Portable MP3 Players have taken the world by storm primarily owing to its compact size, solid-state technology and large memory capacity. MP3 Players enjoy distinct advantages compared to portable music players chiefly because there is no room for MP3 players missing whether the user is taking a bumpy car ride, having a jog or cycling on an uneven road or path. All your favourite MP3 songs or other audible forms of media can be normally stored in Flash Memory systems that is either built-in on the Sony Memory Stick, Compact Flash cards or SmartMedia - the same type of cards & sticks we use for digital cameras and that can also be operated with the portable MP3 players in the same manner.
The process of preparing MP3 files has become quite simple these days. First, MP3 files are prepared on a PC by either downloading songs form the Internet, compressing music from a CD format or producing its original source on MP3 software. You can then download the files through the computer's USB port or parallel port straight away into the MP3 Player or reader or removable drive that accepts the card/stick of choice. Most portable players nowadays are packed with software programs to facilitate the process of downloading.
Compared to CD Players, Portable MP3 Players have solid state memory that determines the amount of data they can store. You can make use of the compression format for compressing a 32MB stored on a CD to 1.6MB that can be stored on a MP3 Player. Therefore, even a low-cost portable MP3 can hold roughly about 4 hours of quality music.
If you are going to use the portable MP3 Player in moving vehicles or carry it around while you are jogging, cycling or walking - a model that has a microdrive is a welcome option. Microdrives like hardrives are used in PCs but they are much smaller.
Similar to a regular hard drive there is a chance of occurrence of a skip in case the MP3 player is jostled. But compared to flash drive, MIicrodrives have the advantages of both storage capacity and is much economical. Like a Flash drive, Microdrives can carry anywhere from 10 to 15 times media clearly making the portable MP3 Player a musical powerhouse.
MP3 Players are now availlable from 1GB to 160GB. You can read reviews on 2GB MP3 Players, 4gb and 8gb Players to choose the best audio player from Sony, Archos, Sandisk, iRiver and all latest models available in the market.
Most mobile phones are equipped with Bluetooth technology. Did you know that a Mac also has Bluetooth? This article will show you how easy it is to pair your phone with your Mac.
On the Mac at the top of your screen you will see a Bluetooth icon. Click the icon and select "Turn Bluetooth On". Then make sure the "Discoverable" is checked.
On your phone make sure it's Bluetooth is on and also in "Discoverable" mode. On the phone select the option to set up a new Bluetooth device. It should find your Mac and give you a code to pair the two. A pop up window on your Mac will ask you to enter the pass-code you set up on the phone.
Once the Mac and phone are paired click the Bluetooth icon at the top of the Mac's screen. Now select "Browse Device". It will pull up a screen where you can select the phone. Once that is selected you can browse the phone's photos and other files depending on what your phone allows.
I use it mainly to transfer photos from my phone to the Mac. This can be achieved by dragging them to the desktop. You can also on some phones send and receive contacts to and from Apple's address book.
After you have finished turn the Bluetooth off on the Mac and Phone. The next time you wish to pair your Mac should already be saved in the phone.
Bluetooth technology on the Mac also makes it possible to use Apple's wireless keyboard and mouse. It is a great feature to have and is another feature found on most Mac computers. Some PC computers are starting to utilize this as well.
Enjoy geek videos, shopping, news, and helpful information.Visit http://jmdcomputer.blogspot.com
Welcome back! I'm glad to see you are not interested in "just" being secure, but you want to be very secure. There are pros and cons to this. You know the pros. Security! , but first of course is my:
DISCLAIMER: While every reasonable precaution has been taken in the preparation of this document, the author is not responsible for errors or omissions, or for damages resulting from the use of the information contained herein.
The information contained in this document is believed to be accurate. However, no guarantee is provided. Use this information at your own risk.
OK. Here are the cons:
No DHCP (Dynamic Host Configuration Protocal) Server. You will need to set your IP addresses manually on all the wireless and wired clients you want to hook to your network.
No viewable SSID. You will have to remember the name of your wireless network, then manually join wireless clients to your network.
No standard IP address for your router. You will have to remember what you set that to. (This is easy as you can always check the IP address of a computer connected to your network.)
MAC (Media Access Control) will be used. This is like a computers finger print. You will have to remember to allow this computer into your network. Unless they are explicitly allowed to join the network they will not be able to unless this step is complete, even though they know the SSID and Shared Key.
Note: on't make these changes with a wireless client. You will not be connected for very long if you do. Use the computer that is hard wired to the router. PRINT this document or save a copy of it local on your computer. There will be places where you will not be able to get to the Internet to read this until some changes are made. You need this document to make those changes. This documentation has been done with Windows XP. If you have Windows Vista the documentation will not match exactly. The settings are the same, but getting to the place the settings are made will be a little different. Read through this document before making any changes.
Please be aware that these are no rock solid guarantees to keep people out of your network. These following steps are simply deterrents, and can be gotten around if the intruder wants in bad enough. If you have gotten to this point I need to make something perfectly clear. The encryption you are using is your number one defense. Don't do these steps if you have set a key like "mynetwork", or used WEP for your security. Use the strongest security available (WPA-AES) and have at least a 20 character key with numbers and upper/lower case characters. There should be no words in there that can be found in the dictionary. That being said let's get on with the deterrents.
Go into the local LAN settings and change the IP address of your router. If the default IP address of your router is 192.168.1.1 change it to something like 192.168.112.86. You can use 10.x.x.x or 172.16.x.x. Replace the "x" with any number under 255. Remember the number you used as it will become the default gateway and the DNS server for your network and you will have to set it in the client since we are going to disable DHCP. Make the changes and apply them. This makes guessing your IP range harder for the intruder. Leaving it set to the default just makes it easier to get into your network.
The computer hard wired to your network should still be able to connect to the network since it is using DHCP to get an IP address. You will have to change the address in your browser to the new IP address to get back into the router settings. That will change with this next step. You will have to hard code the IP address in the client to be able to get back on the network.
Go into the web interface and to the LAN settings. Find the DHPC server and disable it, or uncheck enabled. Save the settings. At this point you will not be able to get into your network. You have just told your router not to give any computer an IP address. If they want in they need to know an IP address that fits the network. To get back into your network we need to do this.
Right click on My Network Places and choose Properties.
Right click on the Local Area Connection that matches your Ethernet adapter. If you have a wireless adapter you will see two. Choose the LAN connection, or the one that is hard wired to your network. Choose properties.
In the box labeled This connection uses the following items:
scroll down to Internet Protocol (TCP/IP).Click on it then click on the Properties button.
Click the Use the following IP address and Use the following DNS server addresses radio buttons. The boxes will become white and you can enter data into them. Enter the following data: This is what you would enter if your routers IP address is 192.168.89.1
IP address: 192.168.89.2
Subnet mask: 255.255.255.0
Default gateway: 192.168.89.1
Preferred DNS server: 192.168.89.1
Click the OK button and you should be able to get back in to your network from a hard wired computer. If you have a wireless adapter you will have to follow these steps in your wireless clients to allow them back into the network.
Note: ***You cannot have any clients with the same IP address***. Increment the last number by 1. Example, the wireless client would have an IP address of 192.168.89.3. The Subnet mask, default gateway, and DNS server address will not change. Keep then the same on all clients.
Your wireless client should not be able to access the network. Let's make a few more changes before we join it to the network.
Next we are going to enable MAC filtering. This will only affect wireless clients. What you are doing is telling the router that only the specified MAC addresses are allowed in the network, even if they know the encryption and key. To do this go to Wireless Settings and find a box labeled Enforce MAC Filtering, or something similar to it. Check it an apply it. When the router reboots you should see the MAC address of your wireless client in the list. You can find the MAC address of your client by opening a DOS box like we did earlier and enter "ipconfig /all" without the quotes. You will see the information about your wireless adapter.
If you want to allow other wireless clients into your network you will have to edit the list and allow them. MAC addresses can be spoofed, but this is another layer of security that you can implement.
So far we have changed the IP address of your router, disabled DHCP and set MAC filtering. I will take it for granted you had, or have changed, your encryption to be as strong as possible. The last thing we will do is not broadcast your SSID. What this means is where you look for Available Wireless Networks you will not see yours.
To disable the broadcasting of your SSID from the web interface for you router go to Wireless Security and uncheck Broadcast SSID and apply it. Your router will reboot.
Now, on to the wireless clients. You will have to assign your wireless client a static IP address. Do the exact same steps as above to do this, but choose the wireless adapter. Once you have a valid IP address you should be on the network. Your wireless client already knows of the SSID and the settings. If you View Available Wireless Networks your SSID will be there.
If you bring in another wireless client it will know nothing about your network. You will have to do the following to get it into your network.
Set your IP address, Default gateway, etc... on the new wireless clint
From the Available Wireless Networks dialog choose Set up a wireless network for home or small office.
Select Create a new connection.
The Welcome to the Wireless Network Connection Setup Wizard will start. Click Next.
Enter your Network name (SSID): "your network name"
Select Manually assign a network key
Check Use WPA encryption instead of WEP (WPA is stonger than WEP but not all devices are compatible with WPA).Click Next
Enter your key twice. Click Next
Choose Setup a network manually
Click Finish
You should now be connected to the wireless network.
This concludes PART3 if you would like to get things even stronger please review the final chapter PART4
A direct link to this article, complete with images can be found at TechAlternatives
DISCLAIMER: While every reasonable precaution has been taken in the preparation of this document, the author is not responsible for errors or omissions, or for damages resulting from the use of the information contained herein.
The information contained in this document is believed to be accurate. However, no guarantee is provided. Use this information at your own risk.
Welcome back to the final steps. These steps have nothing to do with wireless security. What they have to do with is protecting private date in your network should your wireless network be compromised. If you have followed parts two and three your wireless network is as secure as it can be. What if someone does get in? What I want to discuss now is what you can do to protect yourself should that happen. This is just an overview and not a step-by-step. This is food for thought. If you would like help doing this please come to my site and ask in the forum. I would be more than happy to go into detail on this.
Once an intruder is in your network they have access to all the resources in your network. I highly doubt you have a domain, but a workgroup network. This means the security has to be done on each individual workstation for them to be able to transfer data to each other. I don't know for a fact, buy I suspect this is why Microsoft made the security so wide open in Windows. If you had to set everything manually out of the box it would be extremely hard to get the computer to communicate with each other.
By setting default workgroup names, no passwords on administrative accounts and wide open shares people can network their computers together with ease. There is a big problem with this. Once someone is in your network they can get to your stuff with the default settings, There are two default settings to be concerned with the most. The default workgroup name, which has been the same for years, has been either "workgroup" or "MSHOME".
The default administrative password has been blank. With these two settings not changed, the intruder has absolute power over your network. They can steal data, lock you out of your network so you cannot get to your data, install whatever they want and do any damage imaginable. Here is a scenario of an intruder getting into the network and just how easy it is. I have done this with clients to show them and they take a whole new look on security after it has been showed to them.
The intruder cracks the security of your wireless network. He now has an IP address in your network. DNS does not matter at this point for the damage can be done with the IP address alone. He runs a ping sweep on your network. This is simply a script that pings every address in your IP address range and any computer that is on the network will respond. Once he gets a response from the computer(s) he knows which computer to attack. He sets the workgroup name on his computer to workgroup and reboots. He will then go to the IP address he found and try to access the default administrative share.
Here is what that would look like \\192.168.89.2\C$. He could not make a connection so he sets the workgroup name to MSHOME and tries again. He takes for granted the default password has not been changed so he leaves his password blank. This matches the administrator account on both computers. This time he has access to your C:\ drive. The $ symbol is just a share that is hidden and the default administrative share is on the root of C and shared as C$. He is in and has control. How can you prevent this?
Set a strong password on the administrator account and don't use it unless you need to make administrative changes. See PART1 for a tool to check the strength of passwords. Create an everyday user account with user privileges and set a password on that. You will have to create the same account with the same password on all the computers you want to share data with. The administrator account does not have to match, but they will not be able to administer the other computers. Next, change the workgroup name. Change it to anything, but not something easy like you last name.
This is the final steps you can take to secure your data. You can go as far as data encryption, but there is a lot of overhead in it and not as easy as it sounds. You do stand a chance of loosing date if something goes wrong.
Thank you for taking the time to read these articles and if you have any questions or comments please go to TechAlternatives and let me know.
To Discover Your Choices go to TechAlternatives Article Source: http://EzineArticles.com/?expert=Keith_Hagans
When people bring me their computers for repair, there is one problem that motivates them to bring it to my shop more than any other. It is the computer is running slow. Maybe the computer has other problems, but the running slowly part bothers them the most.
There are a few things that can happen to a computer to slow it down and I will talk about these things in this article. However, there is one problem that often goes overlooked when discussing things that need to be done to get a computer's speed back. We will not overlook this problem.
Spyware/Virus And Registry Cleaners
It is well documented what spyware and viruses can do to a computer's operation. It can slow it down and in extreme cases it can cause the computer to be unable to start up. Even worse, spyware can steal a person's identity! For these reason, most people have spyware/virus cleaners installed on their computers.
Another problem most people are aware of is registry corruption. Registry corruption is actually more of a problem with Windows XP and Vista than it was with older operating systems. The newer operating systems have a much larger hierarchy. This allows a little corruption to disrupt many more operations than it could on Windows 98, for instance.
In any event, registry corruption can make a PC unstable and cause it to become very slow. Only keeping the registry clean will prevent a computer from falling into a registry corruption malaise and using a good registry cleaner periodically is the only way to prevent this from happening.
What Else Could Go Wrong?
Still, there are times when I run into computers that have slowed down but aren't infested with any type of virus/spyware or registry corruption. This of course, means there is some other problem slowing down the computer and many times finding the cause of the slowdown is a formidable task!
A large percentage of the time, the problem I find in a case like this, will involve an outdated or unstable driver. Coming to this conclusion is one part of the job of repairing a computer with this type of problem. Finding a replacement for the questionable driver and then installing it is yet another task that needs to be completed.
The New Tool In Town
However, because of a very recent innovation, finding if a computer has a bad or outdated driver is not a difficult undertaking anymore! Now, there is an excellent new tool called a driver scanner that does 100% of the work for us! All we do is start it up and the driver scanner will find any bad or outdated driver we have and it will then upgrade it automatically for us.
The way I see it, driver scanners are worth their weight in gold because they easily do a job that was once very difficult and time consuming. Due to the expense of dealing with them, the fact there could have been outdated drivers in a PC used to be ignored unless these bad drivers were causing major harm.
So, it was common for a computer operator to have to put up with a few irregularities in his or her computer's performance indefinitely. Now that a good driver scanner can take care of the matter, we don't have to accept these irregularities anymore!
You've learned a lot in this article about getting a computer to run fast again. Now find out how to get free spyware/virus scans, free registry scans and even a free driver scan. All you have to do is visit this free site: Repair Slow Computer. Also, find how all the top registry cleaners rate against one another in the most up to date registry cleaner comparison chart on the net: Registry Cleaner Reviews.
The need for multiple data at same time makes it necessary that data need to be duplicated and multiple copies of the same data are circulated to meet the diversified needs. And if the quantity of data is large, then you need to have something that can store volumes of data and transfer it to the destination. Microboards Blu Ray duplicators are categorized amongst the prominent SATA driven DVD duplicators making the buzz in the market today. The duplicators are available in variety of capacities and have the efficiency to duplicate from few DVDs to thousands of DVD copies in just few minutes, from the master DVD. Microboards Blu Ray duplicators have high performance, and they record the media seamlessly with no loss in bits, and the data quality also remains intact.
There are models available in Blu Ray duplicators that feature world's most advanced functions in the form of DHP technology'. The technology creates equal space partition on the hard drive as that of master disc, and in this manner ensures maximum of HDD space. There is also integrated in the duplicators 'Master Error Proof technology' which allows the user to replace corrupted master disc and you will not be wasting your blank DVD. Another popular DVD duplicator is Tower DVD Duplicators manufactured by Blu Ray, LG etc. and which are widely used for commercial purposes. The DVD duplicators are ideally designed as tower systems that work well to duplicate most DVD formats including DVD+R, DVD-R and DVD+R Dual Layer. Tower DVD duplicators come in package of 3, 4, 5, 6 and 10 DVD layers and gives the user plenty of opportunity to mass duplicate the DVDs. The best part is that differentiates Tower DVD duplicators from a Standalone DVD duplicator is that you don't need a computer system to duplicate the DVD. And this also accounts for the reason why there is no need for the USB 2.0 device. Whether it is a Microboards Standalone DVD duplicator or a tower system, you are always assured against duplication session failure. There is high reliability and super duper speed to allow duplication of DVDs. The best part is that there will be no potential damage to DVDs.
Microboards is a symbol of trust and security. The duplicators manufactured by them are adaptable to work with or without computer, and across the platforms. Try one for your requirements and see the difference!
Caitlina Fuller is a freelance writer. Microboards Blu Ray duplicators are categorized amongst the prominent SATA driven DVD duplicators making the buzz in the market today. Another popular DVD duplicator is Tower DVD Duplicators manufactured by Blu Ray, LG etc. and which are widely used for commercial purposes.
A leading manufacturer of hard disk drives for enterprise, desktop, mobile computing and consumer electronics applications uses blocks of intellectual property (IP) in its next-generation disk controller application specific integrated circuits (ASICs). Some of these IP blocks are used in several different products, making it an imperative that designs be exhaustively verified under all possible operating conditions prior to release.
In the past, the manufacturers' ASIC designers relied on digital simulation as their primary means of verifying IP blocks. They also employed automatic constrained pseudo-random testbench generation to construct thousands of different combinations of commands and data packets. Early in the design of a new compute-intensive IP block, the design architects calculated that it would take approximately 500 CPU-years to simulate all the test cases necessary to test this particular design. With a six month design schedule, it was clear that simulation alone would not be adequate. That's when the designers decided to evaluate several hardware-assisted verification platforms. This proved to be the ideal solution for delivering a quality product within the tight design schedule. In this case, the hard disk drive manufacturer selected EVE's ZeBu-ZV platform.
The IP design presented unique verification challenges. The block had a 32-bit interface, over which commands and data were loaded into the block using a packet-based protocol. Once set up, it then processed the data for about four seconds of real time, after which it presented the results over the same 32-bit interface. At an operating speed of 150 MHz, four seconds represented 600,000,000 cycles. The design team needed to run several hundred thousand of these test cases to fully verify the design.
On this project, a digital simulator/testbench generator combination was used for initial verification runs to prove basic functionality, using about 50 tests per command. Once this verification methodology was generally functional, the designers switched to the combination of the hardware-assisted verification platform and testbench generator, which enabled them to run thousands of tests for each command.
To maximize performance, synthesizable transactors were used as the interface between the testbench code on the PC and the emulated IP block in the verification platform. Transactors performed the conversion from high-level commands and data packets to bit-level signals using the hardware-assisted verification platform. The SCE-MI standard from Accellera defined how the transactors were written. They consist of an application program interface (API) on the software side to exchange high-level packets or messages, and a synthesizable bus-functional model (BFM) or state machine mapped onto the hardware platform.
To further accelerate simulation, the design team took advantage of a property of this particular IP block: The only interaction between the testbench and the IP block occurred during the initial setup of the test and the downloading of results at the end of the run. In between these two interactions, the design executed a large number of cycles with no external communication. The designers exploited this by making the verification platform run in lock-step mode with the testbench generator only during these interactions, and switching to a 15MHz clock supplied by the verification platform in between these accesses. To implement this solution, they changed the main clock of the design to switch between two inputs: the clock coming from testbench generation and a clock generated by the verification platform's on-board clock generator.
Using this hybrid approach, the testbench generator produced each new command and data combination, and then transferred the packet through a C function-call to the verification platform transactors. The testbench generator then switched the verification tool to the fast clock and initiated the test. It was able to run the tests at 15 MHz, equivalent to 1/10 of real time. In 40 seconds, the test would finish and it would signal the testbench generator that it was ready to present the result.
Meanwhile, the testbench generator was computing the expected results in software, using the same algorithms implemented in the IP block. Once the hardware-assisted verification platform and the testbench generator completed their respective runs, they would compare their results and flag any differences that occurred as errors.
The design team was surprised that with the first exposure to the system it took them only two hours to get their IP block compiled into the verification platform and running correctly. With a few more weeks of effort, the team had implemented and debugged the transactor interface and had the system running at 15 MHz.
In the first few days, the designers identified 25-30 new bugs in the design, which had escaped detection using simulation without hardware-assistance. In the five weeks to follow, they ran the hardware-assisted verification platform 24 hours per day, 7 days per week, generating hundreds of thousands of additional test cases. Through these runs, they found four additional bugs that were obscure corner cases related to specific sequences of commands. These bugs would have surfaced during product testing, but would have necessitated ASIC respins at a cost of $500,000 or more.
The designers of this hard disk drive manufacturer plans to continue running additional test cases on their hardware-assisted verification platform 24x7 until the resource is needed for another project. Since it takes only one hour per week to kick off new jobs and check the results of the previous runs, there is little reason not to run the additional tests for added confidence. Their hardware-assisted verification platform has become the keystone of their design strategy.
WAN boot is a "new" method for installing a machine running the Solaris Operating System from a Solaris JumpStart server over the network. WAN boot has a lot of enhancements compared to the "old" installation method via bootp and should be used for network installations if possible. (Note: WAN boot is only supported on machines with SPARC CPUs. You cannot use WAN boot on machines running the Solaris OS for x86 platforms.)
This article describes how to use WAN boot on machines that do not have WAN boot support in the OBP and cannot use a CD-ROM for WAN boot.
This method requires:
Access to the console of the machine
The Solaris OS running on the machine
Details
The only file that is necessary for WAN boot is /platform/`uname -i`/wanboot. Therefore, to get WAN boot from the disk to work, it is sufficient to copy the current version of the WAN boot binary from (for example) the Solaris Installation CD-ROM to the directory /platform/`uname -i` on one of the slices of any local hard disk of the machine.
The Steps
1. Configure the machine to install as a WAN boot client on your installation server.
2. Select one of the existing slices on one of the internal hard disks of the machine to install for the WAN boot binary. For example, this can be the existing boot slice or any other slice on the disk. You can also put the WAN boot binary on the disk on which you want to install the Solaris OS, because the disk is only used to read the WAN boot binary. After the WAN boot binary is read and executed, the disk is not used anymore for the boot process.
3. Make the selected slice bootable using installboot if the slice is not already bootable; that is:
If in doubt, issue the installboot command. (It won't hurt if the slice is already bootable.)
4. Halt the machine and issue the following boot command at the ok prompt:
ok> boot mydisk -o prompt -F wanboot - install
Here mydisk is the disk device (either a device alias or the real device name). If you use a slice other than the default slice for the WAN boot binary, the command should look like this:
ok> boot disk1:b -o prompt -F wanboot - install
Here disk1 is the device alias and the letter after the colon specifies the slice to boot from: a is slice 0, b is slice 1, c is slice 2, and so on.
5. After a short time, the normal WAN boot prompt should be printed and you can enter the necessary information for the WAN boot process and continue the WAN boot installation the normal way.
Example 1
Example 1 shows the machine output from step 4 in the preceding description. Note: Some output has been replaced with "x" characters.
{0} ok boot disk1 -o prompt -F wanboot - install Resetting ... RSC Alert: Host System has Reset Probing system devices Probing system devices
Sun Fire 280R (2 X UltraSPARC-III) , No Keyboard Copyright 1998-2004 Sun Microsystems, Inc. All rights reserved. OpenBoot 4.16.4, 4096 MB memory installed, Serial #xxxxxxxx. Ethernet address x:x:x:x:x:x, Host ID: xxxxxxxx.
Here is sample output from a session installing a machine via WAN boot from a disk. In this example, we use the swap slice as the temporary boot slice for the WAN boot process. Note: Some output has been replaced with "x" characters and edited for security reasons.
bash-3.00# uname -a SunOS mysun 5.10 Generic_118833-17 sun4u sparc SUNW,Sun-Fire-280R
bash-3.00# swap -d /dev/dsk/c2t0d0s1 /dev/dsk/c2t0d0s1 was dump device -- invoking dumpadm(1M) -d swap to select new dump device dumpadm: no swap devices are available
bash-3.00# swap -l No swap devices configured
### remove the swap entry from the /etc/vfstab because otherwise newfs will fail
bash-3.00# reboot -- "disk:b -o prompt -F wanboot - install " Jul 28 07:09:42 mysun reboot: rebooted by root Jul 28 07:09:43 mysun syslogd: going down on signal 15 syncing file systems... done rebooting... Resetting ... RSC Alert: Host System has Reset Probing system devices Probing system devices
Sun Fire 280R (2 X UltraSPARC-III) , No Keyboard Copyright 1998-2004 Sun Microsystems, Inc. All rights reserved. OpenBoot 4.16.4, 4096 MB memory installed, Serial #xxxxxxxx. Ethernet address x:x:xx:x:xx:xx, Host ID: xxxxxxxx.
wanboot progress: wanbootfs: Read 128 of 128 kB (100%) wanboot info: wanbootfs: Download complete Fri Jul 28 06:12:38 wanboot progress: miniroot: Read 248881 of 248881 kB (100%) Fri Jul 28 06:12:38 wanboot info: miniroot: Download complete SunOS Release 5.10 Version Generic_118833-17 64-bit Copyright 1983-2005 Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Configuring devices. Network interface was configured manually. 192.168.5.14 SUNW,qfe0: 100 Mbps half duplex link up - internal transceiver SUNW,qfe1: 100 Mbps half duplex link up - internal transceiver SUNW,qfe2: 100 Mbps half duplex link up - internal transceiver SUNW,qfe3: 100 Mbps half duplex link up - internal transceiver Beginning system identification... syslogd: line 24: WARNING: loghost could not be resolved Searching for configuration file(s)... Jul 27 22:46:41 mysun.test.dom eri: SUNW,eri0 : 100 Mbps half duplex link up Using sysid configuration file http://192.168.20.48/profiles/mysun.test.dom/sysidcfg Search complete. Discovering additional network configuration... Completing system identification... Starting remote procedure call (RPC) services: done. System identification complete. Starting Solaris installation program... Searching for JumpStart directory... Using rules.ok from http://192.168.20.48/profiles/mysun.test.dom. Checking rules.ok file... Using begin script: begin_script.sh Using profile: profile Using finish script: finish_script.sh Executing JumpStart preinstall phase... Executing begin script "begin_script.sh"... Copying the missing files from the profile ... Begin script begin_script.sh execution completed. Searching for SolStart directory... Checking rules.ok file... Using begin script: install_begin Using finish script: patch_finish Executing SolStart preinstall phase... Executing begin script "install_begin"... Begin script install_begin execution completed.
The begin script log 'begin.log' is located in /var/sadm/system/logs after reboot.
The finish script log 'finish.log' is located in /var/sadm/system/logs after reboot.
.....
Jul 28 07:52:45 mysun.test.dom reboot: rebooted by root syncing file systems... done rebooting... Resetting ... RSC Alert: Host System has Reset Probing system devices Probing system devices
Sun Fire 280R (2 X UltraSPARC-III) , No Keyboard Copyright 1998-2004 Sun Microsystems, Inc. All rights reserved. OpenBoot 4.16.4, 4096 MB memory installed, Serial #xxxxxxxx. Ethernet address x:x:xx:x:xx:xx, Host ID: xxxxxxxx.
Rebooting with command: boot Boot device: /pci@8,600000/SUNW,qlc@4/fp@0,0/disk@w2100000c50ac4839,0:a File and args: SunOS Release 5.10 Version Generic_118833-17 64-bit Copyright 1983-2005 Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Hostname: mysun Configuring devices. Loading smf(5) service descriptions: 93/93
mysun console login:
If you have questions on this How-To, please contact Bernd Schemmer.
The advancements in technology have made possible the proliferation of crimes that used to be depicted in the movies only and which were very far from reality. However, there are existing crimes that are now spreading like wildfire because of the lack of security in using the Internet, One such crime closely related to Internet use but which can also be committed in other ways is identity theft. Identity theft basically operates the same that the ordinary crime of theft does. The difference is that in identity theft, what is stolen is the identity of a person.
Identity is considered a crime because it is the act of assuming or using the identity of another person without his consent. Identity theft usually causes injury to the person whose identity has been stolen. It is usually committed for financial gain, blackmail or even espionage.
This crime has grown so widespread that the United States Congress has enacted the Identity Theft Penalty Enhancement Act to punish those found suing another person' identity without his consent. The criminal gets an additional two years in jail if he uses the stolen identity to perpetuate another crime. Another five years is added to the jail term if the crime is used to promote terrorism.
So how is identity theft done? Identity thieves are one of the most creative people in this planet and they will do anything to get information about the people whose identity they are planning to steal. This includes rummaging through the target victim's garbage to sift important information about the person's identity which they can use in perpetuating the crime.
Some identity thieves use computers and sophisticated programs like spyware to get financial information about their target victims. Hacking another person's computer is a method often used by identity thieves to commit the crime.
The proliferation of Identity theft can be blamed on the ease with which financial transactions can now be made. Credit card companies readily approve applications without even physically dealing with the applicants. These companies approve the applications based on documents that the applicants send by snail mail or online and the companies send the approved cards by mail. Revealing financial information through the telephone can also be a magnet for identity thieves. These criminals have access to high technology gadgets and they can eavesdrop on telephone conversations. Sending information through the Bluetooth technology can also be easily intercepted by identity thieves.
Everyone is in danger and any person's identity can be stolen. Thus, a person should be careful in revealing financial information especially if such information is being asked for no reason at all. To avoid being victimized by identity thieves, a person should consider the following safety measures:
1. Always be careful in sending and receiving financial information through snail mail because mails can easily be intercepted by thieves.
2. Never throw important financial and other information in the garbage without shredding them first. Identity thieves can masquerade as garbage collectors and sift through a mountain of financial information about the prospective victim.
3. Never reveal financial information over the phone. Anybody can call someone on the telephone and pretend to be a bank officer. When such information has to be given to any office, it is better to visit the office and personally hand in the information to the right person.
4. Always inspect bank transactions and look for any irregular payments or withdrawals.
5. In the same manner, always check credit card bills and cross check with purchases and other credits to make sure that the charges are correct and not made by another person.
When it comes to identity theft, no one is really safe and the best thing to do is to be careful and wary of revealing any financial information. It is best to incur a little delay by verifying the identities of people asking for financial information rather than to suffer financial distress later on.
Remember that identity thieves are very creative and they can get any information they want. They can even be getting a person's financial information this very moment while the target is using his computer. With all the convenience of technology, any person can be a victim of identity theft.
Lee Dobbins writes for http://identitytheft.pagechic.com where you can learn more about how to protect yourself from identity theft.
I am sure that you know enough about revolutionary mobile phone as iPhone. Apple iPhone is getting more and more popular among moblie phone users. There are lot of applications which are specially launched for iPhone. According to a conference held recently iPhone is launching lots of applications world wide. There was lot of talk about SDK applications. SDK applications are native apps which are born out of the iPhone "software`s developer kit". SDK will be available in the market in coming summer this month. In coming future adobe flash player can also be played on the iPhone. This will enhance the experience of mobile internet.
There are lots of application which are being designed for iPhone. In this article you can read about top 5 web applications which will enhance your mobile experience.
Have you heard about a social bookmaking website known as Digg. With the help of a web application known as iPhonedigg you can easily view the top articles in a specific category with their digg counts.
The second application about which we will be talking is related to instant messengers. The application is known as JiveTalk which helps you to connect through all the major IM networks all over the internet. With the help of this application you can easily arrange all your contacts in an easy to use interface.
The next web application is known as David Cann`s Google Reader. This a Rss Reader for mobile phone. With the help of this application you can easily read your subscribed phone on your iPhone.
I have also gone through an application which can compare the gas prices in your area. This application can be easily used with google maps.
The next application is ipling. ipling is a social network which helps iPhone users to make new friends all over the network.
There are many sources which allow you to download appliactions to your phone. You should always look for official or reputed websites which have permission to distribute applications for the phone you are using. You should never use the hacking softwares available all over the internet. These hacking softwares can be harmful for your phone. Mostly the applications are provide free of cost by official websites. But you can also find some websites which are sell applications and softwares at reasonable rates.
There are many things which should be kept in mind while downloading applications for an iPhone. There are many websites and blogs which review latest applications. It is a good idea to read the review about the application you are downloading. You should also check the authenticity of the application before downloading it. It is a good idea to spend some time with a professional before you download mobile phone related stuff online.
There are several websites which are offering popular applications and downloads all over the internet. Your job is to choose the best one among them. You can easily find a good website by following some tips which are stated in this article.
If you really want to know more about Latest SDK applications then feel free to visit iphone Applications.