Tuesday, August 31, 2010

Holden Viva Automatic Ultimate Choice


Holden Viva is the ultimate choice if you are looking for a mid-sized car that isn’t a Corolla. Holden Viva is meant for those buyers on a budget. If you are confused whether to buy it or not then read on.

Very simply, the Holden Viva is a keenly priced automobile and is well equipped, two of the most important factors to consider when purchasing a new car. In addition to this, it has a reasonable performance, agile and is fitted with a proper interior and spacious boot room.



No doubt the ride quality is up to par with its ability to soak up even the worse road surfaces, and the tyre and wind noises are passive. Under cushy and simple conditions the Holden Viva is a quiet and low impact ride. This provides a smooth ride helping to avoid the bumps and jarring of daily suburban driving.

With an average of 7.4 liters per 100 kilometers, you won’t have to worry about the recent fuel price hikes. So is the Viva the small car upheaval that Holden claims? Judged merely in product terms, not by a long shot. But on the sales charts, where things like space, value and features usually add up for more than sharp handling and modern design, the Viva is likely to make an impact.


The Comfortability Factor
There is ample space front up with good seat support and adjustable steering. The steering feels light and direct making maneuvering in the tightest spots quite easy.

Ride Quality
No doubt the ride quality is up to par with its ability to soak up even the worse road surfaces, and the tyre and wind noises are passive. Under cushy and simple conditions the Holden Viva is a quiet and low impact ride. This provides a smooth ride helping to avoid the bumps and jarring of daily suburban driving.

Standard Equipment
With the Holden Viva you get all the standard car features you may look for in a car mid size auto. Good fit-out, four air bags, air-conditioning, power front windows, remote central locking are just a few that are present in this cozy car.


Specification
Dimension
Wheelbase 2600 mm 102.4 in
Track front 1480 mm 58.3 in
rear 1480 mm 58.3 in
Length 4295 mm 169.1 in
Width 1725 mm 67.9 in
Height 1445 mm 56.9 in
Length:wheelbase ratio 1.65
Ground clearance
Kerb weight 1293 kg 2851 lb
Weight distribution
(Front)
Fuel capacity 60 litres 13.2 UK Gal 15.9 US Gal

Engine
Bore × stroke 80.50 mm × 88.20 mm
3.17 in × 3.47 in
Cylinders S-4
Displacement 1.8 litre
1796 cc
(109.599 cu in)
Type DOHC
Key:

SOHC
Single overhead camshaft

DOHC
Double overhead camshaft

OHV
Overhead valves

TS
Two stroke

SV
Side valves

Sl
Sleeve valves

oise
Overhead inlet side exhaust

4 valves per cylinder
16 valves in total
Construction
Sump Wet sumped
Compression ratio 9.70:1
Fuel system SMPFI
Maximum power
(ECE) 121.7 PS (120 bhp) (89.5 kW)
@ 5800 rpm
Specific output 66.8 bhp/litre
1.09 bhp/cu in
Maximum torque
(ECE) 169.0 Nm (125 ft·lb) (17.2 kgm)
@ 3600 rpm
bmep 1182.5 kPa (171.5 psi)
Specific torque 94.1 Nm/litre
Maximum rpm
Manufacturer GM
Code
Main bearings
Coolant Water
Bore/stroke ratio 0.91
Unitary capacity 449 cc/cylinder
Aspiration Normal
Compressor type N/A
Intercooler None
Catalytic converter Y

Performance
0-50 mph (80 km/h)
0-60 mph
0-100 km/h
0-100 mph
80-120 km/h (50-70 mph) in top
Standing ¼mile
Standing km
Top speed
Fuel consumption
CO2 Emissions
Carfolio Calculated CO2 ?
Power-to-weight 92.81 bhp/ton

New Toyota Verso-S


Toyota will exhibit at booth at the Paris Motor Show, world premiere, a small van (MPV) referred back of S, and a restyled version of the model inside iQ. The Toyota Verso S re-segment small car family, where several years ago have only one representative: Toyota Yaris Verso.

The Japanese firm's replacement for the long-gone Yaris Verso measures just under 4 meters in length and will compete with the likes of the Kia Venga, Opel Meriva and Citroen C3 Picasso. We don't have anything else in the way of details, but European buyers should expect a similar petrol and diesel engine lineup to the Yaris.



The all-new Toyota Verso-S arrived at the world’s leading at the Paris Motor show in 2010. Underestimated, broad and ill-S Toyota Verso efficiency in the direction of an empty display. This brusquest overall length – to a lesser degree four beats – whatever the MPV in the segment-B in Europe. But attention to contingencies in any practical expression by the spaciousness of the interior design has maximum flexibility, convenience and caliber to understand the end-to-end.

The smallest four-seater in the world, Toyota iQ comes with an internal review at the Paris Motor Show, and the Aygo model comes with a small class connectivity technology, suggestively called Connect. Also, Toyota's stand at Paris will host the FT-CH concept, already presented in Geneva in March 2010, and the Prius plug-in hybrid - an advanced version of the hybrid Prius, which will be available on sale in Europe 2012.


Sunday, August 29, 2010

New Alfa Romeo Brera 2010 Specification


The special edition Alfa Brera "Italia Independant", which will be produced in a limited run of 900 units for Europe, Japan and Australia, is available for order in Germany with prices starting from €29,700 for the 185HP 2.2-liter four-cylinder JTS model and from €38,850 for the 260HP 3.2-liter JTS V6 model that's offered in both front- and all-wheel drive versions.

Alfa Romeo in collaboration with stylish goods brand Italy Independent has release a special Alfa Romeo Brera model, the Alfa Romeo Brera Italia Independent Special Edition.



Created in collaboration with domestic fashion house "Italia Independent", the limited run Brera coupe is about style. Special exterior touches include a Titanium opaque paintwork with matching 18-inch alloy wheels in a turbine pattern, red colored brake callipers and an aluminum fuel cap.

The 2+2 coupe's interior is decked out in carbon fiber trim and black leather upholstery with contrasting red seams. The brushed aluminium "Italia Independent" logos, pedals and foot rest complete the package.

The vehicle's standard equipment includes seven airbags, automatic dual zone climate control system, cruise control, fog lights and a high-end audio system.




Specification
Wheelbase 2525 mm 99.4 in
Track front 1579 mm 62.2 in
rear 1559 mm 61.4 in
Length 4413 mm 173.7 in
Width 1830 mm 72 in
Height 1341 mm 52.8 in
Length:wheelbase ratio 1.75
Ground clearance
Kerb weight 1480 kg 3263 lb
Weight distribution
(Front)
Fuel capacity 70 litres 15.4 UK Gal 18.5 US Gal
aerodynamics
2010 Alfa Romeo Brera 2.0 JTDm See all Alfa Romeo models
Drag coefficient
Frontal area
Cx
engine
2010 Alfa Romeo Brera 2.0 JTDm See all Alfa Romeo models
Bore × stroke 83.00 mm × 90.40 mm
3.27 in × 3.56 in
Cylinders S-4
Displacement 2 litre
1956 cc
(119.362 cu in)
Construction
Sump Wet sumped
Compression ratio 16.50:1
Fuel system common rail direct diesel injection
Maximum power 170.3 PS (168 bhp) (125.3 kW)
@ 4000 rpm
Specific output 85.9 bhp/litre
1.41 bhp/cu in
Maximum torque 360.0 Nm (266 ft·lb) (36.7 kgm)
@ 1750 rpm
bmep 2312.8 kPa (335.4 psi)
Specific torque 184.05 Nm/litre
Maximum rpm
Manufacturer Fiat
Code
Main bearings
Coolant Water
Bore/stroke ratio 0.92
Unitary capacity 489 cc/cylinder
Aspiration Turbo D.
Compressor type
Intercooler
Catalytic converter Y

0-50 mph (80 km/h)
0-60 mph
0-100 km/h 8.80 s
0-100 mph
80-120 km/h (50-70 mph) in top
Standing ¼mile
Standing km 30.20 s
Top speed 218 km/h (135 mph)
Fuel consumption 7.1/4.4/5.4 l/100km urban/extra-urban/combined
CO2 Emissions 142.0 g/km
Carfolio Calculated CO2 ? 145.80 g/km
Power-to-weight 113.51 bhp/ton

Engine location Front
Engine alignment Transverse
Drive FWD

Key:

FWD
Front wheel drive

RWD
Rear wheel drive

AWD
All wheel drive

4WD
Four wheel drive


Steering rack & pinion PAS
Turns lock-to-lock
Turning circle
Suspension front I.DW.
rear I.MultiLi.
Key:

I
Independent

LA
Live axle

dD
de Dion axle

W
Wishbone

DW
Double wishbones

CS
Coil springs

ARB
Anti-roll bar

LS
Leaf springs

SE
Semi-elliptic leaf springs

See more...
Wheels front
rear
Tyres front 225/50 R 17
rear 225/50 R 17
Brakes F/R VeDi/VeDi-S-ABS

Key:

Ve
Ventilated

Di
Disc (Disk)

Dr
Drum

S
Servo-assisted

ABS
Anti-lock Braking System

Brake ∅ front 330 mm
rear 292 mm
Braked area
Transmission 6 speed manual
Top gear ratio
Final drive ratio 3.55

Saturday, August 28, 2010

New Jeep Commander Generation 2010


2010 Jeep Commander largely unchanged. Medium SUV is basically a stretched version of the Jeep Grand Cherokee. Commander comes in Sport and Limited trims. The Jeep Commander is a niche vehicle for people who like to go off-road and need a lot of passenger room. However, reviewers say that the passengers you haul down the trail in the Commander won't be happy campers. While some high-tech interior features, like Chrysler's uConnect multimedia entertainment system are available, the Commander just isn't as comfortable as competitors. The Overland model has been discontinued. Each is available with rear-wheel drive or all-wheel drive. Low range gear for off-roading is a standard Limited, optional on Sport. All the Commander seat seven passengers.



Sport has a 210-hp 3.7-liter V6 engine. Standard Limiteds and optional on the Sport is a 357-hp 5.7-liter Hemi V8 with Chrysler's Multi Displacement System cylinder deactivation. 305-hp 4.7-liter V8 has been discontinued. All engines team with 5-speed automatic transmission. The commander assessed to tow up to 3500 pounds with the V6 and 7400 pounds with the V8. Security features that are available include ABS, traction control, charging system, curtain side airbags, front and side airbags. DVD entertainment, navigation system, glass-camera and power adjustable pedals are among the choices. Also offered are Chrysler's Uconnect multimedia suite, which can include a wireless cell phone link, 30-GB hard drive to store digital music and image files, and navigation systems.



If you're looking for a comfortable SUV with plenty of seating space and towing capabilities, check out the Chevy Tahoe. Though it doesn't have the off-road chops of the Commander, some critics say it can handle the off-road terrain that most consumers will throw at them. If you just need people-moving ability and don't plan to go off-road or tow, check out the Chevrolet Traverse. It can seat as many as the Commander, costs a little less, is more comfortable to drive and gets better fuel economy. While it isn't as rugged as the Commander, if you can confine your driving to the pavement, it may be a better choice for you.

The 2010 Commander is largely a carryover from the 2009 model year, and is available in two trims: Sport and Limited. It's also available as a rear-wheel or four-wheel drive vehicle. If you're dead set on the Commander, check out this month's best Jeep Deals to see what discounts and incentives are available.


The Jeep Commander offers three different transfer case/driveline options for selection, depending on the model. The base is called Quadra-Trac I, which is a single speed (no reduction gearset for a “low” range) transfer case, incorporating a “power divider” to send power to the front driveshaft, and consequently, the front driving axle, only when slippage is encountered.

The second system, called Quadra-Trac II, is standard on the Commander Limited and optional on the Commander Sport and Rocky Mountain. This system contains an electronically controlled clutch pack that engages to transfer up to 100 percent of the available engine torque to the axle wit hthe most traction. This system also adds a Neutral and Low range selection for special situations.

The third and final system Jeep offers on the Commander is the most complex system, the Quadra-Drive II, standard on the Overland, but optional on all other models, in keeping with Jeep's “You Talk, We Listen” attitude. This system has the “brains” to deliver power only where it is usable, in a normal or low range, based on speed sensor inputs and distributed by Electronic Limited Slip Differentials (“ELSD” in Jeep speak) in both the front and rear axles as well as the transfer case. These three inputs allow the computer to constantly offer the power where it can be most safely utilized, by the tires with the most traction.

The tires on the Commander remain as Goodyear being the supplier, in sizes of P245/65R17 BSW all-terrain as standard, OWL as optional on all but the Overland models, where 245/65R18 BSW tires are standard. Jeep offers 2 different wheels, depending on the tires supplied. In the 17 inch diameter size, a 17” x 7.5” inch machined face aluminum wheel is utilized, and in the optional 18 inch size, an 18” x 7.5” Chrome clad aluminum wheel is supplied.

Trailer towing packages are optional on all models except the Overland, where the high end Trailer Towing Group IV is standard, in keeping with the nature of the fully equipped vehicle.

Jeep has announced enhancements to the 2008 Commander models, Overland and Limited, that include: No Charge MyGIG Infotainment System with integral Navigation system (a $900 value), Power Sunroof w/Command View dual skylights, available SIRIUS BackSeat TV, the SmartBeam headlamp system, which adjusts to ambient lighting conditions, illuminated (fade in and out) entry, and active “three blink-then-off” lane change turn signal position.

New Chrysler Aspen Specification

The Chrysler Aspen Limited 4X2 is Chrysler's full-size SUV. The Aspen shares the same platform as the Dodge Durango. It is clear that when the Aspen was on the drawing board we were not suffering from a credit crunch or gas price hikes. However, although the sheer size and cost of the Aspen may deter buyers, some buyers actually need vehicles like the Chrysler Aspen Limited 4X2 in order to tow large boats or trailers. We should not forget that there is a place for vehicles with huge towing capacities - try towing a 40ft trailer with a Prius!



The Chrysler Aspen Limited 4X2 uses exactly the same suspension layout as the Dodge Durango, independent, double-wishbone front and non-independent solid-axle rear. The Aspen comes with a 303-hp 4.7-liter V8 or a 335-hp 5.7-liter Hemi V8 engine and either rear- or all-wheel drive. Both engines are mated to a five-speed automatic transmission and the Hemi V8 includes the Chrysler Multi-displacement System (MDS) which is capable of shutting down 4 cylinders to conserve fuel when not required.

Conventional 2009 Chrysler Aspen are available with rear-wheel drive or all-wheel drive. 2009 Chrysler Aspen Hybrids are AWD only. Maximum towing capacity is 8900 lb for conventional models, 6000 lb for the Hybrid. A low-range gear for off-roading is an option on non-Hybrid AWD models. The 2009 Chrysler Aspen its available in safety features include ABS, traction control, antiskid system, curtain side airbags, and front side airbags.



Standard seating is for eight with a 2nd-row bench; available buckets reduce it to seven. A power liftgate and rearview camera are standard on all models. Leather upholstery and navigation system are standard on Hybrid and available on other models. DVD entertainment is optional on all.

The Consumer Guide Automotive compare places each vehicle into one of 18 classes based on size, price, and market position for consumer choice. Premium Midsize SUVs are similar in size and construction to Midsize SUVs. Most, in fact, are gilded versions of Midsize SUVs; though a few are exclusive upscale designs.



New or significantly redesigned models include the Infiniti FX and Mercedes-Benz M-Class. The Chrysler Aspen adds a gas/electric hybrid model, and the Mercedes-Benz M-Class and R-Class add a new diesel powerplant, as does the Volkswagen Touareg 2.

Specification
Wheelbase 3028 mm 119.2 in
Track front 1636 mm 64.4 in
rear 1636 mm 64.4 in
Length 5100 mm 200.8 in
Width 1930 mm 76 in
Height 1887 mm 74.3 in
Length:wheelbase ratio 1.68
Ground clearance 220 mm 8.7 in
Kerb weight 2224 kg 4903 lb
Weight distribution
(Front) 52.60 %
Fuel capacity 102.3 litres 22.5 UK Gal 27 US Gal

Drag coefficient 0.391
Frontal area 3.10 m2
Cx 1.21

Bore × stroke 93.00 mm × 86.50 mm
3.66 in × 3.41 in
Cylinders V-8 in 90.0° vee
Displacement 4.7 litre
4701 cc
(286.873 cu in)
Type SOHC
Key:

SOHC
Single overhead camshaft

DOHC
Double overhead camshaft

OHV
Overhead valves

TS
Two stroke

SV
Side valves

Sl
Sleeve valves

oise
Overhead inlet side exhaust

See more...
4 valves per cylinder
32 valves in total
Construction cast iron block; aluminum alloy head
Sump Wet sumped
Compression ratio 9.00:1
Fuel system SMPFI
Maximum power
(SAE net) 307.2 PS (303 bhp) (225.9 kW)
@ 5650 rpm
Specific output 64.5 bhp/litre
1.06 bhp/cu in
Maximum torque
(SAE net) 447.0 Nm (330 ft·lb) (45.6 kgm)
@ 3950 rpm
bmep 1194.9 kPa (173.3 psi)
Specific torque 95.09 Nm/litre
Maximum rpm 6000 rpm
Manufacturer Chrysler
Code
Main bearings
Coolant Water
Bore/stroke ratio 1.08
Unitary capacity 587.63 cc/cylinder
Aspiration Normal
Compressor type N/A
Intercooler None
Catalytic converter Y

Engine location Front
Engine alignment Longitudinal
Drive RWD

Key:

FWD
Front wheel drive

RWD
Rear wheel drive

AWD
All wheel drive

4WD
Four wheel drive


Steering rack & pinion PAS
Turns lock-to-lock 3.410
Turning circle
Suspension front I.U&LW.ARB.
rear LA.WL.ARB.
Key:

I
Independent

LA
Live axle

dD
de Dion axle

W
Wishbone

DW
Double wishbones

CS
Coil springs

ARB
Anti-roll bar

LS
Leaf springs

SE
Semi-elliptic leaf springs

See more...
Wheels front
rear
Tyres front
rear
Brakes F/R VeDi/Di-S-ABS

Key:

Ve
Ventilated

Di
Disc (Disk)

Dr
Drum

S
Servo-assisted

ABS
Anti-lock Braking System

Brake ∅ front 336 mm
rear 352 mm
Braked area
Transmission 5 speed automatic
Top gear ratio 0.67
Final drive ratio 3.55

Thursday, August 26, 2010

New Holden Announces New Compact Car for 2010


GM Holden manufacturer from Australian has announced plans to build a new small car based on the Delta platform which is also the basis of the Chevrolet Cruze and Opel Astra 2010. Unlike traditional Holden new car will be driving the front wheels and features new technologies to improve fuel economy.The new car will be available in both sedan and hatchback body style when it goes into production in the summer of 2010 at the Elizabeth manufacturing facility in South Holden Australia. The majority of car design and engineering will be conducted at Holden's Port Melbourne headquarters in Victoria, ensuring that the production model will have a unique appearance that was built specifically for the Australian market.

Powertrain options will include a variety of four-cylinder petrol engines with direct injection and at least one diesel. Engineers are currently looking into the possibility of offering the new car with start/stop technology and the ability to use alternative fuels such as E85, LPG and Compressed Natural Gas (CNG).

GM Holden will build an all-new small car in Australia alongside the country’s best-selling Commodorerange. The second carline will start in the third quarter of 2010 with support from the Federal and South Australian Governments.

The vehicle will be based on General Motors’ global Delta small car platform and feature new technologies to increase fuel efficiency and reduce greenhouse emissions. The new front-wheel-drive vehicle will be built as a sedan and hatch at GM Holden’s Elizabeth manufacturing facility in South Australia. Design and engineering work will take place at the company’s headquarters in Port Melbourne, Victoria.

Start-stop hybrid technology and capacity to run on alternative fuels such as E85, diesel, LPG and Compressed Natural Gas (CNG) are all being considered for the vehicle’s development.
It will be GM Holden’s first locally produced car beyond its current range of larger vehicles since the Asian economic crisis ended Vectra production in 1998.

The program will require 500 to 600 existing employees at Elizabeth and is estimated to provide 500 to 600 local supplier positions. GM Holden Chairman and Managing Director, Mark Reuss said the announcement provided opportunity to take a leading role in developing alternative fuel and fuel saving technologies in Australia for Australians.

Mr Reuss said the program would be a major contributor to the economy, generating an estimated $70 million to $80 million in wages and $30 million in research and development.
“Together with Government, we are extending the scope and consumer appeal of our local manufacturing efforts,” Mr Reuss said.

“We have been building Holden cars to suit the needs of Australian motorists for 60 years. These plans build on that tradition.
“We recognise the needs and desires of motorists are evolving with growing concern around environmental factors and shifting consumer sentiment.
“Such evolution calls for an innovative approach to complement our current offering.
“Just as our leading Commodore range will continue to undergo technological development, this new vehicle will cater for growing demand for smaller cars focussed on economy.
“We are planning for the future to produce a wider range of cars in Australia to cater for a variety of driving needs.”

Flexible manufacturing infrastructure will be introduced to the Elizabeth plant to make it capable of producing a series of GM global vehicles in years to come.
It also provides opportunity to develop an export program for the vehicle, particularly to other right hand drive markets around the world.

Mr Reuss paid tribute to the Federal and South Australian Governments for their ongoing commitment to the Australian automotive industry.
“The Rudd Government’s Green Car Innovation Fund has provided opportunity to turn our plans into reality,” Mr Reuss said.
“This announcement complements the vision we share with the Government of reducing Australia’s dependence on foreign oil and making motoring better for the environment.
“It demonstrates commitment to an Australian automotive industry which extends beyond manufacturing at GM Holden to thousands of suppliers and dealers across the country.
“That demonstration was clearly seen by our parent company in its decision to support this program.
“The support of the Federal and South Australian Governments in securing this program recognises the fundamental role which automotive manufacturing makes to national and state economies.
“By working together, we have ensured GM Holden will continue to make a major contribution to the nation’s economy for many years to come.”
GM Group Vice President and Asia Pacific President, Nick Reilly, today added his support to the program as proof of GM’s capacity to innovate across the region.
“This announcement recognises the ability of GM, GM Holden and the Australian automotive industry to see the future and move in the right direction,” Mr Reilly said.
“This program simply would not have occurred without such partnerships.
“Producing this vehicle will continue Australia’s proud history of innovation as part of the GM group’s broader commitment to energy diversity.
“I thank the Australian Federal Government and Government of South Australia for their commitment to manufacturing in the Asia Pacific region.”

About the vehicle
The new small, front-wheel-drive, four-cylinder vehicle to be built by GM Holden at Elizabeth will be based on General Motors’ global Delta small car architecture.
Other examples of the architecture will include the next generation Chevrolet Cruze and Opel, Vauxhall and Saturn Astra.

The architecture was primarily developed by GM Europe in Russelsheim, Germany for GM markets around the world. Local design and engineering work on the Australian vehicle will take place at GM Holden’s Port Melbourne headquarters in Victoria.

Direct injected petrol and diesel variants of the vehicle will be produced with GM Holden considering a range of alternative fuel or fuel saving technologies including E85, LPG, CNG and start-stop hybrid capability. Further details about the vehicle including its nameplate, design specifications and pricing will be determined closer to the time of production.

Given the competitiveness of the small car segment, key decisions will be made to ensure the first Australian-made small car choice for many years will be a compelling one.
The vehicle will be built in the south bodyshop of the Elizabeth facility, which was previously used for the Vectra assembly in the late 1990

New Holden Cruze 2010 Specification

New Holden Cruze was the first of a new wave of General Motors' global product and enter the Australian small car segment is equipped with a striking road presence, developed a high level of interior comfort and safety features. All-new Holden Cruze Australian who made her debut at the 2009 Melbourne International Motor Show, signaling the latest corporate participants in the competitive small car segment. The car is powered by 1.8 liter four-cylinder gasoline engine or optional 2.0-liter ECOTEC four-cylinder turbocharged common rail diesel engine, Holden Cruze will go on sale in the second quarter of 2009.




Exterior
With a wide track, long wheelbase and its wheels located at the outer edges of its body, the Holden Cruze sedan's 'four-door coupe' styling delivers the presence of an upscale mid-size sedan. State of the art manufacturing processes ensures gaps are minimised and margins in the exterior design deliver high levels of quality, fit and finish. Holden Cruze has been designed to appeal to drivers who value sophisticated design combined with sporty good looks.




Interior
The Holden Cruze boasts one of the most advanced interiors of any small car on the market offering exceptional quality and functionality, while delivering sportiness and luxurious comfort. Stylish and spacious, the Holden Cruze interior offers exceptional fit and finish and comfort with contoured sport seats and a dual cockpit design which houses an advanced integrated centre panel with graphic information display and CD with MP3 "plug and play" functionality. An integrated centre stack houses the infotainment display, radio and HVAC controls resulting in a fresh and contemporary look. With generous rear passenger leg, head and shoulder room this small car comfortably sits five adults, and when combined with one of the largest range of standard features from the base model customers do not need to compromise on large car features. Storage, functionality and convenience applications found on the new Holden Cruze are plentiful with 60/40 split rear seats, seatback pockets, a centre console CD storage, a shopping bag hook and six cup holders.



SPECIFICATION
The impressive level of standard safety features across the range:
* Electronic Stability Control (ESC)
* Traction Control (TC)
* Anti-lock Brakes (ABS)
* Brake Assist (BA)
* Electronic Brakeforce Distribution (EBD)
* Six airbags including driver, front passenger, front side and curtain airbags
* Seatbelt retractor and lap pretensioners with seatbelt load limiters
* Sixty-five percent of the structure is high-strength steel
Holden Cruze CD Feature Highlights:
* 1.8 litre 4-cylinder ECOTEC petrol engine or optional 2.0 litre 4-cylinder turbocharged common rail diesel engine
* 5-speed manual transmission or optional 6-speed automatic transmission with Active Select
* 16 inch steel wheels
* Body coloured door handles and mirrors
* Electronic Stability Control (ESC) incorporating:
o Anti-lock Braking System (ABS)
o Traction Control (TC)
o Brake Assist (BA)
o Electronic Brakeforce Distribution (EBD)
* 6 airbags including:
o Front airbags for driver and front passenger
o Front side impact airbags
o Side curtain airbags
* Automatic headlamps
* 6 speaker audio system with MP3 compatible in dash CD, radio and MP3 "plug & play" functionality with graphic information display
* Air conditioning
* Steering wheel audio controls
* Cruise control
* Trip computer
* Power windows, front and rear

Holden Cruze CDX, specific feature :
* 1.8 litre 4-cylinder ECOTEC petrol engine
* 5-speed manual transmission or optional 6-speed automatic transmission with Active Select
* 17 inch alloy wheels (4)
* Front fog lamps
* Leather steering wheel
* Leather appointed seats
* Heated front seats
* Rear park assist

Wednesday, August 25, 2010

konsep IP routing

outing dari kata dasar route yang diserap dalam bahasa indonesia sebagai rute, definisinya adalah rute dari paket IP didalam jaringan dengan serangkaian tugas untuk mengirimkan paket IP dari router ke router sampai ke tujuan akhir sebagaimana sudah ditentukan didalam bagian IP Header. adalah mirip konsep routing antara jaringan IP dengan system transportasi, disini kami akan menerangkan bahwa konsep routing didalam jaringan IP juga mirip dengan pengoperasian pengiriman mail. dan kami akan membandingkan konsep routing IP dengan konsep konsep system lainnya.

a router has directly attached networks that are immediately accessible (in
other words, that do not require any specific routing mechanism to discover). Consider
router R, in the following example. Networks 1.0.0.0, 10.1.1.0, and 10.1.2.0
are directly connected to the router:
hostname R
!
interface Ethernet0
ip address 1.1.1.1 255.0.0.0
!
interface Ethernet1
ip address 10.1.1.4 255.255.255.0
!
interface Ethernet2
ip address 10.1.2.4 255.255.255.0

In fact, the moment these networks are connected to the router they are visible in R’s
routing table. Note in the following output that the command to display the routing
table is show ip route (in EXEC mode). Also note the “C” that is prepended to the
entries in the routing table, indicating that the routes were discovered as directly
connected to the router:
R#show ip route
Codes: C – connected, S – static, I – IGRP, R – RIP, M – mobile, B – BGP
D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF external type 2, E – EGP
i – IS-IS, L1 – IS-IS level-1, L2 – IS-IS level-2, * – candidate default
Gateway of last resort is 0.0.0.0 to network 0.0.0.0
C 1.0.0.0/8 is directly connected, Ethernet0
10.0.0.0/8 is subnetted, 2 subnets
C 10.1.1.0/24 is directly connected, Ethernet1
C 10.1.2.0/24 is directly connected, Ethernet2
Directly connected networks are automatically installed in the routing table if the
interface to the network is up. Figure 1-2 shows router R with its directly connected
networks. (The EXEC command show interface will show the state of the interfaces).
In the previous example, it is assumed that all three interfaces to the directly connected
networks are up. If an interface to a directly connected network goes down,
the corresponding route is removed from the routing table.
If multiple IP addresses are attached to an interface (using secondary addresses), all
the associated networks are installed in the routing table.
Static Routing
ip route 146.1.0.0 255.255.0.0 1.1.1.2
R#sh ip route

1 S 146.1.0.0/16 [1/0] via 1.1.1.2
ip route 146.1.0.0 255.255.0.0 1.1.1.3
The syntax of the static route command is:
ip route network [mask] {address | interface} [distance]
where network and mask specify the IP address and mask of the destination. The
next hop may be specified by its IP address or by the interface on which to send the
packet. To point a static route to an interface (Ethernet0 in this case), use:
ip route 146.1.0.0 255.255.0.0 interface Ethernet0
Static routes are smart to the extent that if the next hop (interface or IP address)
specified goes down, the router will remove the static route entry from the routing
table.
Dynamic Routing
we spoke of the “shorter” or “shortest” path in the context
of both DV and Link State algorithms. Since a router may know of multiple
paths to a destination, each routing protocol must provide a mechanism to discover
the “shorter” or “shortest” path based on one or more of the following criteria: number
of hops, delay, throughput, traffic, reliability, etc. A metric is usually attached to
this combination; lower metric values indicate “shorter” paths. For each routing protocol
discussed in the chapters that follow, we will describe how the route metric is
computed.
A network under a single administrative authority is described as an autonomous system
(AS) in routing parlance. Interior gateway protocols (IGPs) are designed to support
the task of routing internal to an AS. IGPs have no concept of political boundaries
between ASs or the metrics that may be used to select paths between ASs. RIP, IGRP,
EIGRP, and OSPF are IGPs. Exterior gateway protocols (EGPs) are designed to support
routing between ASs. EGPs deploy metrics to select one inter-AS path over
another. BGP is the most commonly used EGP.
The Routing Table
At Grand Central Terminal, a big wall lists all the destinations and their corresponding
track numbers (see Figure 1-4). Passengers find their destination on this wall and
then proceed to the indicated platforms. Similarly, a routing table must contain at
least two pieces of information: the destination network and the next hop toward
that destination. This reflects a fundamental paradigm of IP routing: hop-by-hop
routing. In other words, a router does not know the full path to a destination, but
only the next hop to reach the destination.
Departures
Destination #####time#####tracknumber
New Haven 9:21 22
Cos Cob 9:24 11
Valhalla 9:31 19
Dover Plains 9:42 12
Bronxville 9:18 17

Routes are installed in the routing table as they are learned through the mechanisms
we have been discussing: directly connected networks, static routes, and dynamic
routing protocols. A typical routing table in a Cisco router looks like this:
Router>show ip route
Codes: C – connected, S – static, I – IGRP, R – RIP, M – mobile, B – BGP
D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF external type 2, E – EGP
i – IS-IS, L1 – IS-IS level-1, L2 – IS-IS level-2, * – candidate default
Gateway of last resort is 0.0.0.0 to network 0.0.0.0
2 177.130.0.0/30 is subnetted, 2 subnets
C 177.130.17.152 is directly connected, Serial1
C 177.130.17.148 is directly connected, Serial0
3 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
4 S 10.0.0.0/8 [1/0] via 160.4.115.74
5 S 10.254.101.0/24 [1/0] via 160.4.101.4
6 162.162.0.0/24 is subnetted, 2 subnets
O IA 162.162.101.0 [110/3137] via 11.175.238.4, 02:16:02, Ethernet0
[110/3137] via 11.175.238.3, 02:16:02, Ethernet0
O IA 162.162.253.0 [110/3127] via 11.175.238.4, 02:25:43, Ethernet0
[110/3127] via 11.175.238.3, 02:25:43, Ethernet0
7 O E2 192.188.106.0/24 [110/20] via 11.175.238.33, 20:49:59, Ethernet0

Note that the first few lines of the output attach a code to the source of the routing
information: “C” and “S” denote “connected” and “static”, respectively, as we saw
earlier, “I” denotes IGRP, etc. This code is prepended to each routing entry in the
routing table, signifying the source of that route.
The body of the routing table essentially contains two pieces of information: the destination
and the next hop. So, 177.130.0.0 (line 2) has two subnets, each with a 30-bit
mask. The two subnets are listed in the following two lines.
Line 3 shows an interesting case. 10.0.0.0 has two subnets: 10.0.0.0/8 and 10.254.
101.0/24. Not only are the subnet masks different, but the subnets are overlapping. A
destination address of 10.254.101.1 would match both route entries! So, should a
packet for 10.254.101.1 be routed to 160.4.115.74 or 160.4.101.4? Routing table
lookups follow the rule of longest prefix match. 10.254.101.1 matches 8 bits on line 4
and 24 bits on line 5—the longer prefix wins, and the packet is forwarded to 160.4.
101.4. 162.162.0.0 (line 6) has two subnets, each of which is known via two paths.
192.188.106.0 (line 7) is not subnetted.
What if a route is learnt via multiple sources—say, via OSPF and as a static entry?
Each source of routing information has an attached measure of its trustworthiness,
called administrative distance in Cisco parlance. The lower the administrative distance,
the more trustworthy the source.
Table 1-1 shows the default administrative distances.
Table 1-1. Default administrative distances
Route source Default distance
Connected interface 0
Static route 1
External BGP 20
IGRP 100
OSPF 110
IS-IS 115
RIP 120
EGP 140
Internal BGP 200
Unknown 255

Thus, if a route is known both via OSPF and as a static entry, the static entry, not the
entry known via OSPF, will be installed in the routing table.
Note that distance information and the route metric appear in the output of show ip
route inside square brackets with the distance information first, followed by a “/”
and the route metric: [distance/metric].
Administrative distance is only considered internally within a router; distance information
is not exchanged in routing updates.

to be continued..

konsep IP routing

outing dari kata dasar route yang diserap dalam bahasa indonesia sebagai rute, definisinya adalah rute dari paket IP didalam jaringan dengan serangkaian tugas untuk mengirimkan paket IP dari router ke router sampai ke tujuan akhir sebagaimana sudah ditentukan didalam bagian IP Header. adalah mirip konsep routing antara jaringan IP dengan system transportasi, disini kami akan menerangkan bahwa konsep routing didalam jaringan IP juga mirip dengan pengoperasian pengiriman mail. dan kami akan membandingkan konsep routing IP dengan konsep konsep system lainnya.

a router has directly attached networks that are immediately accessible (in
other words, that do not require any specific routing mechanism to discover). Consider
router R, in the following example. Networks 1.0.0.0, 10.1.1.0, and 10.1.2.0
are directly connected to the router:
hostname R
!
interface Ethernet0
ip address 1.1.1.1 255.0.0.0
!
interface Ethernet1
ip address 10.1.1.4 255.255.255.0
!
interface Ethernet2
ip address 10.1.2.4 255.255.255.0

In fact, the moment these networks are connected to the router they are visible in R’s
routing table. Note in the following output that the command to display the routing
table is show ip route (in EXEC mode). Also note the “C” that is prepended to the
entries in the routing table, indicating that the routes were discovered as directly
connected to the router:
R#show ip route
Codes: C – connected, S – static, I – IGRP, R – RIP, M – mobile, B – BGP
D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF external type 2, E – EGP
i – IS-IS, L1 – IS-IS level-1, L2 – IS-IS level-2, * – candidate default
Gateway of last resort is 0.0.0.0 to network 0.0.0.0
C 1.0.0.0/8 is directly connected, Ethernet0
10.0.0.0/8 is subnetted, 2 subnets
C 10.1.1.0/24 is directly connected, Ethernet1
C 10.1.2.0/24 is directly connected, Ethernet2
Directly connected networks are automatically installed in the routing table if the
interface to the network is up. Figure 1-2 shows router R with its directly connected
networks. (The EXEC command show interface will show the state of the interfaces).
In the previous example, it is assumed that all three interfaces to the directly connected
networks are up. If an interface to a directly connected network goes down,
the corresponding route is removed from the routing table.
If multiple IP addresses are attached to an interface (using secondary addresses), all
the associated networks are installed in the routing table.
Static Routing
ip route 146.1.0.0 255.255.0.0 1.1.1.2
R#sh ip route

1 S 146.1.0.0/16 [1/0] via 1.1.1.2
ip route 146.1.0.0 255.255.0.0 1.1.1.3
The syntax of the static route command is:
ip route network [mask] {address | interface} [distance]
where network and mask specify the IP address and mask of the destination. The
next hop may be specified by its IP address or by the interface on which to send the
packet. To point a static route to an interface (Ethernet0 in this case), use:
ip route 146.1.0.0 255.255.0.0 interface Ethernet0
Static routes are smart to the extent that if the next hop (interface or IP address)
specified goes down, the router will remove the static route entry from the routing
table.
Dynamic Routing
we spoke of the “shorter” or “shortest” path in the context
of both DV and Link State algorithms. Since a router may know of multiple
paths to a destination, each routing protocol must provide a mechanism to discover
the “shorter” or “shortest” path based on one or more of the following criteria: number
of hops, delay, throughput, traffic, reliability, etc. A metric is usually attached to
this combination; lower metric values indicate “shorter” paths. For each routing protocol
discussed in the chapters that follow, we will describe how the route metric is
computed.
A network under a single administrative authority is described as an autonomous system
(AS) in routing parlance. Interior gateway protocols (IGPs) are designed to support
the task of routing internal to an AS. IGPs have no concept of political boundaries
between ASs or the metrics that may be used to select paths between ASs. RIP, IGRP,
EIGRP, and OSPF are IGPs. Exterior gateway protocols (EGPs) are designed to support
routing between ASs. EGPs deploy metrics to select one inter-AS path over
another. BGP is the most commonly used EGP.
The Routing Table
At Grand Central Terminal, a big wall lists all the destinations and their corresponding
track numbers (see Figure 1-4). Passengers find their destination on this wall and
then proceed to the indicated platforms. Similarly, a routing table must contain at
least two pieces of information: the destination network and the next hop toward
that destination. This reflects a fundamental paradigm of IP routing: hop-by-hop
routing. In other words, a router does not know the full path to a destination, but
only the next hop to reach the destination.
Departures
Destination #####time#####tracknumber
New Haven 9:21 22
Cos Cob 9:24 11
Valhalla 9:31 19
Dover Plains 9:42 12
Bronxville 9:18 17

Routes are installed in the routing table as they are learned through the mechanisms
we have been discussing: directly connected networks, static routes, and dynamic
routing protocols. A typical routing table in a Cisco router looks like this:
Router>show ip route
Codes: C – connected, S – static, I – IGRP, R – RIP, M – mobile, B – BGP
D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF external type 2, E – EGP
i – IS-IS, L1 – IS-IS level-1, L2 – IS-IS level-2, * – candidate default
Gateway of last resort is 0.0.0.0 to network 0.0.0.0
2 177.130.0.0/30 is subnetted, 2 subnets
C 177.130.17.152 is directly connected, Serial1
C 177.130.17.148 is directly connected, Serial0
3 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
4 S 10.0.0.0/8 [1/0] via 160.4.115.74
5 S 10.254.101.0/24 [1/0] via 160.4.101.4
6 162.162.0.0/24 is subnetted, 2 subnets
O IA 162.162.101.0 [110/3137] via 11.175.238.4, 02:16:02, Ethernet0
[110/3137] via 11.175.238.3, 02:16:02, Ethernet0
O IA 162.162.253.0 [110/3127] via 11.175.238.4, 02:25:43, Ethernet0
[110/3127] via 11.175.238.3, 02:25:43, Ethernet0
7 O E2 192.188.106.0/24 [110/20] via 11.175.238.33, 20:49:59, Ethernet0

Note that the first few lines of the output attach a code to the source of the routing
information: “C” and “S” denote “connected” and “static”, respectively, as we saw
earlier, “I” denotes IGRP, etc. This code is prepended to each routing entry in the
routing table, signifying the source of that route.
The body of the routing table essentially contains two pieces of information: the destination
and the next hop. So, 177.130.0.0 (line 2) has two subnets, each with a 30-bit
mask. The two subnets are listed in the following two lines.
Line 3 shows an interesting case. 10.0.0.0 has two subnets: 10.0.0.0/8 and 10.254.
101.0/24. Not only are the subnet masks different, but the subnets are overlapping. A
destination address of 10.254.101.1 would match both route entries! So, should a
packet for 10.254.101.1 be routed to 160.4.115.74 or 160.4.101.4? Routing table
lookups follow the rule of longest prefix match. 10.254.101.1 matches 8 bits on line 4
and 24 bits on line 5—the longer prefix wins, and the packet is forwarded to 160.4.
101.4. 162.162.0.0 (line 6) has two subnets, each of which is known via two paths.
192.188.106.0 (line 7) is not subnetted.
What if a route is learnt via multiple sources—say, via OSPF and as a static entry?
Each source of routing information has an attached measure of its trustworthiness,
called administrative distance in Cisco parlance. The lower the administrative distance,
the more trustworthy the source.
Table 1-1 shows the default administrative distances.
Table 1-1. Default administrative distances
Route source Default distance
Connected interface 0
Static route 1
External BGP 20
IGRP 100
OSPF 110
IS-IS 115
RIP 120
EGP 140
Internal BGP 200
Unknown 255

Thus, if a route is known both via OSPF and as a static entry, the static entry, not the
entry known via OSPF, will be installed in the routing table.
Note that distance information and the route metric appear in the output of show ip
route inside square brackets with the distance information first, followed by a “/”
and the route metric: [distance/metric].
Administrative distance is only considered internally within a router; distance information
is not exchanged in routing updates.

to be continued..

What’s Wrong with IT Strategy

By definition, every organization has an IT Strategy – some have it clearly articulated and the others are working to one without knowing it. The question is: Is the IT Strategy producing results? One can also ask the same question a different way: What must one do to make IT Strategy produce results? Or, perhaps, what is wrong with this IT Strategy? The strength of an IT Strategy does not come from it being articulated. It lies along its entire lifecycle – from the vision to the underlying policies, framework, process design, including management and control mechanisms, and execution. Each of them must be carefully thought through and designed. Vision, principles and policies set the direction for an IT Strategy. They are the first step to designing and defining an IT Strategy but, more importantly, they reflect the stakeholders’ beliefs. It is critical that the strategy evolve from these beliefs, otherwise execution will be “half hearted”. It is also absolutely essential to realize that “stakeholders” include both the designers and the executers of this strategy. A framework provides structure to IT Strategy. It enables rapid, repeatable results by ensuring that we have a complete “picture” and made the key connections. Frameworks might not guarantee success, but they sure help sustain and repeat it. Sometime, they can also salvage a floundering effort by identifying root cause of failure. Without a framework success or failure are a black box. More often than not, success comes from tinkering with an initial failure. Frameworks are invaluable in this tinkering. Sometimes we forget that IT Strategy is a process not a point in time event. Like any other process, IT Strategy process must also be designed and have an “owner”. It must also be integrated with other processes such as Budget, Portfolio Rationalization, Enterprise Architecture Planning and Systems Implementation. It must also be managed – monitored and controlled – using clearly defined metrics and mechanisms. Execution makes all the difference between success and failure of an IT Strategy. An IT Strategy might look good on paper. However, implementation is where the rubber meets the road and for the first time we know, for sure, if things are working as planned. As much as strategy drives execution, the reverse is also equally true. A good IT Strategy is one that is built factoring in “practical” considerations or execution “constraints”. Also, on an ongoing basis, real data from execution must be used to “fine tune” strategy. For the sake of brevity, we cannot delve into all that issues affecting IT Strategy. So let us look at 10 key reasons why IT Strategies fail to, well, sizzle: Show me the alignment? IT Strategy and alignment are such very nebulous terms that most people have difficulty defining them in a manner that is actionable. It is fine to say that an IT Strategy is going to align IT with business but it is another matter that most people cannot prove this alignment. Most CIOs cannot say for sure if their IT is aligned with business. Show me the value? Another area of concern is whether an IT Strategy will create verifiable and sustainable results. One of the reasons for business leaders’ dissatisfaction with IT in general, and IT Strategy in particular, is that one cannot verify results. We know that IT Alignment creates shareholder value. However, if one cannot verify alignment itself, they cannot expect to be taken seriously, when they claim, that it resulted in shareholder value creation. What is the ROI of NPV? It is hard to argue with Peter Drucker, when he says, “If you cannot measure it, you cannot manage it”. However, is measurement is not restricted to financial measures such as NPV. It is not synonymous with “dollar-denominated”. IT is different. Its value cannot be measured only through NPV or other financial measures. Its measure does not have to be dollar denominated. There are other, better, means of measuring IT Value. How does this decision impact IT Value? An IT Strategy is not an end in itself. Organizations’ need to keep it updated. For example, unanticipated events require a response that might not have been considered in the original strategy. It is critical to understand how these decisions, in response to these events, affect the IT Strategy. Also, how do they impact value creation originally identified? How does this business decision impact IT? Stuff happens. In a business, it happens frequently and, more often than not, without warning. Speed and agility of response, differentiate businesses that succeed. Quickly, one would like to know the impact of a business event on its IT. Also, how can IT help respond to them – efficiently and effectively. IT Strategy framework must, seamlessly, traverse the business and IT boundaries to quickly assess the impact of an event across the entire organization. It should allow for quick decision making in response to these events – by assessing the impact on of each decision on shareholder value. One big leap or baby steps? Success, often, is a multi step process, especially, in uncharted territory. Our response to an initial stumble, determines if it is a minor glitch or a decisive blow. A good framework, process with a feedback loop and metrics help in this endeavor. IT Strategy’s success is no different. Our first foray might result in some problems. We should be able to know when we have faltered; if it is a glitch or a blunder; quickly assess the reason for our stumble. We must also be able to quickly devise a response. Can I learn from my experience? The classic definition of insanity is: repeating the same steps expecting different results. Why do IT organizations behave insanely? Because most organizations do not spend the time to analyze, document, incorporate, disseminate or teach their “lessons learnt”. Best practices are not disseminated from one part of the organization to the other. Failures are hidden. New team members are not taught “what works” and “what doesn’t”. Processes are not modified to incorporate lessons learnt. Your “next” IT Strategy is bound to deliver the same results and this one – nothing less; nothing more Is this a steering committee or a team? Often, IT Strategy is delegated to a steering committee comprised of participants from different functions. Each participant brings excellent, relevant and complementary skills to the table. However, this is a great idea that fails during execution. A successful team must have clearly defined roles and responsibilities. Each member of the team must understand how the different pieces of the puzzle fit together. Each member must “deliver” something. Together, then, the team delivers results. Steering committees result in the right people showing up for all the right meetings. However, they do not focus on role definition. They also fail to assign responsibility for deliverables. More often than not, these committees turn into debating societies where a lot of good stuff is discussed but very little, if anything, of value is ever delivered. Who will lose their job if this fails? Accountability is critical to the success of an IT Strategy. One can create a very “good” IT Strategy that either stays on the shelf or fails miserably when executed. Till success or failure is linked to executive compensation and/or career, such strategies and/or failures will continue to occur. Are we in compliance? IT standards are a critical enabler of IT Strategy because they help lower cost of operations. Organizations invest in standards teams that take great pains in defining standards. Often, IT Strategy process is not linked to a compliance process. Hence, projects that do not adhere to technical standards get implemented. Thus a great IT Strategy results in higher than desirable cost of operations.This is by no means an exhaustive list. However, addressing these will take us many steps closer to the solution.

What’s Wrong with IT Strategy

By definition, every organization has an IT Strategy – some have it clearly articulated and the others are working to one without knowing it. The question is: Is the IT Strategy producing results? One can also ask the same question a different way: What must one do to make IT Strategy produce results? Or, perhaps, what is wrong with this IT Strategy? The strength of an IT Strategy does not come from it being articulated. It lies along its entire lifecycle – from the vision to the underlying policies, framework, process design, including management and control mechanisms, and execution. Each of them must be carefully thought through and designed. Vision, principles and policies set the direction for an IT Strategy. They are the first step to designing and defining an IT Strategy but, more importantly, they reflect the stakeholders’ beliefs. It is critical that the strategy evolve from these beliefs, otherwise execution will be “half hearted”. It is also absolutely essential to realize that “stakeholders” include both the designers and the executers of this strategy. A framework provides structure to IT Strategy. It enables rapid, repeatable results by ensuring that we have a complete “picture” and made the key connections. Frameworks might not guarantee success, but they sure help sustain and repeat it. Sometime, they can also salvage a floundering effort by identifying root cause of failure. Without a framework success or failure are a black box. More often than not, success comes from tinkering with an initial failure. Frameworks are invaluable in this tinkering. Sometimes we forget that IT Strategy is a process not a point in time event. Like any other process, IT Strategy process must also be designed and have an “owner”. It must also be integrated with other processes such as Budget, Portfolio Rationalization, Enterprise Architecture Planning and Systems Implementation. It must also be managed – monitored and controlled – using clearly defined metrics and mechanisms. Execution makes all the difference between success and failure of an IT Strategy. An IT Strategy might look good on paper. However, implementation is where the rubber meets the road and for the first time we know, for sure, if things are working as planned. As much as strategy drives execution, the reverse is also equally true. A good IT Strategy is one that is built factoring in “practical” considerations or execution “constraints”. Also, on an ongoing basis, real data from execution must be used to “fine tune” strategy. For the sake of brevity, we cannot delve into all that issues affecting IT Strategy. So let us look at 10 key reasons why IT Strategies fail to, well, sizzle: Show me the alignment? IT Strategy and alignment are such very nebulous terms that most people have difficulty defining them in a manner that is actionable. It is fine to say that an IT Strategy is going to align IT with business but it is another matter that most people cannot prove this alignment. Most CIOs cannot say for sure if their IT is aligned with business. Show me the value? Another area of concern is whether an IT Strategy will create verifiable and sustainable results. One of the reasons for business leaders’ dissatisfaction with IT in general, and IT Strategy in particular, is that one cannot verify results. We know that IT Alignment creates shareholder value. However, if one cannot verify alignment itself, they cannot expect to be taken seriously, when they claim, that it resulted in shareholder value creation. What is the ROI of NPV? It is hard to argue with Peter Drucker, when he says, “If you cannot measure it, you cannot manage it”. However, is measurement is not restricted to financial measures such as NPV. It is not synonymous with “dollar-denominated”. IT is different. Its value cannot be measured only through NPV or other financial measures. Its measure does not have to be dollar denominated. There are other, better, means of measuring IT Value. How does this decision impact IT Value? An IT Strategy is not an end in itself. Organizations’ need to keep it updated. For example, unanticipated events require a response that might not have been considered in the original strategy. It is critical to understand how these decisions, in response to these events, affect the IT Strategy. Also, how do they impact value creation originally identified? How does this business decision impact IT? Stuff happens. In a business, it happens frequently and, more often than not, without warning. Speed and agility of response, differentiate businesses that succeed. Quickly, one would like to know the impact of a business event on its IT. Also, how can IT help respond to them – efficiently and effectively. IT Strategy framework must, seamlessly, traverse the business and IT boundaries to quickly assess the impact of an event across the entire organization. It should allow for quick decision making in response to these events – by assessing the impact on of each decision on shareholder value. One big leap or baby steps? Success, often, is a multi step process, especially, in uncharted territory. Our response to an initial stumble, determines if it is a minor glitch or a decisive blow. A good framework, process with a feedback loop and metrics help in this endeavor. IT Strategy’s success is no different. Our first foray might result in some problems. We should be able to know when we have faltered; if it is a glitch or a blunder; quickly assess the reason for our stumble. We must also be able to quickly devise a response. Can I learn from my experience? The classic definition of insanity is: repeating the same steps expecting different results. Why do IT organizations behave insanely? Because most organizations do not spend the time to analyze, document, incorporate, disseminate or teach their “lessons learnt”. Best practices are not disseminated from one part of the organization to the other. Failures are hidden. New team members are not taught “what works” and “what doesn’t”. Processes are not modified to incorporate lessons learnt. Your “next” IT Strategy is bound to deliver the same results and this one – nothing less; nothing more Is this a steering committee or a team? Often, IT Strategy is delegated to a steering committee comprised of participants from different functions. Each participant brings excellent, relevant and complementary skills to the table. However, this is a great idea that fails during execution. A successful team must have clearly defined roles and responsibilities. Each member of the team must understand how the different pieces of the puzzle fit together. Each member must “deliver” something. Together, then, the team delivers results. Steering committees result in the right people showing up for all the right meetings. However, they do not focus on role definition. They also fail to assign responsibility for deliverables. More often than not, these committees turn into debating societies where a lot of good stuff is discussed but very little, if anything, of value is ever delivered. Who will lose their job if this fails? Accountability is critical to the success of an IT Strategy. One can create a very “good” IT Strategy that either stays on the shelf or fails miserably when executed. Till success or failure is linked to executive compensation and/or career, such strategies and/or failures will continue to occur. Are we in compliance? IT standards are a critical enabler of IT Strategy because they help lower cost of operations. Organizations invest in standards teams that take great pains in defining standards. Often, IT Strategy process is not linked to a compliance process. Hence, projects that do not adhere to technical standards get implemented. Thus a great IT Strategy results in higher than desirable cost of operations.This is by no means an exhaustive list. However, addressing these will take us many steps closer to the solution.

Sejarah Terciptanya Virus Komputer

Virus komputer pertama kalinya tercipta bersamaan dengan komputer. Pada tahun 1949, salah seorang pencipta komputer, John von Newman, yang menciptakan Electronic Discrete Variable Automatic Computer (EDVAC), memaparkan suatu makalahnya yang berjudul “Theory and Organization of Complicated Automata”. Dalam makalahnya dibahas kemungkinan program yang dapat menyebar dengan sendirinya. Perkembangan virus komputer selanjutnya terjadi di AT&T Bell Laboratory salah satu laboratorium komputer terbesar di dunia yang telah menghasilkan banyak hal, seperti bahasa C dan C++.1 Di laboratorium ini, sekitar tahun 1960-an, setiap waktu istirahat para peneliti membuat permainan dengan suatu program yang dapat memusnahkan kemampuan membetulkan dirinya dan balik menyerang kedudukan lawan. Selain itu, program permainan dapat memperbanyak dirinya secara otomatis. Perang program ini disebut Core War, yaitu pemenangnya adalah pemilik program sisa terbanyak dalam selang waktu tertentu. Karena sadar akan bahaya program tersebut, terutama bila bocor keluar laboratorium tersebut, maka setiap selesai permainan, program tersebut selalu dimusnahkan. Sekitar tahun 1970-an , perusahaan Xerox memperkenalkan suatu program yang digunakan untuk membantu kelancaran kerja. Struktur programnya menyerupai virus, namun program ini adalah untuk memanfaatkan waktu semaksimal mungkin dan pada waktu yang bersamaan dua tugas dapat dilakukan. Pada tahun 1980-an, perang virus di dunia terbuka bermula atas pemaparan Fred Cohen, seorang peneliti dan asisten profesor di Universitas Cincinati, Ohio. Dalam pemaparannya, Fred juga mendemonstrasikan sebuah program ciptaannya, yaitu suatu virus yang dapat menyebar secara cepat pada sejumlah komputer. Sementara virus berkembang, Indonesia juga mulai terkena wabah virus. Virus komputer ini pertama menyebar di Indonesia juga pada
tahun 1988. Virus yang begitu menggemparkan seluruh pemakai komputer di Indonesia, saat itu, adalah virus ©Brain yang dikenal dengan nama virus Pakistan.

Pengertian Virus Komputer

Istilah virus komputer tak asing lagi bagi kalangan pengguna komputer saat ini. Padahal, sekitar 12 tahun yang lalu, istilah ini telah dikenal oleh masyarakat pengguna komputer. Baru pada tahun 1988, muncul artikel-artikel di media massa yang dengan gencar memberitakan mengenai ancaman baru bagi para pemakai komputer yang kemudian dikenal dengan sebutan ‘virus komputer’. Virus yang terdapat pada komputer hanyalah berupa program biasa, sebagaimana layaknya program-program lain. Tetapi terdapat perbedaan yang sangat mendasar pada virus komputer dan program lainnya. Virus dibuat oleh seseorang dengan tujuan yang bermacam-macam, tetapi umumnya para pembuat virus hanyalah ingin mengejar popularitas dan juga hanya demi kesenangan semata. Tetapi apabila seseorang membuat virus dengan tujuan merusak maka tentu saja
akan mengacaukan komputer yang ditularinya.

Kemampuan Dasar Virus Komputer

Definisi umum virus komputer adalah program komputer yang biasanya berukuran kecil yang dapat meyebabkan gangguan atau kerusakan pada sistem komputer dan memiliki beberapa kemampuan dasar, diantaranya adalah :

Kemampuan untuk memperbanyak diri
Yakni kemampuan untuk membuat duplikat dirinya pada file-file atau disk-disk yang belum ditularinya, sehingga lama-kelamaan wilayah penyebarannya semakin luas.

Kemampuan untuk menyembunyikan diri
Yakni kemampuan untuk menyembunyikan dirinya dari perhatian user, antara lain dengan cara-cara berikut :
a. Menghadang keluaran ke layar selama virus bekerja, sehingga pekerjaan virus tak tampak oleh user.
b. Program virus ditempatkan diluar track2 yang dibuat DOS (misalkan track 41)
c. Ukuran virus dibuat sekecil mungkin sehingga tidak menarik kecurigaan.

Kemampuan untuk mengadakan manipulasi
Sebenarnya rutin manipulasi tak terlalu penting. Tetapi inilah yang sering mengganggu. Biasanya rutin ini dibuat untuk :
a. Membuat tampilan atau pesan yang menggangu pada layer monitor
b. Mengganti volume label disket
c. Merusak struktur disk, menghapus file-file
d. Mengacaukan kerja alat-alat I/O, seperti keyboard dan printer

Kemampuan untuk mendapatkan informasi
Yakni kemampuan untuk mendapatkan informasi tentang struktur media penyimpanan seperti letak boot record asli, letak table partisi, letak FAT3, posisi suatu file, dan sebagainya.

Kemampuan untuk memeriksa keberadaan dirinya
Sebelum menyusipi suati file virus memeriksa keberadaan dirinya dalam file itu dengan mencari ID (tanda pengenal) dirinya di dalam file itu. File yang belum tertular suatu virus tentunya tidak mengandung ID dari virus yang bersangkutan. Kemampuan ini mencegah penyusupan yang berkali-kali pada suatu file yang sama.

2.4 Jenis-jenis virus komputer

Berikut ini akan dibahas jenis-jenis virus yang penulis simpulkan dari berbagai sumber, baik sumber pustaka maupun sumber dari internet.

2.4.1 Berdasarkan Teknik Pembuatannya

a. Virus yang dibuat dengan compiler
Adalah virus yang dapat dieksekusi karena merupakan virus yang telah di compile sehingga menjadi dapat dieksekusi langsung. Virus jenis ini adalah virus yang pertama kali muncul di dunia komputer, dan sampai sekarang terus berkembang pesat. Biasanya virus jenis ini dibuat dengan bahasa pemrograman tingkat rendah yang disebut dengan assembler, karena dengan menggunakan assembler program yang dihasilkan lebih kecil dan cepat, sehingga sangat cocok untuk membuat virus. Tetapi tidak tertutup kemungkinan untuk membuat virus dengan menggunakan bahasa pemrograman lainnya seperti C dan Pascal baik dilingkungan DOS maupun Windows .
Mungkin virus jenis ini adalah virus yang paling sulit untuk dibuat tetapi karena dibuat dengan menggunakan bahasa pemrograman dan berbentuk bahasa mesin maka keunggulan dari virus ini adalah mampu melakukan hampir seluruh manipulasi yang mana hal ini tidak selalu dapat dilakukan oleh virus jenis lain karena lebih terbatas.

b. Virus Macro

Banyak orang salah kaprah dengan jenis virus ini, mereka menganggap bahwa virus Macro adalah virus yang terdapat pada program Microsoft Word. Memang hampir seluruh virus Macro yang ditemui merupakan virus Microsoft Word. Sebenarnya virus Macro adalah virus yang memanfaatkan fasilitas pemrograman modular pada suatu program aplikasi tertentu seperti Microsoft Word, Microsoft Excel, Microsoft PowePoint, Corel WordPerfect, dan sebagainya. Tujuan dari fasilitas pemrograman modular ini adalah untuk memberikan suatu kemudahan serta membuat jalan pintas bagi
aplikasi tersebut. Sayangnya fungsi ini dimanfaatkan oleh pembuat-pembuat virus untuk membuat virus didalam aplikasi tersebut. Walaupun virus ini terdapat didalam aplikasi tertentu tetapi bahaya yang ditimbulkan tidak kalah berbahanya dari virus-virus yang lain.

c. Virus Script/ Batch

Pada awalnya virus ini lebih dikenal dengan virus batch karena dulu terdapat pada file batch yang terdapat pada DOS, sekarang hal ini telah berganti menjadi script. Virus script biasanya sering didapat dari Internet karena kelebihannya yang fleksibel dan bisa berjalan pada saat kita bermain internet, virus jenis ini biasanya menumpang pada file HTML (Hype Text Markup Language) dibuat dengan menggunakan fasilitas script seperti Javascript, VBscript,4 maupun gabungan antara script yang mengaktifkan program Active-X dari Microsoft Internet Explorer.

Berdasarkan yang dilakukan

a. Virus Boot Sector
Virus Boot Sector adalah virus yang memanfaatkan gerbang hubungan antara komputer dan media penyimpan sebagai tempat untuk menularkan virus. Apabila pada boot sector terdapat suatu program yang mampu menyebarkan diri dan mampu tinggal di memory selama komputer bekerja, maka program tersebut dapat disebut virus. Virus boot sector terbagi dua yaitu virus yang menyerang disket dan virus yang menyerang disket dan tabel partisi.
b. Virus File
Virus file merupakan virus yang memafaatkan suatu file yang dapat diproses langsung pada editor DOS, seperti file berekstensi COM, EXE, beberapa file overlay, dan file BATCH. Virus umumnya tidak memiliki kemampuan untuk menyerang di semua file tersebut. Virus file juga dikelompokkan berdasarkan dapat atau tidaknya tingga di memory.
c. Virus System
Virus sistem merupakan virus yang memanfaatkan file-file yang dipakai untuk membuat suatu sistem komputer. Contohnya adalah file dengan berekstensi SYS, file IBMBIO.COM, IBMDOS.COM, atau COMMAND.COM.
d. Virus Hybrid
Virus ini merupakan virus yang mempunyai dua kemampuan biasanya dapat masuk ke boot sector dan juga dapat masuk ke file. Salah satu contoh virus ini adalah virus Mystic yang dibuat di Indonesia.
e. Virus Registry WIndows
Virus ini menginfeksi operating system yang menggunakan Windows 95/98/NT biasanya akan mengadakan infeksi dan manipulasi pada bagian registry Windows sebab registry adalah tempat menampung seluruh informasi komputer baik hardware maupun software. Sehingga setiap kali kita menjalankan Windows maka virus akan dijalankan oleh registry tersebut.
f. Virus Program Aplikasi
Virus ini merupakan virus Macro, menginfeksi pada data suatu program aplikasi tertentu. Virus ini baru akan beraksi apabila kita menjalankan program aplikasi tersebut dan membuka data yang mengandung virus.

Berdasarkan media penyebarannya

a. Penyebaran dengan media fisik
Media yang dimaksudkan bisa dengan disket, CD-ROM (Compact Disc Read Only Memory), harddisk, dan sebagainya. Untuk CD-ROM, walaupun media ini tidak dapat dibaca tetapi ada kemungkinan suatu CD-ROM mengandung virus tertentu, walaupun kemungkinannya kecil, tetapi seiring dengan berkembangnya alat CD-R/CD-RW yang beredar dipasaran maka kemungkinan adanya virus didalam CD-ROM akan bertambah pula. Untuk saat ini virus jenis ini yang menjadi dominan dari seluruh virus yang ada. Virus ini akan menular pada komputer yang masih belum tertular apabila terjadi pengaksesan pada file/media yang mengandung virus yang diikuti dengan pengaksesan file/media yang masih bersih, dapat juga dengan mengakes file/media yang masih bersih sedangkan di memori komputer terdapat virus yang aktif.

b. Penyebaran dengan Media Internet
Akhir-akhir ini virus yang menyebar dengan media sudah semakin banyak, virus ini biasanya menyebar lewat e-mail ataupun pada saat kita mendownload suatu file yang mengandung virus. Juga ada beberapa virus yang secara otomatis akan menyebarkan dirinya lewat e-mail apabila komputer memiliki hubungan ke jalur internet

Sejarah Terciptanya Virus Komputer

Virus komputer pertama kalinya tercipta bersamaan dengan komputer. Pada tahun 1949, salah seorang pencipta komputer, John von Newman, yang menciptakan Electronic Discrete Variable Automatic Computer (EDVAC), memaparkan suatu makalahnya yang berjudul “Theory and Organization of Complicated Automata”. Dalam makalahnya dibahas kemungkinan program yang dapat menyebar dengan sendirinya. Perkembangan virus komputer selanjutnya terjadi di AT&T Bell Laboratory salah satu laboratorium komputer terbesar di dunia yang telah menghasilkan banyak hal, seperti bahasa C dan C++.1 Di laboratorium ini, sekitar tahun 1960-an, setiap waktu istirahat para peneliti membuat permainan dengan suatu program yang dapat memusnahkan kemampuan membetulkan dirinya dan balik menyerang kedudukan lawan. Selain itu, program permainan dapat memperbanyak dirinya secara otomatis. Perang program ini disebut Core War, yaitu pemenangnya adalah pemilik program sisa terbanyak dalam selang waktu tertentu. Karena sadar akan bahaya program tersebut, terutama bila bocor keluar laboratorium tersebut, maka setiap selesai permainan, program tersebut selalu dimusnahkan. Sekitar tahun 1970-an , perusahaan Xerox memperkenalkan suatu program yang digunakan untuk membantu kelancaran kerja. Struktur programnya menyerupai virus, namun program ini adalah untuk memanfaatkan waktu semaksimal mungkin dan pada waktu yang bersamaan dua tugas dapat dilakukan. Pada tahun 1980-an, perang virus di dunia terbuka bermula atas pemaparan Fred Cohen, seorang peneliti dan asisten profesor di Universitas Cincinati, Ohio. Dalam pemaparannya, Fred juga mendemonstrasikan sebuah program ciptaannya, yaitu suatu virus yang dapat menyebar secara cepat pada sejumlah komputer. Sementara virus berkembang, Indonesia juga mulai terkena wabah virus. Virus komputer ini pertama menyebar di Indonesia juga pada
tahun 1988. Virus yang begitu menggemparkan seluruh pemakai komputer di Indonesia, saat itu, adalah virus ©Brain yang dikenal dengan nama virus Pakistan.

Pengertian Virus Komputer

Istilah virus komputer tak asing lagi bagi kalangan pengguna komputer saat ini. Padahal, sekitar 12 tahun yang lalu, istilah ini telah dikenal oleh masyarakat pengguna komputer. Baru pada tahun 1988, muncul artikel-artikel di media massa yang dengan gencar memberitakan mengenai ancaman baru bagi para pemakai komputer yang kemudian dikenal dengan sebutan ‘virus komputer’. Virus yang terdapat pada komputer hanyalah berupa program biasa, sebagaimana layaknya program-program lain. Tetapi terdapat perbedaan yang sangat mendasar pada virus komputer dan program lainnya. Virus dibuat oleh seseorang dengan tujuan yang bermacam-macam, tetapi umumnya para pembuat virus hanyalah ingin mengejar popularitas dan juga hanya demi kesenangan semata. Tetapi apabila seseorang membuat virus dengan tujuan merusak maka tentu saja
akan mengacaukan komputer yang ditularinya.

Kemampuan Dasar Virus Komputer

Definisi umum virus komputer adalah program komputer yang biasanya berukuran kecil yang dapat meyebabkan gangguan atau kerusakan pada sistem komputer dan memiliki beberapa kemampuan dasar, diantaranya adalah :

Kemampuan untuk memperbanyak diri
Yakni kemampuan untuk membuat duplikat dirinya pada file-file atau disk-disk yang belum ditularinya, sehingga lama-kelamaan wilayah penyebarannya semakin luas.

Kemampuan untuk menyembunyikan diri
Yakni kemampuan untuk menyembunyikan dirinya dari perhatian user, antara lain dengan cara-cara berikut :
a. Menghadang keluaran ke layar selama virus bekerja, sehingga pekerjaan virus tak tampak oleh user.
b. Program virus ditempatkan diluar track2 yang dibuat DOS (misalkan track 41)
c. Ukuran virus dibuat sekecil mungkin sehingga tidak menarik kecurigaan.

Kemampuan untuk mengadakan manipulasi
Sebenarnya rutin manipulasi tak terlalu penting. Tetapi inilah yang sering mengganggu. Biasanya rutin ini dibuat untuk :
a. Membuat tampilan atau pesan yang menggangu pada layer monitor
b. Mengganti volume label disket
c. Merusak struktur disk, menghapus file-file
d. Mengacaukan kerja alat-alat I/O, seperti keyboard dan printer

Kemampuan untuk mendapatkan informasi
Yakni kemampuan untuk mendapatkan informasi tentang struktur media penyimpanan seperti letak boot record asli, letak table partisi, letak FAT3, posisi suatu file, dan sebagainya.

Kemampuan untuk memeriksa keberadaan dirinya
Sebelum menyusipi suati file virus memeriksa keberadaan dirinya dalam file itu dengan mencari ID (tanda pengenal) dirinya di dalam file itu. File yang belum tertular suatu virus tentunya tidak mengandung ID dari virus yang bersangkutan. Kemampuan ini mencegah penyusupan yang berkali-kali pada suatu file yang sama.

2.4 Jenis-jenis virus komputer

Berikut ini akan dibahas jenis-jenis virus yang penulis simpulkan dari berbagai sumber, baik sumber pustaka maupun sumber dari internet.

2.4.1 Berdasarkan Teknik Pembuatannya

a. Virus yang dibuat dengan compiler
Adalah virus yang dapat dieksekusi karena merupakan virus yang telah di compile sehingga menjadi dapat dieksekusi langsung. Virus jenis ini adalah virus yang pertama kali muncul di dunia komputer, dan sampai sekarang terus berkembang pesat. Biasanya virus jenis ini dibuat dengan bahasa pemrograman tingkat rendah yang disebut dengan assembler, karena dengan menggunakan assembler program yang dihasilkan lebih kecil dan cepat, sehingga sangat cocok untuk membuat virus. Tetapi tidak tertutup kemungkinan untuk membuat virus dengan menggunakan bahasa pemrograman lainnya seperti C dan Pascal baik dilingkungan DOS maupun Windows .
Mungkin virus jenis ini adalah virus yang paling sulit untuk dibuat tetapi karena dibuat dengan menggunakan bahasa pemrograman dan berbentuk bahasa mesin maka keunggulan dari virus ini adalah mampu melakukan hampir seluruh manipulasi yang mana hal ini tidak selalu dapat dilakukan oleh virus jenis lain karena lebih terbatas.

b. Virus Macro

Banyak orang salah kaprah dengan jenis virus ini, mereka menganggap bahwa virus Macro adalah virus yang terdapat pada program Microsoft Word. Memang hampir seluruh virus Macro yang ditemui merupakan virus Microsoft Word. Sebenarnya virus Macro adalah virus yang memanfaatkan fasilitas pemrograman modular pada suatu program aplikasi tertentu seperti Microsoft Word, Microsoft Excel, Microsoft PowePoint, Corel WordPerfect, dan sebagainya. Tujuan dari fasilitas pemrograman modular ini adalah untuk memberikan suatu kemudahan serta membuat jalan pintas bagi
aplikasi tersebut. Sayangnya fungsi ini dimanfaatkan oleh pembuat-pembuat virus untuk membuat virus didalam aplikasi tersebut. Walaupun virus ini terdapat didalam aplikasi tertentu tetapi bahaya yang ditimbulkan tidak kalah berbahanya dari virus-virus yang lain.

c. Virus Script/ Batch

Pada awalnya virus ini lebih dikenal dengan virus batch karena dulu terdapat pada file batch yang terdapat pada DOS, sekarang hal ini telah berganti menjadi script. Virus script biasanya sering didapat dari Internet karena kelebihannya yang fleksibel dan bisa berjalan pada saat kita bermain internet, virus jenis ini biasanya menumpang pada file HTML (Hype Text Markup Language) dibuat dengan menggunakan fasilitas script seperti Javascript, VBscript,4 maupun gabungan antara script yang mengaktifkan program Active-X dari Microsoft Internet Explorer.

Berdasarkan yang dilakukan

a. Virus Boot Sector
Virus Boot Sector adalah virus yang memanfaatkan gerbang hubungan antara komputer dan media penyimpan sebagai tempat untuk menularkan virus. Apabila pada boot sector terdapat suatu program yang mampu menyebarkan diri dan mampu tinggal di memory selama komputer bekerja, maka program tersebut dapat disebut virus. Virus boot sector terbagi dua yaitu virus yang menyerang disket dan virus yang menyerang disket dan tabel partisi.
b. Virus File
Virus file merupakan virus yang memafaatkan suatu file yang dapat diproses langsung pada editor DOS, seperti file berekstensi COM, EXE, beberapa file overlay, dan file BATCH. Virus umumnya tidak memiliki kemampuan untuk menyerang di semua file tersebut. Virus file juga dikelompokkan berdasarkan dapat atau tidaknya tingga di memory.
c. Virus System
Virus sistem merupakan virus yang memanfaatkan file-file yang dipakai untuk membuat suatu sistem komputer. Contohnya adalah file dengan berekstensi SYS, file IBMBIO.COM, IBMDOS.COM, atau COMMAND.COM.
d. Virus Hybrid
Virus ini merupakan virus yang mempunyai dua kemampuan biasanya dapat masuk ke boot sector dan juga dapat masuk ke file. Salah satu contoh virus ini adalah virus Mystic yang dibuat di Indonesia.
e. Virus Registry WIndows
Virus ini menginfeksi operating system yang menggunakan Windows 95/98/NT biasanya akan mengadakan infeksi dan manipulasi pada bagian registry Windows sebab registry adalah tempat menampung seluruh informasi komputer baik hardware maupun software. Sehingga setiap kali kita menjalankan Windows maka virus akan dijalankan oleh registry tersebut.
f. Virus Program Aplikasi
Virus ini merupakan virus Macro, menginfeksi pada data suatu program aplikasi tertentu. Virus ini baru akan beraksi apabila kita menjalankan program aplikasi tersebut dan membuka data yang mengandung virus.

Berdasarkan media penyebarannya

a. Penyebaran dengan media fisik
Media yang dimaksudkan bisa dengan disket, CD-ROM (Compact Disc Read Only Memory), harddisk, dan sebagainya. Untuk CD-ROM, walaupun media ini tidak dapat dibaca tetapi ada kemungkinan suatu CD-ROM mengandung virus tertentu, walaupun kemungkinannya kecil, tetapi seiring dengan berkembangnya alat CD-R/CD-RW yang beredar dipasaran maka kemungkinan adanya virus didalam CD-ROM akan bertambah pula. Untuk saat ini virus jenis ini yang menjadi dominan dari seluruh virus yang ada. Virus ini akan menular pada komputer yang masih belum tertular apabila terjadi pengaksesan pada file/media yang mengandung virus yang diikuti dengan pengaksesan file/media yang masih bersih, dapat juga dengan mengakes file/media yang masih bersih sedangkan di memori komputer terdapat virus yang aktif.

b. Penyebaran dengan Media Internet
Akhir-akhir ini virus yang menyebar dengan media sudah semakin banyak, virus ini biasanya menyebar lewat e-mail ataupun pada saat kita mendownload suatu file yang mengandung virus. Juga ada beberapa virus yang secara otomatis akan menyebarkan dirinya lewat e-mail apabila komputer memiliki hubungan ke jalur internet