Setting Up Mercurial for Netbeans Project

In software development, version control system (VCS) hold an important role. Especially when the project is collaborated by many programmers. Besides to keep tracks of changes, version control could helps handle task distribution and later project integration from the programmers. Basically, there are two flavors of version control system: centralized and distributed. There are many comparison between these two flavors on the net, one of them explained it well with some illustrations. The key point between these two systems is there are local working copies of the project in distributed VCS, while in centralized VCS, every changes must be updated to the central repository. Continue reading

The DZone Effects

Two months ago, I wrote a simple tutorial on how to create a Hadoop MapReduce program using Netbeans. Not a slightest clue in my head that this post will change my life. Okay, I’m exaggerating. I mean the post change the history of this blog.

The first day after I wrote the post, nothing special happened. But the day after, I was shocked when I checked this blog stats. This blog usually have about 15-25 visitors a day. So I was amazed when I saw 90 visitors that day. I started to investigate which post has the biggest contribution in delivering traffics. And I found out that it was the Hadoop in Netbeans post. I noticed that all of the traffic came from one site called DZone. DZone? I never heard that site before. When I was investigating the site, I found that it’s a cool bookmarking site for developer around the globe. And someone, later I known as mitchp, just share my post into this site.

The magic continued the next day. My traffic keep increasing. Then later in that day, I got an email from my hosting provider:

The domain has reached 80% of its bandwidth limit (807.50/1000.00 Megs).

Well, my bandwidth limit was just 1 GB a month. So I double checked the hosting package and found that my bandwidth limit should be 2 GB. I contacted my hosting provider to make sure that they didn’t make any mistakes. They said that my bandwidth should be 2 GB and they will resolve it a.s.a.p. Okay, so I started installing WP Super Cache to prevent my site from being down because of the high traffic and low bandwidth limit.

The magic ended. The highest peak was on the third day, near 200 visitors. After that, the traffic declining and found its equilibrium state. But, this state is higher than my average traffic before. My average traffic now is about 20-35 visitors a day. Not bad, huh?

And now, I’m a fan of DZone. Some days ago, I found out that I’m not the only one who has this kind of experience. Yeah, of course. Jordi Cabot wrote in his blog about his DZone traffic experience:

Unfortunately, a completely different story is the mid and long-term impact. By this I mean the number of people that discovered my portal thanks to the link and that has become a frequent visitor of the site since then. This is very difficult to assess (there is no way to know if a new subscriber originally discover your site thanks to the DZone link or it is just a temporal coincidence that he/she joined the site around those dates) but if we look at the increase in the number of subscribers to the RSS portal feeds , my twitter account or the daily visits to the site, my estimation is that only a 2-3% of the original DZone visitors has converted into new portal followers.

I second that. Maybe it’s just a sweet temporal coincidence if my traffic growth above the average. But one thing that I can learn from this experience is that if you want to have a high amount of traffic, you should write a good post regularly. And I hope I can do that.

Do you have the same experience?

Broke Up, Hi-jacking, and Deception

Once in my peaceful days, a friend rang me up. She said that a friend of her got a problem with email. This friend got her email hi-jacked by her ex-boyfriend. So she couldn’t login to her email. That’s just for the start. The bigger problem is this ex also hi-jacked her Facebook account and start doing nasty things with her account. Pretty scary huh? Continue reading

It’s a Big Secrets

In the mid 2005, me and some of my friends created accounts in one bank. I saved some money there and didn’t do any transactions anymore. So I have two accounts, one in my self-chose-bank and university-collaborated-bank. With the end of my graduate study, I closed and withdrew all of the money from university’s bank. So I only have the first account left.

Because I never do any transactions, I forget the PIN of my account. The bank has the facility to reset the PIN via phone call. Days ago, I tried it to reset my PIN. I called the call-center and they did some verification on my identity (wether I was a real client or just a fake). Then they connected me to the PIN-changer machine. I thought this was great, so the customer service knows nothing about my new PIN. So then I continued to listen into the machine.

“Please enter your account number”, I pushed my account number on the phone.
“Please enter your sequence number”, I pushed it on the phone.
“Please enter your secret code”, I pushed my secret code.
“Please enter your new SIX DIGITS PIN“, I waited. What? A six digits? I didn’t prepare for this. At first I thought that I’ll use my birthday numbers. But hold on, if you unprepared and asked about six digits number for your PIN, then you will likely to use your birthday numbers, right? Considering this, I used another sequence of numbers as my PIN.
“Please enter your PIN again”, I pushed it again.

Secret words or numbers are largely used as personal secret identity in the world. They usually used to verifiy wether you are real or a fake. This concepts widely used in the real world (like PIN or account numbers) and the clouds (passwords or captcha). Losing the secrecy of this words or numbers can lead to big problems. So I suggested you do at least one of these:

Don’t use commonly used passwords because there’re a lot of people would take a guess about it. According to Threadwatch, these are the 10 most commonly used passwords:

1. password
2. 123456
3. qwerty
4. abc123
5. letmein
6. monkey
7. myspace1
8. password1
9. blink182
10. (your first name)

And yes, birthday were considered as commonly used passwords too. You could Googling for another passwords if you’re so curious. If you used one of these passwords, I recommended you to change it immediately.

Raise your password’s length and use some non-alphabetic character into it. Use a sentence as a password may be a great choice, as long as you remember it. Using non-alphabetic like @,^,*,$ can make your password harder to guess. As long as you remember it.

Don’t write down your PIN or passwords. In servers room, sometimes we can see the passwords for their routers, servers, or services. This could be really dangerous. As for PIN, don’t bring your passwords everywhere and don’t place the passwords paper at the same locations with your ATM / credit cards. Because if you lose your wallet, you will lose everything, your money, and maybe your life.

Change your passwords regularly. Maybe once in two months? Just a few minutes to secure yourself and for your own goods.

So don’t waste your time, go check your passwords now!

You have another suggestions? Go ahead and share it!

Wireless at Home

Wireless network at my house
Wireless network at my house

Meet my sister! She was addicted with Instant Messaging. With the coming of Internet at our home, she spent her time on it more. So, there were two people but only one PC connected to the clouds. How to solve this problem?

Lucky for me, as a networking apprentice, I got another PC with wireless device. So I created wireless network at our house. Now, me and my sister could get access to the clouds at the same time on our own machine. How I did it?

The picture above shows the network structure I made to solve this problem. The phone and modem were located on the first floor. I connected the modem to the PC-with-wireless-device. I, then, enabled the Internet sharing on this PC. After that, I configured the first-floor-PC as an access point. And then, I configured another PC-with-wireless-device to make a peer-to-peer connection with the first PC. Here, the second PC could connected to the clouds as long as it got wireless access to the first PC. Even if it was on the second floor, which is my bedroom.

Although right now we could get connected together, there was minor problem. Sometimes, because of the wireless factor, the connection from the access point (first PC) was lost. Just temporary, but it’s a little bug to me. Anyway, now we could access internet together without a fight.