Progressive metal music - Listen free at Last.fm

Progressive metal music - Listen free at Last.fm

maniakmusik

maniakmusik

Apa Phobia Anda!!!

Fobia ( phobia ) adalah rasa ketakutan yang berlebihan pada sesuatu hal atau fenomena. Fobia bisa dikatakan dapat menghambat kehidupan orang yang mengidapnya. Bagi sebagian orang, perasaan takut seorang pengidap Fobia sulit dimengerti. Itu sebabnya, pengidap tersebut sering dijadikan bulan bulanan oleh teman sekitarnya. Ada perbedaan “bahasa” antara pengamat fobia dengan seorang pengidap fobia. Pengamat fobia menggunakan bahasa logika sementara seorang pengidap fobia biasanya menggunakan bahasa rasa. Bagi pengamat dirasa lucu jika seseorang berbadan besar, takut dengan hewan kecil seperti kecoak atau tikus. Sementara dibayangan mental seorang pengidap fobia subjek tersebut menjadi benda yang sangat besar, berwarna, sangat menjijikkan ataupun menakutkan. ( wiki )
Dari pernyataan Om wiki diatas, Awak Termasuk orang yang mengidap penyakit Phobia tersebut. Awak phobia terhadap Pesawat terbang, yang sedang terbang dan berada dibawah pesawat itu. Apalagi klo sewaktu mandi trus denger suara pesawat, awak langsung buru² selesai mandi. Takut pesawatnya jatuh trus menimpa awak yang lagi mandi. Sampai saat ini ketakutan itu masih ada.
Apakah anda Mengidap penyakit Fobia !!!
Tags: , , , ,

Membuat Database Mysql dengan PHPMyAdmin

Saat ini membuat database MySQL tidak perlu menggunakan cara manual lagi. Karena sekarang sudah banyak tool-tool yang membantu kita untuk membuat database dengan mudah dengan cepat, Salah satunya adalah tool phpMyAdmin, tool ini merupakan salah satu paket dari PHPTriad, jadi apabila Anda menginstall PHPTriad, maka secara otomatis di komputer Anda sudah terinstall juga phpMyAdminnya. Setelah PHPTriad diinstal Aktifkan terlebih dahulu Apache server dan MySQL servernya.
Berikut langkah dalam Mebuat database MySQL dengan phpMyadmin:
1. Buka browser Anda (Internet Explorer/ Mozilla Firefox ), lalu ketikkan pada bagian Address: http://localhost/phpmyadmin/, lalu tekan tombol Enter, maka akan tampil halaman selamat datang dari phpMyAdmin.

2. Untuk membuat database, isikan nama database yang akan dibuat pada bagian Create new database, misalnya: matakuliah (tidak boleh ada spasi), lalu klik tombol Create
3. Maka akan terbentuk sebuah database dengan nama: bukutamu, Anda bisa melihatnya pada bagian jendela kiri di bawah teks Home. Setelah membuat database, maka langkah selanjutnya adalah membuat tabel di dalam database tersebut dengan cara mengisikan nama tabel dan jumlah field di bagian Create new table on database bukutamu, misalnya Name: pilihan dan Fields: 4, lalu klik tombol Go


4. Kemudian isikan field-field beserta atribut lainnya seperti pada gambar dibawah ini


5. Setelah selesai, klik tombol Save, maka akan terbentuk sebuah tabel dengan nama: pilihan beserta field-field didalamnya. Hasilnya seperti gambar dibawah ini



NB: Klik pada gambar agar lebih jelas

Tips regedit

1.Mengganti Wallpaper

HKEY_CURRENT_USER/Control Panel/Desktop

Klik ganda pada wallpaper dan masukkan path gambar yang diinginkan pada Value Data.

2.Mengganti Nama Recycle Bin

HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}

Klik ganda pada option (Default value) dan beri nama baru sesuai yang diinginkan pada Value Data.

3.Memunculkan Rename Pada Recycle Bin

HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}/ShellFolder

Klik ganda pada Attributes > Edit Binary Value. Pada Value Data, ganti angka tersebut menjadi 0000 50 01 00 20.

4.Menyembunyikan Recycle Bin

HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Explorer/Desktop/NameSpace

Hapus subkey {645FF040-5081-101B-9F08-00AA002F954E}, kemudian Restart komputer untuk melihat hasilnya.

Untuk memunculkannya kembali, buat kembali kombinasi angka {645FF040-5081-101B-9F08-00AA002F954E}.

Istilah – Istilah Pada Keamanan Komputer

1.Hacker

Hacker adalah orang yang mempelajari, menganalisa, dan selanjutnya bila menginginkan, bisa membuat, memodifikasi, atau bahkan mengeksploitasi sistem yang terdapat di sebuah perangkat seperti perangkat lunak komputer dan perangkat keras komputer seperti program komputer, administrasi dan hal-hal lainnya, terutama keamanan.

2.White hat hacker

White hat hacker adalah istilah teknologi informasi dalam bahasa Inggris yang mengacu kepada peretas yang secara etis menunjukkan suatu kelemahan dalam sebuah sistem komputer. White hat secara umum lebih memfokuskan aksinya kepada bagaimana melindungi sebuah sistem, dimana bertentangan dengan black hat yang lebih memfokuskan aksinya kepada bagaimana menerobos sistem tersebut.

3.Black hat hacker

Black hat hacker adalah istilah teknologi informasi dalam bahasa Inggris yang mengacu kepada para peretas yang menerobos keamanan sistem komputer tanpa izin, umumnya dengan maksud untuk mengakses komputer-komputer yang terkoneksi ke jaringan tersebut. Istilah cracker diajukan oleh Richard Stallman untuk mengacu kepada peretas dalam arti ini.

4.Cracker

Terjemahan bebas: Pembobol. Orang yang mampu menembus kode dan kode kunci (password) serta memecahkan sistem security tanpa izin atau secara tidak beretika. Istilah {cracker} telah ditemui oleh pengganggu sistem komputer untuk membedakan aktivititas penggunaan komputer yang melanggar aturan atau untuk memberikan istilah yang lebih berdasarkan aktivitasnya. Istilah ini juga membedakan {hacker} yang disebut sebagai seseorang yang mahir dalam menggunakan komputer beserta perintah-perintah dasarnya.

5.Script Kiddie

Sebuah pola serangan yang sering dilancarkan oleh hacker pemula dengan menggunakan alat bantu ringan yang bisa mereka dapatkan di banyak situs hacker lainnya. Alat bantu yang biasanya berisi sederetan skrip sederhana ini mereka gunakan untuk mendeface atau melancarkan DOS (Denial of Service) pada korban yang memiliki exploit. Hacker dengan jam terbang yang lebih tinggi biasanya mencibir hacker pemula yang menggunakan metode ini karena biasanya mereka menggunakan tanpa tahu teknologi dan konsep yang ada di balik pola serangan yang dilancarkan.

6.Elite

Juga dikenal sebagai 3l33t, 3l337, 31337 atau kombinasi dari itu; merupakan ujung tombak industri keamanan jaringan. Mereka mengerti sistem operasi luar dalam, sanggup mengkonfigurasi & menyambungkan jaringan secara global. Sanggup melakukan pemrogramman setiap harinya. Sebuah anugrah yang sangat alami, mereka biasanya effisien & trampil, menggunakan pengetahuannya dengan tepat. Mereka seperti siluman dapat memasuki sistem tanpa di ketahui, walaupun mereka tidak akan menghancurkan data-data. Karena mereka selalu mengikuti peraturan yang ada. Salah satu suhu hacker di Indonesia yang saya hormati & kagumi kebetulan bekas murid saya sendiri di Teknik Elektro ITB, beliau relatif masih muda sekarang telah menjadi seorang penting di Telkomsel.

7.Vulnerability

Vulnerability atau celah keamanan adalah suatu kelemahan yang mengancam nilai integrity, confidentiality dan availability dari suatu asset. Vulnerability tidak hanya berupa software bugs atau kelemahan security jaringan. Namun kelemahan seperti pegawai yang tidak ditraining, dokumentasi yang tidak tersedia maupun prosedur yang tidak dijalankan dengan benar.

8. Security hole

Merupakan Celah dari keamanan system/ mesin Hal tersebut disebabkan karena adanya kelemahan-kelemahan di dalam:

- kebijaksanaan jaringan suatu perusahaan (Policy Vulnerabilities),

- konfigurasi suatu sistem (Configuration Vulnerabilities)

- teknologi yang digunakan (Technology Vulnerabilities).

Kelemahan-kelemahan itu biasanya dimanfaatkan untuk menyusup ke dalam suatu jaringan komputer tanpa diketahui pengelolanya. Beberapa masalah yang bisa timbul antara lain adalah:

- Packet Sniffing,

- Identity Spoofing,

- Data Theft,

- Data Alteration.

Selain hal tersebut di atas, masih banyak lagi masalah-masalah yang dapat timbul dari lemahnya sekuriti suatu jaringan. Ping-of-Death adalah salah satu cara untuk membuat suatu sistem menjadi crash, dengan mengirimkan ping dari suatu remote machine.

Untuk mengatasi hal-hal tersebut di atas, maka dibutuhkan solusi-solusi yang tepat dalam pengimplementasian teknologi jaringan. Jalur komunikasi yang akan dipakai harus benar-benar terjamin keamanan dan kehandalannya.
Diantara solusi untuk menyelesaikan permasalahan security ini adalah melalui:

1. Tunneling protocol,

2. IPSec,

3. Identification process.

9.Bug ( Kesalahan )

Istilah untuk suatu cacat/kesalahan pada software atau hardware yang membuatnya tidak dapat berfungsi sebagaimana mestinya. Proses untuk menemukan dan mengatasi bug disebut sebagai debugging.

Sistem software skala besar dan kompleks, pada prakteknya tidak mudah untuk mengantisipasi setiap gabungan potensial dari kejadian yang akan muncul dalam pemakaiannya. Terutama untuk pembuktian bebas dari kesalahan (bug).

Bug merupakan sebuah kenyataan dalam bidang Teknologi Informasi. Bug ini menjelaskan mengapa dalam daur hidup pengembangan sistem, biaya pengujian lebih mahal dari pada biaya pemrograman. Bug-bug tersebut juga memperlihatkan suatu tingkatan dimana risiko teknologi merupakan risiko bisnis juga.

10.Exploit

Exploit adalah sebuah perangkat lunak yang menyerang kerapuhan keamanan (security vulnerability) yang spesifik namun tidak selalu bertujuan untuk melancarkan aksi yang tidak diinginkan. Banyak peneliti keamanan komputer menggunakan exploit untuk mendemonstrasikan bahwa suatu sistem memiliki kerapuhan.

Memang ada badan peneliti yang bekerja sama dengan produsen perangkat lunak. Peneliti itu bertugas mencari kerapuhan dari sebuah perangkat lunak dan kalau mereka menemukannya, mereka melaporkan hasil temuan ke produsen agar produsen dapat mengambil tindakan. Meskipun demikian, exploit kadang menjadi bagian dari suatu malware yang bertugas menyerang kerapuhan keamanan.

* - Remote Exploite

remote exploit adalah program/eksploit yang jika dijalankan dari mesin kamu dengan sasaran server tertentu, akan mengakibatkan anda mendapatkan root shell di mesin/server sasaran yang berarti kamu mempunyai akses root dimesintsb

* - Local Exploite

Local exploit adalah program/eksploit yang jika dijalankan pada mesin atau target yang telah dijebol sebelumnya. dengan sasaran server itu sendiri, akan mengakibatkan anda mendapatkan root shell di mesin/server sasaran yang berarti kamu mempunyai akses root dimesin .

11. Logical Bomb

Merupakan Salah satu program jahat yang ditempelkan pada program komputer agar memeriksa suatu kumpulan kondisi di sistem. Ketika kondisi-kondisi yang dimaksud ditemui, logik mengeksekusi suatu fungsi yang menghasilkan aksi-aksi tak diotorisasi.

Logic bomb menempel pada suatu program resmi yang diset meledak ketika kondisi-kondisi tertentu dipenuhi. Contoh kondisi-kondisi untuk memicu logic bomb adalah ada atau tidak adanya file tertentu, hari tertentu dari minggu atau tanggal, atau pemakai menjalankan aplikasi tertentu. Begitu terpicu, bomb mengubah atau menghapus data atau seluruh file, menyebabkan mesin berhenti, atau mengerjakan perusakan lain.

12. Penetration Testing

Uji coba yang melakukan verifikasi dari mekanisme perlindungan yang dibuat oleh sistem, melindungi dari hal-hal yang mungkin terjadi.

Tags: Black hat hacker, Bug ( Kesalahan ), cracker, Elite hacker, Exploit, Hacker, Istilah - Istilah Pada Keamanan Komputer, Local Exploite, Logical Bomb, Penetration Testing, Remote Exploite, Script Kiddie, Security hole, Vulnerability, white hat hacker

Keamanan Computer

Apa itu keamanan computer!!
Keamanan computer adalah tindakan pencegahan dari ancaman yang dapat merusak bahkan menghapus file – file yang ada pada computer.

Sudah amankah Computer anda!!!
Pertanyaan itu mungkin dengan sangat mudah kita jawab “Ya” tanpa meninjau kembali tingkat keamanan computer kita dari berbagai ancaman. Ada beberapa ancaman yang dapat mengganggu keamanan Computer, yaitu sebagai berikut :

1. Ancaman dari gangguan alam ( Natural Disaster Threat )
- Terjadinya banjir
- Gempa Bumi
2. Ancaman Manusia ( Human Threat )
- Human Error, kesilapan
- Pemakaian computer oleh teman yang belum begitu mengerti computer
3. Virus Computer

Untuk menghindari dari beberapa ancaman diatas kita dapat melakukan langkah – langkah berikut ini:

1. Back up data anda kedalam media penyimpanan yang lain
- seperti : cd, dvd, hardisk external, atau flaskdisk
2. Selalu Update Antivirus yang anda gunakan
3. Gunakan Password untuk melakukan Login Computer Anda
- bila perlu tambah user untuk mengakses computer anda ( 1 login user & 1 lagi login
administrator yang diberi password )
4. Protect / kunci folder yang dianggap rahasia
5. Posisi / letak Computer

Cukup sampai disini Tips dari saya, lain kali akan disambung lagi.

Semoga tips diatas bermanfaat bagi anda. Yang mau nambah dipersilahkan mengisi koment comment dibawah ini.

Paypal berbahasa indonesia

Tadi sore lagi cek email masuk yang berharap akan menerima email dari projecwonderful, salah satu jasa paid review yang udah hampir 1 bulan di approve juga.

Eh ternyata ada email yang masuk dalam kotak inbox Dengan subject

PayPal now speaks your language and much more!!!

Langsung awak cek tuh email yang berisikan sebagai berikut :

“New and Improved PayPal:
More Languages, Tailored Content, and More.

Dear Budi Arianto,

We are pleased to welcome you to the new, enhanced version of the PayPal website where you’ll find new languages, quicker and easier navigation, tailored content, and more – just in time for the Holiday season.
What does this mean for you?
• PayPal now speaks your language! Find what you need in Thai, Indonesian Bahasa, and Traditional Chinese! 1
• Simpler and faster access to relevant information
• Safer and easier shopping and selling experiences for the Holidays”

Trus awak cek lah account Paypal awak. Sapa tau ada yang nyasar ngirim balancenya.

Eh ternyata masih $0,00 USD.

:(

Tapi awak sempat bingung juga pengaturan ganti Paypal yang menggunakan bahasa bulek English tadi menjadi Paypal berbahasa indonesia. Awak main kan kedua bola mata awak ini dengan diiringi scroll mouse keatas kebawah.

Dan akhirnya ketemu juga, tinggal klik U.S English yang berada di bagian Pojok atas sebelah kanan, atau tepatnya dibawah tulisan Logout. awak pikir susah gantinya, ga’ taunya tinggal dua x klik langsung berubah menjadi bahasa indonesia.

Saya ucapkan Terimakasih Pada Paypal karena telah membantu saya dan teman teman yang masih sangat kurang sekali dalam speaks english. Semoga betah dinegara kami INDONESIA yang tercinta ini.

Tukeran Link yokkkk!!

Apa itu link ??

Pranala, pautan atau link (juga hyperlink) adalah sebuah acuan dalam dokumen hiperteks (hypertext) ke dokumen yang lain atau sumber lain. Seperti halnya suatu kutipan di dalam literatur. Dikombinasikan dengan sebuah jaringan data dan sesuai dengan protokol akses, sebuah komputer dapat diminta untuk memperoleh sumber yang direferensikan. ( by: wikipedia )

Setelah Melakukan blog walking dengan mengendarai mozilla, dari sebagian blog yang telah disinggahi melakukan tukeran link sesama blogger. awalnya awak enggan melakukan tukeran link. karena tidak mungkin rasanya link link ( bhs mandaringnya Nol Nol ) yang begitu banyak ditampilkan pda bagian sidebar blog ini.

Sempat juga mo bikin page baru buat parkir link2 tadi, tapi kurang mantap rasanya klo ga’ ditampilkan di mainpage blog ini. biar langsung keliatan 0 0 bagi yang kunjungi bog ini. Terus berpikir lah awak, untuk menemukan solusi nya.

Ternyata dengan menggunakan script < marque > ( ntah apalah nama script ini ) yang awak temukan dr paman gugel menuju blog tips trik blog, script ini dapat membantu blog ini untuk menampilkan smua link pada bagian sidebar tanpa membutuhkan ruang yang luas( bingung awak mo jelasin nya gmn ).

Eeeeeee eeeh, mau tukeran link aja pon bnyak kali basa basi awak :) . Nah, oleh karena itu saya berharap para blogger sapa yang ingin bertukaran link dengan blog ini langsung aja isi celotehmu dibagian komenT dibawah.

:)

search engine list

Apa itu search engine!!!

Mesin pencari (search engine) adalah program komputer yang dirancang untuk membantu seseorang menemukan file-file yang disimpan dalam komputer, misalnya dalam sebuah server umum di web (WWW) atau dalam komputer sendiri. Mesin pencari memungkinkan kita untuk meminta content media dengan kriteria yang spesifik (biasanya yang berisi kata atau frasa yang kita tentukan) dan memperoleh daftar file yang memenuhi kriteria tersebut. Mesin pencari biasanya menggunakan indeks (yang sudah dibuat sebelumnya dan dimutakhirkan secara teratur) untuk mencari file setelah pengguna memasukkan kriteria pencarian. ( Wikipedia )

Nah, kemaren lagi menjelajahi hardisk Computer q, Keliatan File dengan icon winrar dan menamakan dirinya sebagai searchenginelist, penasaran lah awak.

langsung awak extrak tuh file yang menamakan dirinya tadi sebagai searchenginelist. Nah, ternyata saudara – saudara dia tidak salah menamakan dirinya sebagai searchenginelist. Ada tapinya nih, updatenya tahun 2006 yang lalu. Awak juga tidak tau pasti itu file dari mana asalnya. kok tiba tiba ada di dalam hardisk PC awak.

Dari pada awak nikmati sendiri, mending berbagi ama sodara – sodari smua. Khususnya buat blogger, didalam searchenginelist ada blog Blog Search Engines and Directories. selain itu, Daftar Searchengine Regional dari berbagai negara ikut meramaikan searchenginelistnya. Jadi sapa yang mau nyedot jangan sungkan sungkan mumpung gratis.

Dunia Maya VS Dunia Nyata

Mungkin judul diatas sangat cocok dengan kehidupan didunia maya ( internet ) saat ini. Hal tersebut dipicu dengan adanya kegiatan “yang di anggap kriminal” ( hacking, cracking, carding ) yang masih terus terjadi sampai saat ini. Hal itu mungkin tidak begitu memicu kontroversi antar bangsa atau pun umat beragama.

Ada beberapa hal yang membuat dunia maya ini media dalam melakukan kontroversi antar bangsa dan agama seperti yang baru terjadi belakangan ini. Sebuah blog yang berisikan komik tentang Nabi Muhammad S.A.W. Alhamdulillah sekarang telah dihapus oleh pihak Wordpress yang menjadi tempat nongkrong blog SARA tersebut.

Pemerintah Indonesia telah memuat beberapa tentang dunia Maya ini ( udah ga’ bebas lagi dunk ). mulai dari UU Pornografi, Cyber LAw, dan saat ini depkominfo Sedang membentuk suatu instansi yang bertugas dalam Pemantauan website/blog yang menulis atau memuat yang dapat menimbulkan kerusuhan.

Sanksi yang akan diberikan kepada pemilik website yang melakukan pelanggaran adalah ” membloking dan dihukum selama 6 tahun penjara atau membayar denda sebesar Rp 1 miliar yang sesuai dengan undang-undang ITE.”

Dengan adanya pembentukan instansi tersebut. Ada baiknya kita lebih berhati hati lagi dalam membuat suatu artikel atau postingan didalam blog kita. Jangan sampai menyinggung bahkan menimbulkan kerusuhan dengan penyalah gunaan kata – kata didalam postingan kita tersebut.

perintah-perintah Dos Pada Windows

1.cd : Pindah direktori.misalnya cd windows,untuk pindah ke direktori windows

2.copy

Meng-copy file

3.copy file1.txt filebaru.txt

Meng-copy file1.txt, nama file hasil copy-an adalah filebaru.txt. Jadi akan terdapat file1.txt dan filebaru.txt dengan isi yang sama. Ganti file1.txt dan filebaru.txt dengan nama file yang akan Anda copy

4.copy file1.txt c:\data

Mengcopy file1.txt ke directory data pada drive C (nama file hasil copy-an adalah file1.txt)

5.copy file1.txt c:\data\filebaru.txt

Meng-copy file1.txt ke directory data dengan nama file hasil copy-an filebaru.txt

6.dir (menampilkan file dan direktory)

7.dir d: (membuka file di direktori d)

8.dir /w

Menampilkan file dan directory secara “singkat” (cuma menampilkan nama file atau directory saja, tidak ada keterangan ekstensi, ukuran file, tanggal dan jam)

9.ren

Mengganti nama file

10.ren filelama.txt filebaru.txt

Mengganti nama file filelama.txt menjadi filebaru.txt

itu tadi adalah perintah umum yang dipakai dalam Dos..sekarang saya akan memberikan perintah perintah dasar dalam Dos.

ATTRIB Perintah eksternal. Untuk melihat/mengubah atribut file

CLS Perintah internal. Untuk menghapus layar monitor

COPY Perintah internal. Untuk mengcopi file

DEL Perintah internal. Untuk menghapus file

DIR Perintah internal. Untuk melihat daftar file/folder di folder/direktori tertentu

MD Perintah internal. Untuk membuat direktori/folder baru

RD Perintah internal. Untuk menghapus folder (folder kosong)

REN Perintah internal. Untuk mengubah nama file/folder

TYPE Perintah internal. Untuk melihat isi file

EDIT Perintah eksternal. Untuk mengedit file teks (interaktif)

FDISK Perintah eksternal. Untuk melihat/mengubah/membuat partisi harddisk

FORMAT Perintah eksternal. Untuk memformat disket/harddisk

MORE Untuk mencegah tampilan menggulung terus-menerus

SYS Eksternal apa internal ya? Yang jelas untuk membuat disket/harddisk jadi bootable

Melihat daftar file/folder dalam direktori/folder tertentu

DIR (tanpa parameter)

Melihat daftar file saja

DIR /a-d

Melihat daftar folder saja

DIR /ad

Melihat daftar file yang tersembunyi

DIR /a-dh

Melihat daftar folder yang tersembunyi

DIR /adh

Melihat daftar file/folder yang tersembunyi

DIR /ah

Jika suatu kali komputer anda terserang virus dan tiba tiba semua data anda lenyap,jangan khwatir karena sebenrnya virus tidak pernah menghapus data yang ada mereka hanya menyembuyikan data anda disuatu tempat yang tidak kita ketahui.ada cara untuk memunculkan kembali data data tersebut dengan menggunakan perintah Dos.

pertama kali kita harus membuka file apa saja yang tersembunyi..dengan cara:

Melihat daftar folder saja

DIR /ad

Melihat daftar file yang tersembunyi

DIR /a-dh

Melihat daftar folder yang tersembunyi

DIR /adh

Melihat daftar file/folder yang tersembunyi

DIR /ah

setelah kita mengetahui file apa saja yang tersenbunyi,kita tinggal melihat attribut file file tersebut.caranya:

MENGETAHUI/MENGUBAH ATRIBUT FILE: “ATTRIB”

Untuk mengetahui daftar parameter untuk perintah “ATTRIB”, ketikkan “ATTRIB /?”.

Melihat attribut file/folder

Format umum: ATTRIB namafile

Contoh: ATTRIB readme.txt

Untuk melihat attribut dari beberapa file/folder, gunakan wildcards character (*) pada namafile.

setelah tau attribut file tersebut,kita tinggal mengubah attribut file tersebut,caranya:

Mengubah attribut file/folder

ATTRIB daftaratribut namafile

Daftar atribut yang valid: H, R, S

Gunakan tanda ‘-’ di depan kode attribut untuk menonaktifkan atribut tertentu, gunakan tanda ‘+’ untuk mengaktifkan atribut tertentu.

Contoh pemakaian:

Mengubah atribut file README.TXT menjadi hidden

ATTRIB +h README.TXT

Mengaktifkan atribut hidden sekaligus atribut system pada file README.TXT

ATTRIB +h +s README.TXT

Menonaktifkan attribut hidden, read-only dan system pada semua file dalam direktori aktif (current directory). Kombinasi atribut ini dapat digunakan untuk memunculkan kembali file-file yang ‘disembunyikan’, misalnya sebagai dampak infeksi virus ke komputer

Cyber Culture Essay

Throughout centuries writing technologies have consistently altered the processes of reading and writing. With each new technological advance, mankind has continually adapted to the necessary reading and writing skills pertaining to such innovations. The advance from handwriting to print dramatically changed the processes of reading and writing, but now we face a new era of technology: as the world of cyber culture continues to develop. For college students, these progressions of literary technologies have drastically changed the way we think about reading and writing.

Much of a college student’s life is spent researching and obtaining data. In the past, this meant that most students would have to spend endless hours searching and reading through texts in libraries in order to find the proper material to use for research support. Today, on-line college library indexes and databases give students the opportunity to instantaneously find thousands of supporting texts in only a matter of minutes—all the while in the comfort of their own homes.

Eastern Michigan’s on-line library databases offer vast amounts of articles, essays and academic journals ranging from African American Literature to Zoology. The forefront of this convenient technology has drastically changed students’ reading and writing habits and methods of research projects. Sven Birkerts, a literary critic, comments on this new shift of literary techniques in an article titled “Into the electronic Millennium”.

The printed word is part of a vestigial order that we are now moving away from—by choice and by societal compulsion. I’m not just talking about disaffected academics either. This shift is happening throughout our culture, away from the patterns and habits of the printed page and toward a new world distinguished by its reliance on electronic communications. (63)

As time progresses, students seem to depend more and more on the use of electronic mediums. Library databases have become another reliable source of information for students. It has been argued that this new convenient researching tool has both enhanced and damaged the ways that students think about writing, but I believe that the benefits far exceed the negative.

The University’s library database system was created for several reasons, but the main motivation for development was to enable the students to read more, pertinent information—at a quicker rate. If I’m searching for support and research in the libraries database on the topic of communication behaviors of young children, all I have to do is follow a few simple steps, and within minutes I’ll have hundreds of documents applicable to that subject. First, I must choose what index and what sources I’d like to look in for supportive information. Because this would be a study of behaviors, I might choose to look under a psychological database. After I’ve chosen the database, I can simply type in a few simple key words to specify my search. Along with keywords, I have the option to add conjunctions, or to specify whether I would like the key word/s to be found in the title, abstract or the body. This quick process filters out many articles not related to the subject of research. Still, a lot of the articles that turn up may not be exactly what I was looking for, but it sure beats shuffling through library shelves. Even if I were to research texts directly from the library, I would still come across many useless articles and essays. The development of this on-line library database system speeds up the research process, which inadvertently gives the students more reading time. Rather than spending several hours searching for information, which may not even be useful, I can spend some time skimming articles in order to find relevant support, and use the remaining time to thoroughly read through the useful texts.

Skimming and filtering does not only relate to finding relevant texts. I can also easily skim through the articles themselves, in order to find specific quotations and support for my research. The process of skimming and filtering involves selective reading, or hyper reading. Rather than flipping though pages of books and journals, I can simply scroll down and read the headings in order to find relevant passages. In an essay tilted “Hyper readers and their Reading Engines,” James Sosnoski supports the act of hyper reading (reading texts online) by stating “Hyper reading of the “constructive” variety is, in my experience, a more selective process than the reading of printed texts customarily allows”. (404) Selective reading omits endless hours of reading useless information.

Spectators have claimed that hyper reading prevents students from grasping the entire concept of a text (kind of like reading only half of a novel). I can agree to this to some extent, but when it comes to finding bits and pieces of information used for support, the basic, not entire, concept may be all that is needed. Sosnoski refers to this process of hyper reading as he suggests that,

One might be tempted to think of it as a problem. In print environments there are contexts in which we tend to believe that one SHOULD read ALL of a stretched text. Some readers (e.g., teachers) worry about other readers (e.g., students) who do not tend to read all of the text…When we consider the popularity of hypertexts, skimming takes on a whole new dimension… Hypertexts are designed so that such intelligent skimming is the norm which helps readers who have too much to read. (408)

These library databases provide so much information, at such a quick rate, that it has become necessary for students to skim and filter as they read. After the relevant information has been found, we are then able thoroughly read through the texts that we know will be helpful. Hyper reading continues to stir up debate: we are now moving from print to screen. Reading screens rather than paper significantly alters the ways in which we read, but just because our habits are changing doesn’t necessarily make online reading less useful, it just changes the way we read.

Obviously one of the most significant changes in reading occurs with the switch from book to the screen. In books and printed text we read solid marked ink letters, but on the screen we must face the resolution clarity of pixels. For me the transition has been smooth—I don’t mind reading text on-line. If I can look up journals on library databases rather than spending hours in a library then I’ll readily subject myself to the “pandemonium” of pixels. In an essay tilted “Twenty Minutes into the Future, or How Are We Moving Beyond the Book?” George Landow suggests that “…at present inadequate screen technology means that information on computer monitors cannot come close to providing the resolution or aesthetic pleasure provided by such printed documents” (217). When I’m researching information for a paper, aesthetic appeal of text is the last thing I’m looking for. All I care about is the information provided— whether it’s directly out of the hard-copy text, or on my screen. I don’t mind suffering through the, sometimes uncomfortable, on-line reading process because it allows me to type in a few key words that will directly link me to specific sources. In an article titled “The Social Life of Documents,” written by Paul Duguid and John Seely Brown, the consequences of on-line reading are discussed as they point out that “…you can’t search or link hard copy documents, while the latter point out you can’t read on-line documents in the bath or on the beach, or even at your desk with much ease. There the debate has stood.” (113). Reading on-line text does limit physical and locale flexibility, but these are simply necessary adjustments that must be made. Besides, I can kick back and relax with the time I’ve saved by using library databases. The screen has become a new format for reading: the information of the text remains the same, only the design has changed.

An argument against online reading claims that because articles from databases are generally presented in the same format, that students will be less likely to recall and absorb all of the information provided. Birkerts remarks that,

Changes in information storage and access are bound to impinge on our historical memory. The depth field that is our sense of the past is not only a linguistic construct, but it is in some essential way represented by the book and the physical accumulation of books in library spaces…The database, useful as it is, expunges this content, this sense of chronology, and admits us to a weightless order in which all information is equally accessible. (71)

The uses of databases and hyper reading are continually speculated against: claiming that, to some measure, it degrades the objective of researching; that hyper reading prevents the absorption of knowledge. Technologies, such as the database, are generally used to provide information and support. I might not completely remember everything I’ve read, but after implementing the basic ideas and quotes into my papers an impression of the information has still been made.

The amount of information, made available by these on-line library journals and databases, is seemingly endless. The reader must take the responsibly of properly attending to, and distinguishing between essential and obsolete text. Duguid and Brown claim that “The imaginative crisis that faces us today is the crisis that comes from having too much information at our fingertips…” (201). It’s possible to have too much information, but as long as we are able to filter and request specific text, the vast amount information available will prove to be beneficial. Baron supports and identifies the increasing availability of on-line information as he states that “The new computer communications technology does have ability to increase text exposure even more than it already has in positive, productive ways. The simplest one-word Web search returns pages of documents which themselves link to the expanding universe of text in cyberspace” (51). The focus and absorption of information relies solely on the reader’s attention. Birkerts states that “The pace of reading is variable, with progress determined by the reader’s focus and comprehension” (66). As with any type of available text, the inheritance of knowledge depends on the reader’s engagement and comprehension.

On-line databases don’t alter the context of the text, Birkerts recognizes the need for reader attention as he states “The order of print is linear, and is bound to logic by the imperatives of syntax. Print communication requires the active engagements of the reader’s attention, for reading is fundamentally an act of translation (65).” In order to absorb information from on-line library databases the reader must not only focus their attention to the text for increasing knowledge, but they must also be able to understand what the text is saying.

Some may argue that library databases make researching too easy for the students, but certain indexes use language which is common to that field of study. If a student is unfamiliar with the language or terms of that subject field than they will be less likely to understand and make use of the sources. In an article titled “You Can Always Look It Up…or Can You?” E.D. Hirsch remarks on the essential need of prior knowledge in order to obtain a further understanding of the researched text.

Reference works including the internet are immensely valuable in those constrained circumstances…you can successfully look something up only if you already know quite a lot about a field…where a novice knows very little…But looking things up already has a Catch 22; you already need to know something about the subjects to look it up effectively. (185-186)

Databases make researching more convenient for students, not easier. The journal entries found in library databases are written in a manner that assumes that the reader will be able to comprehend the presented material. If I were to look under the medical index for information about neurology, which I know nothing about, then I would stand to gain very little from it. A student who is familiar with the uses and parts of the brain would, hopefully, be able to understand what the article was saying. The databases include professional academic articles that require a certain level of intelligence from the reader.

On-line databases provide concrete academic based information. When looking for support to write about a certain subject, students must be aware of the authenticity of the information found. Baron remarks on the importance of authenticity from on-line resources by suggesting that “…as more and more people turn to the World Wide Web for information, and as students begin relying on it for their research papers, verifying the reliability and authenticity of that information becomes increasingly important, as does revisiting it later to check quotations or gather more information” (50). Library indexes and databases are safe— they are credible, published articles from academic journals. This vast amount of information can only enhance the writer’s knowledge; therefore enabling them to write more informed, and with more support. On-line library databases also make quoting sources easier and more accurate. If a writer wants to implement a quote from the on-line source all they have to do is simply copy and paste the quotes. Directly copying quotes diminishes any question of inaccuracy. If I am going to use an author’s words for support, I want to be sure that I don’t misconstrue their intentions by accidentally quoting their words incorrectly.

The ability of copying and pasting directly does have a drawback—plagiarism. For many, lazy, students the availability of already typed out text may provide an even easier way to plagiarize other people’s work. The writer is the only one who suffers from such acts. Plagiarism existed before on-line texts were available, and it will continue to subsist. On-line databases may increase the use of plagiarism, but students who use this useful tool should not have to suffer for the ignorance of others.

There may be some negative effects for readers and writers who use these on-line library databases, but the benefits are so great. The availability for supportive information can only enhance the objective of writing. Writers are no longer bound to library hours of operation, but rather seemingly endless amounts of information have become available at any moment. The time that is saved from easily accessing information gives the writer more time to focus on their work. Duguid and Brown comment about how these on-line library database journals have increased the abilities of writing.

…on-line library catalogues providing abstracts, indexing, and in some cases full texts for print have reinforced these journals rater than undermined them. The journals still remain the best social filter for the flood of writing available on any topic as well as the best repositories of the development of ideas and attitudes. In these realms, digital media, as yet, do not compete. The electronic resources, however, have made using print journals much easier… (113)

As a current college student, who spends a lot of time researching, I am very thankful for the convenience that these databases provide. I’m also thankful to say that I’ve never had to live without them, and I hope that I never will. On-line library indexes have given me a more positive view of researching. I never have to worry about finding pertinent information because I know that it’s readably available. As a writer I feel that these databases help to develop and provide support for my research papers. I am able to focus more specifically on my writing rather than spending time trying to find the support. Just because I am not physically shuffling through books in libraries does not mean that I’m not researching—I’m researching only the sources and information necessary. For me, on-line library journals only make the process of reading and writing easier and more efficient.

All Southern Rock Online Radio!

All Southern Rock Online Radio!

PROB MINISTRIES ROCK MUSIC


 


In the preface to the Wittenberg Gesangbuch of 1524, Martin Luther shared thoughts about music that are still appropriate.

I wish that the young men might have something to rid them of their love ditties and wanton songs and might instead of these learn wholesome things and thus yield willingly to the good; also, because I am not of the opinion that all the arts shall be crushed to earth and perish through the Gospel, as some bigoted persons pretend, but would willingly see them all, and especially music, servants of Him who gave and created them.(4)
Luther's comments are applicable to the subject of rock. But why should we share Luther's concern for the arts, particularly music?
The first answer to this question is that God carries out His purposes in time and history. He may be "needling" us through contemporary music; He may be challenging us to be alert to the crucial issues and questions of our time that can be heard in much rock music.

Second, rock can tell us how a significant portion of our culture thinks. The answers, or lack of answers, that rock musicians give to their own questions ring true in the minds of millions of listeners.

Third, we can be sympathetic with many of the subjects found in rock. The difference is that often these musicians provide insights that are not of the Lord. Fourth, rock musicians are image-makers more often than not. They present a facade that is very attractive to adolescents. We need to analyze these images, which can be so powerful in the lives of our children, and react biblically.
We are often guilty of living in "Christian ghettos." We may understand each other, but we don't understand our culture, and our culture doesn't understand us. In the New Testament we see that Jews and Gentiles were approached differently because their presuppositions were different. They were speaking different religious and philosophical languages. Today we are faced with the same task. If we are to communicate with our culture, we need to hear what it is saying. We need to see and hear the world views. We need to react as Paul did in Athens (Acts 17). We need to be discerners.


Steps Toward Discernment

Discernment is the key, but how can we become discerners of rock music? Four simple categories will help us arrange our thoughts.
First, there is good music with a good message. This is the ideal combination. The music is of quality, and the message is true. We should all strive to hear and create this unity.

Second, we often hear good music with a bad message. The music may be of quality, but the message is false or misleading.

Third, bad music with a good message can creep into our listening habits. The quality of the music is poor, but the message is true. This category can be used to describe much of what is called "contemporary Christian music."

The fourth is bad music with a bad message. This combination is more blatant in its degradation than are numbers two and three, but it is often more honest. For example, much of what is called "hard core" or "underground" is not presented as a well-done musical statement, and it is honest in its perception of a world gone wrong. The tragedy is that the perceptions are often false and the music is usually not worth a second hearing.

With these categories in mind we can now consider four steps toward becoming discerners of rock music. The first step is to realize that all truth is of God and begin to incorporate this principle in our lives. As Marajen Denman has said, "Truth is truth, no matter who sings it."(5)

The second step is to stop! Stop what you are doing long enough to concentrate on what is being said through the music. Most of us, especially adolescents who spend so much time with rock as a companion, probably need to be more aware of the power of ideas. This can only be done if we take the time to concentrate.

The third step is to listen! Listen carefully to the message of the music. This especially applies to those young people who listen to certain songs or albums repetitively.

The fourth step is to look! Look at how the music affects your life in terms of such things as thoughts, physical tension and sensuality. It may help to encourage a teenager to ask himself a series of questions, such as, Where am I getting these rebellious ideas? Where am I getting these sexual fantasies? Why am I tempted to reject what I know to be true? Why am I depressed so much of the time? Why does the future look so hopeless?, etc. These four steps may take some time, but in most cases the effort brings reward.
Before we discuss the music and its messages, it is important to realize that rock music is as much a cultural phenomenon as it is a musical one. It is a source of personal and corporate identification. Many young people look to rock for more than music. They seek to identify themselves with a unique generation. It helps them declare their independence.

In fact, rock shares in the unique historical development of the idea of adolescence, which is much more recent than most of us realize. Adolescence has come to symbolize an attitude, a distinctiveness, a rite of passage espoused by millions of teens. While reflecting on the impact of rock concerts, the writers of Dancing in the Dark, an excellent study of youth culture, state:

Whatever else rock might be . . . a concert makes it clear that rock is a dramatic participatory anthem of teen life, freighted with the intense experience of what teens believe, feel, value, and do. Rock is at once a barometer of teen experience and the very weather they inhabit, at once the celebration of an ethos and the ethos itself.(6)
An objective awareness of this ethos can lead us to more constructive dialogue concerning rock, especially with our own children. Rock is a major cultural force and has been since its inception. Millions have and will continue to identify with it at various times during their lives. If we don't realize this, the lines of communication are quickly broken. It is not enough to say, "Turn off that noise!" Like it or not, we must approach our children with the understanding that it's not just the music that attracts them. They need to be led to understand whose they are in Jesus Christ, and not just who they are within the scope of adolescent culture.


Musical Ingredients

The musical ingredients of rock music have been the focus of rapt attention among Christians for many years. Some have attacked rock based upon supposed evils within the music itself. These attacks are misdirected. For example, many of us can remember debates concerning the use of certain instruments, such as guitars and drums, in worship. It was believed that there was something very wrong, if not evil, about using such instruments. With a few exceptions, this concern has been rightfully rejected.

Besides such instruments, the nature of the rock rhythm has been called into question and has sometimes been the subject of fierce arguments. The basic syncopation of rock, which is usually in 4/4 time with an accent on the second and fourth beats, is not evil. It is often boring and uncreative, but it is not evil. Some groups experiment with assorted meters and chord progressions, but the majority of rock bands incorporate this basic rhythm. If there is a problem with rock, it is not to be found here.

Rock almost always has a message. The human voice is used to sing about something. Of course no one would claim there is something evil about the human voice. The message that is communicated can be cause for concern, but the voice itself is not the problem.
So rock music basically consists of certain instruments-- such as guitars, keyboards, and percussion--a particular rhythm, and the human voice. And none of these is evil. People can be evil, and people abuse rock music, just as they abuse all parts of life. Our sin nature is actively involved in desecrating everything.
This desecration can best be seen in the lyrical content of the songs. We have come a long way from the inane "do-wa-diddies" of early rock history. It is at this point that those in the Christian community are challenged the most. The music alone may be of quality, but the message may be totally in opposition to a Christian worldview. A decision is required. Do I continue to listen, even though the message is awful? Or do I decide to reject it because of the message, even though I like the music?

Unfortunately, the well-worn statement, "I only listen to the beat!" is simply not true. If they are honest, most people who have heard a rock song several times can sing the lyrics upon request. When you consider the fact that most popular songs are heard dozens, if not hundreds, of times, it is not difficult to understand how the messages are embedded. The lyrics come through; we can't escape that. This does not necessarily mean we always listen and think to the point of really considering what the messages have to say, and that is exactly part of the problem. The lyrics can be subtly incorporated into our thoughts simply because we haven't stopped long enough to sort them out.


Common Themes

As we listen to the messages of rock, we find that several themes appear. One of these is nihilism and its accompanying despair. Evidently large segments of our youth population are willing to pay to hear that the world is falling apart.

Hedonism is another theme. Sexual emphases, in particular, have long been staples of rock's lyrical content. Rebellion and violence are also prominent subjects. These can be found especially in rap, hard core, and heavy metal. Drugs, including alcohol, are also touted in some songs, although their glorification is not as prominent as in the past. Occasionally some groups will toy with occultic and satanic themes, but most of these are simply trying to sell recordings by attracting the curiosity of teens. These themes are by no means complete. The list of subjects would cover virtually everything imaginable, but these are the more prominent ones.


Parent/Child Communication

Since this subject is too often the focus of intense arguments in the home, the following steps can help to alleviate the problem.

  1. Pray over the issue together in order to make a dedicated effort to communicate.
  2. Discuss the subject--don't scream about it.
  3. Examine yourself to determine if you are acting hypocritically. For example, a parent should not scream at the child about rock and then turn on the latest country songs, which often deal with the same subjects that are found in rock.
  4. The parent(s) should honestly seek to spend some time listening to the child's recordings. The child should honestly seek to go beyond the beat/sound in order to hear and see what is being emphasized.
  5. The parent can turn on a rock station while driving to/from work.
  6. The child can begin to be much more selective about when she listens to the music. The process of discernment cannot take place very easily if there is always something taking place while the music is heard.
  7. Take some time to visit the local department or record store.
  8. Visit the local library and check out any number of books on rock music. In fact, "topical bibles" of rock music are available. Pick the subject, and the book will lead you to the songs that deal with the subject.
  9. The latest issues of various trade magazines can be read in the local library or purchased in some grocery stores or book stores. Some of the magazines print the lyrics of the latest songs.
When children see that parents are genuinely interested, they will often begin to respond positively to what is said. Challenge them to make a decision, but don't make it for them. Discernment, coupled with an attitude that is saturated in patience, will go a long way toward helping a young person make Christ-centered decisions that will last a lifetime.

Decisions are in order for many people. Perhaps some will find it necessary to "clean the closet" because of prior saturation in rock. Others need to be more discerning. But a rejection of rock and the wholesale acceptance of another form is not the answer. As soon as that takes place, the thinking process has stopped. All of one has been substituted for all of another. For instance, if we put gospel music in the place of rock without thinking about what we hear, we can be in danger of accepting poor theology, if not heresy, on occasion. Each song, each piece of music should be judged on its own merit. No single artist can be accepted without thought. No single style can be accepted without thought. We are responsible to stop, listen, and look at all that we hear.

Story Hard Rock


Hard rock is a term that's frequently applied to any sort of loud, aggressive guitar rock, but for these purposes, the definition is more specific. To be sure, hard rock is loud, aggressive guitar rock, but it isn't as heavy as heavy metal, and it's only very rarely influenced by punk (though it helped inspire punk). Hard rock generally prizes big, stadium-ready guitar riffs, anthemic choruses, and stomping, swaggering backbeats; its goals are usually (though not universally) commercial, and it's nearly always saturated with machismo. With some bands, it can be difficult to tell where the dividing line between hard rock and heavy metal falls, but the basic distinction is that ever since Black Sabbath, metal tends to be darker and more menacing, while hard rock (for the most part) has remained exuberant, chest-thumping party music. Additionally, while metal riffs often function as stand-alone melodies, hard rock riffs tend to outline chord progressions in their hooks, making for looser, more elastic jams should the band decide to stretch out instrumentally. Like heavy metal, hard rock sprang from the mid-'60s intersection of blues-rock and psychedelia pioneered by artists like Cream, Jimi Hendrix, and the Jeff Beck Group. Blues-rock and psychedelia were both exploring the limits of electric amplification, and blues-rock was pushing the repeated guitar riff center stage, while taking some of the swing out of the blues beat and replacing it with a thumping power. Hard rock really came into its own at the dawn of the '70s, with the tough, boozy rock of the Rolling Stones (post-Brian Jones) and Faces, the blues-drenched power and textured arrangements of Led Zeppelin, the post-psychedelic rave-ups of Deep Purple, and the loud, ringing power chords of the Who (circa Who's Next) setting the template for much of what followed. Later in the decade, the lean, stripped-down riffs of AC/DC and Aerosmith, the catchy tunes and stage theatrics of Alice Cooper and Kiss, and the instrumental flash of Van Halen set new trends, though the essential musical blueprint for hard rock remained similar. Arena rock also became a dominant force, stripping out nearly all blues influence and concentrating solely on big, bombastic hooks. During the '80s, hard rock was dominated by glossy pop-metal, although Guns N' Roses, the Black Crowes, and several others did present a grittier, more traditionalist alternative. Old-fashioned hard rock became a scarce commodity in the post-alternative rock era; after grunge, many guitar bands not only adopted a self-consciously serious attitude, but also resisted the urge to write fist-pumping, arena-ready choruses. Still, the '90s did produce a few exceptions, such as Oasis, Urge Overkill, and the serious but anthemic Pearl Jam.





Artikel Terkait:










Nee Sejarah Musik Rock Bro !! . . . ^_^

Musik Rock adalah salah satu genre dalam khasanah musik populer dunia yang biasanya didominasi oleh vokal, gitar, drum, dan bas. banyak juga dengan penambahan instrumen seperti keyboad, piano maupun synthesizer. Musik rock biasanya mempunyai beat yang kuat dan didominasi oleh gitar, baik elektrik maupun akustik.

Pondasi dari musik rock adalah rock and roll dan rockabilly di era 50an. pada akhir 60an banyak terjadi percampuran genre musik lain dengan musik rock. Musik folk bercampur menjadi Folk Rock, Musik blues bercampur menjadi Blues Rock dan musik jazz menjadi Jazz-Fussion Rock. Dan pada tahun 70an rock berkembang menjadi beberapa subgenre seperti soft rock, hard rock, heavy metal dan punk. Di era 80an berkembang lagi beberapa subgenre seperti glam metal, synth rock, trash metal, hardcore punk, alternative rock. Di era 90an subgenre baru yaitu grunge style rock, britpop, indie rock, piano rock dan nu metal.

Berikut beberapa aliran besar dalam musik rock
Hard Rock
Genre musik rock yang berakar pada musik pertengan 60a yaitu garage dan psychedelic rock dan banyak keterpengaruhan dari musik blues. Hard rock banyak didominasi oleh gitar elektrik, bas gitar dan drum. Peran gitaris biasanya terbagi dua yaitu lead guitar dan rythm guitar, lead guuitar akan menampilkan guitar solo pada beberapa bagian dari lagu sedangkan peran rythm guitar lebih sebagai pelengkap lead guitar. Bas gitar dan drum berfungsi untuk membangun struktur dari musik hard rock itu sendiri. Beberapa grup musik hard rock terkemuka seperti : AC/DC, AC/DC, Aerosmith, The Who, Thin Lizzy, Guns N’ Roses, Nazareth, Van Halen dan Kiss sedangkan grup musik seperti led zeppelin dan deep purple adalah “pelintas batas” antara hard rock dan heavy metal

Heavy Metal
Sebenarnya hard rock dan heavy metal tidak beda jauh dalam hal bermusik makanya banyak pelintas batas antara keduanya, musik heavy metal hanya lebih cepat dalam musiknya. Musik ini dipelopori oleh led zeppelin, deep purple dan black sabbath. penerusnya seperti Judas Priest, Iron maiden, metallica, megadeth, Slayer, W.A.S.P, dll. Ciri tema dari lirik heavy metal adalah tentang sex, kekerasan, fantasi dan mistis.

Punk Rock
Aliran ini lebih pada pemberontakan anak muda terhadap kemapanan. punk rock lebih pada idiologi daripada kemampuan bermusik, seperti kalo kita mendengarkan lagu2nya sex pistols yang sangat ancur dan tanpa harmonisasi bahkan dalam pertunjukan live nya sering basnya diganti dibelakang layar karena pemain aslinya biasanya teler berat dan udah pasti sangat ngawur sekali banget-banget. Pelopor musik ini adalah Ramones, Sex Pistols, dan The Clash penerusnya banyak sekali di era 2000an kayak green day tapi kurang liar.

Glam Metal
Sering juga disebut sebagai Hair Metal karena kecenderungan dari personil band nya yang berambut panjang dan gaya berpakaiannya yang glamour dan make up nya. secara musik glam metal gak beda jauh dengan heavy metal hanya saja ada perbedaan dalam lirik yang lebih cenderung hedonistik seperti masalah sex, minuman dan obat. Grup band yang masuk ke aliran ini adalah motley crue, deff lepard, quiet riot, dokken, twisted sister,poison, cinderella,warrant, bon jovi dll.

Banyak lagi aliran dalam rock yang belum dibahas tapi nanti akan terlalu panjang dan membosankan, intinya adalah dengan mengetahui sejarah dan filosofi dari musik membuat kita tidak langsung serta merta memproklamirkan sebuah lagu menjadi masuk ke dalam musik rock seperti lagu isabella karya search, sebuah lagu melayu yang dibalut distorsi gitar. Juga jangan sampai di ledek “muka kencang (sangar), musik kendor (merintih-rintih)
sumber : http://forumbebas.com

sms gratis

Cara Buat Widget Ini

google search

Cari Blog Ini