It is no secret that servers can take up a lot of floor space, and power. As a result, they can sometimes seem inconvenient. One way to save space and power is to consolidate servers. Server consolidation is very important in order to ease some of the frustrations of overdue consolidation processes.
It is no secret that servers can take up a lot of floor space, and power. As a result, they can sometimes seem inconvenient. One way to save space and power is to consolidate servers. Server consolidation is very important in order to ease some of the frustrations of overdue consolidation processes. Server consolidation projects can also be accelerated via automation and virtualization. Platespin server consolidation helps to accelerate consolidation projects, and reduce errors. This is done without actually having to have contact with the physical machines.
Platespin allows managers to measure and evaluate resource utilization in order to speed up capacity planning for consolidation projects. This is accomplished by remotely gathering information about the server. This information can be the server operating system, memory, CPU speed, the network, and memory. Platespin server consolidation works on Windows NT, 2000, and 2003 systems. The system works without the help of agents. Therefore, the need to manually deploy software is eliminated. The risk of missing certain agent dependencies is also eliminated in this case. Platespin is also very simple and lightweight, so it can start to collect data in almost one minute.
Platespin completely automates the physical to virtual migration of data. This allows the servers to be consolidated quickly and with more ease. There is a drag and drop interface that allows the user to convert machines running Windows or Linux into one fully functional virtual machine that is hosted on several types of servers. These servers include VMware GSX Server, Microsoft Virtual Server 2005, or simply a Platespin Flexible Image file.
Network configurations, CPU cycles disk space, and memory allocations can all be converted rather quickly. This ease allows users to right-size target servers as the conversion process is occurring. As a direct result, data centers are made able to increase the number of servers that are able to be consolidated. This further optimizes resource utilization rates.
Sever consolidation may seem complicated, but the right program can make it quite simple. Platespin automates many processes and allows many different factors to be converted quickly. This means that the total time for consolidating servers is reduced.
How Platespin Server Consolidation Works
meikana555 | Senin, 19 September 2011 | Labels: Data Recovery
Visit Dell mobile reseller near you
New horizons. Colourful adventures. Exhilarating moments.
Inspiration sees no end in the world you create with the Dell™ XCD28. Bring your imagination to life with the smart 3G experience, Wi-Fi™, GPS and a host of exciting applications.
Inspiration sees no end in the world you create with the Dell™ XCD28. Bring your imagination to life with the smart 3G experience, Wi-Fi™, GPS and a host of exciting applications.
- Android™ 2.1 OS
- 3G HSDPA speeds upto 7.2 Mbps plus EDGE, GSM support
- Wi-Fi b/g connectivity plus Bluetooth® 2.1 EDR plus AGPS plus FM
- TFT LCD full touch up to 262K colours
- 3.2 MP camera with 5x zoom
- GPS will never leave you stranded. You can find the nearest city or simply find your way home with Google Maps
- Storage — 200MB internal user memory plus support for external SD card up to 8GB
- Access to Corporate Exchange Emails
- Document Reader (Word, PDF, Excel, Powerpoint)
- Includes 2GB Micro SD card
Jika anda memakai Microsoft® Windows® XP atau Windows XP Service Pack 1 (SP1) dan komputer anda telah terinfeksi Worm Sasser, anda dapat mengikuti langkah berikut ini untuk mengganti perangkat lunak anda, menghilangkan wormnya, dan memberikan perlindungan dari serangan berikutnya.
Langkah 1: Putuskan sambungan komputer anda ke Internet
Untuk mencegah masalah selanjutnya, pustuskan sambungan komputer anda dari Internet:
Bagi Penguuna Sambungan Internet Broadband Cari kabel yang menghubungkan komputer ke modem eksternal DSL atau kabel yang menghubungkan komputer ke modem atau ke sambungan telepon.Cabutlah kabel itu dari modem atau dari sambungan telepon, sehingga sambungan komputer anda ke Internet terputus.
Dial-up connection users: Carilah kabel yang menghubungkan modem internal dalam komputer anda ke sambungan telepon, kemudian cabutlah kabel itu agar tidak menghubungkan komputer anda ke Internet.
Langkah 2: Hentikan Siklus Shutdown
Worm ini akan menyebabkan file LSASS.EXE tidak bereaksi atas perintah lainnya (stop responding), yang kemudian menyebabkan sistem operasi kembali shut down setelah 60 detik. Jika komputer anda mulai shut down, ikutilah langkah berikut ini agar system tidak mengalami shutdown.
Pada taskbar dibawah layar komputer anda, click Start, lalu click Run.
Ketikan: cmd dan kemudian click OK.
Pada promt, ketikan : shutdown.exe -a kemudian tekan tombol ENTER.
Langkah 3: Lakukan Pencegahan
Anda bisa secara periodik membuang semua tanda tanda adanya worm menginfeksi komputer anda dengan cara membuat sebuah file log.
Membuat file log
Pada taskbar dibawah layar monitor anda, click Start, kemudian click Run.
Ketikan: cmd kemudian click OK.
Pada prompt, ketikan: echo dcpromo >%systemroot%\debug\dcpromo.log dan tekan ENTER.
Membuat file log berstatus read-only
Pada prompt, ketikan: attrib +R %systemroot%\debug\dcpromo.log lalu tekan tombol ENTER.
Langkah 4: Ubahlah Performansi Sistem
Jika komputer anda memberikan tanda adanya sambungan Internet yang lambat, worm mungkin sedang masuk ke jaringan komputer anda. Sehingga mengakibatkan anda sulit melakukan download dan menginstalasi perangkat lunak upodate nya.Untuk mengubah performansi sistem anda lakukan :
Tekan CTRL+ALT+DELETE, kemudian click Task Manager.
Untuk setiap langkah berikut ini yang mungkin ada dalam daftarnya, click task untuk memilihnya, kemudian click End Task button untuk mengakhirinya.
Setiap task berakhir dengan _up.exe (contoh , 12345_up.exe).
Setiap task dimulai dengan avserve (contoh, avserve.exe).
Setiap task dimulai dengan avserve2 (contoh, avserve2.exe).
Setiap task dimulai dengan skynetave (contoh, skynetave.exe).
hkey.exe
msiwin84.exe
wmiprvsw.exe
Perhatian Jangan mengakhiri task wmiprvse.exe; sebab ini merupakan task sistem yang sedang dipakai.
Langkah 5: Enable Firewall
Sebuah firewall adalah sebagian perangkat lunak ataupun perangkat keras yang dibuat untuk tameng penghalang antara komputer anda dan Internet. Jika komputer anda terinfeksi, sebuah firewall akan menolong memperkecil efek dari worm. Windows XP dilengkapi dengan Internet Connection Firewall (ICF). Operaikan ICF:
Pada taskbar dibawah layar monitor anda, click Start, kemudian click Control Panel.
Click kategori Network and Internet Connections.
(Jika Network and Internet Connections adalah not visible, click Switch to Category View dalam Control Panel bagian sisi kiri window Control Panel.)
Click Network Connections.
Click tombol kanan mouse anda pada Dial-up, LAN, atau pada sambungan High-Speed Internet yang adan pergunakan untuk akses ke Internet, lalu click Properties dari menu shortcut.
Pada tab Advanced, pada Internet Connection Firewall, pilih Protect my computer and network, kemudian click OK. Windows XP firewall sudah enable sekarang.
Langkah 6: Sambungkan Kembali ke Internet
Hubungkan kabel seperti yang disebutkan pada langkah 1, ke bagian belakang komputer anda, ke sambungan telepon atau kemodem.
Langkah 7: Installasi File Update Yang Diperlukan
Untuk menolong perlindungan komputer anda melawan worm di waktu mendatang, anda harus mendownload dan menginstalasi file update security 835732, yang telah diumumkan dalam Microsoft Security Bulletin MS04-011. Untuk mendownload update security 835732, carilah disitus http://go.microsoft.com/?LinkID=526067
Langkah 8: Pengecekan dan Pembersih Sasser
Setelah anda menginstalasi file update security pada komputer anda dan melakukan restart komputer anda, akseslah halaman web "What You Should Know About the Sasser Worm and Its Variants" di situs http://www.microsoft.com/security/incident/sasser.asp. Pakailah perangkat lunak pembersih worm Sasser agar hardisk anda bisa discan dan dibersihkan dari Sasser.A, Sasser.B, Sasser.C, dan Sasser.D.
Tentang Internet Connection Firewall
Windows XP Internet Connection Firewall dapat memblokir task berguna seperti file sharing atau printer melalui jaringan komputer, pengiriman file atau penyimpanan game multiplayer. Microsoft menyarankan agar anda memakai firewall untuk perlindungan komputer anda.
Jika anda mengoperasikan Internet Connection Firewall dan menemui masalah dimana atas task yang anda inginkan, bacalah "How to Open Ports in the Windows XP Internet Connection Firewall" dalam situs http://www.microsoft.com/security/protect/ports.asp.
Jika anda memiliki lebih dari satu komputer, dan ingin informasi teknis lebih lanjut, atau ingin belajar lebih lanjut tentang firewall, bacalah "Frequently Asked Questions About Firewalls" dalam situs http://www.microsoft.com/security/protect/firewall.asp.
http://alazhartech.blogspot.com/
Langkah 1: Putuskan sambungan komputer anda ke Internet
Untuk mencegah masalah selanjutnya, pustuskan sambungan komputer anda dari Internet:
Bagi Penguuna Sambungan Internet Broadband Cari kabel yang menghubungkan komputer ke modem eksternal DSL atau kabel yang menghubungkan komputer ke modem atau ke sambungan telepon.Cabutlah kabel itu dari modem atau dari sambungan telepon, sehingga sambungan komputer anda ke Internet terputus.
Dial-up connection users: Carilah kabel yang menghubungkan modem internal dalam komputer anda ke sambungan telepon, kemudian cabutlah kabel itu agar tidak menghubungkan komputer anda ke Internet.
Langkah 2: Hentikan Siklus Shutdown
Worm ini akan menyebabkan file LSASS.EXE tidak bereaksi atas perintah lainnya (stop responding), yang kemudian menyebabkan sistem operasi kembali shut down setelah 60 detik. Jika komputer anda mulai shut down, ikutilah langkah berikut ini agar system tidak mengalami shutdown.
Pada taskbar dibawah layar komputer anda, click Start, lalu click Run.
Ketikan: cmd dan kemudian click OK.
Pada promt, ketikan : shutdown.exe -a kemudian tekan tombol ENTER.
Langkah 3: Lakukan Pencegahan
Anda bisa secara periodik membuang semua tanda tanda adanya worm menginfeksi komputer anda dengan cara membuat sebuah file log.
Membuat file log
Pada taskbar dibawah layar monitor anda, click Start, kemudian click Run.
Ketikan: cmd kemudian click OK.
Pada prompt, ketikan: echo dcpromo >%systemroot%\debug\dcpromo.log dan tekan ENTER.
Membuat file log berstatus read-only
Pada prompt, ketikan: attrib +R %systemroot%\debug\dcpromo.log lalu tekan tombol ENTER.
Langkah 4: Ubahlah Performansi Sistem
Jika komputer anda memberikan tanda adanya sambungan Internet yang lambat, worm mungkin sedang masuk ke jaringan komputer anda. Sehingga mengakibatkan anda sulit melakukan download dan menginstalasi perangkat lunak upodate nya.Untuk mengubah performansi sistem anda lakukan :
Tekan CTRL+ALT+DELETE, kemudian click Task Manager.
Untuk setiap langkah berikut ini yang mungkin ada dalam daftarnya, click task untuk memilihnya, kemudian click End Task button untuk mengakhirinya.
Setiap task berakhir dengan _up.exe (contoh , 12345_up.exe).
Setiap task dimulai dengan avserve (contoh, avserve.exe).
Setiap task dimulai dengan avserve2 (contoh, avserve2.exe).
Setiap task dimulai dengan skynetave (contoh, skynetave.exe).
hkey.exe
msiwin84.exe
wmiprvsw.exe
Perhatian Jangan mengakhiri task wmiprvse.exe; sebab ini merupakan task sistem yang sedang dipakai.
Langkah 5: Enable Firewall
Sebuah firewall adalah sebagian perangkat lunak ataupun perangkat keras yang dibuat untuk tameng penghalang antara komputer anda dan Internet. Jika komputer anda terinfeksi, sebuah firewall akan menolong memperkecil efek dari worm. Windows XP dilengkapi dengan Internet Connection Firewall (ICF). Operaikan ICF:
Pada taskbar dibawah layar monitor anda, click Start, kemudian click Control Panel.
Click kategori Network and Internet Connections.
(Jika Network and Internet Connections adalah not visible, click Switch to Category View dalam Control Panel bagian sisi kiri window Control Panel.)
Click Network Connections.
Click tombol kanan mouse anda pada Dial-up, LAN, atau pada sambungan High-Speed Internet yang adan pergunakan untuk akses ke Internet, lalu click Properties dari menu shortcut.
Pada tab Advanced, pada Internet Connection Firewall, pilih Protect my computer and network, kemudian click OK. Windows XP firewall sudah enable sekarang.
Langkah 6: Sambungkan Kembali ke Internet
Hubungkan kabel seperti yang disebutkan pada langkah 1, ke bagian belakang komputer anda, ke sambungan telepon atau kemodem.
Langkah 7: Installasi File Update Yang Diperlukan
Untuk menolong perlindungan komputer anda melawan worm di waktu mendatang, anda harus mendownload dan menginstalasi file update security 835732, yang telah diumumkan dalam Microsoft Security Bulletin MS04-011. Untuk mendownload update security 835732, carilah disitus http://go.microsoft.com/?LinkID=526067
Langkah 8: Pengecekan dan Pembersih Sasser
Setelah anda menginstalasi file update security pada komputer anda dan melakukan restart komputer anda, akseslah halaman web "What You Should Know About the Sasser Worm and Its Variants" di situs http://www.microsoft.com/security/incident/sasser.asp. Pakailah perangkat lunak pembersih worm Sasser agar hardisk anda bisa discan dan dibersihkan dari Sasser.A, Sasser.B, Sasser.C, dan Sasser.D.
Tentang Internet Connection Firewall
Windows XP Internet Connection Firewall dapat memblokir task berguna seperti file sharing atau printer melalui jaringan komputer, pengiriman file atau penyimpanan game multiplayer. Microsoft menyarankan agar anda memakai firewall untuk perlindungan komputer anda.
Jika anda mengoperasikan Internet Connection Firewall dan menemui masalah dimana atas task yang anda inginkan, bacalah "How to Open Ports in the Windows XP Internet Connection Firewall" dalam situs http://www.microsoft.com/security/protect/ports.asp.
Jika anda memiliki lebih dari satu komputer, dan ingin informasi teknis lebih lanjut, atau ingin belajar lebih lanjut tentang firewall, bacalah "Frequently Asked Questions About Firewalls" dalam situs http://www.microsoft.com/security/protect/firewall.asp.
http://alazhartech.blogspot.com/
How To Secure Your Wireless Network ?
meikana555 | Kamis, 02 Juni 2011 | Labels: hardware, network, previews, software
People have more flexible time due to wireless network. Thanks to the invention of wireless. People can now work from home while taking care of their kids or doing house works. No more stress from traffic jam anymore. Is this great?
Well, there is something you should realize. Working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer. They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Believe it or not! Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP. It is recommended that wireless router/access point setup be always done though a wired client.
You can setup your security by follow these steps:
1. Change default administrative password on wireless router/access point to a secured password.
2. Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it. Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
3. Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
4. Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
5. Block anonymous Internet requests or pings. On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point. Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
All computers should have a properly configured personal firewall in addition to a hardware firewall. You should also update router/access point firmware when new versions become available. Locating router/access point away from strangers is also helpful so they cannot reset the router/access point to default settings. You can even try to locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
There is no guarantee of a full protection of your wireless network, but following these suggested tips can definitely lessen your risk of exposing to attackers aiming at insecure networks.
Well, there is something you should realize. Working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer. They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Believe it or not! Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP. It is recommended that wireless router/access point setup be always done though a wired client.
You can setup your security by follow these steps:
1. Change default administrative password on wireless router/access point to a secured password.
2. Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it. Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
3. Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
4. Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
5. Block anonymous Internet requests or pings. On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point. Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
All computers should have a properly configured personal firewall in addition to a hardware firewall. You should also update router/access point firmware when new versions become available. Locating router/access point away from strangers is also helpful so they cannot reset the router/access point to default settings. You can even try to locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
There is no guarantee of a full protection of your wireless network, but following these suggested tips can definitely lessen your risk of exposing to attackers aiming at insecure networks.
Cisco CCNA Certification: Static Routing Tutorial
meikana555 | Rabu, 01 Juni 2011 | Labels: computer, technologi
In studying for your CCNA exam and preparing to earn this valuable certification, you may be tempted to spend little time studying static routing and head right for the more exciting dynamic routing protocols like RIP, EIGRP, and OSPF. This is an understandable mistake, but still a mistake. Static routing is not complicated, but it's an important topic on the CCNA exam and a valuable skill for real-world networking.
To create static routes on a Cisco router, you use the ip route command followed by the destination network, network mask, and either the next-hop IP address or the local exit interface. It's vital to keep that last part in mind - you're either configuring the IP address of the downstream router, or the interface on the local router that will serve as the exit interface.
Let's say your local router has a serial0 interface with an IP address of 200.1.1.1/30, and the downstream router that will be the next hop will receive packets on its serial1 interface with an IP address of 200.1.1.2/30. The static route will be for packets destined for the 172.10.1.0 network. Either of the following ip route statements would be correct.
R1(config)#ip route 172.10.1.0 255.255.255.0 200.1.1.2 (next-hop IP address)
OR
R1(config)#ip route 172.10.1.0 255.255.255.0 serial0 ( local exit interface)
You can also write a static route that matches only one destination. This is a host route, and has 255.255.255.255 for a mask. If the above static routes should only be used to send packets to 172.10.1.1., the following commands would do the job.
R1(config)#ip route 172.10.1.1 255.255.255.255 200.1.1.2 (next-hop IP address)
OR
R1(config)#ip route 172.10.1.1 255.255.255.255 serial0 ( local exit interface)
Finally, a default static route serves as a gateway of last resort. If there are no matches for a destination in the routing table, the default route will be used. Default routes use all zeroes for both the destination and mask, and again a next-hop IP address or local exit interface can be used.
R1(config)#ip route 0.0.0.0 0.0.0.0 200.1.1.2 (next-hop IP address)
OR
R1(config)#ip route 0.0.0.0 0.0.0.0 serial0 ( local exit interface)
IP route statements seem simple enough, but the details regarding the next-hop IP address, the local exit interface, default static routes, and the syntax of the command are vital for success on CCNA exam day and in the real world.
To create static routes on a Cisco router, you use the ip route command followed by the destination network, network mask, and either the next-hop IP address or the local exit interface. It's vital to keep that last part in mind - you're either configuring the IP address of the downstream router, or the interface on the local router that will serve as the exit interface.
Let's say your local router has a serial0 interface with an IP address of 200.1.1.1/30, and the downstream router that will be the next hop will receive packets on its serial1 interface with an IP address of 200.1.1.2/30. The static route will be for packets destined for the 172.10.1.0 network. Either of the following ip route statements would be correct.
R1(config)#ip route 172.10.1.0 255.255.255.0 200.1.1.2 (next-hop IP address)
OR
R1(config)#ip route 172.10.1.0 255.255.255.0 serial0 ( local exit interface)
You can also write a static route that matches only one destination. This is a host route, and has 255.255.255.255 for a mask. If the above static routes should only be used to send packets to 172.10.1.1., the following commands would do the job.
R1(config)#ip route 172.10.1.1 255.255.255.255 200.1.1.2 (next-hop IP address)
OR
R1(config)#ip route 172.10.1.1 255.255.255.255 serial0 ( local exit interface)
Finally, a default static route serves as a gateway of last resort. If there are no matches for a destination in the routing table, the default route will be used. Default routes use all zeroes for both the destination and mask, and again a next-hop IP address or local exit interface can be used.
R1(config)#ip route 0.0.0.0 0.0.0.0 200.1.1.2 (next-hop IP address)
OR
R1(config)#ip route 0.0.0.0 0.0.0.0 serial0 ( local exit interface)
IP route statements seem simple enough, but the details regarding the next-hop IP address, the local exit interface, default static routes, and the syntax of the command are vital for success on CCNA exam day and in the real world.
Langganan:
Postingan (Atom)