Alcon ASU-24005g configuration. Outdoor WLAN 802.11g 54 Mbps
1. Introduction
Wireless Access Point ASU-24005g model works on the Ethernet standard 802.11b and 802.11g, the ability to transfer data at 54 Mbps (108 Mbps Super G Mode) at a frequency of 2.4 GHz.
ASU-24005g AP is made of plastic that are resistant to the temperature of 150C-650C has the flexibility, rather good, it is an outdoor wireless access point, has a coverage of up to 7 km, 12dBi and signals emanating from the 450 horizontal 400 vertical height of the pole so that the installation does not require an additional antenna again.
Another feature is the access point is able to operate as an AP, AP Bridge, AP Client, Repeater, or AP, the SSID its sensitivity is high enough to easily capture the signal emanating from another AP so it can also still be used for wi-fi hack J.
The process of ASU-24005g AP configuration is web based (web-based GUI interface), making it very easy in configuration using a web browser like internet explorer or mozilla firefox or opera. Accompanied by the AP Locator driver that can be used to reset to the default position in case of errors in configuration or forget the IP Address and password. Configuration can be done in two ways can be remotely through the wireless settings as well as from close range using a cable. For the safety of the AP is equipped with a security method 64-bit/128-bit/152-bit encryption system, can be set up Wi-Fi protected Access (WPA), TKIP, Pre Shared Key Mode and AES.
2. ASU-24005g AP Completeness
A. Panel Antenna
types of panels made of plastic that resists heat terhadar from 150C to 650C, is also resistant to water, distance range up to 7 km, 12 dbi 450 horizontal and vertical beamwidth 400, has a high signal sensitivity. Antenna panel is equipped with (ODU) Cable UTP Cat 5 10/100 mps who are semi-permanently attached to serve as a connection to the router / switch / hub / PC through the POE with a length of 100 m, equipped with 8 MB of SDRAM memory and FLASH memory 2 MB, 54/48/36/24/18/12/6Mbps auto fallback data rate.
B. Power Over Ethernet
Power over Ethernet is a transmission medium and serves as a liaison between the cable (ODU) UTP Cat 5 with a router / switch / hub / pc made of plastic that is waterproof and heat with a temperature of 150C-650C. Because of its name is power then the POE also serves as conductor of DC 12V is equipped with a LED indicator that lights up when it gets current from the adapter.
C. Kabel ODU UTP Cat 5 10/100 Mbps
UTP cat 5 cable data rate of 10/100 or called ODU, has a length of 100 m is already configured by default using the RJ 45 first end connected to the port located on the antenna panel is equipped with a wrapper that serves to protect the entry of water into the antenna, the tip of the Another port is connected to the POE that said ODU.
D. Adapter
Antenna panel that is connected to POE via the cable can not be operated if no current flows in it, it would require an adapter that serves as a producer of power, this adapter has a current source AC 100 ~ 240V is converted into DC 12V with 2A current.
E. Bracket
This bracket serves as a hook panel antenna to the mast / tower, located behind the antenna panel installation.
F. Kabel UTP Cat 5 10/100 Mbps
Pair Cable UTP cat 5 port 10/100 Mbps at a predetermined POE POE is written on the port RJ 45 serves as a media liaison from the POE to the router / swtch / hub / pc.
3. Konfigurasi Access Point
Configuring the access point can be done through the AP Locator drivers who accompanied the CD.
4.1. System Status
This link contains information about the system of ASU-24005g AP, which contains details of the AP system configuration that includes:
System Summary
- System Information
This link bersikan about the System Name or the name of ASU-24005g AP, Ethernet MAC address and Wireless MAC Address of AP ASU-24005g, Country, Firmware Version
- Current IP Settings
This link contains the AP default IP address is 192.168.1.20, Subnet Mask 255.255.255.0, Default Gateway 192.168.1.1, DHCP Client
- Current Wireless Settings
This link contains the Operation Mode of the AP depends on the requirement can be set as an Access Point, Bridge or Access Point Client, Wireless Mode information about the 2.4 GHz 54 Mbps (802.11g), information on the Wireless Network Name (SSID) is a media searching signal and to connect between the AP by AP Client if not connected then emerging SSID is generic, other information in the form of Channel /
Frequency where the AP is working on channel 11 with a frequency of 2462 MHz or 2.6 GHz, the frequency of wireless Ethernet in the market to work in 2.4 - 5.5 GHz, information on Security from the AP on condition of default then the AP does not have any security settings and information shown are disabled but can we set a WPA, TKIP, AES Pre-Shared and others in accordance with our desires, information WDS or Wireless Client Bridge
- Wireless Station List
On this page is automatic when opened it will display detailed information about the AP / wireless client anywhere who has been connected or we associate with the AP, information such as station id or name of the client wireless AP, MAC address, connection status and signal strength, to view information clinet wireless AP details click the MAC Address listed on this page.
Virus “W32.Mydoom.I@mm”
Yahoo Messenger ga ... who know with this title. It is an application that is used to converse with our friends who've punyua id in yahoo.
keseneangan chat were disturbed by the presence of the mysterious virus, and very annoying.
viruses are known by the name W32.Mydoom.I @ mm is a virus that air-type worm, he spread the links-links to IM our friends, then if we click the link friend is a friend then the computer we use will pick up also ...…
wah bahaya tuh…
ngilanginnnya lumayan mudah-mudah susah ko .:D
gini ngilanginnya.
now you do restar computer you use, and then once there try booting into safe mode by pressing F8 and select safe mode.setelah go into safe mode, you log in as administrator, the administrator login to continue after you click Start ->> Search, and locate the file that was svhost.exe name. after the meet svhost.exe then you just delete that file and also you delete svhost32.exe. svhost it is a file that runs the virus.
after delete the file and then you go to start ->> run msconfig keystrokes to get into msconfig. after entry into your msconfig click the Startup menu, then on startup that there is such thing as svhost.exe & svhost32.exe, you lose ceklish in that file, it is useful to have the file path that does not fit the windows startup. after completion of the process it all and then you click ok and restart your computer, insha allah W32.Mydoom.I @ mm udah ga road again .... for more details about W32.Mydoom.I @ mm virus you can see at this link
Worm dan Virus ??..??
The term "virus" is always used as a common threat to any malcode (program or script that created with the goal of harm or harming a computer system), such as worms, trojans and even that is not actually a hoax computer virus, here are a few types of these melcode:
- Computer viruses: refers to programs that have the ability to air-reproduction, infecting other programs and make files as files infektor contracting program.
- Computer worm: refers to an independent program that has the ability to air-reproduction, and even infect the computer system capable of fatherly infect other programs but do not aim to make the infected file as a file infector.
- Trojan horse: refers to an independent program that seems useful, and when in the execution, without the knowledge pegguna, also perform functions that bersipat destructive and detrimental.
- Melicios toolkits: refers to programs that are designed to help create programs that can harm a computer system. Examples of this type of program is a virus maker tool and programs made to help the process of cracking or hacking.
From some of the above can be clear that the worm is an algorithm or a program that reproduces itself from system to system using a storage media or a network.
The worm does not infect other program files with the aim of making the infected file as a file infektor. Worm terinteraksi even work without the user, can damage a data directly or degrade system performance by "tying" the computer system resources and can even be deadly sebuag network. In contrast to infections with viruses that do the 'ride' on the files of other programs, waiting for user interaction and makes the infected files as files infektor.