Internet - The largest network in the World

1:20 PM Add Comment
Internet - The largest network in the World -

Computer engineers have been finding ways to connect computers and their devices together in different ways. Computer networking has come hand in hand with the other organs of knowledge, such as telecommunications, computer science and computer engineering. So many things have been made possible through computer networks. It helped people to live an easier life in many ways through the personal area network, local area network, metropolitan area network, and wide area network.

A great example of a wide area network is the champion of all networks, the Internet. And 'the largest network in the world, and billions of data (perhaps trillions) is being transferred every day. So much information is exchanged and has virtually changed the way we live our lives.

Online Training

The usual way to get your education is to enroll in a school, and go to classes on a fixed schedule. Nowadays, we can actually get a college and master the Internet. A lot of reputable universities now offer their courses online because they understand how difficult it is for some students to juggle a job and their schooling. Depending on the program, you can have your own program, and usually it was just required to submit work or before a certain deadline. Sometimes, you have to have real-time chat with you professor and "classmates", sometimes even with a webcam. What's great about this is that you no longer need to go through the hassle of commuting. The good news is that companies have been accepting a lot of candidates with this type of training, but there are still some that are too traditional.

Video games galore

What started as a simple game 2 size is now a multi-billion dollar industry, and has generated a new way of social interaction. Because of the Internet, players are now able to interact with people from all over the world, and play the same game at the same time. This is great because video games have been seen once as anti-social activities. This is no longer true, and now the players not only get to play the game together, but they are able to chat and make new friends as well. Internet gaming has also created a new genre of game called "massively multiplayer online role-playing games", or MMORPGs. This is a supercharged RPG type in which thousands of players can play together in a particular game at the same time.

Social Networking

A lot of websites today allow people to interact and socialize with others with their different instruments and services. Some of them are focused on dating, where users can create their own profile and specify their particular tastes. Other sites are dedicated to people uploading pictures and sharing them with other users as well. This was a great way of connecting with long lost friends and make new ones as well.

It 'nice that the computer network has helped in bringing the Internet. With it, life has become cheaper, and we can learn so many new things every day simply by linking to it. With the Internet, there are certainly more new things to come.

Streaming Technology explained in terms profane

12:19 PM Add Comment
Streaming Technology explained in terms profane -

Various films and on-demand television services that are rampant in recent years have introduced new terminology for many of us who are not experts in technology, and they're just beginning to explore the vast unexplored territory, known as the web worldwide. A term that is practically a household term is streaming. The concept of flow is not new. Radio and television are streaming. Streaming is, simply put, a delivery method for the media. We are able to transmit anything that can be digitized, including music, movies, sports and TV shows.

A statistic that may surprise many people is that 30% of all Internet traffic today is from Netflix stream alone. And over-the-top consumption (OTT) media from distributors like Netflix, Hulu Plus and SuperPass is expected to increase by 60% within the next two years.

To clarify, there are two types of streaming video - live and on-demand. Live streaming is seen on the internet at the same time as a camera captures and digitally encodes the event. progressive streaming is the type of flow that the streaming providers October use. On-demand video are compressed files that are provided by a streaming server. When an end user wants to stream a movie, for example, you select the movie and click a play button. The seller in October then deliver the film requested by specialized software called a streaming server. The streaming server will evaluate what is happening on the end user's media player and make adjustments called buffer to ensure a good viewing experience. The streaming content is not saved on the end user's hard drive. Once the content is streamed, it is not possible to regain access unless the file is requested again from streaming services provider.

also streaming, there is another method of delivery for these compressed files, which is called downloading. When you buy a movie, song or TV show, you download the file from a web server (instead of a streaming server), and save the file somewhere where you can access whenever you wish - usually on hard disk. In general, at least a part of the download must be complete before being able to start viewing the content without interruption.

Downloads can be either rent or purchase. If it is a car, then OTT provider generally gives a certain period of time from the time of rental, in which view the content before the file is deleted. It 'important to note that downloaded files can contain viruses and malware, so be sure that you trust any source from which you download a file.

The media players can take many forms in which streaming or check your booking downloaded. If you look at the contents of your computer, you probably use the media player included with the operating system, or you can download a free player or premium media that the streaming service provider recommends. If you want to watch on your TV, you must use a game console, Blu-ray players, Internet-enabled TV, or a streaming media player that is connected to your TV and your wireless home network. It 'important to ensure that the media player is supported by the intended OTT providers.

Streaming is undoubtedly here to stay as part of our entertainment options. Watch as the technology continues to improve and have more options available to consumers.

Microsoft Access Forms - associated or not associated?

11:18 AM Add Comment
Microsoft Access Forms - associated or not associated? -

Microsoft Access is designed for rapid development of applications. A wizard module enables the development of fast and easy application using the Bound modules. The bound form requires little or no programming, and is ideal for the amateur programmer.

The Unbound module requires the use of VBA (Visual Basic for Applications) and ADO (ActiveX Data Objects) or DAO (Data Access Objects) to retrieve and update records.

A Microsoft Access form can have a mixture of fields that are associated or not associated.

The bound form

The Bound form has fields that are connected directly to a database table. Any change to a bound control on a form is immediately updated in the corresponding field of the current record in a table.

The characteristics of the bound form include:

  • The module can be configured quickly and easily using the Form Wizard
  • The module is a Find, filtering and sorting facility
  • the module indicates the number of records and a navigation bar
  • module allows the selection, addition, deletion or modification of records
  • Under the modules can be installed to handle one-to-many

the disadvantages of bound form

the problems are:

  • the default behavior of access can be unacceptable to users - such as automatic saving of fields or records
  • cancellation of an update with the Esc key is not easy to use
  • there may be performance issues when handling data from the back-end database
  • there is the need to explicitly control record locking
  • Access error messages are user
  • It 'hard to convert to VB.Net bound form
  • E' difficult to extract the business rules from the module logic
  • Canceling a switch to a field or record may be difficult
  • there is no precise point at which a record is saved
  • loads network can become a problem
  • There is an overhead when combined form is kept open for long periods
  • the logic of a bound form can get pretty complex

the combined form validation is done field by field, using the first update event. When the validation involves multiple fields, this is not the easiest way to ensure that the clean data. Multiple events can very easily call each other several times, which can be difficult to cure.

The Form Unbound

The Unbound module provides a better solution and more professional. It is a need for greater efficiency, to extend the number of users and to provide a better control of the application.

The advantages of the unbound form are:

  • There is more control in reading and writing record
  • There is more control over editing, saving and deleting records
  • records can only be updated when all fields are valid
  • not user-friendly error handling
  • there is greater efficiency in the access logs
  • Reducing competition problems (record in problem drug use)
  • the integrity of the data can be guaranteed
  • the Unbound form is readily converted to a VB.Net project
  • Conversion of the back-end database to SQL Server will be easy

In summary

for simple or one-off applications, the bound form is ideal. It can be configured and running in minutes.

For a system of administration Company, in amulti-user environment, the additional work in authoring logic theVisual basis of an unbound form, it will be time well spent.

The advantages of a Personal Firewall

10:17 PM Add Comment
The advantages of a Personal Firewall -

Do you really believe that your computer is fully protected by the best antivirus program alone? Think again. Not all threats are viral in nature. In fact, computer viruses are just a fraction - albeit a large fraction - of the many forms of security threats these days.

It 'important to protect the system with the best antivirus firewall software, not just an antivirus program alone. The firewall component is as important as the antivirus component, since many other types of malware also pass through various vulnerable ports and openings on the computer.

Despite your efforts to update the anti-virus software and scan your entire computer every day, is undoubtedly considered to be lacking when it comes to ensuring the computer's security and other important information it contains. Many have already been victims of hackers without knowing what went wrong. Despite the awareness of the benefits of an antivirus program of the people, there are still some who are victims of identity theft.

Some might think that a virus is enough to avoid downloading malicious threats software and computers. But, in reality they are wrong. An antivirus program alone is not able to protect the computer user from cybercrime. You also need a firewall, which is a major information technology that protects computers from hackers and is specifically only for end users. With the firewall, the computer should be safe from intrusion by outsiders so that the personal data the user's entire is free.

Apart form the control of computer network traffic, a personal firewall also has many other advantages. For example, the computer will have total control of what comes in and out from the computer. The firewall will show the necessary data regarding a certain program and / or the server that is trying to connect with your computer. It will alert you of any attempt made by a certain application that tries to access the network or the local network.

Your personal firewall filters and possible malicious software scans and alerts the user if there is any outside malicious program that attempts to access the computer. It will act immediately upon detection of suspicious behavior, such as tampering with the user's computer. The personal firewall also hides your computer from scans of automatic doors blocking unauthorized network traffic.

Therefore, it is best not to rely solely on anti-virus scans and frequent computer. As a computer user, you are responsible over to know what the latest technology when it comes to computer protection and security. These days, the safest way to go is to use the best antivirus firewall software that suits your security needs.

Fax receiver Appliances Make Your received fax documents arrive in the mail box

9:16 PM Add Comment
Fax receiver Appliances Make Your received fax documents arrive in the mail box -

You are wasting money on paper and toner by fax SPAM and your time colleagues to look at them? Fax Appliance receiver could be the answer to saving costs and speeding up your workflow.

The era of the fax is coming to an end, but not so fast. Faxes are still used to receive orders by fax or by requests from customers.

Instead of having to maintain a full PC with anti-virus, a UPS that is to be replaced every few years and other support costs, a fax Appliance receiver connects directly to a telephone line and to the Ethernet network converting incoming faxes directly to an e-mail in PDF format to send it to a mailbox of a mail server.

A fax Appliance receiver reduces the direct waste significantly and often produces a return on investment of less than a year. This is based on about 20 SPAM faxes a day @ 0.08 cents per page for 365 days a year is equal to a direct savings of US $ 584 per device.

indirect savings from staff is no longer at the research and evaluation of advertising in the fax is likely to be even higher.

workflow faster because the documents no longer need to be collected from the car, but immediately comes to email administrators. e-mail servers can be configured to copy more than one person, so e-mail messages can be picked up while traveling.

A fax machine can be located more securely in the phone or the computer room, away from the dangers of everyday or ill-intent.

every page is an attachment in the mail that can be easily re-distributed or used for input into other applications.

Additional savings come from very low power consumption of the device and high reliability as there are no moving parts to be maintained or paper to be supplied. On average, only 20% of corporate communication in electronic format is actually printed that brings additional savings.

A configuration once the fax machine will run for life, maintenance free if you do not change the address of the mail server. The parameters are stored permanently in the Flash memory and the ignition sequence is less than 10 seconds. remote management via Telnet with login and password protection allows management in any network environment, such as Windows®, UNIX® or Apple®.

A fax Appliance receiver is always ready, does not depend on the operating system updates, antivirus solution Fax as a PC-based or Multi Function Copier It based that require maintenance and a lot of power. When your company has incoming faxes and especially do not want to beat a fax line to every copier / printer a fax Appliance receiver is the most cost efficient solution.

10 multiple choice questions Free - CCNA Practice Exam - 640-802

8:15 PM Add Comment
10 multiple choice questions Free - CCNA Practice Exam - 640-802 -

Cisco Certified Network Associate (CCNA)

After you study your text books it is important to test your newly acquired knowledge and see just how well you have absorbed the material. Practice exams ....

- reinforce what you learned - fill in the gaps of what you missed
- Get you used to answering questions to build confidence and familiarity

Here are 10 different Choice exams questions for you to practice on:

question 1 # - Which of the following are ways to provide login access to a router? (Choose all that apply)

A. HTTP
B. Aux Port
C. Console
D. LLC
E. Telnet
F. SNMP

question # 2 - Which statement is true regarding the user exec and privileged exec mode?

A. They both require the enable password
B. User exec is a subset of the privileged exec
C. The '? 'Only works in privileged exec
D. They are identical

Question 3 # - This modem standard has a speed of 28.8k and has error-correction features.

AV42
BV32bis
CV0
DV34

Questions 4 # - What would be the proper command to set a DCE clock rate of 56k for a serial interface?

A. Router (config) # 500 clockrate
B. Router # clockrate 500.
C. Router (config-if) rate #clock 500
D. Router (config-if ) # clockrate 56k

question # 5 - What is an example of a MAC address?

A. Az32: 6362: 2434
B. BA: 281x: 8288
C. 101: 354: 665: 8734: ffd6: 8023
D. A625: cbdf: 6525

question # 6 - which command does not show that two devices can not route packets between them successfully?

A. show interface
B. track
C. telnet
D. Table

Question # 7 - you are designing a network which needs to support 0 users . You are not going to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer.

A. 255.255.0.0
B. 255.255.255.0
C. 255.0.0.0
D. 255.224.0.0
E. 255 255 255 0

Question # 8 - MAC is to Ethernet what ________ is to Frame Relay.

A. DLCI
B. LCI
C. PVC
D. None of the above

question 9 # - The 802.2 frame specifies a type whereas 802.3 frame specifies a length:

A. true
B. false

question # 10 - what which is used to see if a client is still connected to a NetWare server?

A. spoofing TCP / SAP
B. Watchdog package
C. GNS Round Robin
D. DNS Round Robin

REPLY

Question 1 - correct answers: B, C, E
question 2 - correct answers: B
question 3 - correct answers: A
question 4 - correct answers: C
question 5 - correct answers: D
question 6 - correct answers: A
question 7 - correct answers: B
question 8 - correct answers: A
question 9 - correct answers: A
question 10 - correct answers: B

What is Wardriving and how you can prevent

7:14 PM Add Comment
What is Wardriving and how you can prevent -

Imagine a car equipped with nothing more than a laptop, a handheld GPS receiver, and a wireless network card slowly strolls through your neighborhood. Unknown to any onlookers, this is not an ordinary vehicle; rather, it is a wardriving machine. As the car strolls homes and businesses of the past, a wireless network card (available at any electronics store as low as $ 25) scans for any wireless access points. Anyone with a wireless network (and there are many out there) is vulnerable. The computer is looking for what is called an SSID. An SSID is the name of the wireless network and is continuously transmitted from the access point, letting computers know of its presence. The wardriver uses software like Netstumbler (for Windows) or Cismet (for Linux) to scan the airwaves for SSIDs. The program can monitor various access points immediately and check the signal strength. These programs can also check to see if the network is encrypted. The wardriver generally configure your software to record any clear strong signal. Using the GPS receiver, the coordinates of the strong signal will be recorded. After this preliminary unit, wardriver can return to the positions that have been filed, and the connection to the access point. Once connected to an unencrypted network, the wardriver can use the Internet connection of the victim, and can also explore computers on the network. If the files are shared within someone's private network, all that information is susceptible of a wardriver. In addition, once in the network, a wardriver can intercept network traffic and can display all the information such as passwords and credit card numbers sent to the Internet - even SSL protected data. Wireless network vulnerability is a major problem, and as more and more households buy wireless technology, the problem of insecure networks increases. Sound scary? Well this happens every day, and it does not take an expert to pull out. It does not take an expert to protect against both, though.

steps you can take to protect against wardrivers:

There are a number of very simple steps you can take to protect your wireless network. For many of these, you will have to access the router's configuration utility (check your manual on how to do this, you usually have to type an IP address in the browser such as 192.168.0.1 or 192.168.1.1).

did not broadcast their SSID. If it is broadcasting the SSID, this is the first thing that a program will pickup and recognize. If you configure the router to not broadcast your SSID, it will be difficult to detect (but not impossible, for some software that can intercept wireless communications, so if you are using the wireless network, the SSID can be revealed). If you are not broadcasting the SSID, but it can be guessed (eg if you use a default SSID), cloaking it is pointless. Because of this, it changes your SSID from the factory default. This is not a 100 percent effective method to protect the network, but it is a good first line of defense.

Change the default password. When you buy a router, a default password is stored. People with experience in working with routers know the default passwords for different routers (and the brand of the router can be seen by a wardriver software like NetStumbler). It 'important that you secure your router with a good password.

encrypt wireless communication. I can not stress enough the importance of your wireless communication encryption. Enable encryption and enter a key. Most routers are only capable of WEP encryption, but if they permit, use EAP encryption, is more secure than WEP. How cloaking your SSID, encryption is not 100 percent. Given enough time and determination, if someone wants to hit you and access your network, WEP encryption can be circumvented by using software like AirSnort.

Filter the MAC addresses that are allowed to connect to the router. This would require that you enter the router configuration and enter the MAC address of each wireless card. This way restrict access so that only computers can connect to the router. You will need to obtain the MAC address (which is the individual identification address of a network card in the form of a 12-digit hexadecimal number). If someone sniffs traffic and detects the MAC address of a computer wirelessly using the network, the wardriver could emulate that address and connect to the router, but this takes time.

If you set up file sharing on your computer, make sure it is password protected. It is advisable not to share files on network computers unless they require an authenticated user access. Set the same user account on your machines so that your computers can share files.

With these relatively simple steps, users of the wireless network can protect their networks from wardrivers. Wireless networks are inherently insecure, and these tips will help you protect your network only increased. If someone is really determined to gain access to the network, given enough time, a good hacker can gain access. These tips will deter the wardriver media to access the network, though. Although these methods are not security measures defined, that will change your network from being something that can be hacked in a matter of seconds, something that will have a determined hacker days if not weeks of work, each of which will have to be made while in close proximity to the network.