Wednesday, March 30, 2011

Building a Router at Home With Ubuntu


Building a Router at Home With Ubuntu
Many homes now have Internet access independent. Some of them even had to use a broadband connection with a fairly high speed. The question is, Can the Internet connection is being shared to multiple PCs or notebooks at home? The answer could be, with the router!

Router that will be made - though for home-based classes - guaranteed to have stability and enterprise-class security as supported by the Linux operating system. Eits, do allergies first with Linux. Linux is intentionally selected from Ubuntu Desktop - the easiest Linux distributions and is widely used as a working terminal. We assure you, you baseball will meet with the Linux command line is much feared by ordinary users.

Here we will use the Desktop versions of Ubuntu Linux 8.10 (Intrepid Ibex). But underneath the version of Ubuntu users are also fixed to follow the same steps. Oh yes, the router that we will make use Firestarter application (www.fs-security.com) who has a 100% license free. Originally, this application is a firewall router features. So your router will have a firewall facilities. Fun, right?

Let's get started. As a first step, prepare a PC that had been installed Ubuntu and have an active Internet connection so you can browse there. Do not forget to also provide an additional network card to connect Ubuntu to the local network.

Installation of Main Components

1. There are two main components that must be installed before we can enable the PC as a router, that is Firestarter and DHCP (Dynamic Host Configuration Protocol). DHCP component need only be installed if you want an IP address automatically allocated to clients. If you want to configure the address manually, DHCP is not required to be installed. To install Firestarter and DHCP, click the menu System> Administration> Synaptic Package Manager (SPM). Then enter your Ubuntu root password (if requested).

2. From the window of the MSS, use the "Quick Search" to search for Firestarter package. If you've met, click the small box next to the Firestarter package and select "Mark for Installation".

3. Furthermore, in the same way, do a search for DCHP packets. If SPM presents many choices, make sure you select the package "dhcp3-server". Click the little box again and select "Mark for Installation". Then click the "Apply" with a green check mark icon at the top. The rest I'll work on Linux.

Router Configuration

4. If the installation went smoothly, the next step is to configure Firestarter for all connections from the client can be forwarded to the Internet. Run Firestarter from the menu Applications> Internet> Firestarter and enter your Ubuntu root password when prompted.

5. From the Firestarter main window, click the Preferences menu at the top (make sure the tab "Status" is active), then select Network Settings. Notice the two drop-down box that was there. Drop-down box at the top is the interface to connect to the Internet. If using an Ethernet network card, the interface is shown most likely is "eth0". While the second drop-down box shows the interface to the local network.

6. If it is determined where the Internet and local network, you can simply enable (check) the option "Enable Internet connection sharing" and "Enable DHCP for the local network" (automatic client IP allocation). Range of IP allocation using DHCP also can you set yourself, by clicking the black arrow next to the option "DCHP server details". Other options on this window can be left as is, because we do not really need it.

7. After all is finished is set, click the "Accept". By clicking the "Start Firewall", your PC has become a router to share an Internet connection. Easy, right?

TIPS: Bonus Firewall

Incomplete feel if a router is not equipped with additional security to ward off attacks that are likely to come from the Internet. Fortunately, Firestarter is designed to secure a PC connected to the Internet, including clients that are connected via Internet Connection Sharing.

Actually, by default, Firestarter has worked as a firewall since it was first activated. But the default settings in our opinion still has many holes which if not closed it is not likely going to be penetrated cracker.

If security is your priority while surfing fun, it never hurts to follow the simple steps below.

A. Facing Attacks from Outside

1. Reopen the Preferences window in Firestarter. This time select "ICMP Filtering" and enable (check) the option "Enable ICMP Filtering". Ignore the other options under it if there are no other features of the ICMP protocol which allowed acceptable PC. Next, click the Accept button.

2. Back to the Firestarter main window, then select the tab "Policy". In Editing options, make sure the chosen "Inbound traffic policy" which means we will make rules about "who can access a PC or a port from the Internet". If no port that can be accessed from the Internet, so be sure to list the "Allow connections from host", "Allow service", and "Forward service" to be empty. Conversely, if you want to allow a host of Internet-connected to the router side of this, right-click an empty area on the list "Allow connections from host" and choose "Add rule". Then enter the IP address of hosts that are allowed to access the router. If you have, do not forget to click the "Add" and "Apply". The same way can be done to allow port connection / service from the Internet, it's just that you have to work in the "Allow service".

3. If you have, try to test your PC with the help of site security audits of Gibson Research (www.grc.com). Compare the results before and after the configuration is done (see if you get the title of "Passed" on TruStealth Analysis or not).

B. Restricting Client Access URL

After successfully restrict access from the outside, now we will make restrictions on clients that will access the Internet. This is especially useful if you want to save bandwidth or to prevent underage users accessing inappropriate sites. Here's how to do it.

1. From the Firestarter main window, click the tab "Policy" and change the dropdown editing to "Outbound traffic policy". This option is used to restrict access to the Internet or a local client opposite of "Inbound traffic policy" that we discussed above.

2. Two radio buttons will appear which each contain an option "Permissive by default, traffic black list" and "Restrictive by default, whitelist traffic". Permissive by default used if you want to allow all data traffic from clients to the Internet and using a list of policy to block addresses, the host or service / specific ports. Conversely, Restrictive by default is used to block all traffic from client to Internet data and use the list policy to allow access to the address, host or service / specific ports. If you want to block a specific address, select Permissive by default.

3. To order for Firestarter block certain sites, do it by right-clicking an empty area on the list of "Deny connection to host", then choose "Add rule". Enter the IP address or domain name (without "http://") in the field "IP, host or network", then click Add. If you have, do not forget to click Apply at the top of the window of Firestarter. Try to visit the address had been blocked using the browser.
READ MORE - Building a Router at Home With Ubuntu

Tuesday, March 29, 2011

How to Upload MySQL Database with phpmyadmin

How to Upload MySQL Database with phpmyadmin












Many webmasters who started websitesnya from the local computer by using php and mysql.

The difficulty that often occurs when uploaded to the server mysql database. The following actions should be taken.

That need to be prepared on the local computer is phpmyadmin, phpmyadmin is usually already installed when you install software packages such as WAMP Server, XAMPP and PHP Triad consisting of a package of Apache, Mysql, phpmyadmin.

To export data commonly used facilities 'MySQL Dump' in phpmyadmin.

Two steps are done that is in Local Computer and the Server. If you already have a database in the form of a file just follow the steps on the server.

ALL STEPS BELOW HAS BEEN SUCCESSFULLY TESTED BY THOUSANDS OF PEOPLE, THAT ERROR OCCURRED IN YOUR ORDER TO BE BACK WebSites steps ESPECIALLY IN CONFIGURATION: DATABASE NAME, USER NAME AND DATABASE HOSTNAME

The steps on your local computer:

1. Log into phpmyadmin on your local computer
2. select the database you want to dump,
Located on the left phpmyadmin

3. Phpmyadmin will display the tables contained in the database.
4. click on the 'Export'
5. Now you are on the option that determines the 'How do you be in the dump database',

The default is SQL, and we recommend using SQL.

Sometimes you need to select 'Add DROP TABLE' point to add the SQL to delete the previous table at the time of import on the server.

Another option you can also use the 'Save as File', we recommend using the SQL option.

6. click 'go'

Results dump will be displayed in the browser, then you copy these first results.

To create a mysql database, following the steps in your hosting cpanel:

Login to the cpanel of your website in a new window:

http://www.yourdomain.com/cpanel

replace yourdomain with your domain name.

After logging into your cpanel do the steps below:

If you have not set up MySQL users and databases in cpanel. follow these steps:

1. Click on the 'MySQL database'

2. fill in your username and password on the option 'Add New User' and then click 'Create User'

Mysql user is automatically formed will be preceded and followed by a user cpanel mysql user name that you input. as an example:

usercpanel_namausermysql

3. Enter the name of the database you want to create the 'new database' and click 'Create Database'

Mysql database automatically formed will be preceded and followed by a user cpanel mysql database name that you input. as an example:

usercpanel_databasemysql

4. Add users to the database that you created by selecting 'Add User To Database' and click 'submit'

5. Select ALL PRIVILEGES and click 'Make changes'

From the above we can note two important configurations needed to connect to the database:

1. database name: usercpanel_databasemysql

2. user database: usercpanel_namausermysql

Note:
* mysql database, username and password have been formed for NOTE, because it will be necessary to connect to your database.

* MySQL Server use localhost

you should note from the article above: NAME DATABASE, USER and PASSWORD DATABASE DATABASE
Without all three you know, your website will not be able to connect to the database server.

2. After the database, and user database form, click the icon on the main page of cpanel phpmyadmin (in addition to 'MySQL database')

3. Phpmyadmin will appear, then select the database that you fill with the results of the MySQL dump, located on the left menu.

4.Click on the 'SQL'

Your stay PASTE results mysql database dump from your local computer in the 'Run SQL Query "

5. Finally click 'GO'

It's finished, all the mysql database you've uploaded to the server
Next you just adjust your PHP scripts to connect to the database by changing the configuration database, mysql user and password that has been formed.
READ MORE - How to Upload MySQL Database with phpmyadmin

In this example, we are using phpMyAdmin 2.6.1-pl3 on the local computer

MySQL has a facility called â € œMySQL Dumpâ €??. Usually used to perform backups on the database, or to transfer data to the server. The easiest way to do the dumping in your MySQL database is through phpmyadmin

Small Note: phpmyadmin is a tool that is created using PHP and used to simplify the administration of MySQL database

On the Local Computer
In this example, we are using phpMyAdmin 2.6.1-pl3 on the local computer, the steps:
a. type the path to your phpmyadmin on localhost


b. select the database you want to dump,


Located on the left phpmyadmin

c. if you already have selected a database, then phpmyadmin will display the tables contained in the database.
d. click on the â € œExportâ €?
e. Now you are at the option of determining â
€ œ How does your database will be in dumpâ €??,
Note on the menu option:
â € ¢ Export: Choice of how to dump from your database will be displayed. The default is SQL.
If you will use a dump of the database to be transferred into your website, then use SQL.

â € ¢ SQL option: opsi2 about any query that will be used to dump your database.




Opsi2 for export using SQL

â € ¢ Save as File: If you want a direct result of a database dump is saved, then check this section

in this section, you also can choose the compression type to dump your database

f. click â € ~ cave € ™


If you check the previous â € ~ save as fileâ € ™ will be out a popup window (file download).

If not, then the results will be displayed from a database dump



directly in the browser

Results dump is displayed in the browser, you should first copy

On Your Website
Login to your cpanel website (http://domainanda/cpanel) with



using the username and password have been sent by Rumahweb.
Once logged in, you can use phpmyadmin which is contained in the cpanel, step steps:
a. Click on the menu â € ~ MySQL databaseâ € ™
 â € ¢ If you have not set up MySQL users and databases in cpanel. Then follow these steps:
i. fill in your username and password for the MySQL user
Then click on â € ~ Add Userâ € ™
Note: remember baik2 username and password that you created, because it will be necessary to connect from php to your database.
ii. Enter the name of the database you want to create




lik add "user to db"

b. after you enter the menu â € ~ MySQL databaseâ € ™, click the link to the phpmyadmin



d. Then click on the menu â € ~ SQLâ € ™

e. If you:
a. No


using â € ~ Save as fileâ € ™ to the last database dump, then you can make copies (at the dump on the local computer)

Then you paste in the â € ~ Run SQL Queryâ € ™

Then click on â € ~ cave € ™

b. Using the â € ~ Save as Fileâ € ™, then you live to upload the file from a database dump earlier.

Click browse, then


click â € ~ openâ € ™

Then, you just click on the â € ~ cave € ™

So your database was completed uploads




READ MORE - In this example, we are using phpMyAdmin 2.6.1-pl3 on the local computer

How to Automatically Backup Inter 2 Server Linux

How to Automatically Backup Inter 2 Server Linux

Using Linux as an operating system has many advantages. In addition to virus-resistant, many automated functions that can be done through scripts. For example, for backup or synchronization between two file-sharing server can be done with scp command (server copy) combined with cron to automate (scheduling).

Scp command requires the function ssh (secure shell) to be connected with a remote server. So ssh can simply fill in the connect without a password, do the following:

1. Create a private / public key on the local server
ssh-keygen-t rsa

2. Copy public key to the remote server
scp ~ / .ssh / id_rsa.pub remote_host:

3. Add the key to the remote server is trusted key

Login to the remote server. If you have not ever make a key at all, run ssh-keygen-t rsa to prepare a directory for the key.

Then add a new key made earlier to the file authorized_keys
cat ~ / id_rsa.pub>> ~ / .ssh / authorized_keys

Change the file-level access to the command:
chmod 644 ~ / .ssh / authorized_keys


4. Now you try to login to a remote server via ssh
ssh username @ remote_server

If the above steps correctly, you should get in without entering a password.

5. Create a script to copy files from remote servers
scp username @ remote_server: / remote_dir / local_dir

Save command into a file (eg: mybackup.sh) and change its file mode with chmod 755 mybackup.sh

Mybackup.sh file copy to the directory / etc / cron.daily to get running automatically every day.
READ MORE - How to Automatically Backup Inter 2 Server Linux

My experience learning JAVA

 My experience learning JAVA
I want ya story since the first experience of learning Java. First I started from the read-read tutorial java from SUN website. I go one-one tutorial page, complete one page and click next, and so on. Thank God that time the internet connection quite cepet. Then there's the reason I'll not have to read from the site, I wrote all the copy that is in part tutorial with web copier httrack. The program was immediately wrote nyedot all the links that exist from the first page of the tutorial. Wah deh happy to read and read at home. 'd Be in the office or cafe. One day, I fit into the cafe say nyari fad but a format JAVA tutorials. Chm. File. Chm is compiled from html form-2 that. Turns out there, yes I've donlot ajah tuh file. The amount of responsibility not abysmal tens of mega, mega 63 if not wrong. Although long, but more cepet of httrack, which was not yet finished. Well, that file readable tuh. From that day on the basics of JAVA I began to understand. Just be sure the problem is, I sometimes have problems with Java classes that are difficult to remember. Also difficult if not know of certain classes including a package (package) what. Therefore I also need download rich files. Chm about APIs in JAVA. If I search on google pake keyword 'JAVA API filetype: chm'. Found! There is a file. I immediately wrote donlot tuh file. Well now if confused the names of the class, I live search aja there. At that time I still use notepad.exe editor for programming. Wuaannjrrroooooottt! Learning JAVA wealth of torture really use the editor's time. Idly I open a page from SUN JDK download first place, there were Netbeans version 4 beta. He said it was a sophisticated editor, wrote the file size is about 100 mega. Mad. Yes already, coincidentally cafe where I was pretty spead. I download now. finished two hours later. Download Then I installed it at home. Incidentally I download who've integrated with JDK 1.5. Oh, no editor very slow. Weight if proceed. My computer is Athlon XP 2100, RAM 256, loading about 20 seconds or more. Not crazy? But alas, this is more cepet of JBuilder X that I have ever bought. Quite helpful also, especially by default netbeans can make a GUI program that cute-cute. Code hell can already delicious, rich in VB and Delphi, if the class name already typed, then typed ('.'), point variable name and method automatically appear. The point is pretty good. Sometimes there is also a problem with netbeans. In addition to slow, if create a console program (under DOS so rich), can kompail and run, but if the programs that we make have / need input from the keyboard, just netbeans pass wrote, so the error. I think what so can? Then, if he's my senior reading regular use Eclipse. Can download at eclipse.org. I try tuh donlot eclipse. Pretty big too, it was version 2.0 so if not wrong. Donlot out, I try at home. Editor is faster than netbeans. Loading Affairs does the same, but fitted kodingnya, it feels really different. The disadvantage, by default (without plugins) the editor has not provided the module to create GUI. So, if you want to use the GUI I use netbeans, if I use eclipse console. Actually there are plugins for eclipse that point we'll be coding the GUI with ease. This GUI includes a GUI applet and regular (desktop application). His name Jigloo. Donlot just try it, but I forgot the link, search on google aja with the keyword 'jigloo + eclipse + plugin'. Method of installation can be read on the site developer. You need to read the installation method because it is not just a coffee into the plugins directory. Well after that I almost always use the eclipse. If you need examples of Java programs, you can search the website JAVAALMANAC. This web site explains about the book Java Almanac can be purchased at Amazon.com. Buy not an option for me, but the web site there are many pieces of program based on its packets. Also given the title to fit the problem. Anyway mantep lah. Ordinary, I immediately wrote donlot use httrack. Tuh get quite a lot. Then I compail oh html so. HLP. With the format. Hlp, I could nyari-2 specific topics with ease. The problem is I forget the software that I use to kompail these html files. So much had deh stories. Hehehe .... Instead of patronizing, but bwegi-2 experience.
READ MORE - My experience learning JAVA

Button-Button Vim command (linux)

Button-Button Vim command (linux)
Button-Button Vim command (linux) for linux users who still cloud may be confused how to use a text editor imaginable in linux terminal commands which are grouped category following:

categories: transfer mode
i move to insert mode (insert) a move to insert mode (add)
o moving to INSERT mode, and add a blank line below cursor
O moved to INSERT mode, and add a blank line above cursor

categories: navigation cursor
h, j, k, l left, down, up, right
w forward one word
W developed a next word (including whitespace)
b back one word
B backward one word (including whitespace)
e forward to the end of next word
E advanced to the end of next word (including whitespace)
ge back to the end of the previous word
GE retreated to the end of the previous word (including whitespace)
$ Moved to end of line
^ Move to the beginning of the line (without the blanks)
0 (zero) move to the beginning of the line (including null character) moved to the beginning of the file gg
G moved to end of file
G move to line
% Move to a specific position files, for example 50%, will move into the middle of the file
H moved to the top of the screen
M moved to the center of the screen
L moved to the bottom of the screen
CTRL-G show cursor position in the file
CTRL-U scroll up half a page
CTRL-D scroll down half page
CTRL-E scroll one row up
CTRL-Y scroll one line down
CTRL-B scroll one page up
CTRL-F scroll one page down
zz scroll so that the cursor is in the middle
Zt scroll so that the cursor is above the
ZB scroll so that the cursor is under


categories: search
f forward to the first encountered on a particular line
F back to the first encountered on a particular line
t advance to one character before the first encountered on a particular line
T back to one character one character before the first encountered on a particular line
% Moved to a pair of characters from the cursor position, eg position the cursor in the '(', will move the cursor to ')' partners / looking to the future? looking back n look again in the same direction
N search again in opposite directions * looking forward the same word at the cursor position
# Find the same words back at the cursor position

Category: delete
x delete the character at the cursor dd delete a line
A delete LINE BREAK, to join the line at the cursor with the next line

categories: undo and redo
u undo
CTRL-R redo

categories: save
ZZ save and exit
: W save
: Write save
: W filename save as
: Write save as filename

categories: exit
: Q quit without save if there is no change to the file
: Q! exit without save even when there are changes to the file

category: help
: Help see help
: Help subject see help on the subject
READ MORE - Button-Button Vim command (linux)

programmers unix machine

 
Time I get a pretty interesting article, and can increase our knowledge about what exactly 'Hacker' is ... whether Kevin Midnick & Captain Zap can be called as a hacker? For more details, maybe the following article can help us to find the answers. once again this is not a pure article of my writing, but I copy and paste through my teacher blog ..
happy reading

In recent years the term hacking is looming. The book is "thin", "instant" and use the title of "hacking" into the new terms of writing popular books on Indonesia. This is a dangerous game from the publishers (who authors) because the damage could get to our young generation. Creating a culture increasingly thick that science can be obtained by means fast, instant, even just with a capital of 20-50 pages thick book. To be sure hackers are not crackers, hackers build things, while crackers damage. Let's peel on the nature of these hackers and hacking activities.

Most of the literature mentions that the term and the hacker culture was first used in 1961 when MIT had the opportunity to enjoy the PDP-1 machine. DEC's first computer production has become a favorite toy, especially the MIT student who joined the Tech Model Railroad Club. They make programming tools, making a lot of programs, develop ethics, jargon and even PDP-1, which became a video-game machine earlier generations. Culture is then known to be a true hacker culture. The hackers in the Tech Model Railroad Club became the team's core research laboratory Artificial Intelligence (AI), MIT is a pioneer in AI research in the world today.

ARPAnet project developed by the U.S. Defense Department was not free from interference by hackers at MIT. ARPAnet was the one who brings together the hacker culture from the various "tribes", for example, from Stanford University and Carnegie Mellon University (CMU). MIT hackers eventually even managed to develop its own operating system called ITS (Incompatible Time-Sharing System) is legendary, tops-10 replaces the standard operating system produced by DEC for the PDP-10. ITS was originally built with the assembler, but later changed into the language LISP, functional programming language close to the world of Artificial Intelligence.

Another creation from the MIT hackers who is legendary is Emacs (Richard Stallman), a favorite editor who still used by many programmers unix machine to date. I know the first time Emacs when entering campus at Saitama University in 1995, I used to write all my college report, read email, web browsing, reading newsgroups and even Emacs, too.
From Bell Labs hacker named Ken Thompson who is assisted by another hacker named Dennis Ritchie C language with her to develop the Unix operating system. Collaboration Thomson and Ritchie is the force that is phenomenal, because Unix and C language is a potent formula for the development of variants of the Unix operating system from anywhere to date (BSD and System V where Linux included). Also note that in 1982, hackers from Stanford and Berkeley who led William (Bill) Joy established a company called Sun Microsystems.

Era 1984 commencement of the various episodes of rapid cracking known as raised by the press and journalists. Journalists began to mistakenly refer to computer crime and its deviation as a "hacking activities" where actor called a hacker.

A hacker is actually like Richard Stallman who fought with the Free Software Foundation and decades of dreaming to build a free operating system called the HURD. Linux Torvalds is a hacker also true for remaining committed to the development of the kernel Linux root until now. Contributors to the development of Linux and other open source software also is the real hackers.

Actors carding (misuse of credit cards), phreaking, and defacing is not a hacker, but they are a cracker. Legendary phrase from Eric S. Raymond in the article entitled how changed from a hacker, "hackers and crackers to build a lot of things ruin it." True hackers are a good programmer. Something very foolish when there are people or groups who claim to be hackers but did not understand how to program. Essential nature of a hacker is happy to share, not share the tool exploits, but the sharing of knowledge. True hacker is a writer who is able to understand and write articles in the mother language and English well. Hacker is a nerd who has an attitude (attitude), good base, which would respect others, respect the people who help him, and respect for people who have been given knowledge, means or opportunity.

It is not the nature of a hacker if given the trust holding the administration on a server instead use it for cracking activity. Or even then attack and destroy the server from within by making a mockery added to the owner of the server that has given him the opportunity. With forced me to say, so I've been there. So far I always support the movement of young people in cyberspace, I am pleased with their spirit. Hundreds of community I give the domain and hosting for free as a reward Struggle for wanting to share their knowledge to other friends in the homeland. Unfortunately there are crackers who claimed hackers (though do not have the attitude as a hacker) is toying with this opportunity. Once satisfied to make a dedicated server that contains hundreds of other community sites in the provider of server-shutdown due to phreaking activities she was doing, still of cursed me with titles that are not human. Am I cured? No I will still give the trust, server support and a free domain for cyber activists.

Hackers are not the ones with nicknames, screenname or handlename a funny, silly and stupid. Eric S. Raymond calls that hide the name, is actually just a naughty, silly behavior that characterize the crackers, warez d00dz, and the losers who did not dare to be responsible for his actions. Hacker is a reputation, they are proud of the work done and want a job that is associated with their real names. Hacker does not have the computer, because the concept of hacking is real learners, enthusiastic people to work and never give up because of failure. And the hackers could appear in the field of electronics, machinery, architecture, economics, politics, etc..

Straighten out the problem of understanding the hacker is a rescue project generation and repair the nation. And this could start by improving our educational curriculum so as to educate our students become real hackers. And let us together struggle to be a hacker who could benefit and who can fix this republic was triumphant.
READ MORE - programmers unix machine

Java Connection - MySQL

 Java Connection - MySQL
Basically it can be spelled a bit difficult to connect your MySQL with Java. Unlike other programming languages ​​(put it. NET or even PHP that provides easy interface in the affairs of connectivity), Java needs "a little" patience in the process of connectivity to the MySQL database.

To connect your database and displays with Java, there are several steps that must be followed carefully and in sequence, steps - steps are:
1. Detecting the JDBC driver
2. Making the connection between MySQL with Java
3. Doing sesuat with these connections!
4. Closing connection.

package test;

/**
 *
 * @loso - http://loso.com
 */
public class test {
     public static void main(String[] args) {
          try {
               Class.forName("com.mysql.jdbc.Driver").newInstance();
               System.out.println("Berhasil terhubung dengan MySQL");
          } catch (Exception E) {
               System.out.println("JDBC Driver error");
          }
     }
}


If the exit reading "Successfully connect to MySQL", then the connection between the Java with MySQL successfully. If still get out the words "JDBC Driver error", then the driver is not connected. Usually if I see errors like this, the best way is to uninstall the Java, NetBeans, and repeat from the beginning,, hehe
READ MORE - Java Connection - MySQL

J2ME itself is the technology of the Java programming language

J2ME itself is the technology of the Java programming language are in dedicated to mobile devices like mobile phones, Pocket PCs and what else yah. Just create a small device that is often taken anywhere that you know. J2ME is the same with programming using java itself, only in J2ME there is some functionality added and subtracted and are customized for mobile device programming.

Obviously to be able to create games in HP we have to get used to first use the programming with java, here I will not review the java programming language-maybe next time in a different post-I expect you already have knowledge of java before. Here I will only provide knowledge about the tools used in making Java programs on HP and concepts.

For tools I use IDE (Integrated Development Environment) NetBeans version 6 which can be downloaded for free here, select NetBeans Mobility Pack is included. So that we can lock write code without having to install try again.

After you install the NetBeans IDE, NetBeans run it immediately. To create a new project select File-New Project. Will appear as shown below.
Select MIDP Application and press Next. Next you will be brought to the Name and Location screen like below.


Input Project Name corresponding to the name of your project and remove the check in the Create Hello MIDlet. Press Next
 This is a screen to determine the target device with which you created the application. In line emulator Emulator Platform is a choice that you install on your computer, for now you just install the emulator default of your NetBeans. Once you feel the need to install emulators for specific platforms from other vendors such as Nokia, Sony Ericsson and Motorola you can change it here.

Device is a device emulator or HP who will you run on your computer, in running the program that you create. If later you install the emulator platform from another vendor you will be able to use HP's specific vendor.

Device Configuration and Profile are the specific capabilities of the device package that will you to target your application, for example I have a HP K608 that have CLDC 1.1 and MIDP specification 2.0 HP means I can run the program with a package that is on CLDC 1.1 and MIDP 2.0. For more information about the device you jadikat research target was the first to see the specifications HP or your target device.

To ease you understand, just imagine the old HP is MIDP 1.0, such as nokia 6015 and nokia is big with a slide that I forgot what the old HP brand and others. MIDP 2.0 new HP like the Nokia N70, N73, SE K600, SEW800 and others. Since MIDP 2.0 more a good idea to select MIDP 2.0 and CLDC 1.1 for our application this time.

Select Next and directly select Finish. Ready ready!

Actually in this NetBeans you can create applications with Visual MIDlet HP is in NetBeans, but to more deeply understand the concept of making an application in J2ME here I will not use the Visual MIDlet.

The concept of J2ME programs are as follows. In J2ME we have will make the main class derived from MIDlet class, main class derived from MIDlet is yag will be called the first time during our application running on HP, in the main class also there are 3 methods which will function as a triggering event from our HP. Like:

starApp (), method that is called when we first application of the road.
pauseApp () method that is called when the user hp pause our application.
destroyApp () method that is called when the user closes our application hp.

We start by creating a new classMIDlet for your project. Right-click your project in the project explore and select new-MIDlet, called the new class with name MIDletPertama. Last code your MIDlet file looks like below.


For the first time we will display the "Hello World J2ME" on the HP screen. There are two types of views within the MIDlet,

Low Level use the Canvas class

High Level use Form

Here we will use a form to facilitate you to understand the formation of the display in the MIDlet.

Notice the code above, frPertama is the object form which we will show in the layer, we give the title of Form is the "Title". Then append method is a method to add items on the Form, Item I want to add is the String "Hello World J2ME". Display statement is a statement to display the object fr First into the layer.

Select F11 to build the project and F6 to run the project.

Select the midlet who want to run and press launch in the emulator, then your emulator will display the form that you created, as shown below.


Congratulations, your program has been running well in the emulator, how to run on HP's real?

Log into your NetBeans project folder, open the folder dist
Transfer the jar file in your program to your HP channeled through Bluetooth, infrared or data cable
READ MORE - J2ME itself is the technology of the Java programming language
 
THANK YOU FOR VISITING