WE are an SEO pro working for last 5 years in this very field of eMarketing, SEO and SEM. This is an IT oriented Com. that is providing IT Solution like, Graphics Design,logo Design,converts image, vector image,Data Management services, Database - Mailing list development and web solution. We not only develop database but also provide solution to data entry, update & data manipulation by configuring database server. We develop E-commerce and websites for org. to give them an identity in the Internet world. A new generation of entrepreneurs armed with latest Information Technology, relevant experience. Backed by the finest of field experience and a will to provide the best of service, JMDII and technology is all set to enter the international arena for sharing the technology perfected over time, with developed and developing countries and to take the advantages of a developing country, multi - faced IT Org. with operation that have encompassed high and IT training, Professionalism and willingness to adopt new technology have borne fruit in terms of repeat orders from the esteemed clientele In short; presently around 20 computer professionals are working with JMD InfoTech India.
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
Mobile Application Designing and Developing
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
E-Commerce Website Development
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
Matrimonial Website Development
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
CMS / MLM Website Development
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
Being able to watch TV on the computer is awesome. Especially when you're able to watch some of your favorite shows and programs. You're probably not sure which ones you can get or where to watch them from. So, what I'm going to do is share with you some TV stations and programs you can watch on your computer.
That way, you'll be able to see your favorite shows on your PC.
The stations and programs you can watch are:
1. Sports. This is great if you are a sports fan or if you enjoy watching a game every now and again. You can watch any sports game on your computer. The cool thing is, you can actually watch some of the games that your cable company doesn't carry.
2. News. If you want to stay up-to-date on what's happening in the world, then you can do this by watching TV on your computer. You can do this from anywhere in the world, which is great. So, if you want to keep up with the current events, be sure to watch TV on the computer.
3. TV Shows. If you have a favorite show that you like to watch, you can do this on your PC. You can do this from anywhere in the world, too. All you will need is your computer and internet.
4. Movies. Watching movies on your computer is fun. If you have a favorite movie channel or if you like watching movies, you can do this on your computer. There are TV channels that will allow you to view all of your favorite movies.
These are some of the programs and stations you can watch on your PC. Actually, there are thousands of channels and stations you can get for your computer. So, if you really want to have fun and see all of your shows, be sure to watch tv on the computer. You will really enjoy it.
To watch thousands of TV channels and programs on your computer, click on the link below: Watch TV On The Computer
Portable MP3 Players have taken the world by storm primarily owing to its compact size, solid-state technology and large memory capacity. MP3 Players enjoy distinct advantages compared to portable music players chiefly because there is no room for MP3 players missing whether the user is taking a bumpy car ride, having a jog or cycling on an uneven road or path. All your favourite MP3 songs or other audible forms of media can be normally stored in Flash Memory systems that is either built-in on the Sony Memory Stick, Compact Flash cards or SmartMedia - the same type of cards & sticks we use for digital cameras and that can also be operated with the portable MP3 players in the same manner.
The process of preparing MP3 files has become quite simple these days. First, MP3 files are prepared on a PC by either downloading songs form the Internet, compressing music from a CD format or producing its original source on MP3 software. You can then download the files through the computer's USB port or parallel port straight away into the MP3 Player or reader or removable drive that accepts the card/stick of choice. Most portable players nowadays are packed with software programs to facilitate the process of downloading.
Compared to CD Players, Portable MP3 Players have solid state memory that determines the amount of data they can store. You can make use of the compression format for compressing a 32MB stored on a CD to 1.6MB that can be stored on a MP3 Player. Therefore, even a low-cost portable MP3 can hold roughly about 4 hours of quality music.
If you are going to use the portable MP3 Player in moving vehicles or carry it around while you are jogging, cycling or walking - a model that has a microdrive is a welcome option. Microdrives like hardrives are used in PCs but they are much smaller.
Similar to a regular hard drive there is a chance of occurrence of a skip in case the MP3 player is jostled. But compared to flash drive, MIicrodrives have the advantages of both storage capacity and is much economical. Like a Flash drive, Microdrives can carry anywhere from 10 to 15 times media clearly making the portable MP3 Player a musical powerhouse.
MP3 Players are now availlable from 1GB to 160GB. You can read reviews on 2GB MP3 Players, 4gb and 8gb Players to choose the best audio player from Sony, Archos, Sandisk, iRiver and all latest models available in the market.
Most mobile phones are equipped with Bluetooth technology. Did you know that a Mac also has Bluetooth? This article will show you how easy it is to pair your phone with your Mac.
On the Mac at the top of your screen you will see a Bluetooth icon. Click the icon and select "Turn Bluetooth On". Then make sure the "Discoverable" is checked.
On your phone make sure it's Bluetooth is on and also in "Discoverable" mode. On the phone select the option to set up a new Bluetooth device. It should find your Mac and give you a code to pair the two. A pop up window on your Mac will ask you to enter the pass-code you set up on the phone.
Once the Mac and phone are paired click the Bluetooth icon at the top of the Mac's screen. Now select "Browse Device". It will pull up a screen where you can select the phone. Once that is selected you can browse the phone's photos and other files depending on what your phone allows.
I use it mainly to transfer photos from my phone to the Mac. This can be achieved by dragging them to the desktop. You can also on some phones send and receive contacts to and from Apple's address book.
After you have finished turn the Bluetooth off on the Mac and Phone. The next time you wish to pair your Mac should already be saved in the phone.
Bluetooth technology on the Mac also makes it possible to use Apple's wireless keyboard and mouse. It is a great feature to have and is another feature found on most Mac computers. Some PC computers are starting to utilize this as well.
Enjoy geek videos, shopping, news, and helpful information.Visit http://jmdcomputer.blogspot.com
Welcome back! I'm glad to see you are not interested in "just" being secure, but you want to be very secure. There are pros and cons to this. You know the pros. Security! , but first of course is my:
DISCLAIMER: While every reasonable precaution has been taken in the preparation of this document, the author is not responsible for errors or omissions, or for damages resulting from the use of the information contained herein.
The information contained in this document is believed to be accurate. However, no guarantee is provided. Use this information at your own risk.
OK. Here are the cons:
No DHCP (Dynamic Host Configuration Protocal) Server. You will need to set your IP addresses manually on all the wireless and wired clients you want to hook to your network.
No viewable SSID. You will have to remember the name of your wireless network, then manually join wireless clients to your network.
No standard IP address for your router. You will have to remember what you set that to. (This is easy as you can always check the IP address of a computer connected to your network.)
MAC (Media Access Control) will be used. This is like a computers finger print. You will have to remember to allow this computer into your network. Unless they are explicitly allowed to join the network they will not be able to unless this step is complete, even though they know the SSID and Shared Key.
Note: on't make these changes with a wireless client. You will not be connected for very long if you do. Use the computer that is hard wired to the router. PRINT this document or save a copy of it local on your computer. There will be places where you will not be able to get to the Internet to read this until some changes are made. You need this document to make those changes. This documentation has been done with Windows XP. If you have Windows Vista the documentation will not match exactly. The settings are the same, but getting to the place the settings are made will be a little different. Read through this document before making any changes.
Please be aware that these are no rock solid guarantees to keep people out of your network. These following steps are simply deterrents, and can be gotten around if the intruder wants in bad enough. If you have gotten to this point I need to make something perfectly clear. The encryption you are using is your number one defense. Don't do these steps if you have set a key like "mynetwork", or used WEP for your security. Use the strongest security available (WPA-AES) and have at least a 20 character key with numbers and upper/lower case characters. There should be no words in there that can be found in the dictionary. That being said let's get on with the deterrents.
Go into the local LAN settings and change the IP address of your router. If the default IP address of your router is 192.168.1.1 change it to something like 192.168.112.86. You can use 10.x.x.x or 172.16.x.x. Replace the "x" with any number under 255. Remember the number you used as it will become the default gateway and the DNS server for your network and you will have to set it in the client since we are going to disable DHCP. Make the changes and apply them. This makes guessing your IP range harder for the intruder. Leaving it set to the default just makes it easier to get into your network.
The computer hard wired to your network should still be able to connect to the network since it is using DHCP to get an IP address. You will have to change the address in your browser to the new IP address to get back into the router settings. That will change with this next step. You will have to hard code the IP address in the client to be able to get back on the network.
Go into the web interface and to the LAN settings. Find the DHPC server and disable it, or uncheck enabled. Save the settings. At this point you will not be able to get into your network. You have just told your router not to give any computer an IP address. If they want in they need to know an IP address that fits the network. To get back into your network we need to do this.
Right click on My Network Places and choose Properties.
Right click on the Local Area Connection that matches your Ethernet adapter. If you have a wireless adapter you will see two. Choose the LAN connection, or the one that is hard wired to your network. Choose properties.
In the box labeled This connection uses the following items:
scroll down to Internet Protocol (TCP/IP).Click on it then click on the Properties button.
Click the Use the following IP address and Use the following DNS server addresses radio buttons. The boxes will become white and you can enter data into them. Enter the following data: This is what you would enter if your routers IP address is 192.168.89.1
IP address: 192.168.89.2
Subnet mask: 255.255.255.0
Default gateway: 192.168.89.1
Preferred DNS server: 192.168.89.1
Click the OK button and you should be able to get back in to your network from a hard wired computer. If you have a wireless adapter you will have to follow these steps in your wireless clients to allow them back into the network.
Note: ***You cannot have any clients with the same IP address***. Increment the last number by 1. Example, the wireless client would have an IP address of 192.168.89.3. The Subnet mask, default gateway, and DNS server address will not change. Keep then the same on all clients.
Your wireless client should not be able to access the network. Let's make a few more changes before we join it to the network.
Next we are going to enable MAC filtering. This will only affect wireless clients. What you are doing is telling the router that only the specified MAC addresses are allowed in the network, even if they know the encryption and key. To do this go to Wireless Settings and find a box labeled Enforce MAC Filtering, or something similar to it. Check it an apply it. When the router reboots you should see the MAC address of your wireless client in the list. You can find the MAC address of your client by opening a DOS box like we did earlier and enter "ipconfig /all" without the quotes. You will see the information about your wireless adapter.
If you want to allow other wireless clients into your network you will have to edit the list and allow them. MAC addresses can be spoofed, but this is another layer of security that you can implement.
So far we have changed the IP address of your router, disabled DHCP and set MAC filtering. I will take it for granted you had, or have changed, your encryption to be as strong as possible. The last thing we will do is not broadcast your SSID. What this means is where you look for Available Wireless Networks you will not see yours.
To disable the broadcasting of your SSID from the web interface for you router go to Wireless Security and uncheck Broadcast SSID and apply it. Your router will reboot.
Now, on to the wireless clients. You will have to assign your wireless client a static IP address. Do the exact same steps as above to do this, but choose the wireless adapter. Once you have a valid IP address you should be on the network. Your wireless client already knows of the SSID and the settings. If you View Available Wireless Networks your SSID will be there.
If you bring in another wireless client it will know nothing about your network. You will have to do the following to get it into your network.
Set your IP address, Default gateway, etc... on the new wireless clint
From the Available Wireless Networks dialog choose Set up a wireless network for home or small office.
Select Create a new connection.
The Welcome to the Wireless Network Connection Setup Wizard will start. Click Next.
Enter your Network name (SSID): "your network name"
Select Manually assign a network key
Check Use WPA encryption instead of WEP (WPA is stonger than WEP but not all devices are compatible with WPA).Click Next
Enter your key twice. Click Next
Choose Setup a network manually
Click Finish
You should now be connected to the wireless network.
This concludes PART3 if you would like to get things even stronger please review the final chapter PART4
A direct link to this article, complete with images can be found at TechAlternatives
DISCLAIMER: While every reasonable precaution has been taken in the preparation of this document, the author is not responsible for errors or omissions, or for damages resulting from the use of the information contained herein.
The information contained in this document is believed to be accurate. However, no guarantee is provided. Use this information at your own risk.
Welcome back to the final steps. These steps have nothing to do with wireless security. What they have to do with is protecting private date in your network should your wireless network be compromised. If you have followed parts two and three your wireless network is as secure as it can be. What if someone does get in? What I want to discuss now is what you can do to protect yourself should that happen. This is just an overview and not a step-by-step. This is food for thought. If you would like help doing this please come to my site and ask in the forum. I would be more than happy to go into detail on this.
Once an intruder is in your network they have access to all the resources in your network. I highly doubt you have a domain, but a workgroup network. This means the security has to be done on each individual workstation for them to be able to transfer data to each other. I don't know for a fact, buy I suspect this is why Microsoft made the security so wide open in Windows. If you had to set everything manually out of the box it would be extremely hard to get the computer to communicate with each other.
By setting default workgroup names, no passwords on administrative accounts and wide open shares people can network their computers together with ease. There is a big problem with this. Once someone is in your network they can get to your stuff with the default settings, There are two default settings to be concerned with the most. The default workgroup name, which has been the same for years, has been either "workgroup" or "MSHOME".
The default administrative password has been blank. With these two settings not changed, the intruder has absolute power over your network. They can steal data, lock you out of your network so you cannot get to your data, install whatever they want and do any damage imaginable. Here is a scenario of an intruder getting into the network and just how easy it is. I have done this with clients to show them and they take a whole new look on security after it has been showed to them.
The intruder cracks the security of your wireless network. He now has an IP address in your network. DNS does not matter at this point for the damage can be done with the IP address alone. He runs a ping sweep on your network. This is simply a script that pings every address in your IP address range and any computer that is on the network will respond. Once he gets a response from the computer(s) he knows which computer to attack. He sets the workgroup name on his computer to workgroup and reboots. He will then go to the IP address he found and try to access the default administrative share.
Here is what that would look like \\192.168.89.2\C$. He could not make a connection so he sets the workgroup name to MSHOME and tries again. He takes for granted the default password has not been changed so he leaves his password blank. This matches the administrator account on both computers. This time he has access to your C:\ drive. The $ symbol is just a share that is hidden and the default administrative share is on the root of C and shared as C$. He is in and has control. How can you prevent this?
Set a strong password on the administrator account and don't use it unless you need to make administrative changes. See PART1 for a tool to check the strength of passwords. Create an everyday user account with user privileges and set a password on that. You will have to create the same account with the same password on all the computers you want to share data with. The administrator account does not have to match, but they will not be able to administer the other computers. Next, change the workgroup name. Change it to anything, but not something easy like you last name.
This is the final steps you can take to secure your data. You can go as far as data encryption, but there is a lot of overhead in it and not as easy as it sounds. You do stand a chance of loosing date if something goes wrong.
Thank you for taking the time to read these articles and if you have any questions or comments please go to TechAlternatives and let me know.
To Discover Your Choices go to TechAlternatives Article Source: http://EzineArticles.com/?expert=Keith_Hagans
When people bring me their computers for repair, there is one problem that motivates them to bring it to my shop more than any other. It is the computer is running slow. Maybe the computer has other problems, but the running slowly part bothers them the most.
There are a few things that can happen to a computer to slow it down and I will talk about these things in this article. However, there is one problem that often goes overlooked when discussing things that need to be done to get a computer's speed back. We will not overlook this problem.
Spyware/Virus And Registry Cleaners
It is well documented what spyware and viruses can do to a computer's operation. It can slow it down and in extreme cases it can cause the computer to be unable to start up. Even worse, spyware can steal a person's identity! For these reason, most people have spyware/virus cleaners installed on their computers.
Another problem most people are aware of is registry corruption. Registry corruption is actually more of a problem with Windows XP and Vista than it was with older operating systems. The newer operating systems have a much larger hierarchy. This allows a little corruption to disrupt many more operations than it could on Windows 98, for instance.
In any event, registry corruption can make a PC unstable and cause it to become very slow. Only keeping the registry clean will prevent a computer from falling into a registry corruption malaise and using a good registry cleaner periodically is the only way to prevent this from happening.
What Else Could Go Wrong?
Still, there are times when I run into computers that have slowed down but aren't infested with any type of virus/spyware or registry corruption. This of course, means there is some other problem slowing down the computer and many times finding the cause of the slowdown is a formidable task!
A large percentage of the time, the problem I find in a case like this, will involve an outdated or unstable driver. Coming to this conclusion is one part of the job of repairing a computer with this type of problem. Finding a replacement for the questionable driver and then installing it is yet another task that needs to be completed.
The New Tool In Town
However, because of a very recent innovation, finding if a computer has a bad or outdated driver is not a difficult undertaking anymore! Now, there is an excellent new tool called a driver scanner that does 100% of the work for us! All we do is start it up and the driver scanner will find any bad or outdated driver we have and it will then upgrade it automatically for us.
The way I see it, driver scanners are worth their weight in gold because they easily do a job that was once very difficult and time consuming. Due to the expense of dealing with them, the fact there could have been outdated drivers in a PC used to be ignored unless these bad drivers were causing major harm.
So, it was common for a computer operator to have to put up with a few irregularities in his or her computer's performance indefinitely. Now that a good driver scanner can take care of the matter, we don't have to accept these irregularities anymore!
You've learned a lot in this article about getting a computer to run fast again. Now find out how to get free spyware/virus scans, free registry scans and even a free driver scan. All you have to do is visit this free site: Repair Slow Computer. Also, find how all the top registry cleaners rate against one another in the most up to date registry cleaner comparison chart on the net: Registry Cleaner Reviews.
The need for multiple data at same time makes it necessary that data need to be duplicated and multiple copies of the same data are circulated to meet the diversified needs. And if the quantity of data is large, then you need to have something that can store volumes of data and transfer it to the destination. Microboards Blu Ray duplicators are categorized amongst the prominent SATA driven DVD duplicators making the buzz in the market today. The duplicators are available in variety of capacities and have the efficiency to duplicate from few DVDs to thousands of DVD copies in just few minutes, from the master DVD. Microboards Blu Ray duplicators have high performance, and they record the media seamlessly with no loss in bits, and the data quality also remains intact.
There are models available in Blu Ray duplicators that feature world's most advanced functions in the form of DHP technology'. The technology creates equal space partition on the hard drive as that of master disc, and in this manner ensures maximum of HDD space. There is also integrated in the duplicators 'Master Error Proof technology' which allows the user to replace corrupted master disc and you will not be wasting your blank DVD. Another popular DVD duplicator is Tower DVD Duplicators manufactured by Blu Ray, LG etc. and which are widely used for commercial purposes. The DVD duplicators are ideally designed as tower systems that work well to duplicate most DVD formats including DVD+R, DVD-R and DVD+R Dual Layer. Tower DVD duplicators come in package of 3, 4, 5, 6 and 10 DVD layers and gives the user plenty of opportunity to mass duplicate the DVDs. The best part is that differentiates Tower DVD duplicators from a Standalone DVD duplicator is that you don't need a computer system to duplicate the DVD. And this also accounts for the reason why there is no need for the USB 2.0 device. Whether it is a Microboards Standalone DVD duplicator or a tower system, you are always assured against duplication session failure. There is high reliability and super duper speed to allow duplication of DVDs. The best part is that there will be no potential damage to DVDs.
Microboards is a symbol of trust and security. The duplicators manufactured by them are adaptable to work with or without computer, and across the platforms. Try one for your requirements and see the difference!
Caitlina Fuller is a freelance writer. Microboards Blu Ray duplicators are categorized amongst the prominent SATA driven DVD duplicators making the buzz in the market today. Another popular DVD duplicator is Tower DVD Duplicators manufactured by Blu Ray, LG etc. and which are widely used for commercial purposes.
A leading manufacturer of hard disk drives for enterprise, desktop, mobile computing and consumer electronics applications uses blocks of intellectual property (IP) in its next-generation disk controller application specific integrated circuits (ASICs). Some of these IP blocks are used in several different products, making it an imperative that designs be exhaustively verified under all possible operating conditions prior to release.
In the past, the manufacturers' ASIC designers relied on digital simulation as their primary means of verifying IP blocks. They also employed automatic constrained pseudo-random testbench generation to construct thousands of different combinations of commands and data packets. Early in the design of a new compute-intensive IP block, the design architects calculated that it would take approximately 500 CPU-years to simulate all the test cases necessary to test this particular design. With a six month design schedule, it was clear that simulation alone would not be adequate. That's when the designers decided to evaluate several hardware-assisted verification platforms. This proved to be the ideal solution for delivering a quality product within the tight design schedule. In this case, the hard disk drive manufacturer selected EVE's ZeBu-ZV platform.
The IP design presented unique verification challenges. The block had a 32-bit interface, over which commands and data were loaded into the block using a packet-based protocol. Once set up, it then processed the data for about four seconds of real time, after which it presented the results over the same 32-bit interface. At an operating speed of 150 MHz, four seconds represented 600,000,000 cycles. The design team needed to run several hundred thousand of these test cases to fully verify the design.
On this project, a digital simulator/testbench generator combination was used for initial verification runs to prove basic functionality, using about 50 tests per command. Once this verification methodology was generally functional, the designers switched to the combination of the hardware-assisted verification platform and testbench generator, which enabled them to run thousands of tests for each command.
To maximize performance, synthesizable transactors were used as the interface between the testbench code on the PC and the emulated IP block in the verification platform. Transactors performed the conversion from high-level commands and data packets to bit-level signals using the hardware-assisted verification platform. The SCE-MI standard from Accellera defined how the transactors were written. They consist of an application program interface (API) on the software side to exchange high-level packets or messages, and a synthesizable bus-functional model (BFM) or state machine mapped onto the hardware platform.
To further accelerate simulation, the design team took advantage of a property of this particular IP block: The only interaction between the testbench and the IP block occurred during the initial setup of the test and the downloading of results at the end of the run. In between these two interactions, the design executed a large number of cycles with no external communication. The designers exploited this by making the verification platform run in lock-step mode with the testbench generator only during these interactions, and switching to a 15MHz clock supplied by the verification platform in between these accesses. To implement this solution, they changed the main clock of the design to switch between two inputs: the clock coming from testbench generation and a clock generated by the verification platform's on-board clock generator.
Using this hybrid approach, the testbench generator produced each new command and data combination, and then transferred the packet through a C function-call to the verification platform transactors. The testbench generator then switched the verification tool to the fast clock and initiated the test. It was able to run the tests at 15 MHz, equivalent to 1/10 of real time. In 40 seconds, the test would finish and it would signal the testbench generator that it was ready to present the result.
Meanwhile, the testbench generator was computing the expected results in software, using the same algorithms implemented in the IP block. Once the hardware-assisted verification platform and the testbench generator completed their respective runs, they would compare their results and flag any differences that occurred as errors.
The design team was surprised that with the first exposure to the system it took them only two hours to get their IP block compiled into the verification platform and running correctly. With a few more weeks of effort, the team had implemented and debugged the transactor interface and had the system running at 15 MHz.
In the first few days, the designers identified 25-30 new bugs in the design, which had escaped detection using simulation without hardware-assistance. In the five weeks to follow, they ran the hardware-assisted verification platform 24 hours per day, 7 days per week, generating hundreds of thousands of additional test cases. Through these runs, they found four additional bugs that were obscure corner cases related to specific sequences of commands. These bugs would have surfaced during product testing, but would have necessitated ASIC respins at a cost of $500,000 or more.
The designers of this hard disk drive manufacturer plans to continue running additional test cases on their hardware-assisted verification platform 24x7 until the resource is needed for another project. Since it takes only one hour per week to kick off new jobs and check the results of the previous runs, there is little reason not to run the additional tests for added confidence. Their hardware-assisted verification platform has become the keystone of their design strategy.
WAN boot is a "new" method for installing a machine running the Solaris Operating System from a Solaris JumpStart server over the network. WAN boot has a lot of enhancements compared to the "old" installation method via bootp and should be used for network installations if possible. (Note: WAN boot is only supported on machines with SPARC CPUs. You cannot use WAN boot on machines running the Solaris OS for x86 platforms.)
This article describes how to use WAN boot on machines that do not have WAN boot support in the OBP and cannot use a CD-ROM for WAN boot.
This method requires:
Access to the console of the machine
The Solaris OS running on the machine
Details
The only file that is necessary for WAN boot is /platform/`uname -i`/wanboot. Therefore, to get WAN boot from the disk to work, it is sufficient to copy the current version of the WAN boot binary from (for example) the Solaris Installation CD-ROM to the directory /platform/`uname -i` on one of the slices of any local hard disk of the machine.
The Steps
1. Configure the machine to install as a WAN boot client on your installation server.
2. Select one of the existing slices on one of the internal hard disks of the machine to install for the WAN boot binary. For example, this can be the existing boot slice or any other slice on the disk. You can also put the WAN boot binary on the disk on which you want to install the Solaris OS, because the disk is only used to read the WAN boot binary. After the WAN boot binary is read and executed, the disk is not used anymore for the boot process.
3. Make the selected slice bootable using installboot if the slice is not already bootable; that is:
If in doubt, issue the installboot command. (It won't hurt if the slice is already bootable.)
4. Halt the machine and issue the following boot command at the ok prompt:
ok> boot mydisk -o prompt -F wanboot - install
Here mydisk is the disk device (either a device alias or the real device name). If you use a slice other than the default slice for the WAN boot binary, the command should look like this:
ok> boot disk1:b -o prompt -F wanboot - install
Here disk1 is the device alias and the letter after the colon specifies the slice to boot from: a is slice 0, b is slice 1, c is slice 2, and so on.
5. After a short time, the normal WAN boot prompt should be printed and you can enter the necessary information for the WAN boot process and continue the WAN boot installation the normal way.
Example 1
Example 1 shows the machine output from step 4 in the preceding description. Note: Some output has been replaced with "x" characters.
{0} ok boot disk1 -o prompt -F wanboot - install Resetting ... RSC Alert: Host System has Reset Probing system devices Probing system devices
Sun Fire 280R (2 X UltraSPARC-III) , No Keyboard Copyright 1998-2004 Sun Microsystems, Inc. All rights reserved. OpenBoot 4.16.4, 4096 MB memory installed, Serial #xxxxxxxx. Ethernet address x:x:x:x:x:x, Host ID: xxxxxxxx.
Here is sample output from a session installing a machine via WAN boot from a disk. In this example, we use the swap slice as the temporary boot slice for the WAN boot process. Note: Some output has been replaced with "x" characters and edited for security reasons.
bash-3.00# uname -a SunOS mysun 5.10 Generic_118833-17 sun4u sparc SUNW,Sun-Fire-280R
bash-3.00# swap -d /dev/dsk/c2t0d0s1 /dev/dsk/c2t0d0s1 was dump device -- invoking dumpadm(1M) -d swap to select new dump device dumpadm: no swap devices are available
bash-3.00# swap -l No swap devices configured
### remove the swap entry from the /etc/vfstab because otherwise newfs will fail
bash-3.00# reboot -- "disk:b -o prompt -F wanboot - install " Jul 28 07:09:42 mysun reboot: rebooted by root Jul 28 07:09:43 mysun syslogd: going down on signal 15 syncing file systems... done rebooting... Resetting ... RSC Alert: Host System has Reset Probing system devices Probing system devices
Sun Fire 280R (2 X UltraSPARC-III) , No Keyboard Copyright 1998-2004 Sun Microsystems, Inc. All rights reserved. OpenBoot 4.16.4, 4096 MB memory installed, Serial #xxxxxxxx. Ethernet address x:x:xx:x:xx:xx, Host ID: xxxxxxxx.
wanboot progress: wanbootfs: Read 128 of 128 kB (100%) wanboot info: wanbootfs: Download complete Fri Jul 28 06:12:38 wanboot progress: miniroot: Read 248881 of 248881 kB (100%) Fri Jul 28 06:12:38 wanboot info: miniroot: Download complete SunOS Release 5.10 Version Generic_118833-17 64-bit Copyright 1983-2005 Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Configuring devices. Network interface was configured manually. 192.168.5.14 SUNW,qfe0: 100 Mbps half duplex link up - internal transceiver SUNW,qfe1: 100 Mbps half duplex link up - internal transceiver SUNW,qfe2: 100 Mbps half duplex link up - internal transceiver SUNW,qfe3: 100 Mbps half duplex link up - internal transceiver Beginning system identification... syslogd: line 24: WARNING: loghost could not be resolved Searching for configuration file(s)... Jul 27 22:46:41 mysun.test.dom eri: SUNW,eri0 : 100 Mbps half duplex link up Using sysid configuration file http://192.168.20.48/profiles/mysun.test.dom/sysidcfg Search complete. Discovering additional network configuration... Completing system identification... Starting remote procedure call (RPC) services: done. System identification complete. Starting Solaris installation program... Searching for JumpStart directory... Using rules.ok from http://192.168.20.48/profiles/mysun.test.dom. Checking rules.ok file... Using begin script: begin_script.sh Using profile: profile Using finish script: finish_script.sh Executing JumpStart preinstall phase... Executing begin script "begin_script.sh"... Copying the missing files from the profile ... Begin script begin_script.sh execution completed. Searching for SolStart directory... Checking rules.ok file... Using begin script: install_begin Using finish script: patch_finish Executing SolStart preinstall phase... Executing begin script "install_begin"... Begin script install_begin execution completed.
The begin script log 'begin.log' is located in /var/sadm/system/logs after reboot.
The finish script log 'finish.log' is located in /var/sadm/system/logs after reboot.
.....
Jul 28 07:52:45 mysun.test.dom reboot: rebooted by root syncing file systems... done rebooting... Resetting ... RSC Alert: Host System has Reset Probing system devices Probing system devices
Sun Fire 280R (2 X UltraSPARC-III) , No Keyboard Copyright 1998-2004 Sun Microsystems, Inc. All rights reserved. OpenBoot 4.16.4, 4096 MB memory installed, Serial #xxxxxxxx. Ethernet address x:x:xx:x:xx:xx, Host ID: xxxxxxxx.
Rebooting with command: boot Boot device: /pci@8,600000/SUNW,qlc@4/fp@0,0/disk@w2100000c50ac4839,0:a File and args: SunOS Release 5.10 Version Generic_118833-17 64-bit Copyright 1983-2005 Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Hostname: mysun Configuring devices. Loading smf(5) service descriptions: 93/93
mysun console login:
If you have questions on this How-To, please contact Bernd Schemmer.
The advancements in technology have made possible the proliferation of crimes that used to be depicted in the movies only and which were very far from reality. However, there are existing crimes that are now spreading like wildfire because of the lack of security in using the Internet, One such crime closely related to Internet use but which can also be committed in other ways is identity theft. Identity theft basically operates the same that the ordinary crime of theft does. The difference is that in identity theft, what is stolen is the identity of a person.
Identity is considered a crime because it is the act of assuming or using the identity of another person without his consent. Identity theft usually causes injury to the person whose identity has been stolen. It is usually committed for financial gain, blackmail or even espionage.
This crime has grown so widespread that the United States Congress has enacted the Identity Theft Penalty Enhancement Act to punish those found suing another person' identity without his consent. The criminal gets an additional two years in jail if he uses the stolen identity to perpetuate another crime. Another five years is added to the jail term if the crime is used to promote terrorism.
So how is identity theft done? Identity thieves are one of the most creative people in this planet and they will do anything to get information about the people whose identity they are planning to steal. This includes rummaging through the target victim's garbage to sift important information about the person's identity which they can use in perpetuating the crime.
Some identity thieves use computers and sophisticated programs like spyware to get financial information about their target victims. Hacking another person's computer is a method often used by identity thieves to commit the crime.
The proliferation of Identity theft can be blamed on the ease with which financial transactions can now be made. Credit card companies readily approve applications without even physically dealing with the applicants. These companies approve the applications based on documents that the applicants send by snail mail or online and the companies send the approved cards by mail. Revealing financial information through the telephone can also be a magnet for identity thieves. These criminals have access to high technology gadgets and they can eavesdrop on telephone conversations. Sending information through the Bluetooth technology can also be easily intercepted by identity thieves.
Everyone is in danger and any person's identity can be stolen. Thus, a person should be careful in revealing financial information especially if such information is being asked for no reason at all. To avoid being victimized by identity thieves, a person should consider the following safety measures:
1. Always be careful in sending and receiving financial information through snail mail because mails can easily be intercepted by thieves.
2. Never throw important financial and other information in the garbage without shredding them first. Identity thieves can masquerade as garbage collectors and sift through a mountain of financial information about the prospective victim.
3. Never reveal financial information over the phone. Anybody can call someone on the telephone and pretend to be a bank officer. When such information has to be given to any office, it is better to visit the office and personally hand in the information to the right person.
4. Always inspect bank transactions and look for any irregular payments or withdrawals.
5. In the same manner, always check credit card bills and cross check with purchases and other credits to make sure that the charges are correct and not made by another person.
When it comes to identity theft, no one is really safe and the best thing to do is to be careful and wary of revealing any financial information. It is best to incur a little delay by verifying the identities of people asking for financial information rather than to suffer financial distress later on.
Remember that identity thieves are very creative and they can get any information they want. They can even be getting a person's financial information this very moment while the target is using his computer. With all the convenience of technology, any person can be a victim of identity theft.
Lee Dobbins writes for http://identitytheft.pagechic.com where you can learn more about how to protect yourself from identity theft.
I am sure that you know enough about revolutionary mobile phone as iPhone. Apple iPhone is getting more and more popular among moblie phone users. There are lot of applications which are specially launched for iPhone. According to a conference held recently iPhone is launching lots of applications world wide. There was lot of talk about SDK applications. SDK applications are native apps which are born out of the iPhone "software`s developer kit". SDK will be available in the market in coming summer this month. In coming future adobe flash player can also be played on the iPhone. This will enhance the experience of mobile internet.
There are lots of application which are being designed for iPhone. In this article you can read about top 5 web applications which will enhance your mobile experience.
Have you heard about a social bookmaking website known as Digg. With the help of a web application known as iPhonedigg you can easily view the top articles in a specific category with their digg counts.
The second application about which we will be talking is related to instant messengers. The application is known as JiveTalk which helps you to connect through all the major IM networks all over the internet. With the help of this application you can easily arrange all your contacts in an easy to use interface.
The next web application is known as David Cann`s Google Reader. This a Rss Reader for mobile phone. With the help of this application you can easily read your subscribed phone on your iPhone.
I have also gone through an application which can compare the gas prices in your area. This application can be easily used with google maps.
The next application is ipling. ipling is a social network which helps iPhone users to make new friends all over the network.
There are many sources which allow you to download appliactions to your phone. You should always look for official or reputed websites which have permission to distribute applications for the phone you are using. You should never use the hacking softwares available all over the internet. These hacking softwares can be harmful for your phone. Mostly the applications are provide free of cost by official websites. But you can also find some websites which are sell applications and softwares at reasonable rates.
There are many things which should be kept in mind while downloading applications for an iPhone. There are many websites and blogs which review latest applications. It is a good idea to read the review about the application you are downloading. You should also check the authenticity of the application before downloading it. It is a good idea to spend some time with a professional before you download mobile phone related stuff online.
There are several websites which are offering popular applications and downloads all over the internet. Your job is to choose the best one among them. You can easily find a good website by following some tips which are stated in this article.
If you really want to know more about Latest SDK applications then feel free to visit iphone Applications.
I know you know what a LAN (Local Area network) is and a WLAN (Wireless Local Area network) but do you know what a WPAN is…..?
A WPAN is a personal area network which uses Bluetooth technology to connect everything from cell phones and ear pieces to key boards and desktops.
When most people think of wireless they will think about Wifi hot spots or wireless routers. Bluetooth acts like wireless wire connecting components over ashort distant.
One of the biggest booms of Bluetooth technology is Bluetooth enabled phones that give you the ability to connect to your computer wirelessly or to your Bluetooth ear piece in you car. Other quick examples of Bluetooth networking is wireless keyboards and mice.
Bluetooth travels at 1mbps and has a max distance of about 5-10 meters. 1mbps does not seem very fast but it is three times faster that a serial port.
WPAN’s (Wireless Personal area networks) are all around you and they will become more and more common. Desktop computers with Bluetooth enabled keyboards and mice combined with a cell phone that syncs your data.
A new use of PAN’s is in the hospital industry where Bluetooth technology is helping doctors monitor patients. Bluetooth gives the hospital staff more freedom to treat a patient when not having to trip on or untangle wires.
Because blue tooth enabled devices can communicate with each other life saving equipment will be able to more effectively monitor changes in a patients condition.
The military is also experimenting with Bluetooth devices and PAN networking in creating smart suits for the battle field. A soldier armed with a blue tooth enabled SAT Phone, Bluetooth head set and Bluetooth laptop, can communicate with anyone in the world. The most important thing is that the soldier won’t have a million wires to connect and get in his way during battle.
As Bluetooth technology gains popularity the issue of security will have to be addressed. Virus writers have already made cell phone proof of concept viruses and have actually infected a few phones.
Bluetooth does have many built in features which help protect a user from being hacked. First is distance, unlike WI-FI Bluetooth travel only at most 10 meters. Next, Bluetooth uses frequency hopping and 128 encryption can be enabled. Other features of Bluetooth are built in PIN numbers to verify who they are communicating with and block other devices from connecting. More and more devices will become Bluetooth enabled such and your car radios and home appliances. Bluetooth enabled cars and appliances will be able to connect to your home network or cell phone and notify you when they need repairs or to give you status updates.
Check out the lowest price usb wireless networking devices on the internet http://www.wirelessninja.com/USB_Networking.htm Simple and secure wireless networking news in the name of the game at http://www.wirelessninja.com
Wireless connectivity just got a whole new meaning with the advent of Bluetooth technology. It enables you to achieve hassle-free mobility and so doesn’t restrict you geographically. Best of all, you don’t need to worry about printing issues – no matter where you are. Tips on printing using Bluetooth
Using a Bluetooth adapter can convert any printer into a Bluetooth enabled one. However while using any Bluetooth enabled printers, it is important to know a few basics. In this section we elaborate on these.
1. Limited range: With Bluetooth enabled printers, you’ll find that range is an issue. The range of distance within which printing is possible is from about 30 to 330 feet. This of course would depend on the hardware configuration. The higher the range the more the power needed, which could drain out your battery in the long run.
2. Printing from the mobile: There are times when you just have to print that gorgeous picture or that document from your hand-held PDA to a Bluetooth enabled printer. In such cases, what you need to do is: search for your Bluetooth enabled printer on your mobile phone. You might find it in the option called BT (Bluetooth) Discovery. On clicking this, it will show all the available Bluetooth devices. Then you can select the printer and hit on “Print”. However be careful, as the Discovery stage makes your phone or handheld device accessible to anyone and everyone within your vicinity. Therefore it can be susceptible to hacking. Be sure to switch off the Bluetooth mode once you’re done printing.
3. USB ports: Some printers have what is called the Pictbridge USB port which is compatible with any Bluetooth adapter. This makes printing from any Bluetooth device easier. Pictbridge is a hardware interface technology that enables your printer to access and print images and files from your mobile or PDA. To perform Pictbridge printing you need to:
a. Connect the USB device
b. Wait till both the devices recognize each other
c. Select from the menu that appears, the set of images or files you want printed
d. The menu also offers options to change the size, layout and resolution of the images
e. Select ‘Print’
4. Hacking: Make sure you avoid setting your Bluetooth enabled device to a ‘discoverable mode’. This makes it possible for your IP address to be known by any person with malicious intent. Often such attacks are directed at mobile phones, PDAs and computers. Hackers usually connect to your PDA or mobile by using fictitious names that are familiar to you. Therefore if you connect even once to their device, chances are, the hackers can keep connecting to your device and use it for malicious purposes – like sending a virus, crashing your operating system or even deleting important files.
5. Enable encryption: For security reasons, it’s best to always enable encryption for any Bluetooth transfer that you may make. In order to enable encryption in any Bluetooth enabled device, you need to use the Bluetooth connection Wizard (usually present on Windows XP operating systems).
6. Keep firmware updated: It is also essential to ensure speed and agility in your mobile phone while printing through your wireless printers. To do this, ensure your mobile phone’s firmware is always kept updated.
This Article is written by James Kara Murat from PrintCountry.com, the contributor of PrintCountry Printer Ink Saving Tips. A longer version of this article is located at Top 6 Tips on Using Buletooth Enabled Printers, and some related resources can be found at PrintCountry Articles such as History of Epson Printers.
What features and functionality should you understand in order to fully take advantage of accessing the internet via a mobile phone? Although this can appear complicated and involved ... a little information goes a long way to "keep it simple". For the sake of discussion .... let's say you have a mobile handset with the following specifications: Networks... 2G Network-GSM 900/1800/1900 3G Network-UMTS 2100 Data... GPRS- Clause 10(4+1/3+2 slots),32-48 Kbps 3G-384 Kbps You have configured the software application given with the phone on your laptop .... and once you connect the phone to the laptop using the USB connection you can access Internet. The settings used in the software application includes "call type=GPRS". The connection speed (downlink) is around 375 Kbps when checked through a freely available tool on the Internet .... and the phone's modem speed is shown as 460.8 Kbps all the time( on the network connection). Since your speed is less than 384 Kbps (3G speed is given as the phone's spec), you're likely using 3G. Since GPRS is also supported, when the 3G coverage is not available, you're probably able switch to GSM/GPRS. Your service provider says they support EDGE,GPRS,3G and HSDPA/HSUPA. Here's some questions you may ask ..... * What are the theoretical maximum speeds of EDGE,GPRS, 3G? * What is actually meant by 3G here? * What is the underlaying technology used by my phone? * Which method is better to connect the phone to the laptop; Bluetooth or USB? * Your phone spec says Bluetooth v1.2 and USB2.0 and you've heard that USB2.0 (480Mbps) is faster than Blootooth v1.2 (1 Mbps). Is this correct? Will it make any difference, since your connection from phone to the Internet is 375 Kbps? Here's some feedback to help you work through such a scenario .... and the associated questions above: For sure, the speed with USB 2.0 should be much better than that through Bluetooth (of any class). 3G is a network technology that should offer some extended data services in addition to the regular GSM features. However, I would recommend that you check with your service providers since they should have the exact specifications that you asked for. Theoretical speeds for EDGE are up to 10 times those of GPRS. But again, since these depend on network configuration you need to check with the service provider. Since your speed is less than 1 mb/s, frankly, it doesn't matter if you use bluetooth or USB - the speeds cited are correct. I would use what is most convenient for you. In any case, the edge/hsdpa connection speeds are still slower than either Bluetooth or USB, so they will not bottleneck your speed. So as long as your battery isn't about to run out, you can connect however you choose to. 3G HSUPA is Third Generation High-Speed Uplink Packet Access - a 3G mobile telephony protocol, which offers increased data transfer speeds and capacity of up to 3.6 Mbps on the downlink and up to 1 Mbps on the uplink, under ideal conditions. 3G HSDPA 3.6 is a 3G High-Speed Downlink Packet Access mobile telephony protocol, which offers increased data transfer speeds and capacity of up to 3.6 Mbps on the downlink and up to 348Kbps on the uplink, under ideal conditions. 3G - Third Generation High-Speed Downlink Packet Access - offers increased data transfer speeds and ables customers to access the Internet and email from their cellphones.capacity of up to 1.8 Mbps on the downlink and up to 348Kbps on the uplink EDGE (Enhanced Data rates for GSM Evolution) or EGPRS provides data transfer rates significantly faster than GPRS or HSCSD. EDGE increases the speed of each timeslot to 48 kbps and allows the use of up to 8 timeslots, giving a maximum data transfer rate of 384 kbps. HSCSD (High Speed Circuit Switched Data) enables data to be transferred more rapidly than the standard GSM (Circuit Switched Data) system by using multiple channels. The maximum number of timeslots that can be used is four, giving a maximum data transfer rate of 57.6 kbps (or 38.4 kbps on a GSM 900 network). HSCSD is more expensive to use than GPRS, because all four slots are used simultaneously - it does not transmit data in packets. Because of this, HSCSD is not as popular as GPRS and is being replaced by EDGE. GPRS - General Packet Radio Service is a mobile data service available to customers with GSM cellphones. With a GPRS connection, the phone is "always on" and can transfer data immediately, and at higher speeds: typically 32 - 48 kbps. An additional benefit is that data can be transferred at the same time as making a voice call. I would recommend using USB as it is faster then Bluetooth. You will not have a bottleneck created by the bluetooth link. Regarding the underlying technology ... When you phone is connected to a 3G network it will be using W-CDMA (Wideband Code Division Multiple Access) W-CDMA is the higher speed transmission protocol as used in the UMTS system, it is a third generation follow-on to the 2G GSM networks deployed worldwide. When you phone is on 2G GSM it is using a form of TDMA (time division multiple access). Again .... the main message is this: Wherever possible, simplify and make it convenient for you! Michael is the owner of FreedomFire Communications....including DS3-Bandwidth.com. Michael also authors Broadband Nation where you're always welcome to drop in and catch up on the latest BroadBand news, tips, insights, and ramblings for the masses. Article Source: http://EzineArticles.com/?expert=Michael_Lemm
Being two-faced might not be a popular trait, but the launch of Samsung F300 seems to change it all. The handset is an interesting new take on the convergence of a mobile phone and portable music player. While one face (side) of Samsung F300 looks and acts just like a standard phone, the other side is modelled on the lines of the iPod Nano. And all this comes in a good attractive package, to make the Samsung F300 a perfect blend of form and functionalities.
Despite the addition of two screens on either side, the Samsung F300 comes in a slim frame. The edges are round and smooth, and extends a nice feel when held in hands. Also, due to its compact size, single-handed operation becomes quite easy. The phone side of the Samsung F300 features a small keypad and an even smaller screen. But thankfully the keypad is not to cramped, so fast typing is not affected.
But what poses a problem is the small screen. This screen can only show three lines of texts at a time. So, while this satisfies the users for basic functions like SMS reading etc, other things like web browsing, pictures and videos viewing, suffers. The only resort here is that the users then need to flip to the music side of the phone, featuring a comparatively larger screen.
On the music side of the phone, one can access a lot. This includes camera, photos and videos, FM radio, web browser and voice recorder. The main Menu is made of multiple sub-menu, and the navigation is kept hassle free. There are also touch sensitive keys that are highly responsive. Pictures, music and videos can be transferred between a PC and the phone, through USB. When working on USB, the phone can actually operate in two modes – media transfer mode and PC studio mode. While in the former, one can use Windows Media Player to sync tracks, including music from subscription services such as Napster; in the latter, one can take advantage of the easy-to-use PC software to edit the phone's calendar, transfer videos, manage SMS folders etc. The Samsung F300 is a tri-band mobile, offering GPRS and EDGE. The talk time is restricted to 2 hours, but if one chooses to use the handset as a music player instead, it will offer a running time of 11 hours.
A nice innovation by Samsung indeed, seems like the Samsung F300 is all set to create ripples. Samsung F300 Alice Erin is associated with internet marketing. He has written several articles related to Mobile Phones Latest Mobile Phones.