Tutorial Blogger | e-book download | artikel

Tutorial Blogger | e-book download | artikel
thanks for visit

Senin, 30 November 2009

INTERFACE WINDOWS 7


Microsoft's release of Windows 7 also roughly coincides with Apple's release of its new Snow Leopard; for a visual comparison of the two operating systems, see our slideshow "Snow Leopard Versus Windows 7." Of course, an OS can't be a winner if it turns a zippy PC into a slowpoke or causes installation nightmares. Consult "Windows 7 Performance Tests" for Windows 7 performance test results, and "How to Upgrade to Windows 7" for hands-on advice on the best way to install it. Read on here for an in-depth look at how Microsoft has changed its OS — mostly for the better — in Windows 7.

(Msnbc.com is a NBC Universal-Microsoft joint venture.)



Interface: The new taskmaster
The Windows experience occurs mainly in its Taskbar — especially in the Start menu and System Tray. Vista gave the Start menu a welcome redesign; in Windows 7, the Taskbar and the System Tray get a thorough makeover.


The new Taskbar replaces the old small icons and text labels for running apps with larger, unlabeled icons. If you can keep the icons straight, the new design painlessly reduces Taskbar clutter. If you don't like it, you can shrink the icons and/or bring the labels back.

In the past, you could get one-click access to programs by dragging their icons to the Quick Launch toolbar. Windows 7 eliminates Quick Launch and folds its capabilities into the Taskbar. Drag an app's icon from the Start menu or desktop to the Taskbar, and Windows will pin it there, so you can launch the program without rummaging around in the Start menu. You can also organize icons in the Taskbar by moving them to new positions.

To indicate that a particular application on the Taskbar is running, Windows draws a subtle box around its icon — so subtle, in fact, that figuring out whether the app is running can take a moment, especially if its icon sits between two icons for running apps.

In Windows Vista, hovering the mouse pointer over an application's Taskbar icon produces a thumbnail window view known as a Live Preview. But when you have multiple windows open, you see only one preview at a time. Windows 7's version of this feature is slicker and more efficient: Hover the pointer on an icon, and thumbnails of the app's windows glide into position above the Taskbar, so you can quickly find the one you're looking for. (The process would be even simpler if the thumbnails were larger and easier to decipher.)

Also new in Windows 7's Taskbar is a feature called Jump Lists. These menus resemble the context-sensitive ones you get when you right-click within various Windows applications, except that you don't have to be inside an app to use them. Internet Explorer 8's Jump List, for example, lets you open the browser and load a fresh tab, initiate an InPrivate stealth browsing session, or go directly to any of eight frequently visited Web pages. Non-Microsoft apps can offer Jump Lists, too, if their developers follow the guidelines for creating them.

Click for related content
Windows 7 is strong, but don’t pay to upgrade
Tablet, schmablet: What would it be good for?
Apple’s Snow Leopard is no dramatic upgrade

Other Windows 7 interface adjustments are minor, yet so sensible that you may wonder why Windows didn't include them all along. Shove a window into the left or right edge of the screen and it'll expand to fill half of your desktop. Nudge another into the opposite edge of the screen, and it'll expand to occupy the other half. That makes comparing two windows' contents easy. If you nudge a window into the top of the screen, it will maximize to occupy all of the display's real estate.

The extreme right edge of the Taskbar now sports a sort of nub; hover over it, and open windows become transparent, revealing the desktop below. (Microsoft calls this feature Aero Peek.) Click the nub, and the windows scoot out of the way, giving you access to documents or apps that reside on the desktop and duplicating the Show Desktop feature that Quick Launch used to offer.

Getting at your desktop may soon be­­come even more important than it was in the past. That's because Windows 7 does away with the Sidebar, the portion of screen space that Windows Vista reserved for Gadgets such as a photo viewer and a weather applet. Instead of occupying the Sidebar, Gadgets now sit directly on the desktop, where they don't compete with other apps for precious screen real estate.

ld tray, new tricks
Windows 7's Taskbar and window management tweaks are nice. But its changes to the System Tray — aka the Notification Area —have a huge positive effect.
In the past, no feature of Windows packed more frustration per square inch than the System Tray. It quickly grew dense with applets that users did not want in the first place, and many of the uninvited guests employed word balloons and other intrusive methods to alert users to uninteresting facts at inopportune moments. At their worst, System Tray applets behaved like belligerent squatters, and Windows did little to put users back in charge.
In Windows 7, applets can't pester you unbidden because software installers can't dump them into the System Tray. Instead, applets land in a holding pen that appears only when you click it, a much-improved version of the overflow area used in previous incarnations of the Tray. App­lets in the pen can't float word balloons at you unless you permit them to do so. It's a cinch to drag them into the System Tray or out of it again, so you enjoy complete control over which applets reside there.
More good news: Windows 7 largely dispenses with the onslaught of word-balloon warnings from the OS about troubleshooting issues, potential security problems, and the like. A new area called Action Center — a revamped version of Vista's Security Center — queues up such alerts so you can deal with them at your convenience. Action Center does issue notifications of its own from the System Tray, but you can shut these off if you don't want them pestering you.
All of this helps make Windows 7 the least distracting, least intrusive Microsoft OS in a very long time. It's a giant step forward from the days when Windows thought nothing of interrupting your work to inform you that it had de­­tected unused icons on your desktop.
File management: The library system
Compared to the Taskbar and the System Tray, Explorer hasn't changed much in Windows 7. However, its left pane does sport two new ways to get at your files: Libraries and HomeGroups.
Libraries could just as appropriately have been called File Cabinets, since they let you collect related folders in one place. By default, you get Libraries labeled Documents, Music, Pictures, and Videos, each of which initially di­­rects you to the OS's standard folders for storing the named items — such as My Pictures and Public Pictures.
To benefit from Libraries, you have to customize them. Right-click any folder on your hard drive, and you can add it to any Library; for instance, you can transform the Pictures Library into a collection of all your folders that contain photos. You can create additional Libraries of your own from scratch, such as one that bundles up all folders that relate to your vacation plans.
Libraries would be even more useful if Microsoft had integrated them with Saved Searches, the Windows feature (introduced in Vista) that lets you create virtual folders based on searches, such as one that tracks down every .jpg image file on your system. But while Windows 7 lets you add standard folders to a Library, it doesn't support Saved Searches.
HomeGroups, Sweet HomeGroups?
Closely related to Libraries are HomeGroups, a new feature designed to simplify the notoriously tricky process of networking Windows PCs. Machines that are part of one HomeGroup can selectively grant each other read or read/write access to their Libraries and to the folders they contain, so you can perform such mundane but important tasks as providing your spouse with ac­­cess to a folderful of tax documents on your computer. HomeGroups can also stream media, enabling you to pipe music or a movie off the desktop in the den onto your notebook in the living room. And they let you share a printer connected to one PC with all the other computers in the HomeGroup, a useful feature if you can't connect the printer directly to the network.
HomeGroups aren't a bad idea, but Windows 7's implementation seems half-baked. HomeGroups are password-protected, but rather than inviting you to specify a password of your choice during initial setup, Windows assigns you one consisting of ten characters of alphanumeric gibberish and instructs you to write it down so you won't forget it. To be fair, passwords made up of random characters provide excellent security, and the only time you need the password is when you first connect a new PC to a HomeGroup. But it's still a tad peculiar that you can't specify a password you'll remember during setup — you can do that only after the fact, in a different part of the OS. More annoying and limiting: HomeGroups won't work unless all of the PCs in question are running Windows 7, a scenario that won't be typical anytime soon. A version that also worked on XP, Vista, and Mac systems would have been cooler.
Federated Search, a new Windows Explorer feature, feels incomplete, too. It uses the Open­Search standard to give Win 7's search "connectors" for external sources. That capability allows you to search sites such as Flickr and YouTube from within Explorer. Pretty neat —except that Windows 7 doesn't come with any of the connectors you'd need to add these sources, nor with any way of finding them. (They are available on the Web, though. Use a search engine to track them down.)

What you need to know about Windows 7


What if a new version of Windows didn't try to dazzle you? What if, instead, it tried to disappear except when you needed it? Such an operating system would dispense with glitzy effects in favor of low-key, useful new features. Rather than pelting you with alerts, warnings, and requests, it would try to stay out of your face. And if any bundled applications weren't essential, it would dump 'em.


It's not a what-if scenario. Windows 7, set to arrive on new PCs and as a shrink-wrapped upgrade on Oct. 22, has a minimalist feel and attempts to fix an­­noyances old and new. In contrast, Windows Vista offered a flashy new interface, but its poor performance, compatibility gotchas, and lack of compelling features made some folks regret upgrading and others refuse to leave Windows XP.
Windows 7 is hardly flawless. Some features feel unfinished; others won't realize their potential without heavy lifting by third parties. And some long-standing annoyances remain intact. But overall, the final shipping version I test-drove appears to be the worthy successor to Windows XP that Vista never was.

Motivations of a Criminal Hacker


Although a lot of literature has been written about the technical aspects of securing a network, not much is available about who your enemies are and what motivates them to attack. Before you can determine how to protect your organization, you must learn to think like a hacker, figure out where you’re vulnerable, and then develop a game plan to reduce your exposure. If you can understand who would want to do you harm and what can be gained from such harm, you can better protect your company and your information. Make the following assumptions:
  • You do have professional adversaries.
  • You are on their target list.
  • You will be attacked some day.
  • You cannot afford to be complacent.
One of the most difficult realities for an organization to accept is the presence of adversaries who might attempt to harm it by using technology. It’s also possible that you really do not have adversaries in this traditional sense. Today, attackers look for any system that has an exploitable weakness that they can turn to their advantage. Often, attackers look at weakly secured systems as bases from which to launch more sophisticated attacks.
The motivations of attackers can be varied and complex. Hackers are often motivated, in part, by their invisibleness. Today’s more sophisticated hackers are often also motivated by the prospect of a big payday. On the Internet, a hacker can “peek” into a company’s private world—its network—and learn a lot while remaining anonymous.
Some individuals are just curious to see what they can learn about your company or individuals within your company. These hackers often don’t have any malicious intent and are unaware that their actions violate security policy or criminal codes. That does not mean that these casual hackers are any less dangerous, however.
Other hackers are simply trying to help. You’ve probably been in this category once or twice yourself. In your zeal to be helpful, you bypass security policies to fix problems or accomplish emergency assignments. You might even believe that your efforts are more efficient than following established guidelines and policies. Nevertheless, the bypassing of known security policies is one element of hacking a network.
Some individuals act with malicious intent, engaging in acts of sabotage, espionage, or other criminal activities. They can become moles, stealing information to sell to competitors or foreign groups. Some simply enjoy destroying the work of others as well as their own work. Others act out of revenge for a real or perceived wrong committed against them, or believe they are acting in line with a strongly held belief system. Still others are more methodical and hardened and turn hacking into a career; they might even take employment just to do your company harm.

How Hackers Work

Hackers start by learning that an e-mail server exists, which generic scanning tools can tell them. Coupled with the public information of your Domain Name System (DNS) records, hackers can quickly know a lot about your network.
Finding company information is easy for anyone. You can do it. Simply open a command prompt and type nslookup. Set the type of the record you’re looking for to a mail exchanger (MX) record by typing set type=mx. Type a domain name. This example uses Microsoft.com. Figure 19-1 shows the results.
Cc505928.figure_C19623593_1(en-us,TechNet.10).png
Figure 19-1 Using the NSLookup tool to find the public MX records for Microsoft.com
Next, the hacker determines the platform of your SMTP server in one of two ways. In the first approach, the hacker can use Telnet to open a session to your server over port 25 and then read the banner. Under Exchange Server 2007, the banner no longer identifies the version of Exchange Server being run, but does still indicate that the server is running the Microsoft ESMTP service. By removing the version number, Microsoft makes it harder for hackers to determine the exact version of Exchange that you are using. Note, of course, that because Exchange Server 2007 is the only version that, by default, lacks this identifying information, there are methods to achieve the same goal in older versions. However, a hacker can still figure out what he wants to know. It will take a couple of service packs and another major version of Exchange before this default omission really begins to bear fruit. Figure 19-2 gives you a look at an ESMTP conversation that takes place with an Exchange Server 2007 server.
Cc505928.figure_C19623593_2(en-us,TechNet.10).png
Figure 19-2 Opening a Telnet session to a server running Exchange Server 2003
Under older versions of Exchange Server, the exact version of the Exchange server being run is displayed (see Figure 19-3). The main version number, 6.0, means Exchange Server 2003. An Exchange 2000 Server registers with a main version number of 5.0. A SendMail server has its name and the version of SendMail software used by the company displayed in the header as well as the operating system (OS). Using this kind of information, a hacker can target his efforts by looking for exploits that will work for your specific system.
Cc505928.figure_C19623593_3(en-us,TechNet.10).png
Figure 19-3 Opening a Telnet session to a server running Exchange Server 2007

More Info

Although Exchange Server 2007 is the first version of Exchange Server that, by default, does not display versioning information in a telnet window, you can manually configure older versions of Exchange Server to act the same way. Refer to http://support.microsoft.com/kb/281224/en-us for more information..


The second way to determine your e-mail server platform is to send a bogus e-mail to your server. This is accomplished by sending a message to an unlikely e-mail address such as [email protected] The nondelivery report (NDR) that is returned has the e-mail server information located somewhere in the NDR. The following sample is a message header sent to the lab Exchange server at contoso.com. Notice that the Exchange server version is included right in the Sent by line:

Delivery has failed to these recipients or distribution lists:

[email protected]
This recipient e-mail address was not found in the recipient e-mail system.
Microsoft Exchange will not try to redeliver this message for you. Please
check the recipient e-mail address and try resending this message, or provide
the following diagnostic text to your system administrator.
----------------------------------------------------------------------------
Sent by Microsoft Exchange Server 2007
Diagnostic information for administrators:
Generating server: E2007-4.contoso.com
[email protected] #550 5.1.1 RESOLVER.ADR.RecipNotFound; not found ##
Original message headers:
Received: from E2007-4.contoso.com ([192.168.0.22]) by E2007-4.contoso.com 
([192.168.0.22]) with mapi; Thu, 15 Mar 2007 22:31:42 -0600
Content-Type: application/ms-tnef; name="winmail.dat"
Content-Transfer-Encoding: binary
From: Francis Cat 
To: "[email protected]" 
Date: Thu, 15 Mar 2007 22:31:37 -0600
Subject: Test message
Thread-Topic: Test message
Thread-Index: AQHHZ4P8FQkU6/4hJka2OY89GG0rfg==
Message-ID: <[email protected]>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator: <[email protected]
.contoso.com>
MIME-Version: 1.0


Now that the hacker knows which e-mail server software you run, he or she checks known databases to find vulnerabilities to exploit. The known vulnerabilities for Exchange Server 2007 are listed in Microsoft’s Security Bulletins and can be found at http://www.microsoft.com/security/default.mspx. On older versions of Exchange, some of the vulnerabilities could involve Microsoft Internet Information Services (IIS) because IIS managed the SMTP service for Exchange. In Exchange Server 2007, SMTP is a core part of Exchange itself, which helps to reduce the attack potential on your server. Other vulnerabilities may involve Microsoft Outlook Web Access (OWA), again because of the involvement of IIS managing the HTTP connectivity to the Exchange server. At a minimum, be aware of any vulnerabilities that exist for Exchange Server 2007 and test and install the patches when they are released.
Generally speaking, the e-mail administrator can expect the following kinds of attacks:
  • Buffer overflows Buffer overflows send a larger quantity of data to the server than is anticipated. Depending on how the overflow is executed, it could cause the server to stop working or it might run malicious code from the attacker.
  • Data processing errors These are not common currently, but the concept is that a small program is sent directly to the server, and the server runs it. More common today is sending these programs to a network though e-mail as attachments. Depending on their function and purpose, these programs can be viruses, Trojans, or worms (discussed at length later in this chapter).
  • HTML viruses These do not require user intervention to run unattended scripts.
  • Custom programs written to run against port 25 (SMTP) The more common types of programs that attack port 25 include e-mail–flooding programs or programs that contain their own SMTP engine that use the port for their own malicious purposes.
  • Denial of Service (DoS) A Denial of Service attack is an attack on a network that is undertaken in an effort to disrupt the services provided by a network or server.
  • Cross-site scripting Cross-site scripting is a vulnerability whereby an attacker places malicious code into a link that appears to be from a trusted source.
  • Spam and phishing expeditions Spam, or junk mail, is a well-known e-mail malady and affects just about everyone that uses the communication medium. A particular type of spam, called a phishing e-mail, attempts to lure unsuspecting users into clicking on unsafe web links. These links point to web forms that ask the user to provide sensitive personal information.
Here are some broad actions you can take to guard against the attacks just described, plus others:
  • Physical access to the server Lock the doors and use some type of biotech authentication.
  • Viruses, Trojans, and worms Use antivirus software and regularly scan your servers and workstations. Use the Exchange Server 2007 Edge Transport server role on at least one Exchange server.
  • Loss of data Perform regular backups.
  • Unauthorized use of user accounts Conduct user training on information security policies and require complex passwords.
  • Denial of service attack Harden the TCP/IP stack and the router.
  • Platform vulnerabilities Install all software patches and engage in service that offers minimization. Microsoft has released excellent free software for updating its patches on your servers. This software is called Windows Server Update Services (WSUS).

More Info

A discussion of WSUS is outside the scope of this chapter, but you can learn more about WSUS on Microsoft’s Web site at http://www.microsoft.com/windowsserversystem/updateservices/default.mspx.

about "hack"


Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.

The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -- someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.

A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug -- a section of bad code that prevented the program from working properly -- hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.

As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.


­­In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious -- they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.

In this article, we'll explore common techniques hackers use to infiltrate systems. We'll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.

In the next section, we'll look at hackers' tricks of the trade.

Minggu, 29 November 2009

Should I Stop This "lyrics"


















I’m sorry boy
I wasn’t stealing your girl for sure
What should I do when she asked me to go out?
I should’ve tried to turn my phone off
But she kept calling me
Last night she caught me up

I could run but she always found me
I couldn’t deny everything that she said
I’m actually fun with her / I actually have fun with her
For the last time I apologize
I could leave but she doesn’t wanna lose me
I could lie but she always trusts me
I’m actually fun with her/ I actually have fun with her
For the last time I apologize

I need someone to share
Can’t we just be friends?
I’m just your boy’s best friend
And this could be wrong
I feel like I’m a fake
I know his love is yours
Or should I stop this
Then i’ll make up my mind

Just stop calling me “baby”
You need me but I swear you don’t want to
With those eyes you impress me
Why did you tell me you’re alone?
Remember when the first time
I saw you at the party where we got drunk
Remember when the first time
I saw you at the party where we got drunk

I need someone to share
Can we just be friends?
I’m just your boy’s best friend
And this could be wrong
I feel like I’m a fake
I know his love is yours
Or should I stop this
Then I’ll make up my mind



Party On "lyrics"

Party On

Darling you look so fine today
I’ve never seen you like this time before
(look now)
I know you pretty well
I’m trying to be good for you

I love the way you walk
I swear I can’t stand to have a talk

So let’s hang out tonight
Baby would you have a little dance with me, come on
Get the party on the dance floor
Lady move your body
Until we spend the time all night long

Let me guess
Which dress will you choose
Pick the best to match on the dance floor
I’ll pick you up at nine with my dad’s car

So here we go now
(hey)
We’re the one who saves the party
So don’t be late tonight

I love the way you talk
I swear I can’t stand to ask you out

Don’t look like a freak
Don’t worry don’t be weak
I need you to know
We’ll make it through the night

Yeah I’m here
Ohh no, I’m not
I’m not going anywhere

" What a Horrible Date " Lyrics

Oh
yesterday was the worst day
ever
I couldn’t make you impress
to
I couldn’t find a joke to make
you smile
When I was sitting next
to you
Is another guy on your
mind?
You wouldn’t skip that
scene

My heart stops beating,
My mind stops thinking
Swallowing a bubble gum, My foot steps walking away
I said I’m pleased to make you laughed You started laugh at meNow I act like an idiot
REFF :
So Baby don’t make me upset now
Trying to get your attention
I give you all my best
I’m deserving the worst last
I hate the girl that look at me so badly
She toughts that I’m the worst
Than all the boys that she adores could make her smile
Then I hold your hands off and set my head down
I thought that I could make you fly Until the 7th grade of sky
My heart stops beating, My mind stops thinking
Swallowing a bubble gum,
My foot steps walking away
I said i’m pleased to make you laughed You started laugh at me
Now I act like an idiot
back to Reff :
Oh
girl, you gave a lot of promises
to me
Oh, that you’ll never ever
make it real
back to reff 2x:

Doo doo doo doo
doo doo doo dooDoo doo doo doo
doo doo doo dooDoo doo doo doo
doo doo doo dooDoo doo doo doo
doo doo doo doo
sing it
loud !!


Liric danger rangers "Berhenti melangkah"

BERHENTI MELANGKAH


Intro : F Am G
F G

F
Kemarin Hari terbururkku

Am G F
Tak sanggup ku melangkah, tuk temukan arah yang terbaik

Am G
Ketika ku didekatmu, hatiku bergetar jantungpun berdebar

F C
Dan aku tersentak, ingin ku teriak

G
Langkahku terhenti , tak mampu tuk bergerak

F C G
Kuhanya sanggup terdiam, Menatapmu sendiri menunggu disini

F G

Reff :

C F
Dan bila semua harus kuakhiri

Am
Kuingin agar kau mengerti

G F G
Kulakukan semua untukmu (untukmu)

F G

F
Apa yang kan terjadi bila kubermimpi

Am G F
Kau hadir disini berharap tuk kembali padaku

Kisah kita yang telah lama kaupadamkan

Am G
Tak akan pernah menghilang walau kau pikir telah usai

F C
Dan aku tersentak, ingin ku teriak

G
Langkahku terhenti , tak mampu tuk bergerak

F C G
Ku hanya sanggup terdiam, Menatapmu sendiri menunggu disini

F A G (2x)

Back to Reff

F G

F C G (2x)

F G

F C G F C G
Ohh ohhh buang saja semua janji palsumu yang selalu saja kau ingkari

F G

F Am G

F G

Back to Reff

Overtune :

D G
Dan bila semua harus kuakhiri

Bm
Kuingin agar kau mengerti

A G A
Kulakukan semua untukmu (untukmu)


G
doo doo doo doo doo doo

G
doo doo doo doo doo doo

D
doo doo doo doo doo doo

A
doo doo doo doo doo doo

G

SELALU ADA JALAN KELUAR

Pernahkan Anda mengalami seperti masuk ke dalam sebuah jalan buntu. Bingung mau melakukan apa? Bingung kemana arah langkah kita selanjutnya? Saya pernah mengalami dan ternyata banyak orang lain pun yang mengalami hal sama. Jika Anda pernah mengalami, bahkan sedang mengalami, dan kemungkinan akan mengalami suatu saat, tenang saja. Anda tidak sendiri. Saya akan jelaskan bagaimana mengatasinya.
Saya bukan orang segala bisa, memang siapa yang segala bisa? Kebingungan bisa menghampiri siapa pun, ada yang bingung mau makan apa hari ini ada juga yang bingung bagaimana membayar cicilan mobil bulan ini. Ada yang bingung membayar utang, ada juga yang bingung mau investasi kemana. Semua orang mengalami kebingungan, hanya saja pada level dan aspek yang berbeda.
Lalu bagaimana mengatasinya?


  • Tenang saja, jangan panik. Meskipun buru-buru, dengan panik justru akan memperburuk keadaan.
  • Berdo’alah dengan seyakin-yakinnya untuk meminta solusi kepada Allah.
  • Berikhtiarlah sedapat mungkin untuk menjemput solusi yang sudah kita minta kepada Allah.
“Iya… ikhtiar. Tapi bagaimana? Saya bingung.”
Ada dua ikhtiar yang selalu bisa Anda lakukan. Yaitu bertanya dan minta tolong. Mulailah dari orang-orang terdekat. Anda pasti banyak saudara, banyak teman, bahkan sahabat. Dari pengalaman saya, solusi sering datang dari orang-orang terdekat. Mulailah dari mereka, jika Anda meminta bantuan atau bertanya dengan baik, mereka atau sebagian mereka akan berusaha membantu.
Jika tidak bisa, teruslah bertanya. Misalnya, jika orang terdekat Anda berkata “Maaf, saya tidak bisa membantu.” Jangan dulu menyerah. Tanyakan saja: “Siapa (lagi) yang bisa membantu saya?” Dengan demikian, Anda tidak akan pernah kehabisan sumber bantuan. Prinsip referal, bukan hanya digunakan saat menjual, saat meminta bantuan pun akan sangat berguna. Prinsipnya: “Jika teman Anda tidak bisa, mungkin teman dari teman Anda ada yang bisa”. Jangan mudah menyerah.
Saya sering mendapatkan email, SMS, atau YM dari orang yang meminta bantuan. Saya coba untuk membantu sebisa mungkin. Saat saya mencoba memberikan solusi, seringkali mereka mengatakan “tapi”. Saya sering menemukan, bahwa mereka bukannya mencari solusi, tetapi mencari pembenaran bahwa mereka sedang terpuruk dan tidak ada jalan keluar.
Jika Anda serius mencari solusi, jangan mengatakan “tapi” saat ada solusi. Meskipun solusi tersebut terlihat tidak mungkin. Cobalah untuk berpikir terbuka, sebab seringkali bukan tidak ada solusi, tetapi orang sering menutup pikirannya untuk solusi. Daripada mengatakan “tapi”, tanyakan saja, “Bagaimana caranya?”. Bisa jadi apa yang sebelumnya terlihat mustahil, berubah menjadi hal mudah setelah tahu caranya.
Jadi, tenang, berdo’a, dan carilah solusi diiringi pikiran yang terbuka akan solusi. Kadang, solusi datang dari arah yang tidak disangka-sangka. Bisa jadi solusi datang dari orang yang tidak Anda kenal sama sekali. Yakinlah akan pertolongan Allah. Selalu ada jalan keluar.

MOTIVASI

“Hancur sudah impian saya. Apa yang bisa saya lakukan?” Tidak asing membaca kalimat ini? Setidaknya kalimat yang senada. Dan ini adalah wajar, tidak semua yang kita impikan akan tercapai meski kita sudah ikhtiar dengan optimal. Banyak kemungkinan mengapa impian kita hancur.
Bisa jadi Allah menunjukan kepada kita, bahwa impian kita itu bukan yang terbaik bagi kita. Bisa jadi Allah memberikan hikmah kepada kita lewat kehancuran impian Anda. Bisa jadi Allah menguji kita. Bisa jadi Allah akan memberi sesuatu yang jauh lebih baik dibanding impian kita. Bisa jadi …. yah, banyak sekali kemungkinan.


Boleh jadi kamu membenci sesuatu, padahal ia amat baik bagimu, dan boleh jadi (pula) kamu menyukai sesuatu, padahal ia amat buruk bagimu; Allah mengetahui, sedang kamu tidak mengetahui. (QS. Al Baqarah:216)
Namun, yang terpenting adalah bagaimana kita bersikap saat impian kita hancur berantakan. Banyak orang yang berhenti, menyerah, dan hanya mengeluh. Dia tidak akan mendapatkan apa-apa kecuali sakit hati yang semakin menggunung. Mereka beranggapan bahwa mereka tidak lagi perlu bermimpi karena mimpi mereka sudah hancur.
Tidak, sahabatku. Kata siapa impian itu hanya satu? Kita bisa membangun impian yang lain dan mengejarnya lagi. Ingatlah apa yang Anda impikan selama ini bukanlah satu-satunya impian. Dan juga belum tentu yang terbaik. Atau…
Kata siapa cara meraih impian cuma satu? Jika satu cara salah, kita bisa coba cara lain. Mungkin juga kita kurang optimal dalam meraih mimpi. Mungkin strategi kita salah, maka rumuskan strategi baru. Mungkin taktik kita salah, maka rancanglah taktik baru.
Berhenti adalah cara pasti untuk gagal. Lebih parah lagi, berhenti akan menjadikan kita tidak lagi menggampai mimpi-mimpi yang lain. Jika impian Anda hancur berantakan, maka bangunlah mimpi baru dan/atau lakukan cara baru dalam meraihnya.
Sebagai penutup, mari kita renungkan hadits berikut:
Aku mengagumi seorang mukmin. Bila memperoleh kebaikan dia memuji Allah dan bersyukur. Bila ditimpa musibah dia memuji Allah dan bersabar. Seorang mukmin diberi pahala dalam segala hal walaupun dalam sesuap makanan yang diangkatnya ke mulut isterinya. (HR. Ahmad dan Abu Dawud)
Related Posts Plugin for WordPress, Blogger...

"SMS gratiss ! ! !"

FraNk IeRo

FraNk IeRo
 
Copyright © My BlogGies Romance