Kamis, 15 Desember 2011

Hacking For Good Reasons


Hacking For Good Reasons

Until now.
On the 11th March, the UK's Home Office, Cabinet Office and Ministry of Justice opened their doors to 10 technical experts from http://www.rewiredstate.com who used data.gov.uk and the web to develop tools and services that help people.
I've had a look and these are mash-ups -- the combining of two or more services -- with a difference: they are actually useful to people in helping them deal with important life issues.
At the moment, not all of the newly-created projects are working, but we are promised that they will be by the 13th March. Hmm. An IT project delivered on time? Let's see!
Some of them look very useful indeed. For example, One Click Organisations will make it possible for you to generate, at the click of a mouse, the following:
  • A constitution written in plain English
  • An official legal structure so your group can open a bank account
  • A list of group members that’s automatically kept up to date
  • A voting system to help make group decisions
  • A record of every decision that’s been made
  • Easy ways to modify the constitution as your group develops
Just those first two items alone would make it worthwhile using this app, although I think I would still want to have the legal stuff double-checked, just in case.
Moving There and other sites will prove useful to anyone looking to move into an area, in order to check crime and other stats, whilst Job Centre Pro Plus helps you find jobs in your locale. Several apps are concerned with transparency in various contexts. I especially like the sound of Voxpomp, which will collate statements made by MPs during Parliamentary debate and cross-reference them with news stories of the time. The Companies Open House ("Open 24/7, unlike Companies House") works well, allowing you to look up the details of a company unrestricted by the time of day.
There are also fun applications, such as Crime and Punishment 1707 versus 2007, described as "A slight but delightful project mashing up "The Old Bailey online - 1674-1913" and "Ministry of Justice Quarterly sentencing statistics" to compare sentencing for various types of crime." Can't wait for that one, as it will give grumpy old men like me, who think that criminals are given 32 ways of being let off, something else to rant about.
There are more of these 'Hack Days' coming up. In the meantime, to look at the apps I've mentioned in this article, and other examples of what the 'semantic web' might look like, check out the Rewired State website.

Jumat, 09 Desember 2011

teknik dan peraturan permainan bola basket


Bola Basket (biasanya dijuluki "B-bola" atau "lingkaran") adalah olahraga tim di mana dua tim dari lima pemain mencoba mencetak poin dengan melemparkan atau " menembak "sebuah bola melalui bagian atas ring basket saat mengikuti seperangkat aturan . Basket adalah salah satu olahraga dunia yang paling populer dan banyak dilihat.
Sebuah ring basket regulasi terdiri dari pelek 18 inci dan diameter 10 meter dipasang pada papan . Sebuah tim dapat mencetak gol lapangan dengan menembak bola melalui ring saat bermain reguler. Sebuah field goal skor dua poin untuk tim menembak jika seorang pemain menyentuh atau dekat dengan lingkaran itu dari garis three-point , dan tiga poin (a "3 pointer") jika pemain adalah "di luar" garis tiga titik. Tim dengan poin lebih pada akhir pertandingan menang, tapi waktu tambahan (lembur) dapat dikeluarkan ketika pertandingan berakhir dengan dasi. Bola bisa maju di pengadilan dengan memantulkan itu sambil berjalan atau berlari ( dribbling ) atau diteruskan ke rekan satu tim. Ini adalah pelanggaran ( bepergian ) untuk berjalan dengan bola, membawa , atau untuk ganda menggiring bola (untuk menahan bola dan kemudian melanjutkan dribbling).
Berbagai pelanggaran yang umumnya disebut "pelanggaran". Mengganggu kontak fisik (a busuk pribadi ) adalah dihukum, dan lemparan bebas biasanya diberikan kepada pemain ofensif jika ia mengotori saat pemotretan bola. Sebuah pelanggaran teknis juga dapat dikeluarkan ketika pelanggaran tertentu terjadi, paling sering untuk melakukan tidak sportif pada bagian dari pemain atau pelatih . Sebuah pelanggaran teknis memberikan tim lawan sebuah lemparan bebas.
Basket telah berkembang teknik yang umum digunakan banyak menembak, melewati, dan menggiring bola, serta khusus posisi pemain dan struktur ofensif dan defensif (pemain posisi) dan teknik. Biasanya, anggota tertinggi dari suatu tim akan bermain "pusat" , " kecil ke depan ", atau" kekuatan maju "posisi, sementara pemain lebih pendek atau mereka yang memiliki keterampilan penanganan bola terbaik dan bermain kecepatan" point guard "atau" shooting guard " .
Sementara basket kompetitif hati-hati diatur, banyak variasi basket telah dikembangkan untuk bermain santai. Basket kompetitif terutama olahraga yang dimainkan di dalam ruangan dan dipelihara dengan hati-hati ditandai lapangan basket , namun variasi yang kurang diatur sering dimainkan di luar ruangan di kedua kota dan pedesaan.
adapun teknik-tekknik permainan bola basket diantaranya :

  • Teknik Melempar (Passing)

          Macam-macam passing/operan dengan dua tangan :
              1. The two hand chest pass : operan setinggi dada/ tolakan dada
              2. The over head pass : operan atas kepala
              3. The bounce pass : operan pantulan
              4. The under hand passa : operan ayunan bawah
          Macam-macam operan dengan satu tangan :
              1. The side arm pass/the base ball pass : operan samping
              2. The lop pass : operan lambung
              3. The back pass : operan gaetan
              4. The jump hand pass : operan lompat
Lemparan tolakan dada dengan dua tangan
Lemparan atau operan ini merupakan lemparan yang sangat banyak dilakukan dalam permainan. Lemparan ini sangat bermanfaat untuk operan jarak pendek dengan perhitungan demi kecepatan dan kecermatan dan kawan penerima bola tidak dijaga dengan dekat. Jarak lemparan ini antara 5 sampai 7 meter.
Lemparan samping
Lemparan samping berguna untuk operan jarak sedang dan jarak kira-kira antara 8 sampai 20 meter, bisa dilakukan untuk serangan kilat.
Lemparan di atas kepala dengan dua tangan
Operan ini biasanya digunakan oleh pemain-pemain jangkung, untuk menggerakkan bola di atas sehingga melampui daya raih lawan. Operan ini juga sangat berguna untuk operan cepat, bila pengoper itu sebelumnya menerima bola di atas kepala.
Lemparan bawah dengan dua dua tangan
Lemparan atau operan ini sangat baik dilakukan untuk operan jarak dekat terutama sekali bila lawan melakukan penjagaan satu lawan satu.
Lemparan kaitan
Operan kaitan sebaiknya diajarkan setelah lemparan-lemparan yang lain dikuasai. Operan ini digunakan untuk dapat melindungi bola dan mengatasi jangkauan lawan terutama sekali bagi lemparan yang lebih pendek dari panjangnya. Ciri lemparan ini : bola dilemparkan di samping kanan/kiri, terletak di atas telinga kiri/kanan dan penerima ada di kiri kanan pelempar. Di samping operan-operan tersebut di atas, masih ada lagi macam-macam operan yang pada hakekatnya adalah merupakan kombinasi dari operan tersebut di atas.
  • Teknik Dasar Menggiring Bola (Dribling)
         Dribbling atau memantul-mantulkan bola (membawa bola) dapat dilakukan dengan sikapberhenti, berjalan atau berlari. Pelaksanaannya dapat dikerjakan dengan tangan kanan atau tangan kiri,  seperti :
         1. Dribble rendah
         2. Dribble tinggi
         3. Dribble lambat
         4. Dribble cepat
  • Menembak Bola ke ring (Shooting)
           Cara memasukkan bola atau menembak (shooting)
           Bila dilihat dari posisi badannya terhadap papan maka dapat dibedakan :
  1. Menghadap papan (facing shoot)
  2. Membelakngi papan (back up shoot)
    • Sedang cara pelaksanaannya dapat dilakukan dengan sikap berhenti, memutar, melompat dan berlari.
  3. Menghadap papan dengan sikap berhenti :
  4. tembakan dua tangan dari dada (two handed set shoot)
  5. tembakan dua tangan dari atas kepala (two handed over head set shoot)
  6. tembakan satu tangan (one hand set shoot)
  7. tembakan satu tangan dari atas kepala (one hand over head shoot)
  8. Menghadap papan dengan sikap melompat
  9. Menghadap papan dengan sikap lari
  10. Membelakangi papan dengan sikap berhenti
  11. Membelakangi papan dengan sikap melompat

Perlengkapan Teknik diantaranya :
  1. Lapangan Permainan
    • Berbentuk persegi panjang dengan ukuran panjang 26 m dan lebar 14 m yang diukur dari pinggir garis batas. Variasi ukuran diperolehkan dengna menambah atau mengurangi ukuran panjang 2 m serta menambah atau mengurangi ukuran lebar 1 m. Di lapangan ini terdapat beberapa ukuran seperti : lingakaran tengah, dan lain sebagainya yang secara jelas dan terperinci akan diuraikan dalam gambar di bawah nanti.
  2. Papan Pantul
    • Papan pantul dibuat dari kayu keras setebal 3 cm atau dari bahan transparant yang cocok. Papan pantul berukuran panjang 180 cm dan lebar 120 cm.. Tinggi papan, 275 cm dari permukaan lantai sampai ke bagian bawah papan, dan terletak tegak lurus 120 cm jaraknya dari titik tengah garis akhir lapangan.
    • ini gambarnya
    • bisa di lihat
    • selanjutnya
  3. Ring Basket
    • Keranjang terdiri dari Ring dan Jala. Ring tersebut dari besi yang keras dengan garis tengah 45 cm berwarna jingga. Tinggi ring 305 cm dari permukaan lantai dan dipasang dipermukaan papan pantaul dengan jarak 15 cm. Sedangkan jala terdiri dari tambah putih digantung pada ring. Panjang jala 40 cm.












Cukup sekian dulu deh penjelasan tentang permainan bola basket.
terimakasih semoga bermanfaat  bagi kalian yang mau belajar permaninan bola basket ini dan bagi kalian juga yang sedang mencari tugas tentang permainan bola basket artikel ini boleh kalian copas deh.

Kunjungi artikel menarik saya yang lain dan tak kalah lebih penting di arsip blog saya.

terimakasih.






Top 5 Most Famous Black Hat Crackers in the words


The portrayal of hackers in the media has ranged from the high-tech super-spy, as in Mission Impossible where Ethan Hunt repels from the ceiling to hack the CIA computer system and steal the "NOC list," to the lonely anti-social teen who is simply looking for entertainment.
The reality, however, is that hackers are a very diverse bunch, a group simultaneously blamed with causing billions of dollars in damages as well as credited with the development of the World Wide Web and the founding of major tech companies. In this article, we test the theory that truth is better than fiction by introducing you to ten of the most famous hackers, both nefarious and heroic, to let you decide for yourself.
1.       Jonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off."
James's major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee usernames and passwords.
James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, "The code itself was crappy . . . certainly not worth $1.7 million like they claimed."
Given the extent of his intrusions, if James, also known as "c0mrade," had been an adult he likely would have served at least 10 years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he's learned his lesson and might start a computer security company.
2.       Adrian Lamo: Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to do his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."
Lamo's intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it's legal. What Lamo did is not.
When he broke into The New York Times' intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times' LexisNexis account to research high-profile subject matter.
For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.
3.       Kevin Mitnick: A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.
Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation's computer network and stealing software.
Mitnick's mischief got serious when he went on a two and a half year "coast-to-coast hacking spree." The CNN article, "Legendary computer hacker released from prison," explains that "he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system." He then hacked into computer expert and fellow hacker Tsutomu Shimomura's home computer, which led to his undoing.
Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.
4.       Kevin Poulsen: Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio's KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement dubbed him "the Hannibal Lecter of computer crime."
Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.
His hacking specialty, however, revolved around telephones. Poulsen's most famous hack, KIIS-FM, was accomplished by taking over all of the station's phone lines. In a related feat, Poulsen also "reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency." Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.
Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.
5.       Robert Tappan Morris: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.
Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years' probation, 400 hours of community service and a fined $10,500.
        Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence  Laboratory.  He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.