe yang sesuai dengan ponsel Anda ke C:\sys\bin (gunakan X-plore).

11. Selanjutnya "matikan lalu hidupkan kembali ponsel Anda". Buka X-plore, periksa apakah folder private, sys, yang ada di drive C:\ dan E:\ sudah bisa dibuka isi foldernya? Jika bisa terbuka semua isi di dalam folder tersebut.

Selamat ponsel Anda sekarang telah berstatus hack dan bisa memasang aplikasi sepuasnya tanpa gagal lagi.

Penting:
- Kadang setelah pasang aplikasi Norton, ponsel menjadi hang alias tombol keypad ditekan tapi ponsel tidak meresponnya.
Solusinya??? Cabut lalu pasang lagi baterainya, dan nyalakan ponselnya. Kalau ponsel masih hang, ulangi langkah tadi.
- Untuk file install server pilih salah satu saja yang sesuai dengan ponsel Anda.

1. Installserver91: for E60, E61i, E62, E65, E70, N71, N73, N75, N77, N80, N91, N91, N92 dan lainnya (Symbian 9.1).
2. Installserver92: for E51, E90, N76, N81, N81 8GB, N82, N93, N93i, N95, N95-2, 6290, 5700, 6120, 6110, i520, i550, i400, i450, i560, G810, N78, N96, 6220 dan lainnya (Symbian 9.2, 9.3).
3. Installserver3250: for 3250.
4. Installserver5500: for 5500.
5. Installservere50: for E50.
6. Installservere61: for E61 or 3250 (if first file won't work only).
7. Installserver934: for newest 9.3 and all 9.4.
8. InstallserverS3: for all Symbian^3 (and Symbian Anna, Symbian Belle).

Semoga bermanfaat :D

2012-01-25

IT Essentials Chapter 10


Answers
Questions
Listen to the complaint, apologize for the incident, and then offer to help the customer.
A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this complaint?
1- Check grammar and spelling before sending e-mail
2- Use mixed case in e-mail instead of all upper case or all lower case
Which two actions are examples of good netiquette? (Choose two.) 
Step away from the computer and ask the user to close the document
While servicing a computer, a technician notices that a document labeled "confidential" is open on the computer. What should the technician do? 
resolving computer problems that require opening up the computer
Which task would be the responsibility of a level-two technician?
1- Use simple step-by-step instructions.
2- Speak in plain terms.
Which two techniques should be used when dealing with an inexperienced customer? (Choose two.)
1- Go for a quick walk.
2- Listen to soothing sounds.
3- Practice relaxed breathing.
Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.) 
Ask and wait for permission before placing customers on hold
What is the recommended way to place customers on hold?
A customer wants two new computers added to the existing SLA without additional cost.
Which issue is an example of an exception to an SLA that should be escalated to a manager?
Wait until the customer has finished speaking, and then explain the possible solution
While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed? 
1- your name
2- ticket number
3- customer name
Which three pieces of information should be given to the next technician when transferring a customer? (Choose three.)
speaking directly with the customer
For a computer technician, what is the first step in resolving a customer problem?
Reducing stress helps customers provide more useful information
Which statement is true about the role of stress when troubleshooting customer computer problems? 
It helps technicians learn important details from the customer.
Why is good communication a critical part of successfully troubleshooting customer problems?
1- sending chain letters
2- sending anonymous e-mails
What are two examples of technician interactions with a customer that are considered to be either unethical or illegal? (Choose two.) 
SLA
Where would legal details be found that describe proper handling of information for a specific customer?
to gather pertinent customer information
What is the primary responsibility of a level-one helpdesk technician?
1- The computer case must be opened.
2- The problem cannot be resolved in less than ten minutes.
What are two examples of situations where a helpdesk call should be escalated to a level-two technician? (Choose two.)
1- customer e-mails
2- hard copies of files on the customer desk
A technician works on a customer computer at the customer site after answering a support call. Which two items should the technician regard as being the property of the customer? (Choose two.) 
remote diagnostics utility
Which common feature of helpdesk software allows a technician to control a customer computer from a call center desk? 
Follow up with the customer to verify that the problem has been resolved.
A computer technician wants to make sure that a customer, who had been experiencing a problem with a hard drive, is satisfied that the problem has been resolved. Which of these rules would help accomplish this desire?

IT Essentials Chapter 9

Answers
Questions
1- spyware
2- grayware
What are two examples of malware? (Choose two.) 
1- Enable WEP.
2- Enable MAC filtering
Which two actions improve security on a wireless network? (Choose two.)
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
Which best practice should be included in a password protection policy? 
1- What items need to be protected?
2- What is to be done in the case of a security breach?
3- What are the possible threats to the items?
Which three questions should be addressed by organizations developing a security policy? (Choose three.) 
Download the latest signature files on a regular basis
What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses? 
Create a restore point
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? 
The update will be installed as soon as the computer is powered on
A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown? 
guiding visitors within the premises and escorting them personally when they leave
Which precaution helps protect against social engineering in the workplace?
spam
A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail? 
replay
A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used network sniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy? 
by installing unwanted programs on a computer
How can web tools, such as Java or ActiveX, be used for a malicious attack?
a biometric sensor
Which security device stores user physical characteristics to provide a user level of facility access?
poor wireless device security
What condition can allow unauthorized access to a network for users who are not physically connected to the network?
because everyone can be affected by computer and network security problems
Why should everyone in an organization give high priority to computer and network security?
1- keep equipment functioning
2- provide access only to authorized users
What are two important outcomes of good computer and network security? (Choose two.)
a programming code pattern
What is a signature as the term is used in antivirus and antispyware software development? 
2.5.4.3.6.1
Refer to the exhibit. What is the correct order for the steps in the troubleshooting process?
1- What problems are you experiencing?
2- What websites have you visited recently?
Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.)
Establish a plan of action for resolution.
For troubleshooting security problems, what should be done immediately after the exact cause of the problem is determined?
Identify the problem
At which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions?
 

IT Essentials Chapter 8

Answers
Questions  
WAN
The Internet is an example of which type of network?
TCP/IP
Which suite of protocols is used to transmit data across the Internet?
subnet mask
Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion?
ADSL
What is the most commonly used DSL technology?
1- The company network requires secure access to confidential information.
2- The users need a central database to store inventory and sales information.
3- The data gathered by the employees is critical and should be backed up on a regular basis
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
1- The number of twists in the wires inside the cable
2- The number of wires inside the cable.
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
tracert
Which Windows XP command displays the route taken by packets crossing an IP network? 
328 ft (100 m)
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
1- supported by IEEE 802.3 standards
2- uses a bus logical topology
Which two characteristics describe Ethernet technology? (Choose two.) 
hub
Which device enables computers to be attached to a network without segmenting the network? 
a bad network cable
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
the available wireless networks within range
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
Attach a cable that has an RJ-45 connector.
Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
VPN
Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN? 
1- Fewer peripherals are needed
2- Centralized administration capabilities are enhanced.
Which two statements are true of network computing in contrast to non-network computing? (Choose two.)
It developed standards to replace proprietary standards after U.S. telephone industry deregulation.
What is true about the TIA/EIA?
1- faulty NIC
2- faulty patch cord
A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.) 
to save troubleshooting time
Why should network cables always be labeled? 
Purchase equipment only through manufacturer-authorized partners.
Which method is recommended in order to avoid problems with counterfeit network equipment? 
DNS
Which networking protocol translates a network name such as www.cisco.com to a unique IP address?

IT Essentials Chapter 7


Answers
Questions 
electrophotographic
Which technology is used by laser printers?
drum
Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material? 
firmware
Which software, embedded in a printer, controls how the printer operates and can be upgraded?
Optical Character Recognition
Which software converts scanned pages into text?
website for scanner manufacturer
What is the best source for a Windows-compatible scanner driver? 
print example.txt
Which Windows XP command sends a file named example.txt to the default printer? 
inkjet
Which printer technology is used in low-cost, photo-quality printers? 
the use of Ethernet or wireless
What is typical of a network printer installation?
Send the print job again. If that fails to work, turn the printer off and back on, then resend the print job. If the problem still exists, reinstall or upgrade the print driver.
Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
damage to the UPS
What problem might be encountered if a laser printer is plugged into a UPS?
1- Paper Type
2- Print Quality
Refer to the exhibit. Which two printer configuration settings should be modified when changing from standard paper to photo paper? (Choose two.)
1- USB
2- FireWire
Which two interface types can supply power to a scanner or printer? (Choose two.)
Remove power to the printer.
What is the recommended first step in performing printer maintenance? 
removing impurities collected on internal components
Which routine maintenance procedure can extend the life of a printer?
1- rebooting the computer
2- restarting the print spooler
Which two methods can restart a stopped print service? (Choose two.) 
Identify the symptoms.
What is the first step in troubleshooting a printing problem?
moving parts
What is a feature that causes printers to require higher levels of maintenance than other electrical devices require?
1- internal leaks
2- reduced life of the printer
What are two possible negative results from refilling ink cartridges on a printer? (Choose two.) 
1- wiping the glass with cloth
2- removing the glass during cleaning
What are two recommended procedures for proper scanner care and maintenance? (Choose two.)
drum
A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?