TCP/IP architecture model
meikana555 | Minggu, 29 September 2013 | Labels: IP, iso, iso/osi, reference model, tcp, technology, udp
2. Network layer
3. Transport layer
4. Application layer
Network interface layer
The lowest layer of the TCP/IP model. Its task is to provide access to the transmission physical medium and it differs according to the implementation of the medium.
Network layer
The network layer provides network addressing, routing and datagram transmission. Used protocols that will be of interest further regarding DHCP are IP and ARP.
IP protocol
It is the basic protocol of the network layer and in general the internet as a whole. It sends datagrams, which are independent units that contain information about the destination, source and the sequence number of the datagram. The sequence number is used for message reconstruction, since the delivery order of the datagrams might not be the same as their order in the message and delivery reliability isn't guaranteed at all.
IP protocol versions:
" IP v4 - 32 bit addresses. Provides approximately 4 billion unique addresses which aren't sufficient at present times.
" IP v6 - 128 bit addresses. The transition to v6 will bring (is bringing) higher security, QoS, packet segmentation and many more IP addresses. (the transition from IP v4 to IP v6 must be supported by the system provider)
ARP protocol
The ARP abbreviation stands for Address Resolution Protocol. This protocol is used to find the physical address (MAC) based on a known IP address. If required ARP sends information concerning the wanted address to all the stations in the network - Broadcast. The stations consequently answer with a message containing their MAC. If the wanted device/station is outside the node/segment, the appropriate router will answer instead of it.
Transport layer
The transport layer is implemented only in terminal devices and it adjusts the behavior of the network according to the requirements of the device/application.
Application layer
The application layer is composed of programs that use net services to fulfill the needs of users. Examples of specific protocols are for instance FTP, DNS and DHCP.
Application protocols use TCP, UDP or both services at the same time. So called ports are used to differentiate between application protocols, they represent a type of label of the application. It is possible to change the ports in the settings of the service, but each service has a default port that isn't changed for most services and is used as an unwritten standard.
" FTP = 21
" DNS = 53
" DHCP = 67 + 68
Intranet Implementation: The Advantages Of A Web-Based Solution
meikana555 | Sabtu, 28 September 2013 | Labels: collaboration, document, extranet, intranet, management, online, share, sharing, software, solution, technology, web
Over the past few years, another option has grown in popularity – the implementation of a web-based solution.
As you consider the choice between installed software and a web-based intranet, here are some considerations:
1. The most important requirement of any intranet is that everyone uses it.
To assure broad-based participation, the intranet must be easy to implement, simple to use, cost-effective to maintain, and offer each individual user the power to post, access and use content in a way that serves their specific needs. In short, the intranet must have value to everyone.
Web-based intranets are designed around this concept. The interface and navigation are consistent with their use of the web – an environment in which they feel in control, using familiar tools.
In contrast, the business world is littered with countless elegant and feature-rich soft-ware based intranets that have failed. Why? Because they represented an alien environment into which the user was expected to venture. Few employees had the time or the interest (or courage) to enter, rendering the intranet impotent, with the powerful tools unused.
This is the plight of traditional, out-of-the-box software solutions. Unlike web-based intranets, they force users into a constrained environment requiring in-depth training, built around rules designed for the group, rather than the individual.
2. Software intranets have unpredictable costs: in time, attention and money.
Software based solutions require extensive internal support. The ongoing expense in both staff time and money takes the focus of your IT group away from mission-critical tasks.
System integration, Implementation, maintenance, technology upgrades, training and user support are all on-going tasks that represent a significant, recurring investment. The cost can be substantial, far exceeding your initial license cost and monthly fee.
3. Web-based intranets offer a predictable cost and cutting-edge technology.
Most web-based solutions offer a fixed monthly fee that covers all maintenance, technology upgrades, training and user support. The costs are predictable, the technology evolutionary, and it's all done with minimal involvement of your IT staff.
It's for these reasons that companies needing broad-based participation in a changing environment are choosing web-based intranets over traditional software solutions.
Why use URL shorteners?
meikana555 | Jumat, 27 September 2013 | Labels: short URL, tiny URL, URL shortener, xaddr
URL stands for Uniform Resource Locator. It's the posh technical term for a web address. Web addresses normally take the form http://www.somesite.com/somepage.html, which is not too much of a problem. But some site names can get very long, and so can page names. The increased use of database-driven sites mean that URLs can get very long indeed, and most of them is computer gobbledygook. They are impossible to type in, if you are reading them in a print article, and often get corrupted by word-wrapping when they appear in an email or blog posting.
An URL shortener is a web service that takes a long address that's hard to type, and turns it into a short one. You should use them in articles for print publication, classified ads, emails, blog and forum postings, anywhere there is a danger that the full address may be corrupted, or that someone may need to type the address into a browser manually.
But there is a danger in using short URLs that may make people afraid to use them. The short address disguises the real destination. This makes it easy for somebody to post an innocent looking message encouraging people to click on a link that takes them to a site which infects their computer with spyware, or something equally undesirable.
Some URL shortening services have tried to address this problem. The most well-known service, TinyURL.com, has an optional preview page that shows you the target address before you go there. But you have to know to type "preview" in front of the address, or visit the site and set it as a permanent option. Those who don't know about this are still vulnerable to deception.
A safe URL shortener would not allow the creation of links to undesirable sites. It would also always display a preview page, so the user always sees where the link is taking them before they go there. xaddr.com uses Internet blacklists to prevent its use to disguise sites that are advertised by spam. Its preview page offers a link to McAfee's Site Advisor, which can be used to check the safety of the destination.
Next time you need to write a long web address, use an URL shortener. But to encourage confidence that no harm will come from clicking the link, pick a safe one.
Peltier Associates Breaking and Fixing Wireless Security
meikana555 | Kamis, 26 September 2013 | Labels: Peltier, Security, technology, training, wireless, workshop
In this three day, wireless security workshop, we will examine the cutting edge of wireless technologies. The purpose of the course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This hands-on course is based on real world examples, solutions, and deployments. In this course we will actually set up and use wireless networks, determine the tools to uncover wireless networks, and also look at how to defeat the attempts to secure wireless networks.
Course Completion
Upon the completion of our CISM course, students will have:
Constructed a wireless network architecture
Install and configure 802.1x authentication using Microsoft Windows IAS and Server 2000
Install a wireless access point
Distinguish between 802.11x standards
Defeat Wired Equivalent Privacy
Key Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
An ability to search the internet for updates and more information on wireless networks
Detail of Course Content The following topics will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Tools
Kismet
Wireless Sniffers
Conventional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Options
Legal Issues including GLBA and ISO-17799
Future
Resources
http://www.acquisitiondata.com/wireless_security.asp
It's 12 Noon, Do You Know Who's Using Your Network?
meikana555 | Rabu, 25 September 2013 | Labels: identity theft, technology
Unfortunately, many, or even most, wireless units don't come with security features already functioning. This may not seem like a big issue to someone who is simply setting up a home network, but there are a number of potential problems you should consider.
The most serious problem is the increase in identity theft. If your network is unsecured, the personal data on your wireless electronic equipment is also unsecured. The order you just placed for a book at Amazon may have given your contact and payment information to an unscrupulous hacker!
Nearly every town in which "WiFi" is common will have "War Drivers" and "War Chalkers" at work. These are people who walk or drive around town with wireless equipment, searching for unsecured networks. The "Chalkers" then live up their name, marking curbs and other public items with chalk so that others can more easily find and exploit your network.
Not all "War Drivers" are hackers, of course. Many just want to use your network for free, but the risk is high if you don't learn how to protect yourself. You can usually find quite a bit of free information as to how to secure your network at the website of your router's manufacturer, or by doing a search in a search engine for a phrase like "secure home wireless."
Beyond the truly malicious, there are also your neighbors who may find your network by accident and enjoy nosing into your activities and using your Internet access at will, slowing down your network speed in the process.
Even many businesses use cheap, home-use quality equipment for their company networks. With the poor security often found on small business networks, anyone with a basic knowledge of wireless can access sensitive company and customer data.
If you are unable to secure your network yourself, there are many service companies who will do it for you. A search of your local yellow pages or an inquiry at your neighborhood computer store should yield professional help and get your private data private again
Link Load Balancing - Take a Load Off Annie
meikana555 | Selasa, 24 September 2013 | Labels: Link Load Balancing
Another aspect to link load balancing concerns the communications channels themselves. In this case the “juggling act” is meant to better distribute processing and communications demands more equitably across the network so that no single a computer is overwhelmed by the demand.
Link Load Balancing - Key Features & Benefits First and foremost is “availability” - 24/7 Application Availability for complete IP Application access. Local and Global Service providers rely on redundancy and link load balancing between servers, WSD units and distributed sites for complete server continuity across global networks
Network Bottlenecks - Link Load Balancing Network managers are constantly seeking new solutions for eliminating bottlenecks and latencies for the fastest performance of all networked applications and web-enabled transactions. The idea link load balancing technology combines both unlimited application scalability with flexible traffic distribution management of data centers and server farms.
Network Security - Link Load Balancing Link load balancing is a key element in the overall network Intrusion Prevention effort. Expert Link Load Balancing guards the network against internal and external attacks such as viruses, worms, Trojans, anti-scanning and protocol anomalies. Above all hovers the ultimate link load balancing challenge and network threat – DOS - Denial of Service.
Remember the song, “Take a load off Annie” Just listening to it makes you feel nice and relaxed… For maximum performance and 100 percent uptime, networks use link load balancing to even out resource use throughout the network.
What is search engine gateway?
meikana555 | Senin, 23 September 2013 | Labels: search engine, search engine gateway, search gateway, technology
When we try to find information everyday, most of us might go to Google.com. Yes, it's true. Most of the time, Google works well. But does Google return the best information? I guess you would agree that the search engine's ranking algorithm could only give a good answer, but not the best. Well, you may ask, where can I get the BEST? The best weather information? The best book information? The best price for your favorite mp3 player? The short answer is from the brain, from the hand picked information. Therefore, Navino's editors and their users give out that the best weather website is weather.com, the best book website is amazon.com and the best price information is froogle.
Besides best hand picked information resources, Navino also provide the search engine gateway technology. Using this technology, you can search all the best website at Navino. All you need to do is to add a unique search name before your searching keywords.
For example, if you want to search New York's weather, you can search with ‘weather New York' and you will be forwarded to weather.com with the keyword ‘New York'. If you want to search finance books, you can search with ‘book finance' and you will be forwarded to amazon.com with the keyword ‘finance'. If you want to search the best price for your favorite mp3 player, you can search with ‘price mp3 player' and you will be forwarded to froogle with the keyword ‘mp3 player'.
Navino search engine gateway is very convenient for your everyday web surfing. Besides that, Navino also provides its users to customize their own search engine gateway and allows its users to recommend search names for public use.
The Pleasures of a Wireless Media Router
meikana555 | Minggu, 22 September 2013 | Labels: technology, wireless media router
Wireless routers are becoming more and more popular. They have many uses, one of which is viewing pictures and movies from your computer on your television. This comes in very handy when you have media files that you can’t burn on CD or cannot be played on your DVD player.
A second use would be to transmit paid television. For example if you paid for HBO usually you would be able to only view it on one nominated television. With the wireless media router you can send the signal you television is receiving, HBO, to any other television in the house. You can even change the channel from the remote television while viewing.
The third use would be watching television at a location where an antenna is not available. This means no more long cables leading from room to room just to be able to watch television.
Depending on the amount of receivers you have you can receive the signal from multiple televisions. How does it work? The receivers are connected to the remote televisions. The router takes the signal from the source television and distributes it to the remote televisions by way of the receiver. On the remote television a certain channel is dedicated to this receiver meaning you can watch independent television, and easily switch the channel to the signal being received from the wireless router.
This also makes running your entertainment room a breeze. The receiver can also be hooked up-to a projector making it easy to view anything you wish. This means you will not need to purchase separate DVD players VCR’s for every room.
Wireless Home Security Camera
meikana555 | Sabtu, 21 September 2013 | Labels: technology, wireless media router
What’s need in the package is a camera to fit either just outside the front or back door that transmits a wireless signal. The best one to buy would be one that has night vision to ensure you can see everything at night. The second would be a receiver. Some receivers have screens so you can watch what’s going on no matter where you are and others need to be connected to a computer or television to see the transmission.
If connected to a computer or television the live feed from the camera can be directly recorded to a hard drive or a cassette or DVD depending on which is convenient. Several cameras can be implemented to get several signals meaning more coverage of the home and the surrounding area.
These wireless home security packages are common and can be purchased at most electronics stores. They are on the expensive side but are worth the purchase for the kind of technology it has. With almost everything becoming wireless these days it was only a matter of time until cameras became wireless also.
Most people need some sort of security measure in place, not for protection, but for peace of mind that they are safe in their home. Although there are several other measures that can be implemented in terms of security, the wireless home security camera is a valuable tool for keeping an eye on things at all times. It will complement any other security measure you have in place and will not disappoint.
Computers, programming, searches, Internet, downloads, blogging, websites, all these words are becoming so common that no body can imagine that it all started not many years back. Today across all the ages, this is equally popular. Latest innovations are appearing everyday and companies are minting money online. All this was never predicted but this has become a reality.
Is people to people contact is suffering because of Internet? Are we searching for unnecessary information and over loading ourselves? When so much information was not available to us, we could live, isn’t it? Then why do we search for any and everything online? Does that make our life better? In the earlier days, people took time to write letters to each other. Now it is sending a mail, which somehow does not have that personal touch. Language is also suffering because of the new lingo of the cyber world.
I sometime imagine of people living in a peaceful area away from our civilization. Give them computers and connect them with Internet. Will they not lose all the peace they had before?
About marketing credits from web hosting sign up
meikana555 | | Labels: best hosting, Internet, web, web hosting
Normally, people that already have the account with those marketing network, will just ignore the new coupon code they receive. But some smart folks, will get a new account setup with google adwords and apply the coupon and get the free marketing money. We not talking small money here. Some hosting offering adwords credits up to $50 or even $75 dollars. And this money can be used to exchange you hundreds of website visitors and converted into sales. It’s the model for your website promotion.
Second options is to sell off those coupon code that you have. And yes, its very common thing we seen in ebay where people auction off their coupon code. Alternative market place will be web hosting forums or webmaster forums. Why wasting the ‘money’, lets convert it into cash.
Currently the web hosting provider that offering the best marketing credits are ixwebhosting with up to $175 marketing credits, and midphase with $150 marketing credits. When you getting those coupon code, make sure you make some good cash with it.
Free birthday ecards- will you get good ecards free? Everything that is good is getting charged on the Internet. How can one get free birthday ecards that look good? Yes, you can. Some of the free birthday ecards look much better than paid. Please do not keep this thought in mind that what is good must cost.
Avoid ecards from websites that give free trial for few days and after that will be asking for money. Look for a ecard website that will offer the friends birthday ecard free for ever.
Make friends happy- the ecard should make your friend feel good. Your friend should feel happy that you spent sometime to select ecards for them. These are quick tips to do that. Avoid every other type other than flash ecards. Do not take very large or very small size. Chose bright colors. The animation should be attractive and the text heart warming. Many of us are worried about flash players. Do not worry. Most of the users have flash players installed on their computers now.
Make friends happy with free birthday ecards. Your friendship will become strong with small steps. Take those small steps and watch for the results.
Flowers are the main theme - All these screensavers have lovely flowers as the main theme. That is why they are called Love Flower Screensavers. Flowers can evoke the feeling of love without any other addition. In these Flower Screensavers, love has been as added as a theme by introducing hearts and romantic text. That gives a unique effect to these screensavers.
Download flower screensavers and send them - screensavers are recommended for downloading. in this case I would recommend that you send as many as you can to your sweetheart as the message of love in place of ecards. Everybody sends ecards. Why not surprise your darling with love screensavers, which he/she will be delighted to watch.
Download care for love flower screensavers - take few elementary precautions while downloading these screensavers and sending them to your darling. The screensaver should be free of adware and spyware. Download the flower screensavers from a secure website that guarantees downloads free of adware and spyware.
Adware and spyware can slow down your computer. Many free flower screensavers come with lovely music. Chose the ones with music. Avoid downloads of very heavy files. The installation and removal should be very quick. Take these basic precautions.
Boxtrapper spam protection for your email
meikana555 | | Labels: bluehost, boxtrapper, email spam, web hosting
My web hosting plan with bluehost hosting, are come with boxtrapper email protection. And I can activate it for free. It uses a very effective method to block spam from reaching you. You can add people you know into your ‘white list’, and block spammer emails, or email with certain keyword that you want to blog, eg. Pill, jackpot, drugs, etc.
Simple and effective. That’s what I looking for. If the email sender that is not in your white list sent an email to you, he is require to reply to the verification email. And only once he is verified, the email will reach you. Email bots are not capable to fool this system.
Once I was having an email account that received a spam mail every 5 minutes, and its keep coming in like crazy. It’s frustrated, and you can’t do anything if your email account that not have the boxtrapper feature. Think again, you will need email spam protection for your email. And definitely, not all web hosting are offering this. http://www.bluehostreview.org/bluehost/bluehost-email/ will have more information about email account with bluehost and also boxtrapper features.
A good web hosting must have good email system, and a good email system must have an effective spam protection. That’s what I think.
Birthdaty ecards for father and mother- please look for subdued colors. Prefer nature as the image background. Try to get free ecards with large font sizes and look for text that is heart warming.
Birthdaty ecards for brother- you grew up with your brothers. You know their color choice better than anybody else. Send ecards that translates your feelings as closely as possible. An ecard written with some text about the childhood spent together will be a good choice.
Birthdaty ecards for sister - do not select very bright colors. Warm colors would be preferable to cool colors, as they look more emotional. Use text that talks about a brother/sisters love for sister. If your sister has any special preference, try to find a card accordingly.
Birthdaty ecards for son and daughter- pour your parental love in the ecard. Let the ecard be very warm looking with text that describes a parents love. Use bright and very cheerful colors. The text should be funny with a message for your childs future.
For every family member, you should select different type of ecards to wish a happy birthday. Your relation with them, age difference and their preference would help you look for the ecard that would make them enjoy your birthday wishes.
So you're trying to surf a site like myspace, hotmail or yahoo mail from work or school and its blocked by your school, work or government. Or maybe you want to go on a site without anyone knowing what your doing. The simplest way to do it is by using a web proxy. A proxy is another computer that is like a mask your computer puts on when it connects to the Internet. It's also a private gateway to blocked sites because the site you are actually surfing is hidden behind the proxy, which is unblocked. For example, if you go to a web proxy in London and surf the Web, every other computer in the world thinks you are from London!
There are plenty of free web proxy sites that you can use. The problem is that many of the popular ones also get blocked by people at your school, company or government. However, once you find one that is not blocked, all you do is go to the proxy site, enter the URL you want to browse and click go! Its that easy. You can then click on any links in the page you are browsing and you're still anonymous to the outside world. Just remember that if you go to a proxy and its blocked or no longer works, its no big deal, there are thousands of them. Just try another one and eventually you will find a web proxy that lets you browse freely and privately. Part 2 of this article will show where to find more unblocked working proxies that you will ever need!
This article was published using Article Submitter
Cheap web hosting with good uptime and support
meikana555 | Sabtu, 10 Agustus 2013 | Labels: best hosting, Internet, web, web hosting
I am talking about hostnine shared hosting and hostican shared hosting. Hostnine shared hosting start with $3.95 and the basic plan will allow multiple domain hosting. Get hostnine coupon from http://www.hostninereview.org/hostnine/hostnine-coupons and will get your 50% saving from your first bill. I paid around $40 dollars for the one year plan. For this august, its giving me 100% uptime and no downtime. I tracked using serviceuptime.com monitoring services.
For the hostican hosting base-host and tera-host, you can get the coupon from http://www.hosticanreview.org/hostican/hostican-coupons and apply it to get $50 dollars discount from your bill. I paid only $45 dollars for the hosting. This hosting is giving me very good uptime as well.
Next time you look for cheap web hosting with quality in it, you will know where to start looking. And I glad I found them as well.
Nature Screensavers- Download Free To Enjoy Nature
meikana555 | Jumat, 09 Agustus 2013 | Labels: clouds, flowers, life, love, mountains, nature, screensavers, waterfalls
Dont you miss nature during your daily city life? These concrete jungles have no love in them. Dont you miss the innocent love of nature? Now you can find that with nature screensavers. What if I show you nature screensavers with lovely video shots of Beaches, Clouds, Countryside, Deserts, Flowers, Lakes & Seas, Landscapes, Mountains, Panoramas, Plants & Trees, Rivers & Streams, Sunsets and waterfalls? How about getting them on your computer screens, looking alive? Would you not love that?
You can now download Nature Screensavers free on your desktop. There are hundreds of designs in the above subjects for you to choose from. The nature screensavers come with lovely music. Some of these Nature Screensavers have inspiring text. Some others have romantic text. You will love all of them. As they are free and fast downloading files, you can download many and keep the best for your enjoyment and relaxation.
Whenever you feel tired, tense and stressed, click on a screensaver and watch it play on your screen. Watch the swinging palm trees, the lovely trees and the pure water of rivers and streams. Take your pick and enjoy. You deserve this luxury.
Screensavers - Live Flowers On Your Screen
meikana555 | Kamis, 08 Agustus 2013 | Labels: flowers, garden, inspirational, love, relax, romantic, screensavers, time
Most of the screensavers are made either with static wallpapers appearing one after other or three-dimensional designs. The latest innovation is live video. In this kind of screensaver, video shots of live objects are taken, edited and made into a revolving film. The film is then given effects and converted to flash. This flash movie, when added to installer, becomes a screensaver.
Now you can view live flowers dancing in the garden on your desktop. With innovation in technology and artistry, the quality of the shot gets enhanced when converted in flash. Installing and uninstalling such screensavers is simple. A click of mouse does that.
Download few screensavers with live flowers on your machines and watch them whenever you are getting bored or tired. Live music accompanies the screensaver adding to the relaxing power. Chose colors that you love. You can also choose flower screensavers with romantic or inspirational text. Bring the beauty of flowers to your desktops and relax with the soothing sight and music.
Repair a Scratched CD or DVD with Household Items
meikana555 | Rabu, 07 Agustus 2013 | Labels: Repair scratched damaged cd dvd clean household
Something else to consider: If your CD drive has trouble reading CD’s or DVD’s that aren’t scratched, then you need to clean the drive’s laser lens. You’ll need a CD/DVD-Player Laser-Lens Cleaner for that. They can be purchased at any computer store and even Wal-Mart.
Free Birthday Ecards - How To Search?
meikana555 | Selasa, 06 Agustus 2013 | Labels: birthday, computers, ecards, Internet
Make a quick search for birthday ecards on a good search engine. Click on some websites and read the terms carefully. Are the ecards totally free or it is only for a trial period. Select websites, that offer totally free ecards.
JPG and Flash Birthday ecards-
Do not send JPG ecards. They are one of the earliest designs and the better ones are available only in flash. Use flash ecards of decent size. Do not take very small size. JPG ecards have one advantage that the user need not have flash player on his/her computer. But with popularity of flash designs most of the users are having flash players on their computers.
Design Selection -
Use designs that look decent and are light weight. Ecards filled with many animations look over-crowded and do not look good. Go for subdued designs.
Free Birthday ecards are a boon for Internet users. You save money on buying printed cards, paying for postage and the labor of posting them. Free birthday ecards can be sent with a single click and cost nothing. What more can you ask for in Free Birthday Ecards?
To interrupt the Daemon's currently running process (ID, or PID), key in the command kill -SIGHUP 4140.
It is also possible to use signals to terminate a currently running process. To end the inetd process entirely, key in the following command: kill 4140. This command will, by default, send a SIGTERM signal. If this command fails, then the SIGKILL command is entered to end this process: kill -9 4140. Since this command cannot be controlled, it is usually not a good idea to utilize it to stop a process. This command does not permit a process to clean up or to end gracefully.
How are Unix Signals Managed?
Every Unix signal results in a default range of effects when used with a Unix program. Computer programmers can opt to code their own applications for a customized response upon the receipt of most signals. The term used to describe these individually designed strings of code is "signal handlers".
Signal handlers are unable to redefine two unique signals. In every situation, SIGKILL is used to end a process. Similarly, SIGSTOP always sends a running application to the background when it is in the foreground.
There are two main types of home networks, wired and wireless. While wired home networks are popular, but they require you to run wires from one computer to another. You might have to drill holes in a wall or run wire under the carpet.
If you don’t want cords running all over the place, you can easily get rid of them with a wireless home network. Wireless home networks are extremely simple to set up. You only need a wireless router and a wireless networking card for each additional computer you would like to hook up. Most wireless networks can send and receive data lightning fast at megabytes per second.
Wireless networks are extremely inexpensive, you can hook up a few computers for less than $200. The great part of wireless networks is that all computers on the wireless network can use the same internet or other resources such as a scanning machine and printer. So if you are looking for a great way to share data and resources among your home computer, choose to build a home network.
More information is available at http://www.home-00.info
When you contemplate repairing your own laptop keep in mind that once you open the casing you could be voiding any and all warranty coverages. A certified repair technician will be able to tell quickly if a laptop has been opened and the internal components tampered with or changed.
Laptop repair isnt always easy. If the laptop isnt under warranty and you dont feel comfortable replacing some of these parts yourself, youll have to find a professional to do it.
If you want to repair a laptop by yourself you should have first of all the disassembly manual, pictures and videos ordered by the manufacturer. Once you have the laptops disassembly manual youll discover that a laptop is made up of numerous delicate and small chips and other technical elements with minute details. If one of these innumerable and delicate technical elements is subjected to malfunctioning, then the whole of the laptop will stop functioning. If a problem is allowed to persist in the laptop, it might even damage and cause dreadful things that might even prove to be permanent. Therefore it is always desirable to treat the laptop with utmost care and pay full attention to repairing any sort of problem in the machine.
Please visit <a href="http://www.800tech.com">800tech.com</a> if you want to know more.
Paid for use the search engine
meikana555 | Sabtu, 03 Agustus 2013 | Labels: business, earn, free, money, search engine
How much money received clearly depends upon how much you use the service for your typical day to day Internet searches. Based upon our experience to date we estimate that the average user regularly searching the internet could readily raise in excess of £50 per year.
Web Design and Hosting in Iran
meikana555 | Jumat, 02 Agustus 2013 | Labels: free seo tools, iran, red v, volghan hosseyni, web design, web development, web hosting, web site
1- design and develope web sites:
For iranian companies and bussines men that wanna improve sell by sale products on the web and internet - starting emarket - or wanna say about their self and publishing their resume on the web.
2- seo - search engine optimization:
search engine like google and other mojor engines have so effect on getting more vistors. red v' - volghan hosseyni web development office will help you to get more rank and more vitores also. seo free tools also available for free download nad use on his web site.
3- email marketing:
send your advertisement to iranian - millions of iranian peoples for less than 0.01 $ per 10s. Yes its great you can get more than 17% of them will visit your site at last for one time.
4- web hosting:
Our peofessional web servers and cheap price can help you to start your bussines so fast and easy just think about disk space. you will get it in less than 1H.
The package has two CDs. The first is a ¡°live cd¡± that sets up a RAM disk (remember those?) and then boots into linux with touching your hard drive! Very creative! This is a great way to show non-technical execs what linux can bring to the table.
The second CD is a bootable install disk, with a character-based installer. I loaded into a Virtual PC machine (refer to this How To from the Ubuntu site) and have been working in the corporate environment for a few days. WSS sites are mostly usable. There is a Citrix client for Linux, so all of the ¡°corporate¡± apps are available.
Being a .Net guy now, there is probably not much more to do. If I had time, then perhaps Mono would be fun to try...
http://desktopcomputer.freehostia.com/2007/12/13/shure-mpa-with-se110/
Chances are you haven't been maintaining it the way you should be. Common problems which users ask over and over again why their computer is slow or why does an application have problems locating certainly necessary files.
Common things to do involve de-fragmenting your computer hard drive and also clearing up temporary files which clog up your folders.
One particular item of administration that people often forget is Registry Cleaning.
For a more information see my article at www.opinview.com/Fixing_your_Windows_Registry.html
Templates en la mas alta calidad.
No intentare convencer. Las personas que no conozcan el valor de lo que ofrezco no merecen tener esta oportunidad única.
Templates in but the high quality.
It will not try to convince. The people who do not know the value which I offer do not deserve to have this unique opportunity.
4.46 GB http://magvi.ws/nego/templates.html
By ending the lsass process you may encounter some difficulties when using Windows.
However lsass.exe may sometimes be a trojan horse or downloader disguised to look like an innocent process.
The lsass.exe file is located in the System32 folder, or C:\Windows\System32. If it is located anywhere else on the hard drive or computer, it is not a legitimate program and should immediately be deleted or quaratined. You should never delete or tamper with the file if it is located in the system32 directory.
The only way to determine whether the lsass.exe running is legitimate is to run a full scan of the computer.
[Source: LinuxNewsBlog]
DELL LAPTOP PASSWORD RECOVERY
meikana555 | Senin, 29 Juli 2013 | Labels: dell bios password unlock dell bios password
go here and see for your self you can ourchase your master password from there ebay account
all dell machines supported even new vostro series
best price on net
Now visit a busy city. What does a big city have? It has tall concrete buildings with no soul. It has automobiles running on the roads polluting the air with abandon with all types of poisonous gases being released in the air. You will also find lot many humans running around under stress trying to reach somewhere to finish their work. Can you think about the contrast between these two lifestyles?
How can city dwellers enjoy the sights of jungle in their office and homes? Download free wallpapers that depict plants and trees. That is the easiest method to live in a city but still enjoy the peace and serenity of forest.
Static desktop wallpapers with plants and tress photographs look beautiful. They can help us reduce lot of stress. Download as many as you can on your desktop. Keep on changing as your mood changes. You will get many with text that is inspiring. You will also get many with romantic text. They will help you forget your tensions and stresses. a great treat to the eyes, such wallpapers are a therapy to fight depression.
Free plants and trees wallpapers cost nothing and help us fight the blues. Why not use them to live a more successful life?
1. Make sure that your computer is connected to the router via the Ethernet or a wireless WiFi connection.
2. Now, in your favorite web browser go to the address: http://www.192.168.1.1
3. Usually in the older versions of Linksys routers, there will only be a password (admin) and no need to input a username. However the recent newer models of the Linksys router have “admin” as both the default username and the password.
4. Below are a few sample modes and their default usernames and passwords:
A. Default Usernames Known:
Linksys BEFW11S4: admin
Linksys WRT54G: admin
Linksys Comcast: Comcast
Linksys EtherFast Cable/DSL Ethernet: Administrator
The rest of the Linksys routers: [not required]
B. Default Passwords Known:
Linksys BEFW11S4: [not required]
Linksys Comcast: 1234
The rest of the Linksys routers: admin
In the case that you forgot your Linksys router password, you can always reset the outer by clicking the reset button at the back or at the bottom of the router.
Real World Hollywood
meikana555 | Sabtu, 20 Juli 2013 | Labels: Real World 20, Real World season 20, Real World xx
According to MTV, this season of The Real World will be the first to incorporate environmentally friendly household and lifestyle choices, including a solar-heated swimming pool, energy star appliances, bamboo flooring, recycled glass counters, some sustainable furniture, and energy efficient lighting.
How does this work –
A proxy website allows you to enter the URL of the website which you wish to surf and once you’ve entered the URL, the proxy website displays the target website in a special window. In this way, your real IP address, location are not revealed to the website and you can access it even if it is blocked by the network administrator. You can interact with the website in real-time just like the way you would have interacted with it if it was not blocked on your network.
The only known problem associated with the proxy websites is that they’ve a small life as other websites block the proxy websites to avoid anonymous surfing. So, it’s important to maintain a regularly updated proxy list in order to get the information about the working proxy websites.
How can I change my hotmail password
meikana555 | Jumat, 19 Juli 2013 | Labels: How can I change my hotmail password
Changing your Microsoft Passport password will change your Hotmail password, MSN password and MSN Messenger password.
Steps to Change Your Hotmail Password
• Login to Microsoft Passport
• Go to the Microsoft Passport Network: Account Services Home page
• Select the Credentials menu
• Select Change your password
• Enter your old Hotmail password
• Enter your new password
• Enter your new password again
• Press <Continue>
• Enter an alternate e-mail address, if you have one
• Enter your alternate e-mail address again, if you entered it above
• Press <Continue>
• Press <Done>
These steps to change your Hotmail password will only work if you know your <i>current</i> Hotmail password.
ODBC was developed by the SQL Access Group in 1992.
ODBC operates as an industry-standard "shim" between applications which utilize databases and the databases themselves.
If an application is developed using ODBC, the application will be able to store data in any database management system which is equipped with an ODBC driver.
ODBC drivers are often developed in sub-components:
• An ODBC Driver Manager
• ODBC Drivers
The application submits ODBC calls to the ODBC driver manager.
The ODBC driver manager selects the appropriate ODBC driver, loads that driver, and sends read or write requests using that driver.
The ODBC driver processes the ODBC function calls, submits the SQL requests to the database, and returns the results to the application.
"Runtime Error" is a very generic error message and is usually accompanied by additional information, such as "Runtime Error 6507."
The opposite of a runtime error is a compile time error. Compile time errors occur as a program is being compiled from source code into executable code.
Runtime errors can occur for an inexhaustable number of reasons. These include bugs in the original program, hardware failure, operator error, and resource exhaustion
To properly troubleshoot a runtime error you will need additional information, such as:
• An error number
• Where you were in the program with the error occurred
• What you did just before the error occurred
• What you say just before and just after the error occured
• The state of the machine when the error occurred (memory, disk, and cpu usage)
1. First, back up your data. The conversion process almost always works flawlessly, but there is no point in taking the risk.
2. Click the <Start> button.
3. Click <Run>.
4. Enter "cmd" into the text field labeled "Open".
5. Click the <OK> button.
6. Enter the command "vol c:" to find the volume label for the C: partition.
7. Enter the command "convert c: /fs:ntfs" to convert the C: partition from FAT32 to NTFS.
8. When prompted, enter the volume label for the partition.
MySpace Countdown Generator
meikana555 | Senin, 15 Juli 2013 | Labels: countdown clock, myspace countdown generator
To use our MySpace Countdown Generator:
* Enter the message you want displayed
* Set the date of your event
* Choose colors for your banner
* Select a skin for your banner
* Click the button in the lower left corner
* Copy the HTML source code and paste it into your MySpace page
'No Audio Device' Error
meikana555 | Minggu, 14 Juli 2013 | Labels: 'No Audio Device' Error, Communications
Troubleshooting the most common error
Here are a few steps to take to solve the most common error, an improperly installed card:
You will first need to find your audio controlling device or controller. This controller is what gives you the ability to adjust the sound for everything. From your start menu, go to your control panel. Then, go to add hardware and search for the hardware yourself. Don't let the computer search for it automatically, because if it is improperly installed it may not be seen. Then, scroll down to sound devices and search for your audio controller. Check the properties of the device, and see if it is installed properly. If it isn't installed properly you will see a yellow highlighted question mark beside the device's name
• The best way to solve this problem is to uninstall your sound card and drivers. You will reboot, enter the bios, disable the onboard audio, game port, and midi. Then boot back into windows, go to add remove programs and make sure that any programs for the device was removed.
Next, you should reinstall the sound card and drivers. It is possible driver updates have been made since the sound card was manufactured and released, so it is a good idea to visit the manufacturer's site and see if there are driver updates. Once you do this, restart the computer again. The problem is (more than likely) the default device in audio properties is still the onboard, you can select the creative devices and it will probably work, but it will be better to disable the onboard all together.
Uninstalling and reinstalling the sound card will more than likely fix your problem.
Other troubleshooting tips
If you are still experiencing difficulties, try these other troubleshooting ideas.
• If you think your sound card may be 'dead', before buying a new one, I would recommend borrowing one that is fully functioning from a friend, if possible, and installing that one to see if the error is in the card itself.
• Try using a different PCi slot, that way windows may detect it as new instead of trying to reconfigure it on the slots its currently on. This can also help you to determine whether one of the slots are bad.
• If you have an onboard sound card but are trying to use a sound card you bought separately, ensure the onboard one is disabled.
Always ensure the sound card you purchase is compatible with your board. If it doesn’t say on the packaging, do a little research online prior to the purchase.
DRMRemoval license - free opportunity
meikana555 | Minggu, 02 Juni 2013 | Labels: drm, drm removal, free drm converter, free drm removal
DRMRemoval software is audio and video converter. It converts both protected and unprotected audio or video files, so it's drm removal software and drm converter software.
Today we offer for you a chance to get DRMRemoval Video Unlimited edition license for FREE.
Share your opinion about DRMRemoval software at sites below, be one of the first three who did it and get a license for DRMRemoval Video Unlimited edition or free or request us for money back.
http://del.icio.us
http://digg.com
http://furl.net
http://netscape.com
http://myweb2.search.yahoo.com
http://technorati.com
http://google.com/bookmarks
http://reddit.com
http://blogsmarks.net
Hackers hit petition site Change.org, official says
meikana555 | Selasa, 28 Mei 2013 | Labels: Google Search, hacker, Info, Internet, News, Officials