Simulasi Investasi Di Neobux Tanpa Modal

Selasa, 15 Februari 2011 0 komentar

Mungkin sudah banyak sekali orang yang tahu tentang neobux. Kalau di lihat pada statistik pada forum yang katanya komunitas nomor 1 di Indonesia record tentang neobux ini sudah terlihat mulai tahun 2008. Saya sendiri baru bergabung dengan neobux pada bulan Desember 2010. Melihat dari pengalaman yang lalu kebanyakan jenis PTC site seperti neobux ini tidak berumur panjang, Namun setelah melihat record perjalanan neobux yang terlah berjalan hampir 3 tahun lebih ini membuktikan bahwa neobux adalah salah satu PTC yang sukses dan digarap dengan serius oleh pemiliknya sehingga membuat saya yakin pantas untuk menulis tentang neobux.

Yang akan kita diskusikan disini adalah simulasi investasi. Seperti kita ketahui kebanyakan orang yang belum paham sangat sulit kita ajak untuk bergabung sebelum mereka merasakan buah manis alias hasil yang bisa mereka anggap cukup. Untuk itulah simulasi investasi ini saya buat untuk mengajak teman-teman yang mungkin tertarik dan memenuhi syarat, tentunya TANPA MODAL agar lebih menarik karena kebanyakan orang tidak mau mengambil risiko.

Untuk memulai pastikan terlebih dahulu kita memenuhi syarat dibawah ini:

  1. Punya waktu luang minimal 5-10 menit setiap hari.
  2. Punya koneksi internet.
  3. Punya alamat email.
  4. Punya akun paypal/alertpay yang telah berstatus verified.

Kalau anda sudah memenuhi syarat diatas silahkan baca artikel ini hingga selesai. Silahkan ikuti petunjuk dibawah ini:

Mendaftar pada situs neobux, jika tidak keberatan anda boleh mendaftar melalui link ini untuk menjadi referral saya. Apa keuntungan menjadi referral saya dibanding anda mendaftar langsung pada situs neobux? Jika anda mendaftar melalui link referral saya maka anda menjadi direct referral saya (tentu akan ada bonus dari saya pribadi sebagai solusi win-win), Jika anda mendaftar langsung tanpa melalui link referral saya maka anda akan dijual oleh neobux untuk keuntungan neobux. Silahkan anda tentukan berdasarkan pemikiran anda sendiri, saya tidak memaksa dan tidak akan rugi atas keputusan anda.
  1. Setelah mendaftar pada situs neobux buka email anda lalu klik link verifikasi pada email anda.
  2. Setelah anda sukses terdaftar pada situs neobux segera login lalu update informasi personal anda dengan data yang benar (termasuk email paypal/alertpay).
  3. Setelah update informasi personal silahkan anda klik pada tulisan “View Advertisements” Iklan yang diberikan pada anda adalah 4 setiap harinya, jika anda sering online maka akan diberikan bonus tambahan, tiap klik iklan bernilai $0.01 atau setara dengan Rp 91 , Mungkin bagi anda ini kelihatan sangat kecil, tapi jangan bersedih silahkan baca terus simulasi investasi ini agar mencapai hasil yang di inginkan.
  4. Pastikan anda melakukan klik iklan setiap harinya, Saran saya setiap harinya anda klik pada range jam 12:00 Siang sampai dengan jam 21:00 Malam. Jika anda punya waktu luang yang banyak saran saya klik 1 iklan setiap rentang 1 jam karena ada bonus $0.50 setiap jam di neobux.
  5. Lakukan rutinitas diatas hingga earning anda mencapai $1 jika anda melakukan klik rutin setiap harinya maka anda dapat mencapai $1 dalam waktu 25 hari (tidak lebih dari 1 bulan)
  6. Pada tahap ini lakukan re-investasi atau investasi ulang dari penghasilan anda untuk mencapai tingkat berikutnya. Sewalah 3 referral seharga $0.75. Maka pada bulan berikutnya uang anda akan berjumlah 1,8+0.25+1.2 = $3.25 *Jika 100% aktif.
  7. Pada langkah berikutnya lakukan lagi invertasi ulang, jika sewa 1 referral harganya adalah $0.25 maka sekarang anda mampu menyewa 13 referrals, karena paket sewa referral tidak ada angka 13 maka anda harus menyewa 10 dan sisanya anda simpan untuk berjaga-jaga jika perlu melakukan recycle (pergantian).
  8. Langkah seterusnya adalah mengikuti langkah ke-8 sampai pada saat anda mulai memiliki pondasi yang kuat.
  9. Setelah anda merasa memiliki pondasi yang kuat saatnya anda mulai berpikir untuk melipat gandakan keuntungan anda dengan menjadi member yang berbayar. tentu saja tidak ada paksaan, jika anda merasa cocok sebagai member standard silahkan. Jika anda merasa masih belum mencapai target maka upgrade lah akun anda. Anda akan semakin berkembang dan naik ke level diatas sebelumnya.
  10. Setelah mencapai batasan maksimal/target yang anda incar anda bisa menikmati keuntungan anda. Jika belum, lakukan manajemen pintar agar anda bisa naik terus pada tingkat berikutnya.
  11. Pelajari dan pahami bagaimana agar anda bisa mencapai target yang di incar, cari tahu tentang yang legal dan ilegal, dan yang terakhir pelajari juga teknik dari member lain mungkin ada beberapa yang akan memberikan nilai lebih.

Simulasi ini sangat mudah dipahami oleh banyak orang namun jarang sekali orang bertindak. Salah satu kunci untuk mendapatkan penghasilan yang lebih dari cukup adalah dengan memiliki banyak sumber. Sama hal-nya dengan prinsip umum jika seorang pegawai negeri memiliki bisnis sampingan maka dia akan semakin untung karena memiliki lebih dari 1 sumber penghasilan. Ini juga berlaku pada semua orang karena sangatlah rugi jika anda hanya menggantungkan sumber penghasilan anda hanya dari 1 sumber saja.

Lalu bagaimana dengan neobux? kunci diatas dapat anda gunakan, semakin banyak referrals yang anda sewa atau direct referral yang anda cari maka akan semakin tinggi penghasilan anda. Jangan melihat dari besar kecilnya penghasilan pokok tapi lihatlah pada hasil akhir dan bagaimana pintarnya anda melakukan manajemen. Bayangkan ada seorang tukang bakso berjualan, sehari keuntungan tukang bakso kita anggap saja 20 ribu Rupiah. Bisakah tukang bakso menjadi orang kaya? tentu BISA kenapa tidak?! semua orang memiliki kemungkinan menjadi kaya jika dia melakukan manajemen yang pintar dan terorganisir. Jika tukang bakso menjadi bandar bakso, jika dia punya 10 gerobak, maka penghasilan sehari buat si tukang bakso adalah 200 ribu Rupiah bukan lagi 20 ribu Rupiah.

Anda tidak yakin jika neobux bisa memberikan penghasilan yang lebih dari cukup atau mungkin bahkan lebih dari gaji anda sendiri? Silahkan baca dan pelajari diforum neobux ada seorang member yang mendapatkan keuntungan bersih setiap bulannya dari neobux sebesar $2.500. Kalau kita rupiahkan dengan rate saat ini $2.500 = Rp 22.750.000 setiap bulannya. Fantastis kan angka ini? bahkan mungkin angka ini lebih besar dari gaji seorang pegawai negeri (maaf bukan maksud melecehkan pegawai negeri hehe) semua ini dilakukan hanya dengan meluangkan waktu 5-10 menit setiap harinya, tentunya juga manajemen yang pintar dan modal yang cukup sehingga sang member yang wah itu bisa mencapai target itu. Kalau dia bisa kenapa anda tidak bisa?!

Yang perlu anda ketahui bahwa neobux ini bukanlah solusi untuk anda yang ingin menjadi kaya mendadak, neobux mungkin merupakan salah satu cara agar anda bisa berkembang atau mungkin bisa menjadi salah satu income dari sekian banyak income yang anda miliki. Seperti filsafat diatas, anda akan rugi jika hanya menggantungkan sumber penghasilan anda pada satu sumber.

{Tulisan diatas sudah mendapatkan persetujuan dari Penulis aslinya.]

Sekian, Salam GoBlog!

Sumber : http://id.istanto.net/

Finding Your MAC Address On Wired And Wireless Network Cards

Minggu, 06 Februari 2011 0 komentar
The Answer To The Media Access Control Question
----------------------------
Over the past few weeks I have received quite a few e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control (MAC) addresses. I think the main reason I've received so many questions about Ethernet cards and MAC addresses is people trying to secure their home wireless networks and their desire to use MAC address filtering. This type of filtering in wireless networks can be configured to allow or deny specific computers to use or attach to the wireless network, based on the MAC address.

My first thought was to write an article just about MAC addresses and wireless Ethernet. After thinking about it I decided to expand on this and go over some specific information about Ethernet cards and communication.

Different Ways Of Finding Your MAC Address And More
--------------------------------------------------
There are several ways of finding your Ethernet and communications protocol information. Many Ethernet card manufacturer's have proprietary software that can reveal this information but they work differently depending on the manufacturer. So we will use the Windows 2000 and XP "ipconfig" utility since this is available in the majority of Windows Operating Systems.

First, go to "start" -> "run" and type "cmd" without the quotes. Then hit the enter key. At the command line type "ipconfig /all", again without the quotes. Actually, just typing ipconfig without the /all will work but will only provide you with abbreviated information regarding your network cards. An example of what you might see by typing the "ipconfig /all" command is below with each item commented in green lettering:

Fault Tolerant And Highly Availability Computer Systems
----------------------------
There are several ways of finding your Ethernet and communications protocol information. Many Ethernet card manufacturer's have proprietary software that can reveal this information but they work differently depending on the manufacturer. So we will use the Windows 2000 and XP "ipconfig" utility since this is available in the majority of Windows Operating Systems.

First, go to "start" -> "run" and type "cmd" without the quotes. Then hit the enter key. At the command line type "ipconfig /all", again without the quotes. Actually, just typing ipconfig without the /all will work but will only provide you with abbreviated information regarding your network cards. An example of what you might see by typing the "ipconfig /all" command is below:

OutPut Of The "Ipconfig /All" Command
----------------------------------------------------------
Windows IP Configuration


Host Name . . . . . . . . . . . . : Home Computer
This is the name of your computer, typically defined during the windows installation. However, it can be changed after installation.

Primary Dns Suffix . . . . . . . : domain.com
If your computer participates in a network such as a Microsoft Windows domain this item may contain the name of the domain.

Node Type . . . . . . . . . . . . : Unknown
The Node Type may say Unknown, or peer-to-peer, or in some cases "hybrid". It is a setting that has to do with the Windows Internet Naming Services used in certain types of Windows domain networks.

IP Routing Enabled. . . . . . . . : No
This setting determines if Windows XP or 2000 will function as an IP router. If you have two or more network cards you can setup your system to act as a router, forwarding communications requests from one network to another. Windows 2000 can be configured to do this in a pretty straight forward fashion; Windows XP will need a registry modification.

WINS Proxy Enabled. . . . . . . . : No
WINS Proxy is another setting that is related to the "Node Type" we discussed earlier. It is normally not a required setting in a home or small office network, or newer types of Microsoft Windows domains.

Ethernet adapter Wireless Network Connection 2:
If you have multiple Ethernet (network) cards in your systems, as I do in this laptop, you will have multiple listings. This one happens to be the second Ethernet card, an internal wireless Ethernet card.

Description . . . . . . . . . . . : Broadcom 802.11b/g WLAN
This is the description of the Ethernet card, usually the Name / Manufacturer and type of Ethernet card. In this case, it is a Broadcom wireless Ethernet card built into my laptop.

Physical Address. . . . . . . . . : 00-90-4B-F1-6E-4A
And here we have the MAC address. The MAC address is a 48 bit hexadecimal code and is suppose to be a totally unique address. It is 48 bits because each number or letter in hexadecimal represents 8 bits. Hexadecimal numbers range from 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E, F. There are 6 alpha-numeric codes hence 6*8=48(bits). The first 3 codes identify the manufacturer of the card and the remaining codes are used to create a unique number. Theoretically there should never be a card with same MAC address on a local network. However, there are a few exceptions. There are software tools that allow you to change this code. In fact, this is a step some hackers take to attack other systems on a local network. I say local network because MAC addresses are not routable between network segments. By spoofing this address, you can impersonate another machine on the local network. Traffic that was bound for the intended target can be redirected to the hacker's machine. This is the address you would also use to populate a MAC address, or physical address table when setting up your wireless access point to support MAC address filtering.

DHCP Enabled. . . . . . . . . . . : Yes
DHCP, or the Dynamic Host Control Protocol, if enabled means your computers IP address is being provided by a DHCP server on you network. The DHCP server could be your wireless access point, cable/dsl router, cable modem, or a server on your network. Also, if a DHCP server is not enabled on your network, your computers Operating System will auto generate a random IP address within a certain predefined range. This means you could network a group of systems together without having to manually assign the IP settings.

IP Address. . . . . . . . . . . . : 192.168.0.117
This parameter provides you with your current IP address. The address listed above is what is called a "private" address. There are certain classes of IP addresses that have been set aside for private use. This means for your internal, local, or private network at home or office. These addresses are not, or should not, be routable on the Internet. The Internet routes what are called "valid" IP addresses. Your cable/dsl router or cable modem has a valid IP address assigned to its "external" network interface. The external interface may be your phone line or cable TV cable.
Subnet Mask . . . . . . . . . . . : 255.255.255.0
The Subnet Mask is a special number, or in some sense, filter, that breaks down your IP address, in this case private IP address, into certain groups. IP addresses and Subnet Masks can be a complicated matter and would take an entire article to go over.

Default Gateway . . . . . . . . . : 192.168.0.254
The default gateway, the IP addresses listed above, is the IP address of the device that will route your request, such as when you try to browse a website, to the Internet. It is a bit more complicated than that though as gateways or routers can route traffic to various different networks, even other private networks. At your home or small office, this gateway most likely is your cable/dsl modem or router.

DHCP Server . . . . . . . . . . . : 192.168.0.49
The DHCP server, remember we talked a little about this above, is the device that assigns your computer an IP address and other information. DHCP servers can assign all kinds of information such as; Default Gateway, Domain Name Servers (DNS), IP address, Subnet Mask, Time Server, and much more.

DNS Servers . . . . . . . . . . . : 192.168.0.49, 64.105.197.58
DNS Servers are internal or external servers that resolve Fully Qualified Domain Names (FQDN), such as www.defendingthenet.com , to IP addresses. This is done because computers don't actually transmit your requests using the domain name, they use the IP address assigned to the FQDN. For most home or small office users, the primary DNS server is the IP address of your cable/dsl router. Your cable/dsl router than queries an external DNS server on the Internet to perform the actual resolution of the FQDN to IP address. The address 192.168.0.49 is an internal private device on my network whereas the 64.105.197.58 is an external public Internet DNS server and is present just in case my router has trouble performing the DNS resolution tasks.

Lease Obtained. . . . . . . . . . : Sunday, March 19, 2006 6:38:16 PM
This information tells you when your computer received its IP address and other information from a DHCP server. You will notice it says "Lease Obtained", that is because most DHCP servers only lease the IP address to you from a pool of available address. For instance, your pool may be 192.168.1.1 through 192.168.1.50. So your DHCP server has 50 IP addresses to choose from when assigning your computer its IP address.

Lease Expires . . . . . . . . . . : Wednesday, March 29, 2006 9:38:16 PM
When the IP address, assigned by the DHCP server, lease expires it will attempt to lease you the same or another IP address. This function can typically be changed on the DHCP server. For instance, on some fully functional DHCP servers, you can configure the Lease to never expire, or to expire within 1 day and so on.

Why Are MAC Addresses So Important And How Do They Work
------------------------------------------------------
To jump back to MAC address for just a bit. You may think that IP addresses are the most important thing when it comes to network communication. The reality is, MAC addresses are very important because without them computers would not be able to communicate over Ethernet networks. When a computer wants to speak with another computer on a local network, it will make a broadcast request, or ask a question, of who owns a particular IP address. For instance, your computer may say "Who is 192.168.0.254". Using the information above, my default gateway is 192.168.0.254 and will answer "I am "00-90-4B-F1-6E-4A" 192.168.0.254". It sends back its MAC address. That MAC address then goes into what is called a Address Resolution Protocol (ARP) table on your computer. You can see this information by going to the command prompt like you did above and typing "arp –a". You will get information like the following:


Internet Address Physical Address Type
192.168.0.49 00-12-17-5c-a2-27 dynamic
192.168.0.109 00-12-17-5c-a2-27 dynamic
192.168.0.112 00-0c-76-93-94-b2 dynamic
192.168.0.254 00-0e-2e-2e-15-61 dynamic

How A Hacker Can Use MAC Addresses In An Attack
----------------------------------------------
You will notice the IP addresses and to the right of them the MAC addresses. Without this information, without the MAC address, you would not be reading this article right now. MAC addresses are not routable like IP addresses. They work on your local or private network. However, devices on the Internet perform the same tasks. Routers and switches maintain a list of their peer devices MAC address just like your computers and devices on your home or office network. I mentioned above that MAC addresses can be changed in order to redirect requests. For instance, if I were on your office network and you had an internal web server that took personal information as input, I could tell your computer to go to my laptop for the web site by broadcasting my MAC address tied to the real web servers IP address. I would do this when you computer asked "Who is the "Real Web Server"". I could setup a fake web server that looks just like the real thing, and start collecting information the real web server would normally collect. You can see how dangerous this can be.

Conclusion
-----------
There are several other easy ways you can find your MAC address but they can be a little confusing if you have more than one internal network card. Most external USB, or PCMCIA wired and wireless Ethernet cards have their MAC address printed on them. In cases where the wired or wireless network card are inside your computer, such as in laptops, the MAC address is sometimes printed on the bottom of the laptop. Even Desktop systems cards that are inserted in PCI slots have the MAC address printed on the Ethernet card.

You may reprint or publish this article free of charge as long as the bylines are included.

Original URL (The Web version of the article)
------------
http://www.defendingthenet.com/NewsLetters/FindingYourMACAddressOnWiredAndWirelessNetworkCards.htm

About The Author
----------------
Darren Miller is an Information Security Consultant with over seventeen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. If you would like to contact Darren you can e-mail him at Darren.Miller@defendingthenet.com. If you would like to know more about computer security please visit us at http://www.defendingthenet.com.


in Networks

How To Find Your IP Address . DNS Address . IPv4 . IPv6

Selasa, 01 Februari 2011 0 komentar

IP address
(Internet Protocol address) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)-in simpler terms, a computer address. Any participating network device-including routers, computers, time-servers, printers, Internet fax machines, and some telephones-can have their own unique address.
An IP address can also be thought of as the equivalent of a street address or a phone number ( compare: VoIP (voice over (the) internet protocol)) for a computer or other network device on the Internet. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network. An IP address differs from other contact information, however, because the linkage of a user's IP address to his/her name is not publicly available information.
IP addresses can appear to be shared by multiple client devices either because they are part of a shared hosting web server environment or because a network address translator (NAT) or proxy server acts as an intermediary agent on behalf of its customers, in which case the real originating IP addresses might be hidden from the server receiving a request. A common practice is to have a NAT hide a large number of IP addresses, in the private address space defined by RFC 1918, an address block that cannot be routed on the public Internet. Only the "outside" interface(s) of the NAT need to have Internet-routable addresses.
Most commonly, the NAT device maps TCP or UDP port numbers on the outside to individual private addresses on the inside. Just as there may be site-specific extensions on a telephone number, the port numbers are site-specific extensions to an IP address.
IP addresses are managed and created by the Internet Assigned Numbers Authority (IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in turn allocate smaller blocks to Internet service providers and enterprises.

DNS Address:

On the Internet, the Domain Name System (DNS) associates various sorts of information with so-called domain names; most importantly, it serves as the "phone book" for the Internet: it translates human-readable computer hostnames, e.g. en.wikipedia.org, into the IP addresses that networking equipment needs for delivering information. It also stores other information such as the list of mail exchange servers that accept email for a given domain. In providing a worldwide keyword-based redirection service, the Domain Name System is an essential component of contemporary Internet use.

Uses :

The most basic use of DNS is to translate hostnames to IP addresses. It is in very simple terms like a phone book. For example, if you want to know the internet address of en.wikipedia.org, the Domain Name System can be used to tell you it is 66.230.200.100. DNS also has other important uses.
Pre-eminently, DNS makes it possible to assign Internet destinations to the human organization or concern they represent, independently of the physical routing hierarchy represented by the numerical IP address. Because of this, hyperlinks and Internet contact information can remain the same, whatever the current IP routing arrangements may be, and can take a human-readable form (such as "wikipedia.org") which is rather easier to remember than an IP address (such as 66.230.200.100). People take advantage of this when they recite meaningful URLs and e-mail addresses without caring how the machine will actually locate them.
The Domain Name System distributes the responsibility for assigning domain names and mapping them to IP networks by allowing an authoritative server for each domain to keep track of its own changes, avoiding the need for a central registrar to be continually consulted and

History :

The practice of using a name as a more human-legible abstraction of a machine's numerical address on the network predates even TCP/IP, and goes all the way to the ARPAnet era. Back then however, a different system was used, as DNS was only invented in 1983, shortly after TCP/IP was deployed. With the older system, each computer on the network retrieved a file called HOSTS.TXT from a computer at SRI (now SRI International). The HOSTS.TXT file mapped numerical addresses to names. A hosts file still exists on most modern operating systems, either by default or through configuration, and allows users to specify an IP address (eg. 192.0.34.166) to use for a hostname (eg. www.example.net) without checking DNS. As of 2006, the hosts file serves primarily for troubleshooting DNS errors or for mapping local addresses to more organic names. Systems based on a hosts file have inherent limitations, because of the obvious requirement that every time a given computer's address changed, every computer that seeks to communicate with it would need an update to its hosts file.
The growth of networking called for a more scalable system: one that recorded a change in a host's address in one place only. Other hosts would learn about the change dynamically through a notification system, thus completing a globally accessible network of all hosts' names and their associated IP Addresses.
At the request of Jon Postel, Paul Mockapetris invented the Domain Name System in 1983 and wrote the first implementation. The original specifications appear in RFC 882 and 883. In 1987, the publication of RFC 1034 and RFC 1035 updated the DNS specification and made RFC 882 and RFC 883 obsolete. Several more-recent RFCs have proposed various extensions to the core DNS protocols.
In 1984, four Berkeley students - Douglas Terry, Mark Painter, David Riggle and Songnian Zhou - wrote the first UNIX implementation, which was maintained by Ralph Campbell thereafter. In 1985, Kevin Dunlap of DEC significantly re-wrote the DNS implementation and renamed it BIND (Berkeley Internet Name Domain, previously: Berkeley Internet Name Daemon). Mike Karels, Phil Almquist and Paul Vixie have maintained BIND since then. BIND was ported to the Windows NT platform in the early 1990s.
Due to BIND's long history of security issues and exploits, several alternative nameserver/resolver programs have been written and distributed in recent years.
How DNS Work In The Theory :
The domain name space consists of a tree of domain names. Each node or branch in the tree has one or more resource records, which hold information associated with the domain name. The tree sub-divides into zones. A zone consists of a collection of connected nodes authoritatively served by an authoritative DNS nameserver. (Note that a single nameserver can host several zones.)
When a system administrator wants to let another administrator control a part of the domain name space within his or her zone of authority, he or she can delegate control to the other administrator. This splits a part of the old zone off into a new zone, which comes under the authority of the second administrator's nameservers. The old zone becomes no longer authoritative for what goes under the authority of the new zone.
A resolver looks up the information associated with nodes. A resolver knows how to communicate with name servers by sending DNS requests, and heeding DNS responses. Resolving usually entails iterating through several name servers to find the needed information.
Some resolvers function simplistically and can only communicate with a single name server. These simple resolvers rely on a recursing name server to perform the work of finding information for them.

IPv4:

Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. IPv4 is the dominant network layer protocol on the Internet and apart from IPv6 it is the only protocol used on the Internet.
It is described in IETF RFC 791 (September 1981) which made obsolete RFC 760 (January 1980). The United States Department of Defense also standardized it as MIL-STD-1777.
IPv4 is a data-oriented protocol to be used on a packet switched internetwork (e.g., Ethernet). It is a best effort protocol in that it does not guarantee delivery. It does not make any guarantees on the correctness of the data; It may result in duplicated packets and/or packets out-of-order. These aspects are addressed by an upper layer protocol (e.g., TCP, and partly by UDP).
The entire purpose of IP is to provide unique global computer addressing to ensure that two computers communicating over the Internet can uniquely identify one another.

Addressing :

IPv4 uses 32-bit (4-byte) addresses, which limits the address space to 4,294,967,296 possible unique addresses. However, some are reserved for special purposes such as private networks (~18 million addresses) or multicast addresses (~1 million addresses). This reduces the number of addresses that can be allocated as public Internet addresses. As the number of addresses available are consumed, an IPv4 address shortage appears to be inevitable, however Network Address Translation (NAT) has significantly delayed this inevitability.
This limitation has helped stimulate the push towards IPv6, which is currently in the early stages of deployment and is currently the only contender to replace IPv4.

Allocation :

Originally, the IP address was divided into two parts:

* Network id : first octet
* Host id : last three octets

This created an upper limit of 256 networks. As the networks began to be allocated, this was soon seen to be inadequate.
To overcome this limit, different classes of network were defined, in a system which later became known as classful networking. Five classes were created (A, B, C, D, & E), three of which (A, B, & C) had different lengths for the network field. The rest of the address field in these three classes was used to identify a host on that network, which meant that each network class had a different maximum number of hosts. Thus there were a few networks with lots of host addresses and numerous networks with only a few addresses. Class D was for multicast addresses and class E was reserved.
Around 1993, these classes were replaced with a Classless Inter-Domain Routing (CIDR) scheme, and the previous scheme was dubbed "classful", by contrast. CIDR's primary advantage is to allow re-division of Class A, B & C networks so that smaller (or larger) blocks of addresses may be allocated to entities (such as Internet service providers, or their customers) or Local Area Networks.
The actual assignment of an address is not arbitrary. The fundamental principle of routing is that address encodes information about a device's location within a network. This implies that an address assigned to one part of a network will not function in another part of the network. A hierarchical structure, created by CIDR and overseen by the Internet Assigned Numbers Authority (IANA) and its Regional Internet Registries (RIRs), manages the assignment of Internet address worldwide. Each RIR maintains a publicly searchable WHOIS database that provides information about IP address assignments; information from these databases plays a central role in numerous tools that attempt to locate IP addresses geographically.

IPv6:

Internet Protocol version 6 (IPv6) is a network layer protocol for packet-switched internetworks. It is designated as the successor of IPv4, the current version of the Internet Protocol, for general use on the Internet.
The main improvement brought by IPv6 is a much larger address space that allows greater flexibility in assigning addresses. While IPv6 could support 2128 (about 3.4׳1038) addresses, or approximately 5׳1028 addresses for each of the roughly 6.5 billion people[1] alive today. It was not the intention of IPv6 designers, however, to give permanent unique addresses to every individual and every computer. Rather, the extended address length eliminates the need to use network address translation to avoid address exhaustion, and also simplifies aspects of address assignment and renumbering when changing providers.

Introduction :

By the early 1990s, it was clear that the change to a classless network introduced a decade earlier was not enough to prevent IPv4 address exhaustion and that further changes to IPv4 were needed.[2] By the winter of 1992, several proposed systems were being circulated and by the fall of 1993, the IETF announced a call for white papers (RFC 1550) and the creation of the "IP, the Next Generation" (IPng Area) of working groups.[2][3]
IPng was adopted by the Internet Engineering Task Force on July 25, 1994 with the formation of several "IP Next Generation" (IPng) working groups.[2] By 1996, a series of RFCs were released defining IPv6, starting with RFC 2460. (Incidentally, IPv5 was not a successor to IPv4, but an experimental flow-oriented streaming protocol intended to support video and audio.)
It is expected that IPv4 will be supported alongside IPv6 for the foreseeable future. IPv4-only nodes (clients or servers) will not be able to communicate directly with IPv6 nodes, and will need to go through an intermediary

Features of IPv6 :

[edit] To a great extent, IPv6 is a conservative extension of IPv4. Most transport- and application-layer protocols need little or no change to work over IPv6; exceptions are applications protocols that embed network-layer addresses (such as FTP or NTPv3).
Applications, however, usually need small changes and a recompile in order to run over IPv6.

Larger address space :

The main feature of IPv6 that is driving adoption today is the larger address space: addresses in IPv6 are 128 bits long versus 32 bits in IPv4.
The larger address space avoids the potential exhaustion of the IPv4 address space without the need for network address translation (NAT) and other devices that break the end-to-end nature of Internet traffic. NAT may still be necessary in rare cases, but Internet engineers recognize that it will be difficult in IPv6 and are trying to avoid it whenever possible. It also makes administration of medium and large networks simpler, by avoiding the need for complex subnetting schemes. Subnetting will, ideally, revert to its purpose of logical segmentation of an IP network for optimal routing and access.
The drawback of the large address size is that IPv6 carries some bandwidth overhead over IPv4, which may hurt regions where bandwidth is limited (header compression can sometimes be used to alleviate this problem). IPv6 addresses are harder to memorize than IPv4 addresses, although even IPv4 addresses are much harder to memorize than Domain Name System (DNS) names. DNS protocols have been modified to support IPv6 as well as IPv4.

Stateless auto configuration of hosts :

IPv6 hosts can be configured automatically when connected to a routed IPv6 network. When first connected to a network, a host sends a link-local multicast request for its configuration parameters; if configured suitably, routers respond to such a request with a router advertisement packet that contains network-layer configuration parameters.
If IPv6 autoconfiguration is not suitable, a host can use stateful autoconfiguration (DHCPv6) or be configured manually. Stateless autoconfiguration is only suitable for hosts: routers must be configured manually or by other means

IPv6 scope :

IPv6 defines 3 unicast address scopes: global, site, and link.
Site-local addresses are non-link-local addresses that are valid within the scope of an administratively-defined site and cannot be exported beyond it.
Companion IPv6 specifications further define that only link-local addresses can be used when generating ICMP Redirect Messages [ND] and as next-hop addresses in most routing protocols.
These restrictions do imply that an IPv6 router must have a link-local next-hop address for all directly connected routes (routes for which the given router and the next-hop router share a common subnet prefix).

Links:

Find IP Info: link http://www.ip-adress.com
Find DNS, IPv4, IPv6 : link: http://www.iplobster.com
Find IP Address: link http://www.myip.dk

in Networks

Jenis Sistem Operasi

0 komentar
Pada masa sekarang sebagian besar orang memanfaatkan teknologi komputerisasi, misal saja komputer dan handphone. Karena itulah, untuk berinteraksi dengan alat-alat tersebut manusia membutuhkan suatu antarmuka, yaitu berupa perangkat lunak (software). Perangkat lunak ini bermanfaat untuk membuat komputer dapat berinteraksi atau melakukan apa yang manusia inginkan dan perintahkan. Perangkat lunak yang digunakan untuk mengatur suatu penggunaan Perangkat keras (hardware) komputer selain BIOS disebut sistem operasi (operating system).
Sekarang ini banyak sekali tipe/jenis sistem operasi untuk untuk mengkoordinir suatu komputer ataupun handphone. Nah, untuk lebih jelasnya lagi mari kita kenali bersama masing-masing sistem operasi tersebut.


Sistem Operasi untuk komputer:
  • UNIX
    Termasuk sistem operasi yang paling awal ada untuk komputer. Merupakan induk dari sistem operasi linux.
  • DOS
    Sistem operasi yang merupakan cikal bakal dari micro**oft Windows. Ciri khasnya yaitu berupa teks putih dengan latar belakang hitam. Kalau mau mencobanya bisa lewat Start Windows – Run, lalu ketik cmd.
  • Novell Operating Sistem
    Dibuat oleh Novell Corporation. Sistem operasi yang dulu pernaha digunakan oleh Fakultas MIPA UGM untuk Entry Key-In KRS mahasiswa.
  • microsoft Windows
    Merupakan sistem operasi yang paling populer. Hampir semua orang pernah memakainya. Beberapa versi micro**oft Windows yang terkenal: micro**oft Windows 98, 2000, Me, XP, Vista, dan yang paling terbaru Windows 7.
  • Apple Machintos
    System operasi yang unggul dalam hal grafik. Memerlukan hardware khusus sehingga tidak dapat di-install di computer biasa. Versinya antara lain Mac OS X (Tiger), Leopard.
  • Linux
    Pertama kali dikembangkan oleh Linus Torvald. Merupakan sistem operasi open source artinya bisa dikembangkan oleh semua orang dengan bebas. Turunan linux atau yang dikenal dengan distro linux banyak sekali macamnya. Mungkin linux merupakan sistem operasi yang paling banyak. Beberapa di antaranya yaitu: Debian, Suse, Red Hat (Fedora), Slackware, Ubuntu, Backtrack, dan lain-lain
  • Solaris
    Dikembangkan oleh Sun Microsystem. Lebih banyak digunakan untuk perusahaan.
  • Free BSD
    Dibuat oleh Universitas Berkeley. Hampir sama seperti linux.
Sistem Operasi untuk handphone:
  • Symbian
    Sistem operasi yang populer di kalangan para pengguna handphone. Kebanyakan handphone nokia menggunakan symbian sebagai sistem operasi. Versinya antara lain S40, S60, S9
  • microsoft Windows Mobile
    Sistem operasi yang dikeluarkan oleh micro**oft untuk smartphone dan PDA. Tampilannya hampir sama dengan Windows pada komputer.
  • Palm OS
    Sistem operasi yang digunakan pada PDA keluaran PALM.
  • Android
    Sistem operasi untuk handphone yang akan diluncurkan Google. Android berbasis Linux sehingga termasuk open source.
Nah, Apabila ada yang kurang dan ada yang salah dalam penjelasannya, saya berharap temen-temen semua berminat untuk meluangkan sebaris dua baris penjelasan yang benar, dengan cara meninggalkan komentar dibawah. Thanks semoga bermanfaat

Sumber

Baca Artikel Dapat Duit

Kamis, 27 Januari 2011 0 komentar
readbud - get paid to read and rate articles

Satu lagi sumber penghasilan yang bisa kamu dapat dari internet. yaitu kamu dibayar hanya untuk membaca dan rate sebuah artikel. dari hasil blogwalking, saya mendapatkan info bahawa hanya dengan membaca dan rate 24 artikel, bisa dapat $1.40, karena setiap artikel harganya berbeda-beda berkisar $0.03-0.09.

Payment akan dilakukansetelah pendapatan anda mencapai $50. dan program ini terbukti tidak scam kok. setelah saya mencari di google dengan keyword payment proof , saya menemukan blog yang mempublish payment proof dari program ini. dan pembayarannya adalah bulan april 2010, jadi belum lama.

o ya, anda juga bisa menggunakan affiliate program dari readbud. setelah referal anda mendapatkan payment. anda mendapatkan $5 ke akun anda. bagaimana? tertarik?

segera daftar disini

Cara bergabung Readbud :

  • Daftar Readbud di sini: Gabung Readbud
  • Setelah mendaftar cek email anda untuk konfirmasi
  • Login ke Account Readbud Anda
  • Lalu klik Interest (pilih kategori bacaan yang anda sukai)
  • Untuk mendapatkan earning dari Readbud klik menu ARTICLES yang ada di member area (setelah Anda login)
  • Setelah artikel terbuka (Anda bisa lihat harga artikel yang diberikan) kemudian klik Open articles
  • Kemudian klik RATE THIS ARTICLES untuk nge-rate artikel tersebut (dengan dengan klik gambar bintang ) tugas anda selesai.
  • Untuk melihat Eerning Anda dari Readbud, klik menu HOME maka akan kelihatan jumlah earning yang telah anda kumpulkan.

Pembayaran minimal adalah $50 melalui Paypal!

Jika anda belum memiliku akun di Paypal Bisa Langsung daftar DISINI, dan untuk memVerifikasi Akun anda bisa anda baca DISINI. (tanpa memerlukan VCC / Kartu Kredit) cukup biaya Inet dan Scan doank

cara memaksimalkan pendapatan readbud

-------------------------------------------
Tentu bila anda sudah mendaftar readbud, pasti anda tau bahwa semakin banyak kita membaca dan rate artikel tiap hari, akan semakin banyak earning kita. tetapi masalahnya artikel yang dapat kita rate terbatas. padahal jumlah artikel yang masuk ke readbud sangat banyak setiap harinya.

untuk memperbanyak artikel yang bisa kita baca kita bisa melakukan hal-hal berikut :

Perlama selang waktu antara membuka artikel dengan ratenya. jika kita membuka artikel dan langsung me-rate begitu saja, dapat dipastikan kita tidak akan mendapatkan banyak artikel di hari berikutnya.

Klik iklan yang ada di halaman readbud. Kita tahu bahwa readbud mendapatkan penghasilan dari iklan. dan penghasilan itulah yang dibagikan kepada kita setiap harinya melalui membaca artikel-artikelnya. oleh karena itu kita harus meng-klik iklan pada readbud agar penghasilan readbud semakin bertambah. sehingga uang yang dibagikan kepada kita juga lebih banyak. tetapi untuk klik iklan jangan banyak-banyak. cukup satu kali perhari. jika iklan diklik berkali-kali dari IP yang sama, maka klik tersebut dianggap tidak sah.

Nah, bagaimana, siap untuk mendapatkan penghasilan lebih banyak dari readbud?


Sobatku

0 komentar
Aku Punya dot com

Fitur Tersembunyi Pada Photoshop

Rabu, 26 Januari 2011 0 komentar
Adobe Photoshop, Program yang pastinya sudah tidak asing lagi yang sering kita dengar dimana-mana, merupakan program yang bertugas untuk mengedit foto jepretan gambar bitmap, merupakan program terwahit dalam abad ini. Betapa tidak, di Adobe Photoshop telah tersedia berbagai fitur yang sangat lengkap (Menurut saya) yang menyediakan tool lengkap dalam hal memperbaiki, mengedit, dan mengolah gambar berbasis Bitmap.

Postingan kali ini, bukanlah sebuah tutorial yang harus anda ikuti, tapi jika anda penasaran silahkan ikuti step-step berikut untuk melihat salah satu fitur tersembunyi yang ada di dalam photohsop. Perlu diketahui fitur ini sebetulnya tidaklah membuat anda menjadi ahli dalam photohsop designer, dan trik ini tidak berhubungan sama sekali dengan cara mengedit foto, gambar, dan lainnya. Juga, perlu diketahui bahwa hal ini cuma saya test di Adobe Photoshop CS3.

Langkah 1

Buka program Adobe Photoshop CS3 anda.

Langkah 2

Sambil menekan tombol Ctrl pada keyboard, klik help dan About Photoshop…

Langkah 3

Anda akan melihat about photoshop yang berbeda jika anda mengklik About Photoshop tanpa menekan tombol Ctrl, tapi dengan atau sambil menekan tombol Ctrl, anda akan melihat halaman About Adobe ReedPill

Langkah 4

Tekan Print Screen Sysrq atau Prt Sc SysRq yang berguna untuk mengcapture gambar tersebut. Selanjutnya buat file baru dengan photohsop, tidak usah diganti ukuran filenya langsung tekan OK. Paste gambar hasil capture dengan cara menekan Ctrl + V (Paste) pada keyboard.


Langkah 5

Crop hanya pada bagian About Red Pill tersebut dengan Crop Tool. Lalu ubah kemenu image > adjustments > Levels


ubah levelnya menjadi terang, sangat terang


Hasil yang anda dapatkan
Langkah 6

Sangat mengejutkan bukan ? Ada gambar merah telapak kaki. Selanjutnya kita buat yang sebaliknya, yakni menggelapkan dengan Levels. Hasilnya


Hebatkan? ..
siapakah Bruce Fraser itu?

Bruce Fraser, yang fotonya di Adobe Red Pill tersebut adalah Seorang penulis pertama buku-buku photoshop. Bahkan namanya juga ada pada daftar kredit photoshop.

Sedangkah kucing kecil yang ada pada bola merah Adobe Red Pill, merupakan Maskot Photoshop versi sebelumnya, yakni Adobe Photoshop V. 4.0 yang bernama Electrik Cat

Demikian Fitur aneh yang ada pada photoshop, Sekali lagi, perlu anda ketahui bahwa dengan mengenal fitur ini anda tidak akan segera mahir dengan photoshop tapi ini hanyalah sedikit fitur aneh yang mungkin membuat anda lebih dekat dengan program photoshop ini, seperti kata pepatah “Tak kenal maka tak sayang ” hehe. Tapi, jika anda ingin mahir photoshop, belajarlah yang giat dan jangan lupa untuk menunggu Update artikel terkini dari blog Photoshop turorial ini dengan cara mensubscribe blog ini .

Semoga bermanfaat dan berguna bagi yang sedang memahami Adobe Photoshop.


Diambil dari http://jakazulham.blogspot.com/2011/01/fitur-tersembunyi-pada-photoshop.html

TVI Express

0 komentar
Bisnis Yang Luar Biasa Telah Hadir …..

Bisnis ini bagus banget .. Dengan modal bisnis senilai 2,6jt kita berpeluang untuk mendapatkan 10.000 US dollar berulang ulang. Keuntungan join bisnis ini selain jadi member, kita bisa menjadi agent, plus bonus keanggotaan berupa fasilitas menginap selama 7 hari 6 malam di hotel bintang 3-5 diseluruh dunia (Room Only, and booked by website).

Dengan join bisnis ini berarti kita juga membeli frenchise keagenan..
Keuntungannya:
  • Kita memiliki web sendiri untuk berbisnis
  • Kita bisa memesan tiket pesawat, hotel, dan rencana berlibur kita sendiri tanpa perlu ke travel agent.
Kita bisa bisnis dari rumah, dan punya banyak waktu untuk keluarga….



Tentang Aku

0 komentar

Name

Cahyo Anton Setyono

Nick Name

Anton

Date/Place Of Birth

Magetan, 24 Januari ****

Permanent Address

Jl. Raya Kebonsari, Dsn. Binowo, Ds. Balerejo, Kec. Kebonsari, Kab. Madiun

Job

Instruktur IT SMKN 1 Kebonsari

Email

anton_cisco@yahoo.com


Tutorial dan Tips Verifikasi Paypal tanpa VCC dan Kartu Kredit

Selasa, 25 Januari 2011 0 komentar
Sign up for PayPal and start accepting credit card payments instantly.
Pertama saya minta maaf kpd temen2 mungkin ini Repost, Tulisan ini saya ambil dari Kang Agus [IDWS MVU] tapi saya ingin berbagi pengalaman dengan temen2 semua. Bagi yang mempunyai Akun di Paypal dapat di coba Tips2 berikut ini. Sebagian dapet referensi dari website lain. tutorial ini saya bagi menjadi 2 LANGKAH. Saya verifikasi akun paypal saya cuma pake Bank M**D**I

================================================== ===============

langkah pertama(di ikuti ya gan)

1. Punya rekening bank (semua bank lokal di indonesia bisa bro..tinggal pilih aja)

2. Punya alamat email

3. Punya paypal/ minimal tahu cara daftar paypal

4. Jika akun paypal anda masih biasa, bisa ditingkatkan menjadi primer karena biar nanti bisa bertransaksi, untuk caranya bisa gogling aja

begini nih :

- Saya asumsikan bahwa anda udah daftar dan punya akun paypal (bagi yang belum, anda bisa memulainya sambil baca tutorial ini) atau klik disini untuk daftar Paypal

- Paypal anda belum pernah dikunjungi BOTnya paypal pusat/ kena limited access

- NAMA ANDA HARUS SAMA PERSIS DENGAN NAMA DI BUKU TABUNGAN

- Pastikan alamat yang ada di paypal itu sama dengan yang di KTP/ SIM/ Buku Tabungan
kalau belum sama, bisa anda ganti di bagian edit/ add address
saran saya adalah jika di alamat KTP atau SIM ada sedikit perbedaan dengan alamat di buku tabungan, maka anda bisa add/ menambahkan alamat baru yang sama dengan buku tabungan anda dan jadikan alamat rumah/ home

yang di jadikan "HOME" berarti itu juga akan dijadikan alamat di buku tabungan
sedangkan yang "MAKE HOME" berarti itu alamat cadangan/ beda penulisan/ RT.TW..dll

- setelah itu pilih tab profil, add/ edit bank account, pilih add

nama di paypal harus sama dengan di buku tabungan jika belum sama, bisa di klik change the name, dan silahkan diubah untuk sandi bank, nanti akan saya kasih linknya, dan anda bisa cek sendiri

dan jika berhasil, di daftar bank account paypal anda akan ada nama bank dan 4 nomor belakang tabungan anda. ini adalah daftar bank indonesia berserta kodenya : Downoad Disini atau liat di Link Berikut ini Kode Bank

tapi ingat, anda harus login dulu ke paypal dan silahkan buka link diatas

penting :

- Silahkan isi bag" bank name" sama dengan daftar bank Indonesia

- Silahkan isi bag" bank code" dengan 7 angka yang ada di daftar bank indonesia tadi

Tahap Satu Selesai

untuk langkah berikutnya adalah permohonan kepada paypal, disimak ya ……..

- Pilih contact us

- Ada 3 pilihan, pilih saja email us (send us a question by email)

- Pilih credit card link and confirm

pada bag " summarize your question" tulis saja, can i verified paypal with bank account" ya intinya bisa nggak saya verifikasi akun paypal denga buku tabungan, gitu aja..hehehe..tp terserah anda sendiri

setelah di klik next, selanjutnya akan muncul halaman ini:

- Pilih NO, isi 4 nomor belakang dari tabungan anda

- Untuk yang opsional gak diisi juga gak pa2

- Pada bag additional information, bisa anda isi : nama, alamat, no tabungan, dll
pilih next dan selesai

sekarang anda tinggal nunggu balesan dari paypal, biasanya sampe 24 jam, kalo ada email dari paypal yang tulisannya beginian:

Dear (Sensor yach,)

On 01/17/2011, we sent you an email regarding your PayPal account. As part of PayPal's commitment to excellence, we want to make sure we met your needs in our response. Would you please take a minute to answer a few questions to let us know how we did?

http://surveys2.incontact.com/paypal/survey_paypal.taf?survey_id=2110&user_id=3CCCE96C-07D3-4610-BF36-5CF1FE7C9946

To respond to our survey, please click on the web address above. If that does not work, please cut and paste the entire web address into the address field of your browser.

NOTE: This invitation will expire after 5 days.

Thank you for your help!

PayPal Customer Support

** An important note from the survey vendor **

PayPal, as the party who controls the data collected in this survey, may use your responses together with existing data it has about you to ensure its products and services meet your needs. PayPal will treat data collected from you in accordance with PayPal's privacy policy. To review this privacy policy, please contact PayPal or visit PayPal's web site.

If you want to be excluded from future surveys and survey correspondence, please click below:
http://surveys2.incontact.com/paypal/opt_out.taf?id=3CCCE96C-07D3-4610-BF36-5CF1FE7C9946&client=paypal

nah bahan/ DOCUMENT yang harus di persiapkan adalah

- Scan KTP/ SIM (intinya nama dan alamat harus sama dengan buku tabungan)

- Scan tabungan anda (harus jelas nomor tabungannya, nama, alamat dan lain2..

gak usah khawatir, paypal gak bakal bisa ngambil duit anda..

file itu nantinya akan di pelajari, jika memang lengkap dan memenuhi syarat, maka dalam 24 jam akan ada balesan dari paypal yang isinya begini :

Dear (Sensor yach,)

Hello, my name is Jay. I will be happy to assist you with your question.

I understand you want to use bank account to verify your PayPal account.

Actually we can help you to manual verify your PayPal account when you
send the verify documents to us.

The document you need to provide should be:

1.Photo ID(Identification Card/Driver License)

2.A copy of a recent bank statement for the bank account listed on your
PayPal account.

You can send this document to the email address: manualverify@paypal.com

When get your documents, we will help you to verify your PayPal account.

If you need any other further assistance, please do not hesitate to
contact us.

It is my pleasure to assist you. Thank you for choosing PayPal.

Sincerely,
Jay

PayPal, an eBay Company

Copyright © 1999-2011 PayPal. All rights reserved.

Consumer advisory: PayPal Pte Ltd, the Holder of the PayPal™ payment

service stored value facility, does not require the approval of the Monetary Authority of Singapore. Consumers (users) are advised to read the terms and conditions carefully.

Upload File / data KTP dan Scan Rekening Buku Tabungan ke email yang ditunjuk.. file itu nantinya akan di pelajari, jika memang lengkap dan memenuhi syarat, maka dalam 24 jam akan ada balesan dari paypal yang isinya begini :

Dear (Sensor yach,)

Thank you for contacting PayPal in regard to the verify account issue.

We have verified your PayPal account now.

Thank you for using PayPal for your online payment needs.

Sincerely,
Jessie

PayPal Account Review Department

PayPal, an eBay Company

Copyright© 2011 PayPal Inc. All rights reserved.

Consumer advisory: PayPal Pte Ltd is regarded as a stored value facility under Singapore law. As such, it does not require the approval of the Monetary Authority of Singapore. You are advised to read the terms and conditions carefully.

udah deh, jadi

verified tuh paypal biasanya setelah sehari atau dua hari, akan ada free survey/ tingkat kepuasan anda terhadap pelayanan di paypal, ikuti aja instruksinya, dan beres

jd gimana, ada yang tertarik verified pake cara beginian emang sih ribet, tapi gratis, cuma modal inet ama bayar scan doang..

Tutorialnya bisa Di Unduh Disini

Referensi :

http://cebongipiet.blogspot.com/2010/01/cara-verifikasi-paypal-dengan-rekening.html