install netbeans 6.7 :

  1. download netbeans 6.7 di http://download.netbeans.org/netbeans/6.7/rc2
  2. tambah permission untuk eksekusi file sh hasil download tadi
    user@computer:$ chmod +x $PATH_TO_DOWNLOAD/netbeans-6.7rc2-ml-linux.sh
  3. kemudian jalankan file tersebut
    user@computer:$ sh $PATH_TO_DOWNLOAD/netbeans-6.7rc2-ml-linux.sh
  4. ikuti petunjuk instalasi netbeans 6.7
  5. jika instalasi sukses akan tampil icon netbeans di desktop

install scala plugin di netbeans 6.7 :

  1. download pluginnya di http://biznetnetworks.dl.sourceforge.net/project/erlybird/nb-scala/nb-scala%206.7v1/nb-scala-6.7v1.zip
  2. kemudian extrak file nb-scala-6.7v1.zip
  3. jalankan aplikasi netbeans 6.7 dengan double click icon netbeans yang ada di desktop
  4. pilih Tools -> Plugins, klik tab Downloaded kemudian Add Plugins
  5. pilih direktori hasil extrak file nb-scala-6.7v1.zip tadi, kemudian pilih semua yang ada di folder tersebut
  6. klik install, tunggu beberapa saat
  7. setelah proses instalasi plugin selesai, restart netbeans

source :
http://pxapp1.packagex.com/wordpress/?p=1177&pid=198
http://wiki.netbeans.org/Scala#section-Scala-1.GetStartedWithNetBeans6.7

2 thoughts on “how to install netbeans 6.7 and scala plugin

  1. 5ecOh, thanks for your awsenr Paolo. Yes, I thought of everything you say, but it’s good to check that list again In fact I think I’m going to make my password even stronger (I already changed it, but I’m going to change it again to a more complex one).I don’t think I had a virus in my desktop but yes, just in case, I even re-formatted my PC and reinstalled Windows, and of course changed my password. I’ve updated my antivirus to a full internet security suite (norton) just in case. I’ve stopped logging in to my control panel from my smartphone just in case the password was stolen through it. I have done all kind of paranoic things but haven’t been able to find nothing out of the ordinary.Of course I might be wrong but I think I have ruled out all the possible causes, and if I had to bet, my money would be on some inscure script/plugin on my WP installation. Also, it has to be something easily scanned , since I think I was attacked just because I was detected as vulnerable. Anyway. I’m sending you my old infected index.php file just in case. Maybe your script already detects it, I couldn’t really check because I had already removed it from the server when I uploaded your scanner, and I don’t want to put the file on the server again just to run the test, to minimise risks.Again thanks a lot for your time awsenring my question and again thanks for sharing your work and expertise.24

    Reply
  2. 7e7We have used before your clean spirct.And worked fine.Now we have a new hacked site but the clean doesnt work on the infected index-file.here is the content of the infected index file:It forward to: sweepstakesandcontestsdo.commark( afterLoad’ ) : null;/** * CREATE THE APPLICATION * * NOTE : */$mainframe =& JFactory::getApplication( site’);/** * INITIALISE THE APPLICATION * * NOTE : */// set the language$mainframe->initialise();JPluginHelper::importPlugin( system’);// trigger the onAfterInitialise eventsJDEBUG ? $_PROFILER->mark( afterInitialise’) : null;$mainframe->triggerEvent( onAfterInitialise’);/** * ROUTE THE APPLICATION * * NOTE : */$mainframe->route();// authorization$Itemid = JRequest::getInt( Itemid’);$mainframe->authorize($Itemid);// trigger the onAfterRoute eventsJDEBUG ? $_PROFILER->mark( afterRoute’) : null;$mainframe->triggerEvent( onAfterRoute’);/** * DISPATCH THE APPLICATION * * NOTE : */$option = JRequest::getCmd( option’);$mainframe->dispatch($option);// trigger the onAfterDispatch eventsJDEBUG ? $_PROFILER->mark( afterDispatch’) : null;$mainframe->triggerEvent( onAfterDispatch’);/** * RENDER THE APPLICATION * * NOTE : */$mainframe->render();// trigger the onAfterRender eventsJDEBUG ? $_PROFILER->mark( afterRender’) : null;$mainframe->triggerEvent( onAfterRender’);/** * RETURN THE RESPONSE */echo JResponse::toString($mainframe->getCfg( gzip’));24

    Reply

Leave a reply

required

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong> <pre user="" computer="" escaped="">