Difference Between Category 6 cable & Category 5e cable

Feb 27, 2009

  • Category-6 cable, commonly referred to as Cat-6, is a cable standard for Gigabit Ethernet and other network protocols that is backward compatible with the Category 5/5e and Category 3 cable standards.
  • Cat-6 give good control over crosstalk and system noise.
  • Cat-6 cable standard provides performance of up to 250 MHz and is suitable for 10BASE-T / 100BASE-TX and 1000BASE-T (Gigabit Ethernet)
  • Cat-6 is normally terminated in 8P8C modular connectors, often incorrectly referred to as “RJ-45″ electrical connectors.
  • CAT-6 cable contains four pairs of copper wire and unlike CAT5, utilizes all four pairs.
  • Cat-6 can support 10 Gbit/s applications (especially 10GBaseT) up to a maximum distance of 100 meters.
  • Twisted pair cable like CAT6 comes in two main varieties, solid and stranded. Solid CAT6 cable supports longer runs and works best in fixed wiring configurations like office buildings. Stranded CAT6 cable, on the other hand, is more pliable and better suited for shorter-distance, movable cabling such as “patch” cables.
  • Cat-5e cable is an enhanced version of Cat 5 that adds specifications for far end crosstalk.
  • Cat-5e cables are still limited to a maximum of 100 m (328 ft) in length (normal practice is to limit fixed (”horizontal”) cables to 90 m to allow for up to 5 m of patch cable at each end, this comes to a total of the previous mentioned 100m maximum).
  • Although CAT5 cable usually contains four pairs of copper wire, Fast Ethernet communications only utilize two pairs. A newer specification for CAT5 cable - CAT5 enhanced (CAT5e) - supports networking at Gigabit Ethernet[ speeds (up to 1000 Mbps) over short distances by utilizing all four wire pairs, and it is backward compatible with ordinary CAT5.
READ MORE - Difference Between Category 6 cable & Category 5e cable

Learn about Different Virtualization Approaches

A key benefit of virtualization is the ability to run multiple operating systems on a single physical system and share the underlying hardware resources known as partitioning.

  • Hardware-level virtualization,
  • Operating systemlevel virtualization,
  • and high-level language virtual machines.

For Unix/RISC and industry-standard x86 systems, the two approaches typically used with software-based partitioning are hosted and hypervisor architectures .

A hosted approach provides partitioning services on top of a standard operating system and supports the broadest range of hardware configurations.

In contrast, a hypervisor architecture is the first layer of software installed on a clean x86-based system (hence it is often referred to as a “bare metal” approach). Since it has direct access to the hardware resources, a hypervisor is more efficient than hosted architectures, enabling greater scalability,robustness and performance.

READ MORE - Learn about Different Virtualization Approaches

Microsoft made 36 changes to Windows 7

Among the changes highlighted were

  • 10 affecting the Window 7 desktop,
  • four to the operating system’s new touch-sensitive features,
  • another four to the Control Panel
  • and eight to Windows Media Player.
READ MORE - Microsoft made 36 changes to Windows 7

New Cisco Catalyst 2960 Switches Features

The Cisco Catalyst 2960 LAN Base Series offers:

  • PoE configurations up to 48 ports
  • Intelligent features at the network edge, such as sophisticated access control lists (ACLs) and enhanced security
  • Networked Sustainability: Cisco EnergyWise to measure, report and reduce energy usage across the entire organization
  • Dual-purpose uplinks for Gigabit Ethernet uplink flexibility, allowing use of either a copper or a fiber uplink; each dual-purpose uplink port has one 10/100/1000 Ethernet port and one Small Form-Factor Pluggable (SFP)-based Gigabit Ethernet port, with one port active at a time
  • Network control and bandwidth optimization using advanced QoS, granular rate limiting, ACLs, and multicast services
  • Network security through a wide range of authentication methods, data encryption technologies, and NAC based on users, ports, and MAC addresses
  • Easy network configuration, upgrades, and troubleshooting using Cisco Network Assistant software
  • Autoconfiguration for specialized applications using Auto Smartports
  • Limited lifetime hardware warranty
  • Software updates at no additional charge

2960

READ MORE - New Cisco Catalyst 2960 Switches Features

AMD at a Glance

|



CEO: Dirk Meyer
Revenue: $6.013 billion in 2007
NYSE ticker symbol: AMD
Year Company Started: 1969
Number of Employees: approximately 16,500
Headquarters: Sunnyvale, California

Number of Office Locations: 80

READ MORE - AMD at a Glance

AMD Phenom™ X3 Triple-Core Processors

| AMD


Ready for a performance boost over single and dual-core processors? AMD Phenom™ X3 triple-core processors offer three processing cores on a single chip, plus cutting-edge features and capabilities for next-generation applications.
FOR BUSINESS
AMD Phenom™ X3 Triple-Core Processors
True multi-core performance for the way businesses multi-task today, and for the next-generation applications employees will need in the near future. Stable commercial AMD Phenom™X3 8000 Series processors offer industry-leading platform stability and longevity, investment protection, and the exceptional performance you expect from AMD. Plus, unique features for energy efficiency.
Learn More
FOR HOME
AMD Phenom™ X3 Triple-Core Processors
Do more than dual-core. AMD Phenom™ X3 8000 Series processors offer outstanding performance on a balanced suite of applications, as compared to AMD Athlon™X2 dual-core processors. Get added performance for multitasking, HD entertainment, content creation, and gaming applications.
READ MORE - AMD Phenom™ X3 Triple-Core Processors

New AMD Quad-Cores Start Shipping Early


In a surprising move, online vendors have begun to offer AMD’s latest quad-core processors a while before they have been actually displayed to the public. The new processors on offer are the quad-core Phenol II chips, designed to run at at speeds from 2.8GHz to 3GHz and come with 8MB of cache.


Among these the Phenom II X4 920 runs at 2.8GHz and is being retailed for between $271 and $317 USD while the Phenom II X4 940 which runs at 3GHz is being sold for anything between $304 and $373 USD, depending on the online store. They run on DDR2 platforms and will be moved to DDR3 platforms based on the AM3 sockets, later this year.

This move comes as a big surprise, because AMD has not yet introduced these processors. Their launch is earmarked for CES 09, which will be held in January '09.


READ MORE - New AMD Quad-Cores Start Shipping Early

AMD's 45nm Push


AMD recently announced that the company is shedding its manufacturing operation, transferring its manufacturing assets to a new company. This will allow AMD to focus on design and engineering.

A large part of that design effort is a move to the 45nm manufacturing process. AMD's CPUs have been hobbled by the company's reliance on the older 65nm process, which has forced the company to stay out of the high-end, high-margin segment of the processor business. To its credit, AMD has focused on lowering power consumption, offering a complete line of 45W dual-core and 65W quad-core CPUs.

By late 2008, the company will have begun shipping its first set of 45nm quad-core CPUs based on the Phenom architecture. Code-named Shanghai, the new CPU will offer 6MB of L3 cache (up from 2MB) and HyperTransport 3 support. However, Shanghai will still have an embedded DDR2 memory controller, meaning that it will trail Intel in overall memory bandwidth.

Beyond this year, the company is prepping a 6-core CPU dubbed Istanbul, which is slated for a late 2009 launch. It's unlikely that there will be substantial changes to the architecture. The next new architecture for AMD is Magny Cours, which will have up to 12 cores and finally incorporate a DDR3 memory controller. A 6-core version, code-named Sao Paulo, will arrive on the scene about the same time, in early 2010.

Intel, on the other hand, likes to brag about its "tick-tock" development cycle. The phrase refers to the way Intel designs and transitions new architectures. When Intel develops a manufacturing process—such as its current 45nm technology—it brings an existing architecture to the new process. So Penryn, Intel's first 45nm CPU, was an evolutionary improvement over the original Core 2. That's the "tick." The "tock" is when Intel designs and builds a new CPU architecture on the current manufacturing process. Hence all the Nehalem variants will be built using the existing 45nm process.

In 2009, Intel will start to bring up its next-generation 32nm process, enabling it to pack even more transistors onto the same die size or shrink the CPU considerably. The 32nm process should also reduce power consumption and, in theory, enable higher clock speeds. The first processor built on 32nm will be Westmere and will be based on Nehalem.

Westmere may incorporate up to six cores on a single die. Intel has also announced that six new instructions designed to accelerate AES encryption/decryption algorithms will be part of the instruction set.

The true next generation for Intel isn't likely to hit the street until later in 2009 and will also be built on 32nm. That CPU is code-named Sandy Bridge. There's not a lot known about Sandy Bridge yet, but Intel is planning on integrating Advanced Vector Extensions, a new set of extensions to SSE that may considerably enhance the CPU's floating-point performance

READ MORE - AMD's 45nm Push

Intel takes chipset dispute with Nvidia to court

Feb 23, 2009

Bit-tech.net tipped us off Wednesday morning that Intel has sued Nvidia over the latter's right to create and sell motherboard chipsets that support Intel's Nehalem (aka Core i7) class of desktop processors.
We haven't heard much about this fight since May 2008, although since that time Nehalem has come to market and Intel remains the only manufacturer with a supporting chipset.
We spoke to Derek Perez, Nvidia's head of public relations, Wednesday morning, and he provided some clarity on the nature of the court filing, as well as Nvidia's take on the filing, which he says is actually a request for an injunction to prevent Nvidia from manufacturing a Nehalem chipset.
"We have a cross-licensing agreement with Intel, entered into about four and a half years ago. Intel is now basically saying the cross-license agreement doesn't apply to future bus interfaces, specifically DMI, (the direct media interface Intel uses to link the Nehalem CPU to a system's memory, a new feature for Nehalem chipsets). Intel has now filed an injunction against us, basically trying to stop us from innovating on DMI.
"We believe our business license with Intel lets us build chipsets for Intel CPUs," Perez said, "specifically for CPUs with integrated memory controllers (such as DMI). The PC has become a GPU-based platform as much as a CPU-based platform, and Intel is trying to delay that inevitable shift. They're trying to do everything they can to slow that down and it's because they recognize the importance of the GPU."
This sentiment was echoed by Nvidia's official press release on the court filing, which hit our in-box while we had Perez on the phone.
"'We are confident that our license, as negotiated, applies," said Jen-Hsun Huang, president and CEO of Nvidia. "At the heart of this issue is that the CPU has run its course and the soul of the PC is shifting quickly to the GPU. This is clearly an attempt to stifle innovation to protect a decaying CPU business."
Among other things, Intel makes CPUs and the circuitry (aka "chipsets") that goes in the motherboards to which those CPUs connect. Nvidia makes 3D cards (aka "GPUs," for graphics processing unit), and it has licensed chipset technology from both AMD and Nvidia to make its own chipsets that support each CPU vendors' respective processors.
Within the last year or so, Nvidia has also aggressively pitched its GPUs as more than simply gaming hardware. By virtue of its CUDA software, and others' software that performs a similar task, Nvidia has begun encouraging software developers to offload certain programming tasks (generally multimedia-oriented operations) from the CPU to the GPU. If this type of programming becomes widespread, Nvidia can then argue that the graphics processor is more important than the traditional CPU to the way we actually use our computers.
Whether Intel's CPU business is decaying is up for debate. Financially speaking, recent shipment data from analyst house IDC indicates that while Intel is maintaining its CPU market share, its revenues are down from 2007, and the outlook for the first half of 2009 is similarly disheartening.
-CNET
READ MORE - Intel takes chipset dispute with Nvidia to court

Intel to invest in three UAE tech firms

Intel Corp, the world’s largest maker of computer chips, will invest in three technology companies based in the United Arab Emirates.
Intel will finance its investment in Conservus International FZ-LLC, Pulse Technologies FZ-LLC and Vertex Animation Studio FZ- LLC from its US$50 million Intel Capital Middle East and Turkey Fund, the company said yesterday in Dubai.“We have a strong pipeline for future investments in the region,” Feroz Sanaulla, director of Intel Capital’s Middle East, Turkey and Africa division, said during a press conference. “Several hundred million dollars have been deployed in the region, and you will see more in the next few months.”Intel, whose processors run more than 80 percent of the world’s personal computers, has announced layoffs this year as the global credit crisis curbed consumer spending, hurting technology companies.The company said on Jan. 21 it would close five older plants that employ as many as 6,000 people, including its last factory in Silicon Valley, as it copes with a worldwide recession.“It’s a very unpredictable situation,” Arvind Sodhani, president of Intel Capital said. “We’re in an economic situation where virtually no company is untouched.”Meanwhile, shareholders of Advanced Micro Devices Inc, Intel’s largest rival, was to vote yesterday on a planned spinoff of plants as part of an investment from the Abu Dhabi government.
READ MORE - Intel to invest in three UAE tech firms

A New look to Windows Command line tutorial

Feb 22, 2009

Windows PowerShell is a new command line shell and task-based scripting technology that provides information technology (IT) administrators comprehensive control and automation of system administration tasks, increasing administrator productivity.

Windows PowerShell includes numerous system administration utilities, consistent syntax and naming conventions, and improved navigation of common management data such as the registry, certificate store, or Windows Management Instrumentation (WMI). Windows PowerShell also includes an intuitive scripting language specifically designed for IT administration.

Supported Platforms:

  • Windows XP Service Pack 2,
  • Windows Server 2003 Service Pack 1,
  • Windows Server 2003 R2,
  • Windows Vista,
  • and Windows Server 2008.

The main advantage of PowerShell ISE is that you can work within two panes:

  • one for typing commands
  • and one where the output results are displayed.
  • There is a third pane for editing scripts, but you can disable it, so as to have more space for the output pane.

Download Link

READ MORE - A New look to Windows Command line tutorial

Protect your Computer from Virus

  • Use a high-quality anti-virus program, and be sure to update it regularly. Use it to scan any files, programs, software, or diskettes (even new software from a commercial company) before you use them on your computer.
  • Make back-up copies of important documents or files and store them on separate diskettes. Making backups will also protect your information against accidental file deletion, diskette failure, and other damage.
  • Whenever you use a computer in a campus lab, be sure to reboot or run “cleanup” before you start your session and log out when you end your session.
  • Do not share commerical software with anyone. It is a violation of the author’s copyright to distribute such material, and it is a way to spread viruses.
  • When you get public domain (PD) software for which the author has granted permission to make copies, get it from a reliable source. (For example, and individual you do not know is not a reliable source.) Before you run PD material, use an anit-virus program to inspect for known viruses.
  • Always scan your disks and files after using them on another computer.
  • Always scan all files you download from the Internet.
  • Always scan Word or Excel file email attachments before you read them.


READ MORE - Protect your Computer from Virus

Why to Move From One functional level to another

Domain Functional Level

  • Windows 2000 mixed (Default)
  • Windows 2000 native
  • Windows Server 2003 interim
  • Windows Server 2003

Windows 2000 mixed:

  • Supported domain controllers: Microsoft Windows NT 4.0, Windows 2000, Windows Server 2003
  • Activated features: local and global groups, global catalog support

Windows 2000 native:

  • Supported domain controllers: Windows 2000, Windows Server 2003
  • Activated features: group nesting, universal groups, SidHistory, converting groups between security groups and distribution groups, you can raise domain levels by increasing the forest level settings

Windows Server 2003 interim:

  • Supported domain controllers: Windows NT 4.0, Windows Server 2003
  • Supported features: There are no domain-wide features activated at this level. All domains in a forest are automatically raised to this level when the forest level increases to interim. This mode is only used when you upgrade domain controllers in Windows NT 4.0 domains to Windows Server 2003 domain controllers.

Windows Server 2003:

  • Supported domain controllers: Windows Server 2003
  • Supported features: domain controller rename, logon timestamp attribute updated and replicated. User password support on the InetOrgPerson objectClass. Constrained delegation, you can redirect the Users and Computers containers.


READ MORE - Why to Move From One functional level to another

Disaster recovery Plan

Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.

Disasters can result from events such as

  • hacker attacks
  • computer viruses
  • electric power failures
  • underground cable cuts or failures
  • fire, flood, earthquake, and other natural disasters at a facility
  • mistakes in system administration

An IT disaster recovery plan takes into account the need to

  • detect the outages or other disaster effects as quickly as possible
  • notify any affected parties so that they can take action
  • isolate the affected systems so that damage cannot spread
  • repair the critical affected systems so that operations can be resumed


READ MORE - Disaster recovery Plan

Recent Posts and Recent Comments at Sidebar

Feb 21, 2009

Many from bloggers wish insatlling the widget of Recent post and Recent post at sidebar, and for this matter is several blogger creating recent post and recent comment widget by javascript, However i think that is not good for your blog SEO (Search Engine Optimization). Besides not good to SEO, installation javascript risk to slow down your blog loading, so that matter it's can make your visitor don't feel balmy.
To install recent post and recent comments, be in fact you can use your blog feed address. this is the address of Recent Post :



http://YourBlogName.blogspot.com/feeds/posts/default

And this is the address of Recent Comments :

http://YourBlogName.blogspot.com/feeds/comments/default

YourBlogName must be alter with your blog name. For example :

this is my Recent Post address :

http://rohman-freeblogtemplate.blogspot.com/feeds/posts/default

And this is my Recent Comments address :

http://rohman-freeblogtemplate.blogspot.com/feeds/comments/default


Still compused to install this feed adress to your blog. Please follow the steps :

  1. Login to blogger with your ID
  2. After entering the dasboard page , click Layout. Please saw the picture :
    layout

  1. Click at Page Element tab. See the picture below :
  2. Click at Add a Page element.
  3. After emerging pop up window , Klik add to blog button for the things Feed. See the picture following :
  4. feed element

  5. After that, Insert your fedd URL (URL feed post for Recent posts or URL feed comment for recent comments). Example :
  6. feed url

  7. Click Continue button.
  8. Then alter the title with Recent Post for recent post widget or Recent Comments for recent comments widget. Example :
  9. feed url

  10. Click SAVE CHANGES button.
  11. Move that element where you want, and then click SAVE button.
  12. Finish. Please see the result.

Now you have had Recent Posts or Recent Comments widget at your sidebar with good SEO for your blog, and without slow loading. See you at my next post, and if you are new visitor don't forget to subcribe in a reader.
READ MORE - Recent Posts and Recent Comments at Sidebar

Seabreeze 3 coulmn Blogger Theme

READ MORE - Seabreeze 3 coulmn Blogger Theme

Revolution Lifestyle Blogger Theme

READ MORE - Revolution Lifestyle Blogger Theme

Cool 3 Column Blogger Theme

Blogger Theme Download
FEATURES:* Two or Three right side columns which are easy to switch (default is three)
* Three great location ad spots (header banner 468 x 60, three 125 x 125 buttons in sidebar, and a 468 x 60 AdSense banner above the first post)
* Integrated Feedburner rss and subscribe via email sidebar module (also includes “add to favorites” Technorati link)
* Built-in live traffic feed widget from FEEDJIT
* Built-in MyBlogLog and BlogCatalog recent reader widgets
* Dynamic tabs easily created by editing the link list widget
* Search box without the need for a “go” button
* Recent posts and comments widgets
* Nicely designed individual blog post comments section
* Properly setup Blogger layout editor

Download Theme

READ MORE - Cool 3 Column Blogger Theme

How to recover corrupted NTFS data through Knoppix Linux Live CD / D

Recently one of my PC having Windows XP failed to boot. I tried to reinstall the OS. But Windows XP installer gave the error message that C drive having NTFS partition contains undefined File system, and it needs to be formatted. The partition in question contained valuable data, and an alternate way was needed.

I tried to boot with Knoppix 5.1.1 Live CD. It was a breezy success. It showed all the partitions of hard disks on my desktop. When I tried to mount the corrupted partition (C drive in Windows), it asked me to Force mount it since the partition in question had some problem. I said yes, and voila! It worked.

I changed the attribute of other mounted harddisks NTFS partition to read-write mode (right click on partition in question and select read write attribute) and copied all my data to other, safe partition. Knoppix 5.1.1 had built in NTFS partition READ-WRITE capabilities. You can also use USB Key or Burn a CD / DVD to backup data.

After backing up my data, I reformatted the C drive and finally I was able to clean reinstall WindowsXP again.

You can download latest Knoppix Live CD / DVD image for free from HERE

READ MORE - How to recover corrupted NTFS data through Knoppix Linux Live CD / D

How to download and install phonon.dll, phonon4.dll, libphonon.dll – phonon.dll download

Many *nix applications are being now ported to Windows and when you try to run them, they display missing phonon.dll file error messages specially if the program is Multimedia kind.

Here are the files you can download :

phonon.dll

phonon4.dll

libphonon.dll

libphononexperimental.dll

Download these files and copy them in application’s directory. For example, if you are using KDE 4 Windows, then place these files in KDE4’s bin directory – where all KDE4 executables are placed.

You can try placing them in Windows system directory too.

READ MORE - How to download and install phonon.dll, phonon4.dll, libphonon.dll – phonon.dll download

Intel Precessor With Heat Sink

A processor number:
  • Represents a broad set of features that can influence overall computing experience
  • Differentiates the relative features within a processor brand family (e.g. within the Intel® Core™2 processor family or within the Intel® Xeon® processor family)
  • The processor number is not a measurement of performance considered when choosing the right processor for you.
READ MORE - Intel Precessor With Heat Sink

How to copy and open multimedia / youtube swf video files from Opera cache?


opera cache folder

Opera browser is notorious in making everything cryptic inside its cache. When it stores internet history in its cache, it renames everything to its liking and you are left behind to guess which file belongs to what.

Still, you can use multimedia files renamed by Opera in such cryptic manner. For example, Multimedia / Youtube video files were normally big in size, and you can easily judge them by their size in cache directory. Oprea cache directory normally located at \Program Files\Opera\profile\cache4\. Under this directory you may find hundreds of files with cryptic names generally started with ‘opr’ prefix. Sort them by size and hunt for the file with a particular time stamp – i.e. the time when you were surfing or streaming a particular audia/video. Copy that file to another folder and rename it with extension swf (if Youtub video) or jpg or mp3 as the case may be. Open the file in appropriate program. If you use Mplayer, then you may directly open files of any media you have copied.

READ MORE - How to copy and open multimedia / youtube swf video files from Opera cache?

Edition of The IDF Processor

While the previous edition of the IDF had been particularly rich in terms of ads around the processor and Atom MID (Mobile Internet Device) or Netbooks that accompany it, the vintage of this August reserve a place smaller to this new platform. Anand Chandrasekher, one of the fathers of mobility at Intel.
READ MORE - Edition of The IDF Processor

Intel silicon Processor LCD

As for the future of Atom, the person has of course referred to the new platform Moorestown without giving more details. A Wafer of Moorestown was still exhibited before qu'Anand Chandrasekher gives us an appointment next spring to learn more about this new platform that would enable Intel to bring its solution Atom in mobile phones, if everything is fine.
And since there was definitely nothing to announce, we video was projected to show us a concept phone tactile, largely inspired by the iPhone but animated by an Intel processor and offering functions geolocation or reading code bar. Finally Anand Chandrasekher gave a demonstration of an Intel MID Atom running the famous game World of Warcraft, the MID is connected to an LCD screen.
READ MORE - Intel silicon Processor LCD

How to Dual / Triple boot Windows 7 with Windows XP / Linux

windows 7

Here is no-nonsense quick take to dual / triple boot Windows 7 with Windows XP and Linux.

What you need additionally : Ubuntu Linux Live (or, any Live Linux CD/DVD) CD/DVD. You can download Ubuntu Live Linux CD from here.

Assuming that you are installing Windows 7 on a separate partition in a machine that had Windows XP and Linux installed already.

If your machine had only Windows XP and no Linux, Windows 7 is generous enough to let you choose to boot older version of Windows through its boot manager.

But, it deliberately ignore other non-windows OS and file system, and hence you can’t boot Linux through Windows 7 boot manager.

In such case, you need to restore GRUB boot manager. Follow these steps carefully and restore your old GRUB:

Boot through Ubuntu Linux Live CD/DVD

Start terminal and give following command:

$ sudo grub

You will then enter in grub configuration mode. Here, give following command:

$ root (hd0,0)

Then give following command:

$ setup (hd%1,%2) - here, %1,%2 is the disk volume and partition value of your original Linux installation where /boot/grub is already installed. For example, in my machine, it is on disk 1, partition 6, so the value will be – (hd0,5). So, be careful here else your Grub will not be restored, and you will get error message instead.

Finally, give following command within grub configuration mode:

$ quit

$ exit

Now, reboot (do not forget to remove Linux Live CD/DVD to boot from HDD). If everything had gone right, your Grub boot manager will load and prompt you to choose to boot from either Linux or Windows 7. Enjoy

READ MORE - How to Dual / Triple boot Windows 7 with Windows XP / Linux

How to reduce / lower temperature of AMD processor?

Your AMD laptop is too hot to handle? It is so hot that you can virtually fry a PAPAD with it or prepare a cup of hot coffee over it?

Your AMD PC are getting freezing now and then due to excessive heat?

Come summer season and you face problem like this – especially in Indian sub-continent.

You can cool down your PC / Laptop a little bit with a little utility though.

AMD had since been released a utility called cool-and-calm utility that works with certain AMD processors and certain OS. If you use Windows, try your luck with this download:

http://www.amd.com/us-en/assets/content_type/utilities/AMD_Processor_Driver_1320053.zip

There is another one for Linux too. Search www.amd.com for your version of linux.

Simply unzip and install the above utility. It takes your processor in on-demand mode by reducing its clock speed and hence keep the temperature less by about 5-10 degree Celsius otherwise.

READ MORE - How to reduce / lower temperature of AMD processor?

Nice Picture from AMD

READ MORE - Nice Picture from AMD

AMD's Six Core CPUs are running

Unlike Intel three-dual-core 220 watt monsters, AMD's are real six-core chips with HT3 consuming 95 watts. Intel will play copycat for the next 20 years...

My guess is that the HT3 cache coherence technology may indeed carry some hidden tricks, maybe something borrowed from the Horus chipset.
READ MORE - AMD's Six Core CPUs are running

Intel Processors terminologies Explained

Clock Speed:

A clock speed measures how fast a processor performs an activity.A clock speed is measured in gigahertz (GHz), which means a billion cycles per second.

Core:
Quad-core technology is a single processor chip including four processor cores or rather four simultaneously hard working brains. A

Software developers chop up their code (known as threading) and run each piece concurrently through whatever processor core happens to be most available. Increasingly, software developers rely on Intel® quad-core and dual-core technology so their multithreaded program can do more things simultaneously producing faster, more efficient results for you.

Tip: for exceptional multitasking, look for Intel® dual-core processors. If you’re a mega-multitasker, gaming elitist, or multimedia maven, look for Intel quad-core processors.

Imagine the RAM of your computer as one city, and the CPU as another. Between them is a wide road (the Front Side Bus). When you’re making calculations, developing graphics - anything you and your software demands - the Front Side Bus transfers data quickly to meet that demand.

Tip: whatever system you choose, make sure the components work together. For example, if you’re building a media computer, having a 1333 MHz front side bus that can handle HD video is wonderful - but make sure the CPU is adequate for the challenge.

Imagine arriving at your local shop and having all your favourite food fly off the shelves and fill the shopping trolley in minutes.

That’s L2 cache. It remembers the information you access most frequently in your computer so you can easily get to it without those annoying lags. (Just don’t expect it to remember documents you didn’t save.)

Tip: more L2 cache reduces bottlenecks and helps speed memory performance.
Enhanced wireless connectivity is your mobility life saver: experience less dead spots and more hot spots.

But optional Intel® Next-Gen Wireless-N is more than enhanced wireless connectivity¹. It’s a performance boost. Next-Gen Wireless-N manages available bandwidth; If there is more than one channel, twice the data can be sent, up to twice as fast.

Tip! Ask for Intel® Next-Gen Wireless-N technology in your notebook purchase if you want a faster connection where 802.11n networks are available.

¹ Intel® Next-Gen Wireless-N technology and Connect with Intel® Centrino® processor technology certified wireless N access point. Wireless N access points without the Connect with Intel Centrino technology processor identifier may require additional firmware for increased performance results. Check with your PC and access point manufacturer for details.

Requires Intel® Next-Gen Wireless-N technology and Connect with Intel® Centrino® processor technology certified wireless N access point. Wireless N access points without the Connect with Intel Centrino technology processor identifier may require additional firmware for increased performance results. Check with your PC and access point manufacturer for details.

READ MORE - Intel Processors terminologies Explained

Latest Intel Desktop Processors Features

Extreme Gaming with the Intel® Core™ i7 Processor Extreme Edition

The Intel® Core™ i7 processor Extreme Edition with intelligent multi-core technology.It delivers breakthrough performance in gaming. Plus, multitask demanding applications up to 25% faster and unleash amazing power for digital media.

Features:

  • Clock Speed 3.2 Ghz
  • Cores/Threads 4/8
  • Turbo Boost Up to 3.46 Ghz Boost
  • Intel® Smart Cache 8 Mb
Intel® Core™ i7 Processor

Best for the heaviest workloads. Intel® Core™ i7 processor, the best desktop processor on the planet. Built on advanced technology that automatically applies processing power where it’s needed most, the Intel Core i7 processor’s incredible speed and efficiency lets you multitask 25% faster and delivers an amazing multimedia creation experience.

Features:

  • Clock Speed up to 2.93 Ghz
  • Cores/Threads 4/8
  • Turbo Boost Up to 3.46 Ghz Boost
  • Intel® Smart Cache 8 Mb

Intel® Core™2 Quad Processor
Get the performance you need to handle the hottest digital media, content-creation software, and immersive multi-threaded games. Four cores provide all the power you need to achieve smooth effects during game play, plus the capacity to handle today’s processor-hungry multimedia applications.

Features:

  • Clock Speed up to 2.83 Ghz
  • Cores/Threads 4
  • FSB(Front Bus Speed) Up to 1333 Mhz
  • L2 Cache 4 Mb

Intel® Core™2 Duo Processor
Enter the performance-packed and energy-efficient world of HD entertainment.Get amazing responsiveness for gaming or running complex applications with the Intel® Core™2 Duo processor. Load large files faster and run multiple applications simultaneously—all while enjoying your entertainment without lag time.

Features:

  • Clock Speed up to 3.16 Ghz
  • Cores/Threads 2
  • FSB(Front Bus Speed) Up to 1333 Mhz
  • L2 Cache 6 Mb
READ MORE - Latest Intel Desktop Processors Features

Difference between 32-bit and 64-bit Operating System

  • The terms 32-bit and 64-bit refer to the way a computer’s processor (also called a CPU), handles information.
  • The 64-bit versions of Windows can utilize more memory than 32-bit versions of Windows.
  • By using 32 bits your processor can represent numbers from 0 to 4,294,967,295 while a 64-bit machine can represent numbers from 0 to 18,446,744,073,709,551,615.
  • 64 bit minimize the time spent swapping processes in and out of memory by storing more of those processes in Random access memory (RAM) rather than on the hard disk.
  • 64bit can increase overall program performance
  • 64 bit benefit to academic institutions and private companies, where large calculations are being performed, huge databases are being accessed, and complex problems are being solved.
  • A 64-bit processor is made with more advanced silicon processes, have more transistors, and faster speeds.
  • In 64 bit you need 4 GB of RAM to take full advantage of the capabilities
  • There is another problem when you run 32-bit software programs in the environment of a 64-bit operating system. Many programs won’t work properly, such as Adobe Acrobat and Windows Media Player

64-bit

READ MORE - Difference between 32-bit and 64-bit Operating System

Intel Multi-Core Technology Features

  • multicore
  • It Incorporates multiple processor execution cores in a single package in order to deliver full parallel execution of multiple software threads
  • It put multiple execution cores into a single processor as well as continuing to increase clock frequency
  • By incorporating multiple cores, each core is able to run at a lower frequency, dividing among them the power normally given to a single core. The result is a big performance increase over a single core processor.
  • Continuous advances in silicon process technology from 65 nm to 45 nm and to 32 nm) to increase transistor density.
  • Minimizes latency and improves efficiency and speed.
READ MORE - Intel Multi-Core Technology Features

Intel’s 32nm Process Technology

  • Intel introduces 32nm process technology with second generation high-k + metal gate transistors. This process technology builds upon the tremendously successful 45nm process technology that enabled the launch of the Intel® microarchitecture codename Nehalem and the Intel® Core™ i7 processor.

READ MORE - Intel’s 32nm Process Technology

General keyboard shortcuts

CTRL+C Copy.
CTRL+X Cut.
CTRL+V Paste.
CTRL+Z Undo.
DELETE Delete.
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin.
CTRL while dragging an item Copy selected item.
CTRL+SHIFT while dragging an item Create shortcut to selected item.
F2 Rename selected item.
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word.
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word.
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph.
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph.
CTRL+SHIFT with any of the arrow keys Highlight a block of text.
SHIFT with any of the arrow keys Select more than one item in a window or on the desktop, or select text within a document.
CTRL+A Select all.
F3 Search for a file or folder.
ALT+ENTER View properties for the selected item.
ALT+F4 Close the active item, or quit the active program.
ALT+Enter Displays the properties of the selected object.
ALT+SPACEBAR Opens the shortcut menu for the active window.
CTRL+F4 Close the active document in programs that allow you to have multiple documents open simultaneously.
ALT+TAB Switch between open items.
ALT+ESC Cycle through items in the order they were opened.
F6 Cycle through screen elements in a window or on the desktop.
F4 Display the Address bar list in My Computer or Windows Explorer.
SHIFT+F10 Display the shortcut menu for the selected item.
ALT+SPACEBAR Display the System menu for the active window.
CTRL+ESC Display the Start menu.
ALT+Underlined letter in a menu name Display the corresponding menu.
Underlined letter in a command name on an open menu Carry out the corresponding command.
F10 Activate the menu bar in the active program.
RIGHT ARROW Open the next menu to the right, or open a submenu.
LEFT ARROW Open the next menu to the left, or close a submenu.
F5 Refresh the active window.
BACKSPACE View the folder one level up in My Computer or Windows Explorer.
ESC Cancel the current task.
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.
READ MORE - General keyboard shortcuts

Windows Service Recommened Settings

Event Log
It’s best to leave this one on Automatic.

Protected Storage
Leave this set to Automatic, as setting it to Manual can cause a delay at startup of 1 to 2 minutes. It also has the odd side effect of causing property pages in the Services tab not to appear.

Net Logon

if you do need to logon to a domain or LAN, you need to keep this on Automatic.

Alerter

A home user can set this to Manual.

Computer Browser
A home user can set this to Manual.

Distributed Link Tracking Client
This sends notifications of files moving between NTFS volumes in a network domain. A home user can set this to Manual.

Distributed Transaction Coordinator
A home user can set this to Manual.

Fax Service
If you are not using Modems with Fax capabilities, you should set this to Manual.

Indexing Service
A home user can set this to Manual.

Internet Connection Sharing
If you are sharing an Internet connection on a small home network, then set this to Automatic. If not, set this to Manual.

IPSEC Policy Agent
This manages IP security. A home user can set this to Manual.

Messenger
Messenger sends and receives messages transmitted by administrators or by the Alerter service. A home user can set this to Manual.

NT LM Security Support Provider
This provides security to Remote Procedure Call programs that use transports other than named pipes. A home user can set this to Manual.

Performance Logs & Alerts
This configures performance logs and alerts. A home user can set this to Manual.

Print Spooler
If you don’t have a printer installed (network or local), you can set this to Manual. Remember to change it back to Automatic if you ever do install a printer.

QoS RSVP
This feature provides network signaling and local traffic control setup functionality for QoS-aware programs & control applets. A home user can set this to Manual.

Remote Registry Service
Allows remote registry manipulation. You should set this to Disable.

Routing & Remote Access
This offers routing services to businesses in local area and wide area network environments. A home user can set this to Manual.

RunAs Service
This enables starting processes under alternate user IDs. A home user can set this to Manual.

Security Accounts Manager
This stores security information for local user accounts. Unless you have changed some security policies via the Local Security Policy editor, you can set this to Manual.

Smart Card and Smart Card Helper
A home user can set these to Manual.

TCP/IP NetBIOS Helper Service
This service enables NetBIOS name resolution. A home user can set this to Manual.

Telnet
A home user can Disable it altogether.

DNS client
A home user can usually set this to manual, as it’s used for when you use a DNS server on your network (i.e., not the Internet or dial up connections). If you have name resolution problems afterwards, put this one back to Automatic.

Server Service
This Provides RPC support and file, printer and name pipe sharing. You can set this to manual, unless you are running IIS or using offline files (or similar features), which is not that likely for a home desktop user.

Workstation Service
You should be able to set this to Manual unless you use Alerter or Messenger, in which case set this to Automatic. Otherwise. you should be able to safely set this to Manual instead.

WMDM PMSP Service
I suggest it’s set to manual. If you have any problems with Media Player, set it back to Automatic.

READ MORE - Windows Service Recommened Settings

How to uninstall application using Windows Instrumentation command-line interface (WMIC) instead GUI

By using the Windows Instrumentation command-line interface (WMIC), you can easily uninstall an application without having to use the GUI. Once you become familiar with the steps, it will be much faster than having to access the Add/Remove Programs applet in the Control Panel.

1. Open a command prompt.
2. Input WMIC and press Return. You will see a prompt that looks like this:
wmic:root\cli>
3. At the new prompt, execute the following command:
product get name
This will generate a list of installed applications.
4. At the prompt, execute the following command:
product where name=”" call uninstall
where application name is the name of the program you wish to uninstall (use the exact name provided by the previously generated list).
For example, if I were wanting to uninstall Adobe Reader 9, my command would look like this:
product where name=”Adobe Reader 9″ call uninstall
5. When prompted, input y to confirm that you wish to uninstall the application and press Return.
The application will be uninstalled.

Supporting Operationg Systems:Windows XP Professional, Windows Vista, Windows Server 2003 and Windows Server 2008.


READ MORE - How to uninstall application using Windows Instrumentation command-line interface (WMIC) instead GUI

Cisco router Planes

Feb 18, 2009

The router is typically segmented into three planes, each with a clearly identified objective. The dataplane allows the ability to forward packets; the control plane allows the ability to route data correctly; and the management plane allows the ability to manage network elements.

  • Management Plane—The management plane manages traffic that is sent to the Cisco IOS device and is made up of applications and protocols such as SSH and SNMP.
  • Control Plane—The control plane of a network device processes the traffic that is paramount to maintaining the functionality of the network infrastructure. The control plane consists of applications and protocols between network devices, which includes the Border Gateway Protocol (BGP), as well as the Interior Gateway Protocols (IGPs) such as the Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF).
  • Data Plane—The data plane forwards data through a network device. The data plane does not include traffic that is sent to the local Cisco IOS device.


READ MORE - Cisco router Planes

Cisco Technologies to Secure Router Planes

Data Plane:

  • Technologies
  • NetFlow
  • Access Control List
  • Unicast Reverse Path Forwarding (uRPF)
  • Remote Triggered Black Hole (RTBH)
  • QoS Tools

Management Plane:

  • CPU/Memory Threshold Notification
  • Management Plane Protection (MPP)
  • Role Based Access Control (RBACL)
  • Secure Access
  • Image Verification
  • Configuration Logger

Control Plane:

  • Control Plane Protection (CPPr)
  • Routing Protection
  • Receive ACLs
  • BGP TTL Security Check


READ MORE - Cisco Technologies to Secure Router Planes

Understand Cisco New IOS Packaging

Cisco IOS® Packaging simplifies the image selection process by consolidating the number of packages and using consistent package names across platforms.Cisco has begun repackaging all IOS versions with its new naming conventions, starting with IOS version 12.3 specifically designed for Cisco 1700, Cisco 2600XM, Cisco 2691, the Cisco 3700 Series Access Routers, and the Cisco 1800, 2800, and 3800 Integrated Services Router family. It is available in Cisco IOS Software Major Release 12.3M/T, with additional enhancements in 12.4M/T.

CISCO IOS new packages are as fellows

  1. I P Base
  2. IP Voice
  3. Enterprise Base
  4. Advanced Security
  5. SP Services
  6. Advanced IP Services
  7. Enterprise Services
  8. Advanced Enterprise Services

newios

Each group contains large number of features inside the package For example, the Advanced Security package contains the Cisco IOS Firewall, IPSEC, 3DES, VPN, and SSH. So

IP Base or IP Base without Crypto-Entry level Cisco IOS Software image (Classic IP Data + trunking and DSL)

IP VoiceText Box or IP Voice without CryptoText Box-Adds VoIP, VoFR to IP Base (Adds Voice to Data)

SP Services-Adds SSH/SSL, ATM, VoATM, MPLS, etc. to IP Voice (Adds SP Services to Voice & Data)

Advanced Security-Adds Cisco IOS FW, IDS/IDP, NAC, SSH/SSL, IPsec VPN, etc. to IP Base (Add Security/VPN to Data)

Enterprise BaseText Box or Enterprise Base without CryptoText Box:-Adds Enterprise Layer 3 routed protocols (AT, IPX, etc.) and IBM support to IP Base (Add Multiprotocol Services to Data)

Enterprise Services or Enterprise Services without Crypto-Adds full IBM support, Service Provider Services to Enterprise Base (Merge Enterprise Base & SP Services)

Advanced IP Services-Adds IPv6, Advanced Security to SP Services (Merge Advanced Security & SP Services)

Advanced Enterprise Services-Full Cisco IOS Software (Merge Advanced IP Services & Enterprise Services)

READ MORE - Understand Cisco New IOS Packaging

VLANs Basics

VLANs are broadcast domains in a Layer 2 network. Each broadcast domain is like a distinct virtual bridge within the switch. Each virtual bridge you create in a switch defines a broadcast domain. By default, traffic from one VLAN cannot pass to another VLAN. Each of the users in a VLAN is also in the same IP subnet, and each switch port can belong to only one VLAN.The three characteristics of a typical VLAN setup are:

  • Each logical VLAN is like a separate physical bridge.
  • VLANs can span multiple switches.
  • Trunks carry traffic for multiple VLANs.

By default, each port on a switch can belong to only one VLAN. For devices that are in VLANs (that span multiple switches) to talk to other devices in the same VLAN, you must use trunking or have a dedicated port per VLAN. Trunk links allow the switch to carry multiple VLANs across a single link.

vlan


READ MORE - VLANs Basics

Cisco Career Certifications Path

General Certifications: Three Levels of Certification

  • Associate: The first step in Cisco networking begins at the Associate level, which also includes CCENT, an interim step to Associates for those with little job experience. Think of the Associate level as the apprentice or foundation level of networking certification.
  • Professional. This is the advanced or journeyman level of certification.
  • Expert. This is CCIE, the highest level of achievement for network professionals, certifying an individual as an expert or master.

General Certifications: Six Different Paths

  • Routing and Switching: This path is for professionals who install and support Cisco technology-based networks in which LAN and WAN routers and switches reside.
  • Design: This path is aimed at professionals who design Cisco technology-based networks in which LAN and WAN routers and switches reside.
  • Network Security: This path is directed toward network professionals who design and implement Cisco Secure networks.
  • Service Provider: This path is aimed at professionals working with infrastructure or access solutions in a Cisco end-to-end environment primarily within the telecommunications arena.
  • Storage Networking: This path is for professionals who implement storage solutions over extended network infrastructure using multiple transport options.
  • Voice: This path is directed toward network professionals who install and maintain Voice solutions over IP networks.

Certification Paths: Routing & Switching

Associate: CCNA

Professional: CCNP

Expert: CCIE Routing & Switching

Certification Paths: Design

Associate: CCNA & CCDA

Professional: CCDP

Expert: CCDE

Certification Paths: Network Security

Associate: CCNA Security

Professional: CCSP

Expert: CCIE Security

Certification Paths: Service Provider

Associate: CCNA

Professional: CCIP

Expert: CCIE Service Provider

Certification Paths: Storage Networking

Associate: CCNA

Professional: CCNP

Expert: CCIE Storage Networking

Certification Paths: Voice

Associate: CCNA Voice

Professional: CCVP

Expert: CCIE Voice

Certification Paths: Wireless

Associate: CCNA Wireless

Professional: Coming Soon

Expert: CCIE Wireless

careers-graph


READ MORE - Cisco Career Certifications Path

Difference between IGP(Interior Gateway Protocols) & EGP(Exterior Gateway Protocols)

IGP:

  • Within a single autonomous system
  • Single network administration
  • Unique routing policy
  • Make best use of network resource
  • An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks).
  • IGP’s fall into two categories:
    • Distance Vector Protocols
      • Routing Information Protocol (RIP)
      • Interior Gateway Routing Protocol (IGRP)
    • Link State Protocols
      • Open Shortest Path First (OSPF)
      • Intermediate System to Intermediate System (IS-IS)

EGP:

  • Among different autonomous systems
  • Independent administrative entities
  • Communication between independent network infrastructures
  • Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
  • EGP is commonly used between hosts on the Internet to exchange routing table information.
  • Examples of an EGP:
    • Border Gateway Protocol (BGP)
    • Exterior Gateway Protocol (Replaced by BGP)
READ MORE - Difference between IGP(Interior Gateway Protocols) & EGP(Exterior Gateway Protocols)

Why to use the Cisco Enterprise Composite Model

  • Cisco has used the three-level hierarchical network design model for years. This older model (also referred to as the switch block model) provided a high-level idea of how a reliable network could be conceived but was largely conceptual, because it did not provide specific guidance.
  • Cisco therefore developed a newer design model-the enterprise composite model-that is significantly more complex.
  • This model attempts to address the major shortcomings of the hierarchical model by expanding the older version and making specific recommendations about how and where certain network functions should be implemented.

The enterprise composite model is broken up into three areas :

  • Enterprise campus
  • Enterprise edge
  • Service provider edge

The Enterprise Campus module deals with the campus, defined as one or more buildings on a local area connected with a high speed network. The campus does not provide remote/Internet access. The campus is broken into functional areas, described below.

  • Campus backbone (core layer)
  • Building distribution
  • Building access
  • Management
  • Server farm (for enterprise services)

The Enterprise Edge module connects the Enterprise Campuses, and other internal resources such as the WAN.

  • E-Commerce
  • Internet connectivity
  • Remote access (dial-up and VPN)
  • WAN (internal links)

The Service Provider edge is the demarcation to the Internet and other remote access services.

  • Internet service provider (ISP)
  • Public Switched Telephone Network (PSTN) for dialup
  • Frame Relay, ATM, and PPP for private connectivity

safe_wp2


READ MORE - Why to use the Cisco Enterprise Composite Model

Cisco CCNA Security 640-553 IINS Tutorials Part-16

Rivest, Shamir, and Adleman (RSA) Invented by Ron Rivest, Adi Shamir, and Len Adleman in 1977, RSA is one of the most common asymmetric algorithms in use today. This public-keyalgorithm was patented until September 2000, when the patent expired, making the algorithm part of the public domain. RSA has been widely embraced over the years, in part because of its ease of implementation and its flexibility.

role-based command-line interface (CLI) views Can be used to provide different sets of configuration information to different administrators. However, unlike making commands available via privilege levels, using role-based CLI views you can control exactly what commands an administrator has access to.

RTP Control Protocol (RTCP) Provides information about an RTP flow, such as information about the quality of the call. In a Cisco environment, RTCP typically uses odd-numbered UDP ports in the range 16,384 to 32,767.

salami attack A collection of small attacks that result in a larger attack when combined.

salt A series of random bits added to a password. When the password is hashed, and that hash is stored in a database, two identical passwords do not create the same hash. This also protects the passwords from attacks involving rainbow tables.

Secure RTP (SRTP) Secures the transmission of voice via Real-time Transport Protocol (RTP). Specifically, SRTP adds encryption, authentication, integrity, and antireplay mechanisms to voice traffic.

Secure Shell (SSH) A protocol that provides encryption and authentication functions for remote terminal sessions. This allows an administrator to securely attach to and exchange information with a router, for example. Cisco recommends that SSH be used instead of Telnet because Telnet sends data in plain text.

Security level Defines the type of security algorithm performed on SNMP packets. Examples of security levels are noAuthNoPriv, authNoPriv, and authPriv.

Security model Defines an approach for user and group authentication. Cisco IOS supports the SNMPv1, SNMPv2c, and SNMPv3 security models.

Security policy A continually changing document that dictates a set of guidelines for network use. These guidelines complement organizational objectives by specifying rules for how the network is used.

READ MORE - Cisco CCNA Security 640-553 IINS Tutorials Part-16

Cisco CCNA Security 640-553 IINS Tutorials Part-17

Security zone Consists of a group of interfaces to which a policy can be applied. Grouping interfaces into zones involves two steps. First, a zone must be created so that interfaces may be attached to it. Second, an interface must be configured to be a member of a given zone.

SHA-1 Secure Hash Algorithm 1. One of five cryptographic hash functions known as SHA hash functions. They were designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard. SHA-1 computes a fixed-length digital representation (a message digest) from an input data sequence (the message) of any length.

Signature definition file (SDF) A database of signatures used to identify malicious traffic. Modern routers typically ship with an SDF file installed in flash memory. However, the administrator usually needs to periodically update the router’s SDF, because Cisco routinely updates these files to address emerging threats.

Simple Network Management Protocol (SNMP) A management protocol that allows an SNMP manager to collect information from an SNMP agent.

Skinny Client Control Protocol (SCCP) A Cisco-proprietary signaling protocol often called Skinny protocol. SCCP is often used for signaling between Cisco IP Phones and Cisco Unified Communications Manager servers. However, some Cisco gateways also support SCCP. SCCP is considered a client/server protocol, such as MGCP and H.248.

Small Computer Systems Interface (SCSI) In terms of SAN networking, the SCSI communications model serves as the basis for all the major SAN transport technologies. In fact, you could say that a SAN can best be described as the merging of SCSI and networking.

SNMP agent A piece of software that runs on a managed device (such as a server, router, or switch).

SNMP GET A message that is used to retrieve information from a managed device

SNMP manager Runs a network management application. Sometimes called a Network Management Server (NMS).

SNMP SET A message that is used to set a variable in a managed device or to trigger an action on the managed device.

READ MORE - Cisco CCNA Security 640-553 IINS Tutorials Part-17

Cisco CCNA Security 640-553 IINS Tutorials Part-18

SNMP trap An unsolicited message sent from the managed device to an SNMP manager. It can be used to notify the SNMP manager about a significant event that occurred on a managed device.

Snooping Broadly defines a class of attacks focused on compromising the confidentiality of data. In terms of SAN deployments, these attacks seek to give an attacker access to data that would otherwise be confidential.

Software Encryption Algorithm (SEAL) This kind of encryption uses a 160-bit encryption key. It offers the benefit of having less of an impact on the CPU compared to other software-based algorithms. It is an alternative to software-based DES, 3DES, and AES.

Spam over IP telephony (SPIT) VoIP spam. A SPIT attack on your Cisco IP Phone could, for example, make unsolicited messages periodically appear on the phone’s LCD screen or make the phone ring periodically.

Spoofing Imitating a given resource by alternative means. In network terms this might represent the spoofing of an IP address, where an attacker poses as the valid recipient at a given IP address to intercept traffic.

Standard access control list (ACL) Standard ACLs allow traffic to be permitted or denied from only specific IP addresses. With these ACLs, the packet’s destination and the ports involved are not taken into account.

Static firewall This first-generation firewall technology analyzes network traffic at the transport protocol layer. IP packets are examined to see if they match one of a set of rules defining which data flows are allowed. These rules specify whether communication is allowed based on information contained in the network and transport layer headers as well as the direction of the packet flow.

Storage-area network (SAN) In a SAN, storage devices are shared among all networked servers as peer resources. A SAN may be used to connect servers to storage, servers to each other, and storage to storage.

Stream cipher Uses smaller units of plain text than what are used with block ciphers. Typically they work with bits. Transformation of these smaller plain-text units also varies, depending on when during the encryption process they are encountered. One of the great benefits of stream ciphers as compared to block ciphers is that they are much faster. Generally they do not increase the message size because they can encrypt an arbitrary number of bits.

Supplicant A user device (such as a PC) that requests permission to access the network. This device must support the 802.1x standard. For example, a PC running the Microsoft Windows XP operating system supporting 802.1x could act as a supplicant.

READ MORE - Cisco CCNA Security 640-553 IINS Tutorials Part-18

Cisco CCNA Security 640-553 IINS Tutorials Part-20

Transparent firewall A Layer 2 firewall that behaves like a “stealth firewall.” In other words, it is not seen as a router hop to connected devices. In this implementation, the security appliance connects the same network on its inside and outside ports. However, each interface resides on a separate VLAN.

Transport mode Uses a packet’s original IP header, as opposed to adding a tunnel header for packets traveling over an IPsec-protected VPN. This approach works well in networks in which increasing a packet’s size could cause an issue.

Triple Data Encryption Standard (3DES) Applies the DES algorithm three times in a row to a plain-text block, but each application uses a different key. Applying DES three times with different keys makes brute-force attacks on 3DES unfeasible. This stems from the fact that the basic algorithm has stood the test of time, weathering 35 years in the field, proving quite trustworthy.

Trojan horse A piece of software that appears to perform a certain action but in fact performs another action, such as a computer virus. This action, generally encoded in a hidden payload, may or may not be malicious in nature.

Tunnel mode Unlike transport mode, tunnel mode encapsulates an entire packet traveling over an IPsec-protected VPN. As a result, the encapsulated packet has a new IPsec header. This new header has source and destination IP address information that reflects the two VPN termination devices at two different sites. Therefore, tunnel mode is frequently used in an IPsec site-to-site VPN.

Turbo access control list (ACL) Processes ACLs into lookup tables for greater efficiency. Turbo ACLs use the packet header to access these tables in a small, fixed number of lookups, independent of the existing number of ACL entries.

User datagram protocol (UDP) A communications protocol that has no error recovery features and is mostly used to send streamed material over the Internet.

VACL VLAN access control list. An ACL applied within a VLAN, as opposed to an ACL applied when traffic travels from one VLAN, or subnet, to another (as typically seen on a router).

virtual private network (VPN) A logical connection (sometimes called a tunnel) that can be established over an “untrusted” network (such as the Internet). An IPsec VPN can use a series of security protocols and algorithms to protect the traffic flowing over a VPN tunnel.

virtual SAN (VSAN) Created from a collection of ports that are part of a set of connected Fibre Channel switches. Together these ports form a virtual fabric. Ports within a single switch may be partitioned off to form multiple VSANs. Conversely, multiple switches may be used together, and any number of their ports may be joined to form a single VSAN.

READ MORE - Cisco CCNA Security 640-553 IINS Tutorials Part-20

CCNA Security Certification Overview

640-553 IINS IINS - Implementing Cisco IOS Network Security

CCNA Security is a new Associate Level certification designed to build upon the CCNA certification and as a prerequisite for the CCSP - Cisco Certified Security Professional certification. The Cisco CCNA Security certification validates the knowledge required to install, troubleshoot, and monitor Cisco security network devices. In addition, CCNA Security confirms an individual’s skills for job roles such as network security specialist, security administrator, and network security support engineer.


READ MORE - CCNA Security Certification Overview

Simple Solutions For Runtime Error 339

Feb 14, 2009

Runtime errors are actually quite common within the Windows computer environment and there are more than a few hundred known ones that have been affecting PC users all over the world. Runtime error 339 is just one of the many hiccups that Windows might experience while running its system and it is actually quite a natural progression of owning a computer that runs on any one of the many incarnations of the Windows operating system. What is runtime error 339? It usually occurs when there is a missing .ocx file when an end user is trying to install a program or an application.

The error doesn't really show up when you are installing the software, but rather when you are trying to manoeuvre around the program and use its functions. Like any runtime error, it typically occurs when a link in the chain of processes that leads to a program launch is either interrupted or missing or even corrupted. In the value chain of launching a program, there are several system files and data files that are needed to ensure the integrity of the program launch. Using the analogy of a rocket launch, all parties must work together, from the control tower, to the fuelling trucks, to the co-ordinators and even the astronauts to ensure that launch goes up without a hitch.

This is the 'runtime', the processes that happen from one stage to the nest, a countdown to a launch that is dependent on the process and every member within that process performing their very own functions to the T. Imagine if you will if the fuel truck doesn't show up, or if one of its tyres blows out, or if one of the many computer screens in the control tower fails to start. These are just some of the many dynamic failures that can happen within the process or the 'runtime' and when that happens, an error occurs and the rocket or the program cannot launch. And because the computer is so much more complex and so much more intricate, there are hundreds of combinations of missing files and corrupt data that can lead to a bad process chain. But just as there are plenty of possible causes, there are many ways that you can solve these runtime errors and this can apply to runtime error 339.

First, look at the program that you are trying to install and try to check for the integrities of the various files needed. Check if the program needs specific system and control files (Java, Active X etc), which can be a root cause to why it refuses to launch. Also, check the registry as well, because bad program installs, null values and orphan keys are one of they major causes of runtime errors. You can sort this problem out by downloading a free and reliable registry cleaner, which can ensure the integrity of the programs and command lines which Windows uses as reference in order for a smooth system launch. These simple solutions can be applied to runtime error 339 or any of the possible errors Windows can come up with.

Logan Albright is an authority on troubleshooting computer problems at http://www.pcaholic.com. Where he helps thousands how to optimize their computers through a proper computer check up. Click Here to fix your runtime errors for free.

READ MORE - Simple Solutions For Runtime Error 339

What Do I Do If My Computer Keeps Freezing?

The common thing that most computer users end up doing when their computer freezes up on them is usually a show of temper of some sort, be it banging their hands on their desks in frustration or restraining the urge to hit any nearby computer peripherals (the usual 'victim' being the screen). Some might even hit the CPU case thinking that doing so might help get the computer working again.

What everyone needs to remember is that the computer is not a sentient living being with a mind of its own, which fears reprimand every time it acts up. Abusing the computer physically (or even verbally) will not help at all. If you have ever found yourself asking the question "What do I do if my computer keeps freezing" then this article will answer that question for you.

The fact is, freezing computers are a common phenomenon, and for those with relatively outdated systems it has become almost an inevitable expectation of sorts. Common symptoms include a frozen cursor and the inability to launch any program, and your desktop would for all intents and purposes be frozen in a sort of suspended animation. This is usually followed by beeping noises coming from the CPU when you try and tap the keys of your keyboard, indicating that all signals to the motherboard and back have been blocked.

At this point most people might be looking at the reset or power button in fear, especially if they have not had the chance to save their work prior. Let's face it, by now there is pretty much nothing you can do but hope that the auto-save feature kicked in before your computer froze.

What needs to be done is to ensure that the computer does not freeze in the first place, and in order to avoid this inconvenience from ever occurring again, we need to look into the various reasons why it does so. One of the common reasons happens to be a lack of memory, and to put it simply, with insufficient memory the computer becomes stressed at having to handle memory intensive programs that it simply gives up and stops functioning.

If you're running memory intensive programs be sure you're not running them simultaneously. Run them one at a time to avoid overwhelming your computer's limited memory resources. If you absolutely need to run multiple memory intensive programs then perhaps you should look into upgrading your memory. Buy additional sticks of RAM, which are relatively cheap these days, and boost the memory of your system.

Also, another possible reason for system freezes could be bad code in programs, especially games and high-end software, which can lock up your computer when Windows cannot execute the code written in them. Always check the integrity of the programs that you are going to install and check for any possible conflict issues with other software or even hardware. Hardware conflicts are pretty common as well, so make sure you have those sorted out before buying anything new and expensive.

There may also be a conflict in the registry between local keys and null values, which means that the OS will lock up whenever you try to launch a program. One of the best ways to fix these conflicts and even clean up and speed up your PC is to get a registry or PC cleaner, which can solve most software based problems and clean out the junk in your system folders which can lead to memory overload and the infamous computer freeze. A good registry cleaner has been the saviour of many computers and yours should be no exception.

Logan Albright is an authority on troubleshooting computer problems at http://www.pcaholic.com. Where he helps thousands how to optimize their computers through a proper computer check up. Click Here when Windows has recovered from a serious error.

READ MORE - What Do I Do If My Computer Keeps Freezing?

Administrative Distance

Feb 13, 2009

Advertised Distance is the distance a neighbor router says, or advertises, is the distance to a destination. This is key in electing a feasible successor or backup route. The lower the distance, the better. The lower the value the better the route is believable. These values can be changed with the distance command.

Administrative Distances

Protocol Distance Value

Connected Interface 0
Static routes 1
EIGRP Summary routes 5
EBGP 20
Internal EIGRP 90
IGRP 100


OSPF 110
RIP 120
EGP 140
External EIGRP 170
Internal BGP 200

READ MORE - Administrative Distance

Today Available Web browser List

A Web browser is a software application which enables a user to display and interact with text, images, videos, music, games and other information typically located on a Web page at a Web site on the World Wide Web or a local area network.
  • Internet Explorer
  • Mozilla Firefox
  • Safari
  • Opera
  • Avant Browser
  • Konqueror
  • Lynx
  • Google Chrome
  • Maxthon
  • Flock
  • Arachne
  • Epiphany
  • K-Meleon
  • AOL Explorer.
READ MORE - Today Available Web browser List

f Cisco Router Series


Cisco 2600 Series Routers
The Cisco 2600 series router, with over 70 network modules and interfaces, offers versatility and expandability ideal for branch office connectivity in a multiservice access router. In addition, Cisco 2600 series routers provide flexible LAN and WAN configurations, multiple security options and a range of high performance processors. By deploying Cisco 2600 series routers, companies can consolidate the functions of multiple separate devices into a single, compact package that can be managed remotely.

Cisco 3600 Series Routers
The Cisco 3600 series router is a family of modular, multi-service routers for medium and large size offices as well as smaller Internet Service Providers. Cisco 3600 routers support over 70 modular interface options in a high performance manageable access platform. The Cisco 3600 series routers provide solutions for data, voice, video, hybrid dial access, Virtual Private Networks (VPNs), and multi-protocol data routing while integrating the functions of several devices into a single manageable solution.

Cisco 3700 Series Routers
The Cisco 3700 series multiservice access router enables dramatically higher levels of application and service integration in enterprise branch offices. With on-board LAN/WAN connectivity, new high-density service modules, and support for multiple Advanced Integration Modules (AIMs), the Cisco 3700 series routers deliver internal inline power for the EtherSwitch ports, thus delivering a compelling single platform Branch Office IP Telephony and Voice Gateway solution which enables flexible, incremental, and scalable migration to a converged branch office network.

Cisco 6400 Series Universal Concentrators
The Cisco 6400 carrier-class broadband concentrator is a high-performance, scalable service gateway that enables the selection and delivery of broadband network services, Virtual Private Networks (VPNs) and voice and entertainment-driven traffic over the full suite of access media. Cisco 6400 series concentrators include Service Selection Gateway (SSG), which allows subscribers to dynamically select on-demand services. As the gateway to next generation services, the SSG enables services such as videoconferencing, streaming video, personalized Internet, business-grade Internet, shopping, and gaming to create new revenue streams and help attract and retain subscribers.

Cisco 7200 Series Routers
The Cisco 7200 series router is ideally suited as WAN edge devices for enterprises and service providers. The modularity of Cisco 7200 series routers makes them ideal for enterprises seeking to build scalable solutions based on differing requirements for density, performance, and availability. In addition, Cisco 7200 series routers include a Multiservice Interchange (MIX)-enabled backplane to enable integration of data, voice, and video functions previously performed by separate devices into a single platform.


READ MORE - f Cisco Router Series

Network cabling requirements for ethernet


  • 10Base2 50-ohm coaxial is also called thinnet which is up to 185 meters and supports 30 hosts per segment. Physical and logical bus is used with AUI connectors.
  • 10Base5 50-ohm coaxial is also called thicknet which is up to 500 meters and supports 208 users per segment. It uses a physical and logical bus with AUI connectors. It is up to 2500 meters with repeaters and supports 1024 users for all segments.
  • 10BaseT EIA/TIA category 3, 4, or 5, using two-pair unshielded twisted-pair (UTP) wiring supports one user per segment; up to 100 meters long.RJ-45 connector is used along with star topology.
  • 100BaseTX EIA/TIA category 5, 6, or 7 UTP two-pair wiring supports one user per segment; up to 100 meters long. It uses an RJ-45 MII connector with a physical star topology and a logical bus.
  • 100BaseFX Uses fiber cabling 62.5/125-micron multimode fiber supports point-to-point topology; up to 400 meters long. It uses an ST or SC connector, which are duplex media-interface connectors.
  • 1000BaseCX Copper shielded twisted-pair that can only run up to 25 meters.
  • 1000BaseT Category 5 is a four-pair UTP wiring that can run up to 100 meters.
  • 1000BaseSX MMF using 62.5 and 50-micron core; uses a 780-nanometer laser and can go up to 260 meters.
  • 1000BaseLX Single-mode fiber that uses a 9-micron core, 1300-nanometer laser and can go from 3 km up to 10 km.
READ MORE - Network cabling requirements for ethernet

Cisco Router Configuration Commands


Set a console password to cisco

Router(config)#line con 0
Router(config-line)#login
Router(config-line)#password cisco

Set a telnet password
Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#password cisco

Stop console timing out
Router(config)#line con 0
Router(config-line)#exec-timeout 0 0

Set the enable password to cisco
Router(config)#enable password cisco

Set the enable secret password to ciscorouter.

This password overrides the enable password and is encypted within the config file

Router(config)#enable secret ciscorouter

Enable an interface
Router(config-if)#no shutdown

To disable an interface
Router(config-if)#shutdown

READ MORE - Cisco Router Configuration Commands

Mostly Asked Question In CCNA Exam Part III


The Answers is in Bold Style. Maybe my answer are wrong but i tried my best to give you correct answer. if any one think that the answer which i gave its not correct then please feedback me.

1. Which statement is accurate about the CIR in Frame Relay?

  1. It is important to purchase a CIR that matches the highest bandwidth requirements of the enterprise.
  2. The CIR can be no lower than the port speed of the local loop.
  3. The CIR defines the contracted maximum rate available from the service provider on the Frame Relay circuit.
  4. It is possible to burst over the CIR if bandwidth is available.
Question 2

Question 2

2. Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address?

  1. The IP address is already in use.
  2. The technician is using a network address.
  3. The technician is using the wrong subnet mask for /26.
  4. The technician must enable VLSM on the interface.
Question 3

Question 3

3. Refer to the exhibit. Because of continuing instability of one of the serial links in the OSPF network, a network administrator configures router ASBR as shown. Which two statements will be a result of this configuration? (Choose two.)

  • Traffic intended for destinations across unstable serial links will be forwarded by ASBR even when the links are down.
  • A summary route of 192.168.0.0/22 will be advertised to the ISP router.
  • Serial links in range 192.168.0.0 255.255.252.0 will be forced into a passive state.
  • Networks connected to the unstable serial links will be placed in an unreachable state.
  • Negative effects of route flapping will be reduced.
Question 4

Question 4

4. Refer to the exhibit. Which IP addressing scheme would be correct for the network?

  • H1-172.18.0.10/16
    H2-172.18.0.11/16
    H3-172.18.0.12/16
  • H1-172.18.0.10/16
    H2-172.19.0.10/16
    H3-172.18.0.11/16
  • H1-172.18.0.10/16
    H2-172.18.0.11/16
    H3-172.19.0.11/16
  • H1-172.18.0.10/16
    H2-172.19.0.11/16
    H3-172.19.0.11/16
Question 5

Question 5

5. Refer to the exhibit. What two conclusions can be drawn from the displayed output? (Choose two.)

  • A packet with a destination IP address of 172.20.1.14 will exit the router via the Serial 0/1/0 interface.
  • The default administrative distance for EIGRP has been changed.
  • Network 172.20.1.4 can be reached through two possible routes of equal cost
  • The addresses on this network were created using VLSM.
  • The router connected to Serial 0/1/1 is advertising four separate routes through EIGRP to this router.

I will post more questions soon please comment on it and for any other queries asif (dot) javed (at) yahoo (dot) com

READ MORE - Mostly Asked Question In CCNA Exam Part III

 
 
 
free counters 
HTML Hit Counter