Spiga


The Next Generation PC Systems

Change is coming soon. Technology has continued to evolve at break neck speed. The speed at which technology evolves is partly driven by increasing demands from the marketplace. Everyone wants more powerful systems that are highly reliable and can run faster. Hardware and software manufacturers are working in tandem to bring the next generation of computer systems to a whole new level.

It all starts from the CPU (Central Processing Unit). The CPU is like the heart of the system. Without a powerful "heart", other components cannot realize their full potential. Intel has recently announced the release of the Core i7 processors. This family of processors is radically different from previous generations. They are all quad core processors, with each core having dual threads. That means the CPU will appear to the operating system as 8 processors. Talk about power!

With more powerful processors, other components of the computer system have more processing power to utilize. An enthusiast will surely ask, "But what about the memory?" The memory of a computer system is another critical component that affects the overall speed of the system. If the memory is not upgraded, there will be a bottle neck, and even the fastest of CPUs will be rendered ineffective.

The Core processors support triple channel DDR3 memory. Memory manufacturers like Gingle have announced releases of triple channel DDR3 memory kits that are fully compatible with Intel's Core i7 processors. Furthermore, for enhanced memory performance, Intel has decided to mount the memory controllers directly onto the processor die. A high speed link is available if another processor wants to access the information on the memory controllers on another core. This means that instead of the processor having to retrieve information from external memory controllers, the processors now have direct access to the instructions. This improves performance dramatically.

Tests ran by reputable technology websites have showed improvements in all areas - graphics processing, CPU processing, and higher reliability when overclocked.

Of course, given the raw power offered by the new Core i7 processors, a better architecture has to be available to allow faster communication between the different components. For this reason, the Core i7 processors can only be used on motherboards with the X58 chipset. In other words, whoever wants to upgrade to the new Core i7 processors will have to give up their old motherboards.

The X58 motherboards support Intel Quickpath Interconnect. This is Intel's way of establishing faster communications between the various components.

The new motherboards also features support for high speed hard drives. Both internal and external disk drives can run up to 3GB/s.

Seagate recently announced the release of the Savvio 15K.2 second generation, 2.5″ hard drive. This new generation hard drive can run at 15,000 RPM (twice the speed of traditional hard drives) and can save up to 70% in terms of power consumption. For server farms that use many hard disk drives, the energy savings can amount to something substantial.

Everything appears to be pointed in the right direction - faster systems, higher reliability, and more cost savings. Enthusiasts have a lot to cheer about.
Article Source: http://www.upublish.info
About the Author:
Gen Wright
For more information on the Seagate Savvio 15K.2 15000 RPM 2.5" hard drive and Gingle triple-channel DDR3 memory kits for Intel Core i7 processors, please visit the Gadget Advisor blog.

Top 10 Mysql Development Security Tips

While using MySQL or PHP, you can use some 10 recognized tips to counter security bottlenecks during the construction of the code as well as optimizing time to troubleshoot and implement it. MySQL development and PHP development has always been one of the core tools for web development, and companies and people involved in custom web development solutions and services face hordes of security breach issues with their scripting codes. Hereon, we shall discuss the aforementioned tips to provide a threat-proof vest for your MySQL web development code.

Here is a list of the 10 main points to keep in mind to avert landing in a soup as far as data security and other similar issues are concerned:

1. Do not blindly follow User Input – Do not trust the input by the user without verifying its compatibility or correctness. Checking with the strstr() and prompting that the username is not valid to the user is a good countermeasure.

2. Validation of user input necessary from the server side – Validate the user input with Javascript from the server side as well, if you have done so from the user’s perspective.

3. Direct implementation of user input on SQL queries to be avoided – Do not directly use the user input into SQL queries.

4. Escape the Output – Helps you avoid XSS (Cross Site Scripting) invasions on your development code.

5. While uploading, mime type file should be validated – If this action is not taken, a PHP file or some other application may come camouflaged as an image file and wreak havoc on your server.

6. Up to date 3rd party code libraries – The latest version of all 3rd party code libraries should be with you to avoid jeopardizing the security of the code.

7. Exact permissions for database users – Do not give an overload of permissions for the user, with just the ones that will do justice to user independence.

8. Library file extensions to be PHP – Have a PHP extension to avoid others to manipulate your passwords and other confidential information and data in the code.

9. PHP too, should be up to date – Keep checking the site www.php.net and keep consulting with PHP development experts regularly to append as well as know about fixes on security issues, regarding MySQL development.

10. Be Well Read about Security concerns – Read books, consult web development experts and also read about the contemporary trends in security concerns in MySQL and PHP development round the world.

Implementing these measures will not make your code foolproof to security threats, but it will surely be a great countermeasure against the commonplace code security breaches in the arena of MySQL and PHP development.

Article Source: http://www.upublish.info
About the Author:Markus Fernandez
Script2please.com is one of the leading offshore outsourcing companies in India, We Offer Rich php web development services, and custom web development

Support All of Your Computing Needs

Modern computers use Universal Serial Bus connectivity as the industry standard. This severely limited the number peripherals that could be attached to a single PC. These two ports have been around for two decades, serving effectively in linking devices. More PC peripherals, office machines, telecommunication devices, etc. will be operated wireless. For increased viewing pleasure, it is recommended to install high quality graphics and sound cards. There are ways to enhance the quality of picture and sound of your satellite TV using other optional components. You may need good sound card and graphics card. Manufacturers have jumped on this opportunity to bring you a mountain of products that enhance your PC by simply plugging them into the Universal Serial Bus socket. As technology moves on they are becoming bigger and better in making day to day tasks easier for you.

For installation of a Universal Serial Bus device, simply plug the cord of said device into the Universal Serial Bus port of your host system. The Universal Serial Bus has been around for a number of years, and its creation has solved the problem of a lack of or incompatible connections available to link to. Intended for mid speed and slow computer peripherals, it created an intelligent serial bus. With the advent of modern communication equipments, today you can enter the market from the comfort of your home. A good technician must also know how to deal with different accessories such as printers, scanners, fax machines, etc. Have a look for other accessories. Not only are they made for a PC and monitor, but they also come with spaces for printers, speakers, the mouse, keyboard, and scanner. They manufacture and sell PC, servers, personal digital assistants.

Universal Serial Bus Adapter accommodates not all Universal Serial Bus connectors of any peripherals. Presently there are thousands of product sites that offer affiliate programs to sell a variety of goods, from clothing to health and fitness accessories. Your knowledge on the accessories will help you to gain knowledge on the functioning of the computers system and thus will help you in its operation. To know about the accessories, you need not open your whole system apart and start doing the anatomical study on it. Electronics and cheap computer devices and accessories were among the first merchandise to be sold regularly in online marketplaces and they continue to be the most popular type of items bought at online stores. The way these devices works are changing but still they are used for the same purpose. By purchasing everything at once you can ascertain that your devices will support all of your computing needs. These wireless mouse are nowadays available in every shop and in the shopping sites of Internet too.

Old computers are an integral part of life in the 21st Century and these days it is not uncommon for households to have more than one, however, there are still many people who find it too expensive to buy new. If you are selling spare parts, you may just want to stick to Internet marketing, but if you are selling household clothes, clothing or pizzas, you want to make sure to look into other forms of advertising as well. The Internet is the best place to buy cheap devices and take it secure. Donate older computers and get a tax deduction for a contribution to a local charity. You can find the latest models of everything from hard drives to flash drives, from DVD players to digital TV, from cheap computer parts to completely kitted out superstar gaming computers. More expensive units even come with the computer parts built right in, which can give your office a sleek, clean look. Allow the technicians to assist you through out the set up.

Thus we can see that the memory controllers are very essential computer parts and are of several types used for several purposes. When you are going to buy computers it is important that you know something as it will come handy in case you are planning to buy a second hand parts. You can find almost everything from speakers to hard drive at an astonishingly low price. You will be able to walk without worrying of static charges which is perfect for that needed safety around other electronics where static charges can have devastating effects. In fact, research has shown that no IT companies fare better with this approach because people looking for services generally do not look at their mouse mats for guidance! China is also manufacturing mobiles, camcorders, cameras, memory cards, DVD players, microphones, web cameras, LCD monitors, headphones, boards, cartridges etc.

A computer comprises of a lot of things like that of the software, the games, hardware etc. The idea here is to decide where your money will be best spent. In addition to cool looks, a clear case can also keep cooler in temperature. Laptops are designed to be portable so the manufacturers have to use special types of parts. The next one is about the functionality and the longevity. Clients need to keep in mind that just like anything else in life, not all techs, not all consultants, not all website designers.

Article Source: http://www.upublish.info
About the Author:Ronald W. Firquain
Ronald W. Firquain is a auto mechanic, musician, Arabian horse owner for 20 years, writer, marketer, entrepreneur, webmaster and has 18 years of computer experience. computer tips

How to Pick the Right Computer for Your Business

Nowadays, businesses cannot function effectively without computers and internet connection. It is now more important than ever to communicate with suppliers, clients, employees, and buyers using digital media. But timely communication is only possible if you have the right tools.

Technology change so quickly that it can be daunting for a buyer to purchase a dozen computers only because it can become outdated several months later. So before you part with your hard-earned cash, here are some questions you may want to consider:

What will the PC be used for?

Before you even begin to research on the features of available computers in the market, you need to know the purpose of this machine. Would it be used for accounting, for graphic design? Or simply for writing? Knowing its purpose is key to finding a reliable PC that you can use several years down the road.

If you are thinking of using your computer for graphic-intensive activities, it is important for you to choose something with huge amounts of memory and video cards. On the other hand, if you are simple going to use the computer for text editing, a cheap computer will do.

How long do you want to use it?

With care and attention, most computers can last an average of three years or longer. Most computers are actually replaced because of software upgrade not because anything was wrong with it. If you anticipate the need to update your computer regularly, it is best to buy a cheap computer so it would not hurt your pocket that much to replace it.

What brand do you prefer?

A few years ago, IBM dominated that market. This is no longer true because with so many options out there, almost any brand will do. You need to take note though that specific companies do have their own specialty. For example, Dell computers are known for their affordability, IBM computers are known for their extensive range of choices, and Apple computers for their impressive graphic editing capability.

Desktop or laptop?

Desktops are great to work in because it’s large, it typically has higher memory capacity, and you can use a regular mouse. Laptop offers portability and space; you can also take your laptop almost anywhere so your files will always be with you. It is important to remember that both options have their own advantages and disadvantages, you need to know which one is better suited for your business needs.

What processor speed do you need?

The processor is one of the most important chips on your computer. It will determine how fast your computer will be. Most processors these days provide acceptable speeds but there are some that stands out from the rest.

What is the memory capacity of the computer?

The memory space on your computer is more important than the processor. This is because the larger the memory, the faster and the more efficient a computer will be. A good computer buying tip to remember is that you need to buy as much memory as you can because trying to save in this area can slow down everything.

Article Source: http://www.upublish.info
About the Author:Marshal Pull
Marshall is an avid Internet Marketer, and enjoys connecting surfers with the products they are looking for and getting paid to do it. He has been running as a way to present various Apple Computers in a new way.

How a Registry Cleaner Can Eliminate the Blue Screen of Death

Computers are incredibly useful and they are constantly helping us streamline our lives. Without them, everything we do, from paying bills to ordering holiday gifts, would involve extra steps and extra time. But, computers can make our lives difficult as well—especially when they generate error messages we don’t understand. Even worse than error messages, the widely-feared Blue Screen of Death (BSOD) can abruptly change the way we see our computer, making it a burden in an instant. If you have ever been in the midst of working on a project for work or school on your computer, and have seen the feared BSOD, you know what this feels like. The operating system generates an error that says “fatal error” and you suddenly think your computer—and your project—are gone. While the “fatal error” sounds deadly, there’s no need to worry. Armed with the right information and the right tool, you can bring your system back to life. And, once you’ve revived it, the system will be running faster than ever. Knowing what the Blue Screen of Death is and how to avoid and repair it is key. Once armed with this knowledge, your operating system will be less overwhelming to you. The BSOD error is generally caused by errors in the Windows system registry. The registry is a directory within your Windows operating system that stores settings and options.

Holding an abundance of information, the registry acts as a closet. Imagine all the items you add to your closet over the course of a year. Over time, your closet becomes disorganized and you can’t find things you need. The process of finding things in your closet slows down dramatically. The same is true with the Windows system registry. Over time, the registry becomes cluttered with entries and begins to function poorly, sometimes even generating frightening errors. One common error in the system registry that leads to slowdowns and to the Blue Screen of Death is the DLL error. Before learning about the DLL error, it is important to understand what DLL files are. They are central to all applications and programs and they enable shared files to link up with each other. Without DLL files, a program’s files would not be able to communicate in order to execute the program. DLL files are easy to identify because they end in the .dll extension. Before you encountered the Blue Screen of Death, it is possible that your system generated an error regarding a DLL file. Whether your BSOD was caused by a DLL error or another issue, the answer lies within your system’s registry. There are two solutions then for the Blue Screen of Death.

First, you can manually investigate your system’s registry and manually repair any errors. This can be very time-consuming. There is a second, easier solution.

You can download a registry cleaning tool to scan and clean your Windows operating system registry. A popular and efficient registry cleaner is RegCure. This registry cleaner will scan your registry and remove any unneeded entries that are causing slowdowns and errors. The first step is visiting RegistryRepairProgram.com. There, you’ll be able to download a free scan of your system’s registry. From there, you can choose whether you want to use RegCure to clean your registry. If you elect to use RegCure, your BSOD errors will disappear. In addition, any other system errors you have experienced will disappear as well. Most important, your system will return to functioning like new, and you will notice the change in speed. Sorting through your registry manually takes time, but using a registry cleaner is the best thing you can do to fix annoying, or in the case of the Blue Screen of Death, overwhelming system errors. If you use RegCure on a regular basis, you will never experience a last minute BSOD crisis again.

Article Source: http://www.upublish.info
About the Author:Hamilton Hill
Ben Hamilton. RegCure uses the most sophisticated technology available to scan your Windows registry for corruptions and is the most effective registry cleaner on the market

Network Camera Video Surveillance for Towns and Cities

Expansion of towns and cities is always a good thing, but it also brings with it potential problems such as increased crime. One way to help defend against increases in crime in your city or town is to employ the use of a network camera / IP camera video surveillance system. This can prove to be a vital part of your municipality's security infrastructure.

Benefits for Municipalities

Crime can be a horrible for a city, especially a growing one. The use of video surveillance can help cut down on crime, thus making the city safer and more attractive both for new residents and for new businesses. This is a good thing for everyone in town.

IP cameras used in public areas can also make these areas safer. In some cities, parks are known as havens of crime and many residents tend to avoid them, rendering these public areas almost useless. Through the proper use of a video surveillance system this problem can be curtailed, cutting down on the crime in these areas and making them safe for resident use once again.

Network Cameras for Video Surveillance

When dealing with a very large area, such as a town or city, network cameras can have a real advantage over traditional CCTV cameras. Network cameras, also known as IP (Internet Protocol) cameras come with built-in web servers and their video feeds are accessible via network. This means that no actual physical connection between IP cameras and monitoring stations need to exist: as long as the monitoring station is connected to the same network as the camera, then feeds can be viewed. This is an excellent way to handle a number of different cameras all from a single location, or at least allow a single location access to a number of different cameras, even if the cameras also have more local monitoring stations.

Another benefit of network cameras is enhanced quality. These cameras take video in a digital format, and depending on the camera resolution can often be much higher than that found in analog cameras. This gives your town's police force or security personnel a better image of the happenings on in the town, thus make it easier for them to perform their duties.

The use of advanced IP camera software can also be a great boon to a town's video surveillance system. With the use of this software, alarm systems can be set into place, or automatic notifications can be sent to officers on patrol, etc., based on certain parameters programmed into the software. This is a great tool which can be used in a number of different ways in various situations.

Installing a Municipal Video Surveillance System

It can often be tricky to install a municipal video surveillance system. Depending on property laws in the area, it will probably be best not to have it done by the town, but to work with local businesses and residents to have them set up their own cameras. For public areas such as parks, this will of course be done by the municipality itself, but for downtown and other areas where most if not all property is private, cooperation between town and businesses will be needed. You might wish to consider an incentive plan for businesses that cooperate with implement video surveillance systems

Obviously an entire town cannot be covered with cameras, so you will need to prioritize what areas should be covered. The busiest areas such as downtown or other shopping areas, public parks, etc. should definitely be considered. You should also look at the crime rates in town, see what areas are the most vulnerable to crime and concentrate on these areas as well.

Copyright (c) 2008 Wes Fernley
Article Source: http://www.upublish.info
About the Author:Wes Fernley
Network Camera Store is an online store that specializes in network cameras, network camera software and accessories. For information on purchasing, supporting or learning about IP Cameras, visit http://www.NetworkCameraStore.com

How to Choose Reliable CD DVD Replication Services

CD/DVD duplication service is a serious business that needs a serious solution, but must not be expensive. There are plenty of companies advertising their services over the Internet and through local store offering DVD replication and CD duplication, but only few can really deliver the quality and assurance one is looking for. Finding these companies is not hard. All you need is a little investigation and you’re good to go in outsourcing your needs.

What should be the criteria when choosing the right company to handle your CD/DVD duplication need? Doing these tasks on your end may sound impossible so we need to let experts do it for us. Companies with expertise on this field can provide a client with best results while spending the least amount.

First thing we need to consider is the company’s reputation. We must only entrust our business needs to reputable companies to get assurance of the quality of service and output we can get. A reputable company offering CD DVD replication services has everything to lose when it fails to provide a client with satisfactory level of service and an excellent quality output. A company’s reputation serves as our bargain when allowing them to do the job.

Fast turn around with high percentage of accuracy should also be among the company’s concerns. Numbers of companies in existence are offering DVD replication and CD duplication services providing clients with fast turn around time. This is a good indication that a company can handle task that needs immediate completion. These companies are also confident to make this assure because they have state-of-the-art technological equipment that can cater a client’s need.

The next important thing that a client should consider would be the price. With the tight competition on CD duplication or DVD replication services, prices are way affordable compared to those that were offered years ago. These services may require good quality result, but it should not be expensive. It is very important for a client to compare prices offered by companies offering CD/DVD duplication services before making the deal.

Support center should be available 24/7. Yes! As a client, you must look for a company’s support center. This will serve as the mediator between you and the company. In case there is a need for slight changes with your CD duplication requirements or any thing that you want to inform the company, you can easily do these things by contacting their support center.

Aside from the basic CD duplication or DVD replication services several companies offer added services to their clients. These include labeling and packaging. For promotional purposes, right labeling can boost a client’s business and may serve as additional promotional materials. Packaging services on the other hand lessen the burden of the client when thinking of how orders will be shipped.

DVD duplication service is a blessing to most of us especially musicians who do not have enough funds to support wide scale product of materials. This is the best alternative for companies in need of CD or DVD as informational materials for business promotion and employee awareness programs.

Article Source: http://www.upublish.info
About the Author:Roberta Groche
If you want to know more about CD duplication services then please feel free to visit CD DVD replication services offered by Corporate Disk Company. Disk.com has over 20 years experience in digital asset manufacturing

What to Expect From Online CD-DVD Replications Services

Most of us are puzzled if it’s possible to produce instant copies of personal recordings in less than 48 hours. This may sound impossible way back years ago, but not today. With the continuous technological advancement, we are also at the brink for making this as easy and fast as possible. For CD duplication or DVD duplication services that need to have a fast turn around time without compromising the quality of the copies, there are plenty of reliable sources online.

The question is, “How do we find the best company to entrust very important materials that matter to us?” This may sound simple, but the answer is not that easy. Yes, there are plenty of companies extending their services but not all of them are capable of producing the desired output. Some are confident on their advertisements that they will be able to offer good quality services, but in reality everything is going to be a failure. With this in mind, finding the right company to handle your CD/DVD replication services is one major question that should be not taken for granted.

Online services are advantageous in two simple ways. First, it’s economical. Seconds, it’s available 24/7. Why should you risk your materials to online companies offering CD or DVD duplications? You can look for local shops offering CD duplication services and get the same result. Well from our observation, online services are as reliable as local shops. Online services can deliver and pack orders similar to what local shops can offer. But speaking in terms of economics, online CD DVD replication services are far more affordable than what local shops can offer.

Online CD/DVD replication business has a very tight competition. There are thousands of companies competing for the number one position in ranking and in getting sales. This is the reason why these companies are offering reasonable prices for their services to attract more customers.

Purchasing your own machine to perform your CD/DVD replication needs may require you to spend thousands of dollars. And after all these things are done, your machine will no longer be necessary unless you can come up with another project.

Like millions of online business taking advantage of the Internet, online CD/DVD replication is accessible 24/7. What does that mean to us as consumers? A lot! Being available to take orders while the rest of the world is sleeping is already an advantage for us. We can make our orders anytime of the day and get assurance of the getting our packages the moment we need it. Orders are placed on secured systems and are processed immediately.

However, despite the advantageous one can receive through online CD duplication or DVD duplication services, there are still few disadvantages from it. One disadvantage is the company’s failure to deliver packages on the desired date. We may not like it, but these things happen to some orders. Companies may face issues with deliveries of packages which hinders them from fulfilling the set date and time of delivery. Luckily, this issue is minimal and can easily be resolved through a strong partnership with the client and the service provider.

Article Source: http://www.upublish.info
About the Author:Amit Chakraborty
If you want to know more about CD duplication services then please feel free to visit CD DVD Replication services offered by Corporate Disk Company. Disk.com has over 20 years experience in digital asset manufacturing

Inventory your Network with PC Inventory Advisor!

PC Inventory Advisor 3.2 - more than expected.

After almost half a year without major upgrades, the whole ClearApps team welcome our valued clients and visitors with a new version of PC Inventory Advisor, our premium network inventory solution for small, medium and large networks. One of the key features that we invested most of our time in when preparing this release was stability and control.

Most of the features which we added were requested directly or inspired by you. And we truly hope you'll love the new update, and send in even more usage scenarios so we can adapt PC Inventory Advisor to your IT environments and client networks. If you are interested in our future roadmap or have other questions, please, feel free to contact us any time.

What's hot in PC Inventory Advisor 3.2?

First of all we concentrated on the following top new features:

#1 Tabular reports

Flexible Network Inventory: Custom Tabular Reports

Now you can easily select which data fields you are interested in, and compile your own network inventory reports adding target nodes dynamically. So, with tabular reporting, you will get a flexible dataset collected from the nodes of your interest. It works like the following: first, you select the nodes you would like to see on the list; secondly, you build a list of parameters you are interested in, you can choose among more than 40 software, hardware and other inventory data fields; sort the list; and go!

Pre-defined reports are still in place for fast 1-click inventory reporting. Probably, one of the next updates will feature creating your own pre-defined reports for future references and automation needs.

You probably noticed the new office address, and phone number, please, update your records accordingly, so we still stay in touch and provide only the highest level of services.

#2 Licenses compliance audit

Since version 3.2 'All software' tab in your network summary is also your single place to keep tabs on all the software installed in your network and also monitor the number of licenses you have for each title.

PC Inventory: Software Licenses Compliance Audit

PC Inventory Advisor will automatically calculate licenses shortage or notify you when if not all licenses are used. Additionally we added sorting to this list, so whenever you get the new network summary with PC Inventory Advisor, it's more convenient and much easier to analyze software usage in your network.

#3

Among the rest of new features, I would like to highlight the fact that we fixed more than 100 glitches in reporting and inventory modules, invested hundreds of hours in core stability and also concentrated on the following:

* sorting of reports on network software and tabular reports
* improved CSV export
* resizable scanning dialog
* new pre-defined report Inventory by brand
* highlighting the nodes with new reports available
* new export format selection
* better detection of currently logged on users
* separated scanning for domain users, so you no longer see hundreds of users in your asset report
* enhanced troubleshooting
* RMB-menu in reports
* enhanced pre-configuration window
* support of Macs in custom and pre-defined reports
* categorization of reports on Windows assets, so you can select which data should be collected, and which can be omitted
* refreshed Reports tab and intro
* your top feature requests

You can download the latest PC Inventory Advisor right away! If your automatic update notification hasn't arrived for any reason.

Plus we refreshed our website. Talk to you soon. And thanks for staying with ClearApps!

Buzz generated

"Network Inventory Advisor provides scalable and cost-effective solution allowing us to manage and audit our network easily."

Jeff Blume, RFMD

"We liked smart scan, it's a one-click way to company-wide network inventory. We audited all hardware and software on our 500+ nodes network in no more than 5 minutes."

Amit Klain, Asus Taiwan

"This is what makes paperwork useless! I used Excel for inventory before, but this is just a convertor to 1-button 1-click mode!"

Ben Homa, Copper

"Alternatives? No way! PC Inventory Advisor is our favorite soft for network management since now on, we got the Service Provider license, so all our admins use one package and central data repository"

John Chen, Siguard

"We were impressed with the number of computers we could inventory simultaneously. We had 250 or more PCs in our LAN and PC Inventory Advisor was extremely responsive."

Cristian Pots, Euro PR Network
Article Source: http://www.upublish.info
About the Author:Gen Wright
http://www.clearapps.com/pc-inventory.html network inventory

Things you should know when you take your Laptop on the road

You need to keep an eye on your laptop. If you take it out of the house, make sure the bag is closed all the way, zipped shut. It is easy for a thief to swipe your laptop out of your bag on the street or subway if they can see it. Then, as you go throughout your day make sure you keep the strap over your shoulder opposite the side of you body. This makes it much harder for a thief to snatch it from you. If you place it on the ground while paying for coffee or at the airport ticket counter make sure you place it between your legs and squeeze your ankles around it.

When go out to get some work done and you set your laptop up at a coffee shop. Be sure to use a laptop security cable. Attach it to anything you can. It doesn’t have to be attached to the building or floor, as long as it’s noticeable. A thief is not going to drag a chair out of the coffee shop and down the street.

You need to attach the lock as soon as you sit down as you don’t know when you are going to have to get up quickly to run to the bathroom, or to get more sugar or another coffee.

If you make it a habit of locking your laptop every time you take it out, you are much less likely to be a victim of theft.

This includes locking it at the office and at home. You would be surprised at how many laptops get swiped from desks in large office towers during lunch when there are not many people around. And if your house should happen to get broken into, the TV can be replaced, and you can live without it for a day or two, but if your laptop is taken, then all your work, documents and pictures etc.. are gone! Even if you are smart enough to back up, the odds are that you didn’t back up the minute before your laptop is stolen so you are going to be out some data. Then there is the downtime, now you have to spend half a day computer shopping, arguing with the insurance company buying and installing new software (the cost may not be covered by insurance) and not to mention that your deductible may be too high to even bother making a claim.

On top of that, you may end up struggling with a new operating system that you are not familiar with for weeks, and dealing with loosing all your settings and bookmarks.

A lot of people say “my laptop is old, I hope someone steals it!”… We all would like to get a newer faster laptop, but you don’t need to be “forced” into a new upgrade in the middle of working on a new project.

Then this all leads to the data on your laptop. You could have personal information on your laptop including names, address, Social Insurance Numbers or Social Security Numbers, credit card numbers, bank accounts, medical information, legal information etc…

The privacy laws will hold YOU responsible for the damages those people receive. If fraud is committed against someone because you lost your laptop with their information, if they lose money or their credit is damaged, then you are responsible for their loss.

Article Source: http://www.upublish.info
About the Author:Ben Kayfetz
Ben Kayfetz is a expert security solutions provider specializing in laptop locks.

How to Configure SSH (Secure Shell) for Remote Login on a Cisco Router

Prior to the introduction of SSH in the Cisco IOS, the only remote login protocol was Telnet. Although quite functional, Telnet is a non-secure protocol in which the entire session, including authentication, is in clear text and thus subject to snooping.

SSH is both a protocol and an application that replaces Telnet and provides an encrypted connection for remote administration of a Cisco network device such as a router, switch, or security appliance.

The Cisco IOS includes both an SSH server and an SSH client. This document is concerned only with the configuration of the SSH server component.

Prerequisites

Software

The SSH server component requires that you have an IPSec (DES or 3DES) encryption software image from Cisco IOS Release 12.1(1)T or later installed on your router. Advanced IP services images include the IPSec component. This document was written using c2800nm-advipservicesk9-mz.123-14.T5.bin.

Pre-configuration

You must configure a hostname and a domain name on your router. For example:

router#
router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
router01(config)#hostname router01
router01(config)#ip domain-name soundtraining.net

You must also generate an RSA keypair for your router which automatically enables SSH. In the following example, note how the keypair is named for the combination of hostname and domain name that were previously configured. The modulus represents the key length. Cisco recommends a minimum key length of 1024 bits (even though the default key length is 512 bits):

router01(config)#
router01(config)#crypto key generate rsa
The name for the keys will be: router01.soundtraining.net
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.

How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys ...[OK]

Finally, you must either use an AAA server such as a RADIUS or TACACS+ server or create a local user database to authenticate remote users and enable authentication on the terminal lines. For the purpose of this document, we'll create a local user database on the router. In the following example, the user "donc" was created with a privilege level of 15 (the maximum allowed) and given an encrypted password of "p@ss5678". (The command "secret" followed by "0" tells the router to encrypt the following plaintext password. In the router's running configuration, the password would not be human readable.) We also used line configuration mode to tell the router to use its local user database for authentication (login local) on terminals lines 0-4.

router01(config)#username donc privilege 15 secret 0 p@ss5678
router01(config)#line vty 0 4
router01(config-line)#login local

Enabling SSH

To enable SSH, you must tell the router which keypair to use. Optionally, you can configure the SSH version (it defaults to SSH version 1), authentication timeout values, and several other parameters. In the following example, we told the router to use the previously created keypair and to use SSH version 2:

router01(config)#
router01(config)#ip ssh version 2
router01(config)#ip ssh rsa keypair-name router01.soundtraining.net

You can now log on to your router securely using an SSH client such as TeraTerm.

Viewing SSH Configurations and Connections

You can use the privileged mode commands "view ssh" and "view ip ssh" to view SSH configurations and connections (if any). In the following example, the SSHv1 configuration from a Cisco 871 router is verified using "show ip ssh" and a single SSHv1 connection is displayed using the command "show ssh". Notice that we did not enable SSHv2 on this router, so it defaulted to SSH version 1.99. Also note in the output of the "show ssh" command that SSH version 1 defaults to 3DES. SSHv2 supports AES, a more robust and efficient encryption technology. SSHv2 is also not subject to the same security exploits as SSHv1. soundtraining.net recommends the use of SSHv2 and disabling a dropback to SSHv1. Enabling SSHv2 disables SSHv1. This example is included only to demonstrate backwards compatibility:

router04#
router04#show ip ssh
SSH Enabled - version 1.99
Authentication timeout: 120 secs; Authentication retries: 3
router04#
router04#show ssh
Connection Version Encryption State Username
2 1.5 3DES Session started donc
%No SSHv2 server connections running.
router04#

You can also use the command "debug ip ssh" to troubleshoot SSH configurations.


Copyright (c) 2008 Don R. Crawley
Article Source: http://www.upublish.info
About the Author:Don R. Crawley
Don R. Crawley, Linux+ and CCNA-certified, is president and chief technologist at soundtraining.net, the Seattle training firm specializing in accelerated, task-oriented training for IT professionals. He works with IT pros to enhance their work, lives, and careers. For more information about learning opportunities with soundtraining.net, visit here.

Computer Support Services

With world of technology moving fast, computer users and companies depend on fast reliable tech support services. Every computer enthusiast might experience some computer problems; because the network system is fatal to encounter quite a few troubles during its entire life cycle. This creates a need for reliable IT resources.

These resources are said to have a full spectrum of IT solutions to cater your computer support requirements both at home and business. They have highly qualified technicians who provide professional, high-quality service at affordable rates in the comfort and convenience of your business or residential premises.

Although, you have to pay much money to computer tech support to get the answer you concerned, but it’s really worth your money. Most of these companies concentrate their efforts exclusively on home and small office computer users who require greater attention to detail and personalized service. Most of the times they maintain retail stores that allow them to keep costs low in order to provide competitive service prices.

There are number of companies that offer home computer repair services. These services include repairs, up-gradations, and installations for new system, virus removal, networking and more. Highly trained computer technicians perform all of these services. Many computer technicians will travel to your home or office to diagnosis, estimate and complete upgrades and repairs. In most cases, all work can be done in a single visit.

However, it can be an expensive choice as in home repair technicians charge on the basis of per hour. Whether you have got your system crashed or combating with pesky computer errors like blue screen of death or any other frustrating tech problems, these support resources will provide you with all the technical assistance that you need. Indeed, you can also avail professional advice in order to avoid future IT problems.

Troubleshooters at tech support resources answer all your telephone calls in order to analyze every IT problem that occurs in your computer. Even the most difficult and recurring difficulties are going to be handled and resolved in the easiest manner. The support workers also run the automatic diagnosis program to resolve all the technical issues that can occur in a particular system.

Apart from offering you with solutions for your PC blues, they will also maintain the proper functioning of the network. All the networks are going to be monitored in order to ensure their present and future availability when it comes to system users.

Data will be gathered in order to make out all the potential requirements coming from the customers and the information will be used for the network and system requirements to be assessed and interpreted. The technicians take up imitative to run the necessary network security measures in order to safeguard your computers. And, they don’t charge anything extra for it!

By availing services from these technical support resources, you can assure your computer’s protection and maintenance. The support technicians will also ensure the proper plan for every computer system, thus allowing all the IT components to work in an effective manner.
.
Article Source: http://www.upublish.info
About the Author:
Joseph John
Joseph John is a technical associated with numerous tech firms including iYogi. iYogi is synergistic ally aligned to offer tech support, remote computer support, computer repair, PC help services computer support, online technical support, computer tech support to its clients in US, UK, Canada and Australia by Microsoft certified technician

Of mp3 and Online games

There are two things in life that I am very passionate about: mp3s and online games. I absolutely begged for my father to buy me a brand new laptop and to subscribe to a fast internet connection so that I could have my fill of downloading and playing. “Pa, please I really need a brand new laptop!” “How can I do my research and homework and stuff?” This is the argument that would fill every dinner conversations. I always attack from this-is-for-my-school angle. I find that it is the most effective argument to use. (Take note of that guys! It may come in handy for you someday.) I had also added some puppy dog look to that to add some more convincing power. I knew that soon he’ll give in, but, of course, I did some extra chores around the house before that. If you saw some really shiny and spotless house back then, that was ours.

We finally bought this cool Lenovo laptop with fingerprint scanning, webcam, Dolby digital sound, wireless fidelity (wifi), Bluetooth, DVD combo writer and all the bells and whistles that would put the old Apollo spacecraft to shame. (Well, that is what the sales person told us. I really would not know for sure.) As long as that Laptop has speakers and can connect to the Internet, I really do not care if it contains the fastest Intel processor or the latest NVIDIA GeForce. (whatever those are) I remember that I pressured pa to drive faster on the way home so that I could finally use my new laptop. I got a long sermon from him about road safety and being a responsible driver because of that.

Ok now that I have told you the very boring story of how I got my laptop, let me tell you about my two passions. My family has always been music lovers. We have a huge collection of cds from different genre. Pa likes to listen to classical music. (you know, Mozart and stuff) Ma likes old songs especially The Carpenters, Bread and Abba. (I think these are 1970s groups.) Brother likes his noisy music while I like R and B and hiphop. To save money, I used to borrow my classmates’ cds, rip them and save them into mp3 format. I listen to them for hours and hours and hours.

But my main interests are online games. I have been a fan of those engrossing games at yahoo, but lately, I have been a Bratz games fanatic. Bratz games? Yes, you heard me right. Bratz games. Those games that are inspired by the hit dolls Bratz. Bratz games have over twenty games to choose from. They do not have as many as those found in yahoo but it does not mean that they are less interesting. I tried all the Bratz games in the site and everything there was very fun for me. The characters are so cute, I would have hug them if they were real toys.

Article Source: http://www.upublish.info
About the Author: Lea Smith
Lea Smith is a bratz dolls enthusiast and she loves to play various Bratz Games . She is also the webmaster of www.bratzgames.biz wherein you can find tons of great online flash games to play.

Free, Scan Your Computer Now For Zero Cost

How would you like to be able to scan your system and locate all the viruses, Trojans, Adware and Spyware that have accumulated over the years and not only just find them but remove them? Over the years every time you install new software a new registry entry is put into you registry. Then when you uninstall this software you would expect that it is also removed from the registry but this rarely happens. What does happen is you get all these bogus entries in your registry. Entries that point to software that is no longer on your system. This stuff needs to be removed otherwise your system will become very slow.

There are thousand of sites on the net that tell you they will scan your system for free but what they always fail to tell you is that if you want things fixed it is going to cost you some of your money. I get offers for free downloadable software that will scan my system but after the scan when you click on the button that says fix you are then taken to a website where you have to buy a product to fix these newly discovered problems.

Wouldn't it be great if you could scan your computer and find all the problems and have them all repaired without ever finding out how these problems occur? If you knew what caused Spyware, Adware, virus, trojans and malicious software that infects your computer then maybe in the future you could prevent this stuff from happening again. Every time you connect to the net their is a strong possibility that you will pick up one of these junk files. Every time somebody downloads music, movies, pictures, and programs there is a chance that your system will get infected. It is not the music, the movies, the pictures and other files that are the problem. The problem is the Spyware, Adware, viruses and trojans that get downloaded with this stuff.

One of my neighbors was having a difficult time connecting to the internet and after I looked at her computer this is what I found. Over 40 programs that weren't really needed started up every time she would restart her computer. These programs together was making it impossible to connect on the internet. Everybody needs a firewall on their system which cannot be turned off. I ended up having to execute Msconfig, selective startup and then disable all the garbage software that was loading every time she started up her computer. She could not believe how fast her system was able to reboot and connect to the internet. She also realized that she could now surf the Net so much faster than before.

I have done extensive research and now I am going to share with you what I have found. Most of the sites and software that tell you that you can scan your system for free will provide no tools for removal or for fixes unless you part with your hard earned money. All the marketers out there were telling me that I needed to have something that I can offer people to get them to sign up for a list on my landing page. I could have become an affiliate for one of the BS companies that offer to scan your system for free. But I hate it when I find out that some marketer is doing something of the sort.

Instead, I have found several great sites where you can scan for viruses and trojans and then get the removal tools completely at zero cost. I will also provide links to free software programs that will eliminate all Spyware and Adware. Last but not least I provide a great link to a company that makes registry software but this software does have a cost. However, they do offer a free 30 day trial to the full product.

All you need to do to get all of this is to just enter in your name and valid email address and when you click submit I will send you all of this completely free,
Article Source: http://www.upublish.info

Know the Essential Skills to Become an Ethical hacker

Computer security has become a major cause of worry for businesses and governments all over the world. Though internet has made e-commerce possible, helped in advertising products and services to millions of people, it has also led to the rise of criminal hacking. Due to this, a growing number of companies and governments are turning to ethical or white-hat hackers to get them out of the problem.

A certified ethical hacker tests the security of the systems, look for viruses and rectify the problems pertaining to the network security. But in order to become en efficient ethical hacker, you need to have competent skills along with the right attitude.

Programming skills
The knowledge of programming languages is a mandatory. You should learn the technique of C, C++, Python, Java, Perl and Lisp.

As a beginner, you can start by learning Python which is less complicated as compared to other languages but at the same time challenging enough. It is well-documented and well-designed. Afterwards, you can learn C, Lisp, Perl and java.
It is important to learn Perl as it is used extensively for web pages and system administration.

All these languages have different approach to programming, and by acquiring the knowledge of each one of these would make you much more efficient hacker. Each language has its own significance and at the end of the day you would benefit by learning each one of them.

UNIX
You can’t become a hacker unless you learn and understand UNIX. After all UNIX is the platform on which the Internet is built upon. Though there are other platforms, it is not possible to read the code or modify them. However with UNIX you can read how the operating system is written and modify it. Hence, learn to hack on open-source UNIX by getting a Linux or BDS-UNIX installed on your personal computer and practice on it daily for hours.

HTML
To become a hacker, you should know how the World Wide Web functions. And having knowledge of web is not just restricted to how to use the browser. You should make efforts to learn and write HTML.

Usage of English
In order to become an efficient ethical hacker, you need to have a good command over the English language, as it is the English language which dominates the Internet. All the books on hacking come in English language. Hence concentrate to improve on this part too.

Apart from all this, read lots of books on hacking. The more you read; the better. Buy books or enrol in some libraries and take them on rent. And don’t hesitate in experimenting. To become a white-hat hacker, you need to have the curiosity to learn about new things.

In fact, you can also take up hacking course. There are several reputed institutes which offer certified hacking courses with theoretical as well practical training. Getting proper training from prestigious institutes would benefit you a lot and help you in becoming a professional, certified ethical hacker.

Article Source: http://www.upublish.info
About the Author:Mandira kumar
Maria Kilani is working as a consultant in a reputed IT firm in India. She is also an amateur writer who has contributed several insightful articles on ethical hacking and how to become white hat hackers and the future of IT jobs in India, the USA, or the UK.

Configuring a Site-to-Site VPN Between Two Cisco Routers

A site-to-site virtual private network (VPN) allows you to maintain a secure "always-on" connection between two physically separate sites using an existing non-secure network such as the public Internet. Traffic between the two sites is transmitted over an encrypted tunnel to prevent snooping or other types of data attacks.

This configuration requires an IOS software image that supports cryptography. The one used in the examples is c870-advipservicesk9-mz.124-15.T6.bin.

There are several protocols used in creating the VPN including protocols used for a key exchange between the peers, those used to encrypt the tunnel, and hashing technologies which produce message digests.

VPN Protocols

IPSec: Internet Protocol Security (IPSec) is a suite of protocols that are used to secure IP communications. IPSec involves both key exchanges and tunnel encryption. You can think of IPSec as a framework for implementing security. When creating an IPSec VPN, you can choose from a variety of security technologies to implement the tunnel.

ISAKMP (IKE): Internet Security Association and Key Management Protocol (ISAKMP) provides a means for authenticating the peers in a secure communication. It typically uses Internet Key Exchange (IKE), but other technologies can also be used. Public keys or a pre-shared key are used to authenticate the parties to the communication.

MD5: Message-Digest algorithm 5 (MD5) is an often used, but partially insecure cryptographic hash function with a 128-bit hash value. A cryptographic hash function is a way of taking an arbitrary block of data and returning a fixed-size bit string, the hash value based on the original block of data. The hashing process is designed so that a change to the data will also change the hash value. The hash value is also called the message digest.

SHA: Secure Hash Algorithm (SHA) is a set of cryptographic hash functions designed by the National Security Agency (NSA). The three SHA algorithms are structured differently and are distinguished as SHA-0,SHA-1, and SHA-2. SHA-1 is a commonly used hashing algorithm with a standard key length of 160 bits.

ESP: Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite that provides origin authenticity, integrity, and confidentiality protection of packets. ESP also supports encryption-only and authentication-only configurations, but using encryption without authentication is strongly discouraged because it is insecure. Unlike the other IPsec protocol, Authentication Header (AH), ESP does not protect the IP packet header. This difference makes ESP preferred for use in a Network Address Translation configuration. ESP operates directly on top of IP, using IP protocol number 50.

DES: The Data Encryption Standard (DES) provides 56-bit encryption. It is no longer considered a secure protocol because its short key-length makes it vulnerable to brute-force attacks.

3DES: Three DES was designed to overcome the limitations and weaknesses of DES by using three different 56-bit keys in a encrypting, decrypting, and re-encrypting operation. 3DES keys are 168 bits in length. When using 3DES, the data is first encrypted with one 56-bit key, then decrypted with a different 56-bit key, the output of which is then re-encrypted with a third 56-bit key.

AES: The Advanced Encryption Standard (AES) was designed as a replacement for DES and 3DES. It is available in varying key lengths and is generally considered to be about six times faster than 3DES.

HMAC: The Hashing Message Authentication Code (HMAC) is a type of message authentication code (MAC). HMAC is calculated using a specific algorithm involving a cryptographic hash function in combination with a secret key.

Configuring a Site-to-Site VPN

The process of configuring a site-to-site VPN involves several steps:

Phase One configuration involves configuring the key exchange. This process uses ISAKMP to identify the hashing algorithm and authentication method. It is also one of two places where you must identify the peer at the opposite end of the tunnel. In this example, we chose SHA as the hashing algorithm due to its more robust nature, including its 160-bit key. The key "vpnkey" must be identical on both ends of the tunnel. The address "192.168.16.105" is the outside interface of the router at the opposite end of the tunnel.

Sample phase one configuration:
tukwila(config)#crypto isakmp policy 10
tukwila(config-isakmp)#hash sha
tukwila(config-isakmp)#authentication pre-share
tukwila(config-isakmp)#crypto isakmp key vpnkey address 192.168.16.105

Phase Two configuration involves configuring the encrypted tunnel. In Phase Two configuration, you create and name a transform set which identifies the encrypting protocols used to create the secure tunnel. You must also create a crypto map in which you identify the peer at the opposite end of the tunnel, specify the transform-set to be used, and specify which access control list will identify permitted traffic flows. In this example, we chose AES due to its heightened security and enhanced performance. The statement "set peer 192.168.16.25" identifies the outside interface of the router at the opposite end of the tunnel. The statement "set transform-set vpnset" tells the router to use the parameters specified in the transform-set vpnset in this tunnel. The "match address 100" statement is used to associate the tunnel with access-list 100 which will be defined later.

Sample phase two configuration:
tukwila(config)#crypto ipsec transform-set vpnset esp-aes esp-sha-hmac
tukwila(cfg-crypto-trans)#exit
tukwila(config)#crypto map vpnset 10 ipsec-isakmp
% NOTE: This new crypto map will remain disabled until a peer
and a valid access list have been configured.
tukwila(config-crypto-map)#set peer 192.168.16.105
tukwila(config-crypto-map)#set transform-set vpnset
tukwila(config-crypto-map)#match address 100

The crypto map must be applied to your outside interface (in this example, interface FastEthernet 4):

tukwila(config)#int f4
tukwila(config-if)#crypto map vpnset

You must create an access control list to explicitly allow traffic from the router's inside LAN across the tunnel to the other router's inside LAN (in this example, the router tukwila's inside LAN network address is 10.10.10.0/24 and the other router's inside LAN network address is 10.20.0.0/24):

tukwila(config)#access-list 100 permit ip 10.10.10.0 0.0.0.255 10.20.0.0 0.0.0.255

(For more information about the syntax of access-control lists, see my other articles on creating and managing Cisco router access-control lists.)

You must also create a default gateway (also known as the "gateway of last resort"). In this example, the default gateway is at 192.168.16.1:

tukwila(config)#ip route 0.0.0.0 0.0.0.0 192.168.16.1

Verifying VPN Connections

The following two commands can be used to verify VPN connections:

Router#show crypto ipsec sa
This command displays the settings used by the current Security Associations (SAs).

Router#show crypto isakmp sa
This command displays current IKE Security Associations.

Troubleshooting VPN Connections

After confirming physical connectivity, audit both ends of the VPN connection to ensure they mirror each other.

Use debugging to analyze VPN connection difficulties:

Router#debug crypto isakmp
This command allows you to observe Phase 1 ISAKMP negotiations.

Router#debug crypto ipsec
This command allows you to observe Phase 2 IPSec negotiations.


Copyright (c) 2008 Don R. Crawley
Article Source: http://www.upublish.info
About the Author: Don R. Crawley
Don R. Crawley, Linux+ and CCNA-certified, is president and chief technologist at soundtraining.net, the Seattle training firm specializing in accelerated, task-oriented training for IT professionals. He works with IT pros to enhance their work, lives, and careers. For more information about learning opportunities with soundtraining.net, visit here.