Wednesday,Apr4,

How to Repair the Acer D2D Recovery Quickly and Easily

Before you ever try to do any kind of repairs to your systems in your computer, you should always make a back up. Even professionals do this; it is simply good practice. Having said that, let's discuss the Acer D2D (disk to disk) recovery and how to repair it quickly and easily if yours is no longer functioning.

Many times, the reason the D2D is not working is that it is no longer enabled in the BIOS menu. Go to BIOS and make sure D2D is enabled. As you reboot your computer, press alt+F10 and see if that did the trick.

If your D2D is already enabled, or if enabling it in the BIOS didn't help matters any, there are some other ideas on how to repair the Acer D2D recover quickly and easily. Use your CD/DVD to restore your computer. You will need to do this if PQService has been damaged or is missing for some reason. This is another very common reason for the malfunction of the Acer D2D recovery.

Remake the Master Boot Record (MBR) for your Acer. A damaged MBR is oftentimes the reason your Acer D2D recovery isn't working. Here is how you do it:

1. Disable D2D in the BIOS and save and exit.
2. Log into Windows as an administrator.
3. DownloadParTEDIT32.zip
4. Extract PTEDIT32.exe from the zip file and run it.
5. Find the PQSERVICE partition and change its type to "07"
6. Save your changes and reboot.
7. Login again as an administrator.
8. Go to the PQSERVICE drive.
9. Enter this command at the prompt: mbrwrdos.exe install rtmbr.bin
10. Close the command prompt and reboot your computer.
11. Go back and enable the D2D in your BIOS again.

USB Storage

Monday,Apr2,

What Does Renters Insurance Cover? An Explanation

Many apartment and house renters have asked me if they need insurance for renters, and if they do-- what does renters insurance cover? Well, even if you think you own few possession, all renters should be insured not only to cover your personal possessions but for the all-important liability coverage. Let me explain exactly what it covers.

Renters' insurance coverage has two parts:
1. The first part is 'general coverage' of your personal possessions from theft or damage.
2. The second part is 'liability coverage' against financial loss resulting from injury to a visitor to your home. Depending on your policy, this often includes visitor's medical costs, plus legal and other associated costs should you be sued.

Ask your insurance representative about the exact coverage in any policy you consider.

The Landlord's Insurance

Many renters mistakenly believe a landlord's building insurance will cover anything that could possibly go wrong in an apartment building. That is simply not true.

The truth is that landlords' insurance is limited to damage to the building structure and to liability coverage for the common areas, only. Landlord's insurance does not cover your furniture, personal possessions, or damage you might do to the landlords building. You are responsible for your own possessions and the well-being of your apartment or rented house. You are also responsible for liability within your rented home. So you need renters insurance to protect your possessions and liability inside your home.

A Few Points Of Coverage

What does renters insurance cover? Well, here are points of coverage to show you how this insurance can benefit you:


Your possessions will be protected from theft and vandalism.
Your possessions will be protected against damage from specifically named risks such as fire and windstorm.*
If there is damage to your rented apartment or house and you are not able to live there, many renter's insurance policies will provide for temporary relocation living expenses while repairs are made.
Your possessions will be protected away from your home, such as items in your car, or items you take with you while on vacation.

* Policies cover "insured risks" which are specifically named in your policy. Insured risks never include flood and earthquake damage. These are considered separate risks that require separate policies.

In reading the above list, it is easy to see that you can get substantial renters insurance coverage; and it comes at little cost. You will not have any problem in locating a good renter's insurance policy for $20 a month or less for a basic policy.

It Adds Up

I know many renters think they don't have enough possessions to warrant getting insurance. Well, if you add together your CD and DVD collection, your computer, TV, other electronics, clothing, furniture, bedding, and other personal items, you will find it all adds up very quickly.

In every case, renters insurance makes a lot of sense as a way to protect your assets for the cost of only two small pizzas a month. When you think about it, it's a wise thing to get.

free design software HP Wireless Printer USB Storage

Definition and Objectives of Bookkeeping and Accounting Systems

Accounting is defined as "the art of recording, classifying and summarizing in terms of money transactions and events of financial character and interpreting the results thereof." In simplest words, we can say:

(1) Accounting is an art

(2) of recording classifying and summarizing

(3) in terms of money

(4) transactions and events of financial nature and

(5) interpreting the results thereof

Accounting is an art of correctly recording the day to day business transactions: It is a science of keeping the business records in a regular and most systematic manner so as to know the business results with minimum trouble. Therefore, it is said to be a statistical procedure for the collection, classification and summarization of financial information.

Objectives of Accounting

The objectives of accounting are two-fold:

(1) To record permanently, all business transactions, and

(2) To show the effect of each transaction and also the combined effect of all such transactions for a given period so as to find out the profit the business has earned or loss incurred, and also to know the correct financial position on a particular date.

The necessity and importance of accounting can be understood by answering the following questions:

(1) How much we have earned this year ?

(2) How much was earned during the last year ?

(3) Is our business improving?

(4) How much cash do we have?

(5) How much money we owe?

(6) How much others owe to us ?

Accounting Systems

There are various systems of accounting for maintaining business records:

Cash system of accounting

This system records only cash receipts and payments on the assumption that there are no credit transactions. If at all there are any credit transactions, they are not at all recorded until the cash is actually paid or received. Receipts and payments account in case of clubs, societies, hospital, educational institutes, lawyers etc. is the best example of cash system.

Single Entry System

This system ignores the two fold aspect of each transaction as considered in double entry system. Under single entry system, merely personal aspects of transaction i.e. personal accounts are recorded. This method takes no note of the impersonal aspects of the transactions other than cash. It offers no check on the accuracy of the posting and no safeguard against fraud because it does not provide any check over the recording of cash transactions. Therefore, it is called as "imperfect accounting."

Double Entry System

The double entry system was first evolved by Luca Pacioliin, who was a Franciscan Monk of Italy. With the passage of time, the system has gone through lot of developmental stages. It is the only method fulfilling all the objectives of systematic accounting. It recognizes the two fold aspect of every business transaction.

These questions are of decisive importance for a trader and the answers can only be derived from up to-date financial records. Only the system of keeping the perfect records of all business transactions will help the proprietor to know the amount he has gained or lost.

The main objective of any business is to earn maximum possible profits with minimum expense. In view of this, a commercial organization always tries to expand its business, increase its sales and reduce operating expenses. The progress made in this regard, is always indicated only by the properly maintained financial records.

Meaning of Accounting

In the beginning, the main objective of accounting was to ascertain the result of the business activities (whether profit has been earned or loss has been suffered) during a year and to show the financial position of the business as on a particular date. Accounting has to meet the requirements of taxation authorities; investors, government regulations; management and owners. This has resulted in widening the scope of accounting and may be defined as follows:

"Accounting is the art of recording, classifying and summarizing, in a significant manner and in terms of money transactions and events which are in part at least, of a financial character and interpreting the result thereof."

Is Accounting a Science or an Art?

In simple words, science establishes relationship of cause and effect whereas the art is the application of knowledge comprising of some accepted theories, principles and rules. Since accounting docs not establish cause and effect relationship it only provides us with the procedure by which objectives of accounting can be achieved, therefore accounting is an art and not a science. Accounting is an art of recording financial transactions in a set of books; classifying in desired categories and summarizing the information for presentation in a suitable manner to the concerned persons for their benefit.

Scope of Accounting

The need of a system of accounting was felt by man early in the history of trade and commerce. The art of book-keeping is as old as the art of trading itself. This art of keeping records passed through many phases since its inception. With the development of commerce, it has attained a position of great importance. Indeed, it can be truly said that accounting has become the foundation on which the whole fabric of modem commerce rests.

Though there is no legal obligation on an ordinary trader to keep the records, every business house finds it essential and convenient to keep the systematic records so as to know where exactly it stands. Moreover, it is legally binding on some forms of business, such as joint stock companies, to prepare periodically, statements in proper forms showing the position of the business. A proper and satisfactory method of accounting is an essential part of any business house for the following reasons :

(1) If no records are kept, it will be difficult to find out accurate net profit. Under such circumstances, tax authorities may overestimate the profits and thus a trader will suffer for not having kept the business records.

(2) In absence of proper business records, the trader will find it difficult to submit the true position to the court in case he becomes insolvent.

(3) Keeping of proper records helps the trader in framing future business plans & policies.

(4) It will be difficult to ascertain and fix the price of business to be sold or disposed off, if no records are kept.

(5) Finally, in spite of the best memory it is beyond the capacity of a trader to remember all the business dealings with back references.

HP Wireless Printer android market

Saturday,Mar31,

Fix Microsoft Visual C++ Runtime Library Error With Registry Cleaner

When you receive messages like Microsoft visual c++ runtime library error, it simply means that the Microsoft Windows in your compute is having problems, and such problems could be related to the registry, which points out to the fact that you require a registry cleaner. You will experience a number of errors in the programs, if your compute system requires a registry cleaner's use. The common errors that you experience while operating the system pertains to the runtime error, which doesn't allow running of the programs in a proper manner, or even it may not allow you to access the files that you may be trying to access. You should in such a case use the registry cleaner software to fix the errors.

When you come across runtime errors while using the programs installed in your computer, say, Microsoft Visual C++, which could be occurring due to your downloading applications, or installing or uninstalling new programs, or such errors are already in the Windows programs in the computer. In such cases, it will lead to errors in registry files making it impossible for you to run the files or programs. When you install a software called registry cleaner and use it you will be able to scan the computer registry in full and recognize the problems that are causing this error.

The errors that you are facing may be due to the missing programs or files in the computer, which you may have deleted or that were not properly installed in the computer. Through a registry cleaner software, you will be able to repair the errors and get back the computer to its proper running condition.

The Registry Cleaner will help you to repair wrong program shortcuts, discover missing associations of files, as also invalid extensions or classes and empty folders or missing information. The usage of registry cleaner is not complicated and after installation of the software, you can scan all the programs and files, which are in the registry and detect the culprits which are causing the errors and repair them properly.

These software are available online and you can download and use them to help you ascertain the reason for the Microsoft visual c++ runtime library error as you will also be instructed what you should do to repair the files or programs. You should download a software which suits Microsoft programs, and which can scan the computer for files or programs which are improperly working or completely missing. Since there are so many downloads available on the let, which leads to these registry errors, which can be repairs so that your normal working on the computer is not disturbed. Whenever you find programs which refuses to work, you should use registry cleaner. You will then find out the files which are not working and repair them.

free design software HP Wireless Printer android market

Friday,Mar30,

PS3 Won't Turn on - What to Do to Fix Your PS3

So you get into your gaming mood and try to turn on your PS3 but you quickly realize that nothing is happening. This is a very common PS3 problem and the only options you have to fix it is either call Sony and send it to them or do it yourself.

The only problem with the first option is that Sony will take around 2 months to fix this SMALL problem and will charge you around 120$. This problem is usually do to too much dust build up in your HDD (hard drive disk) and power supply cable.

How To Make My PS3 Turn On?

First you should carefully take out the hard drive disk from your PS3 which should be full of dust. Reset it and then place it back in. Then you should check if your power cable is still working. This is easy to do, just replace your computers power cable with the PS3 one. If your computer boots up properly, put back your pc cable in the pc and the PS3 cable in the PS3. Once done, turn your PS3 and everything should be working.

If you are not sure how to do the above steps properly like resetting the HDD and dusting the inside properly, you should look for a step by step guide. There are many available online and the best part is that they include fixes to other PS3 problems so if ever you have another problem, you will be able to fix it in a jiffy without forking out hundreds of dollars to Sony.

free design software

Tuesday,Mar27,

Security - Steps For Cisco ASA5505 Password Recovery

All passwords should be recorded and keep in a safe secure place, but when the password is lost, becomes corrupted or is just not known then it may be necessary use the Cisco ASA password recovery procedure. This procedure doses not actually recover an existing password but give you privileged access to the device, enabling you to change the existing password with a new one.

Once you have changed the password and have regained management of the Cisco ASA security device you should record the new password and place it in a safe secure place for future access.

Password Recovery Procedure:


Connect the PC serial port to the console port using a console rollover cable.
Execute a terminal emulator program like Hyper Terminal or Putty and configure the serial connection with 9600 baud, 8 data bits,no parity,1 stop bit, no flow control.
Reset the Power on the security device.
During the startup process, press the Escape key when prompted to enter ROMMON.
Enter the confreg command.
Record your current configuration register value, so it can be restored later.
Enter "y" to the question "Do you wish to change this configuration y/n".
Accept the default values for all settings, except "disable system configuration"; enter Y for this value.
Reload the security device by entering the boot command.
Enter privileged mode by entering the enable command.
When prompted for the password, press Return.
Load the existing startup configuration by entering copy startup-config running-config.
Enter global configuration mode by entering the configure terminal command.
Change the passwords by entering the following commands. Password new-password, Enable password new-password, Username existing-username password new-password.

Restore the old configuration register value by entering config-register recorded-value from step 5.
Save the new passwords by entering copy running-config startup-config.

free design software USB Storage

Monday,Mar26,

Asus RT-N66U - An Excellent Router You Should Consider Upgrading To

If you are thinking of replacing your existing router for whatever reasons in your connected home or in a small office home office (SOHO) environment, then you should seriously look at the Asus RT-N66U as your replacement. If you are not a techie, reading reviews to get a sound judgment to buy a technical network product like a router can sometimes be very daunting and confusing; especially with all the technical jargons thrown into it.

For those of you non techies out there, I would like to make this article as simple as possible so that you will know whether you should buy or not buy Asus RT-N66U router by the end of this article.

What Is The Asus RT-N66U Dual-Band Wireless-N900 Router?

First of all, what is the Asus RT-N66U? In a gist, it is a simultaneous dual-band three-stream "N-900" router with one Gigabit WAN port. The "N-900" indicates that the RT-N66U can support 450 Mbps link rates when both radios are set to 20/40 or 40 mHz channel bandwidth.

Duo band allows you to split your internet usage to maximize usage. One band will be used for basic internet usage such as web surfing, email and file loading while the other band will be used for HD content streaming such as watching movies, listening to music and online gaming.

The Asus RT-N66U also has four switched Gigabit LAN ports with two USB 2.0 ports that support both drive and printer sharing. It is also designed to operate up to 300,000 Internet client data sessions and is IPv6 support. You also have up to 8 multi-user SSIDs with parental controls. Knowing that sometimes it can be daunting for the non-technical user to set-up a router, Asus also makes it easy for you to set-up the RT-N66U with its ASUSWRT dashboard user interface.

What Are The Advantages Of The Arsus RT-N66U?

The RT-N66U with the many additional improvements in it was built upon the hugely successful Asus RT-N56U resulting in a better product with better features and performance than its predecessor which was already an excellent product

It is one of the fastest consumer class routers in its price range in the market today. In terms of performance, reviewers and testers have reported that the Asus RT-N66U beat rivals like the Linksys E4200, ASUS RT-N56U, Cisco E4200V2, Netgear WNDR3800 etc flat!

Expanded coverage - if your house or office is multi levels - the RT-N66U comes with three detachable external antennas which allow omnidirectional wireless signal coverage to not only reach devices horizontally but also vertically

Easy Setup and Customizability - it is very easy to setup the RT-N66U with the ASUSWRT dashboard user interface mentioned earlier as you can set up your network right out of the box and optimize it through the dashboard. Management is also made easy with robust parental controls, real-time traffic monitor and Quality of Service done through the dashboard

If you are in a hurry or need to download many files at one go - the RT-N66U lets you simultaneously download files directly to USB storage devices and connect a

free design software HP Wireless Printer

Sunday,Mar25,

Download Nintendo Wii Games Online - Transfer From PC To Wii

When you've finished a hard day at work and you plan to spend your evening relaxing and playing your Nintendo wii, you suddenly remember that you've completed your latest game and the thought of going all the way to the shops to search for a new title is daunting and even more tiring, Well now you don't even have to go to a shop. You can now download Nintendo Wii games free, and transfer them from your PC to wii.

There are now sites on the Internet that allow you join as a member, and members get access to huge data-bases full of all the new release games, plus you can usually find all your old favourite retro games that you can also download and play on your Wii. Its not just games either with these sites you get access to download music movies and loads more goodies! To do all this you have to find the site you want to join, then pay a small one time membership ship fee- which is usually the cost of one game then you gain access to the members area where you can download games to your hearts content. There's no pay per download or any hidden costs after you've paid the small one time only membership fee.

As a member i found this process extremely easy as I'm no computer expert at all. You get step by step instructions on how to find and download the game you want and further more you get all the tools needed to transfer and burn your games so you can play them on your wii.

free design software HP Wireless Printer USB Storage

Friday,Mar23,

Guide - Configuring Exchange Active Sync on HTC Hero Android Device

I decided this morning to test the Exchange ActiveSync connection on my HTC Hero. I went through the account settings and authenticated with the server successfully, specified the data I wanted to sync, and then, when it came to finalising the settings, it failed with the following error:

"Error
Failed to create the account. Please try again later."

Great. Well, it definitely authenticated fine, so what's the problem? A little further digging and I discovered that this was down to a security setting I use on my Exchange server which forces mobile ActiveSync users to specify a PIN number on their phone to add an additional layer of security on the phone. It seems the HTC Hero can't deal with sending back your encrypted password. So, if you use SSL with your web-facing Exchange server, you won't be able to connect without either turning off the mobile users password policy requirement, or, I assume, using a certified web certificate. Neither turning off SSL or turning off the password policy is a particularly good idea, and I daresay if you ask your IT department to do it they'll laugh you out of their office (I know I would), so the best option would be to ask your IT admins to arrange for a web certificate. In the interests of covering all the options for this guide though, I'll detail the method of excluding specific users from the password policy-

* Open Exchange System Manager
* Expand Global Settings and then right click on Mobile Services and choose Properties
* Click the Device Security button
* The "Enforce password on device" tick box is the culprit here, but it's better to turn it off for one specific user rather than the whole domain, so push the Exceptions button
* Push Add and select the user you want added to the exception list
* Push OK three times to get back to Exchange System Manager and you're done

OK, now that that's out of the way, the following guide details the method for setting up Exchange ActiveSync on Android. It's based on my HTC Hero, but it should be a similar process for other Android devices.

* Tap the Mail icon then tap "Microsoft Exchange ActiveSync"
* Enter your email address in the top field and your Active Directory password in the second field
* Tap "Manual Setup"
* Enter the full Exchange server gateway URL (or IP address) in to the "Server address" field (eg: mail.yourdomain.com)
* Enter your Active Directory domain, you'll probably need to use the full domain name (eg: yourdomain.local). Your domain admin will be able to provide you with these details
* Enter your Active Directory username and password in the relevant boxes
* If your domain uses SSL (again, your domain admins will be able to tell you), make sure you tick the "This server requires an encrypted SSL connection"
* Click Next and the phone will say "Verifying account information..."
* If the connection succeeds, you'll be asked to specify what you would like to synchronize from Mail, Contacts and Calendar. If it doesn't succeed, you'll probably have entered in some information incorrectly, go back and re-enter everything. If it still doesn't work, contact your IT department
* Hit Finish Setup and the phone should begin to sync your mail

Hopefully, the Exchange SSL issue will be fixed in future updates, but I wouldn't hold your breath on that.

HP Wireless Printer free design software

Thursday,Mar22,

How Can I Stop My Computer From Freezing?

A while back, it seemed every day I was asking how can I stop my computer from freezing? I would just be working along, normally designing a website for a customer, and then it would happen. Everything would just stop. No movement from the mouse, the keyboard would not allow any typing; even the ctrl-alt-delete would not work. The only basic way to get out of this situation is to hold the power button down for 5 seconds or until the computer shuts down.

The problem with that is all of the information you were just working on is lost. Most likely you did not save the work just before the system froze up. Now it is gone. And, just because you restarted the computer, and it is up and running again now, you still have not fixed the problem. It will happen again, and you will get frustrated again. But there is a fix.

Registry repair software will take care of this problem. The reason computers lock up, or freeze up, is because of a problem in the registry files. These files, which most people do not know even exist; give the computer instructions for each piece of software on the system. These registry files tell the computer how to start it up, what resources to use, how to run it, and even how to shut it down. So, as you can imagine, if there is a problem in these files, the computer will not know what to do. This is what causes the error. By using a registry repair software, you will fix this condition by restoring your registry files back to their correct settings.

So, back to the original question I would ask: How can I stop my computer from freezing? The answer I learned and tell others is to use a registry repair software. You can have your computer running smoothly in a matter of minutes.

free design software

Wednesday,Mar21,

Free Xbox 360 Repair - Do it Yourself!

Well, Who is not addicted to computer games today, I, myself, have a XBox 360. Playing games on the Xbox 360, is the only activity my entire family does together, I mean forget ma and pa, My grandmother is a big fan of some of the Xbox 360 games, including some shoot them ups! Well such is the lure of today's gaming consoles and Xbox 360 is one of the best with some of the best Xbox 360 game titles. Well, Xbox 360, being a Microsoft product does have "the blue screen of death" - some electrical glitches, the most famous being the "red rings of death", well if you do get these, you may be aware how frustrating these are.

There are some mods available in the market that offer some XBox 360 repair and solution to the red ring of death, but why not do it yourself? it is easy and relatively uncomplicated process. Well, this works with some Play Stations 3, why? Well with most next generation consoles, becoming more sophisticated and more complete, it is no wonder that these gaming consoles have their own problems.

You, may be one of the countless millions of people, who are looking for XBox 360 Repair. Xbox 360 repair, if outsourced to a third party, will cost you a bomb, and probably end up drilling up a hole in your pocket. Xbox 360 Repair from Microsoft itself will take out approximately two months+ of your gaming experience. So what should you do? Is there any other way your Xbox 360 repair work could be done? Well Read on to find out how to - XBox 360 Repair, all by yourself!

Here are some tips you could follow for Xbox 360 repair:

Well, what are we going to learn with this article is, how to prevent your Xbox 360 from overheating, while playing Xbox 360 games. Overheating contributes to over seventy percent of Xbox 360 repair work, this is because most gamers throw caution to the air and keep on playing the very interesting and gripping Xbox 360 games. Well, one very basic method of preventing Xbox 360 repair caused due to overheating is by seeing to it that your Xbox 360 is kept in an area which is very highly ventilated, may be even air conditioned. The next big Xbox 360 repair involves the DVD, which comes in three different models. You know you may have to go in for the Xbox 360 repair, if the DVD starts making a grudging and crunching noise!

For repairing this and many other Xbox 360 problems, you may need to give in for Xbox 360 repair, which may cost you. Do not Despair yet click here and you can learn how to repair many problems of your XBox 360.

android market

Tuesday,Mar20,

The Fastest Ways to Repair JavaScript

A number of issues can interfere with your browser's scripting functions, making it necessary for you to repair JavaScript quickly. If you wish to surf the web safely and efficiently, you need to make sure you repair JavaScript errors. Here are a few battle-tested methods for repairing JavaScript problems.

Practice Safe Browsing

Let's say you visit a particular website, and loads of errors pop up on your screen. First of all, you need to make sure that you are visiting a safe website. Many websites that are hiding malware use JavaScript error messages to disguise their malicious intent. Only visit websites you know, you can trust.

If you are visiting a safe website, then do a little bit of trial and error. Open another browser and visit the same website. If the website works on the other browser, then its likely JavaScript errors on the first browser are causing viewing issues. If the website is still malfunctioning, then there is something wrong with the website, and the problem is beyond your control.

Disable Programs that Might Interfere with JavaScript

If you are running anti-virus software, double-check it to make sure it is not currently scanning your temporary internet files or downloaded files. The anti-virus scan can interfere with your ability to view webpages containing JavaScript.

Clear and delete all of your cookies and temporary Internet files. This is straightforward. Here's how to do this with Internet Explorer 8:

1. Go to the Command bar and click "Safety."
2. Click "Delete Browsing History."
3. Check the Cookies option.
4. Click Delete

Make sure you download the most recent version of DirectX. Older versions of DirectX can interfere with your browser's ability to interact with JavaScript.

Enable Active Scripting and Use a Registry Cleaner

Also, enable active scripting, ActiveX controls, and java applets. All of these options are key components to JavaScript. You can find these options within your browser. Here's how to enable these features if you are using Mozilla Firefox:

1. In the top menu, select "Tools"
2. Click "Options."
3. Select "Content" from the navigation at the top.
4. Check the "Enable JavaScript" checkbox.
5. Click OK.

If none of the above works to solve your errors, then download a registry cleaner and run it. A registry cleaner works by scanning your entire registry for errors and then deleting those errors.

Registry cleaners work efficiently and thoroughly to remove errors. They are well suited to prevent errors from ever appearing, but you can also use them to cure errors. Learn more about how to repair JavaScript by identifying the cause of the problem and resolving it.

USB Storage android market

Sunday,Mar18,

The Importance of Proper Computer Maintenance

Some might say that we have become a slave to this invention of mankind whereas others might say that it is a boon to mankind. Whatever be the argument, the fact remains that it has become almost impossible for man to do without the computer. Almost everything is computerized or is in the process of becoming computerized. Right from booking railway and air tickets to doing banking, everything can be done at the click of the mouse. And even in places where they use pen and paper, serious steps are being taken to make it computerized.

The main reason why people prefer computers to pen and paper is because it is highly accurate and prone to a lesser number of errors. Also, people can store large volumes of data on a computer. If there is not enough memory on a computer, there is always the option of buying additional memory space. We get to store large volumes of data in a relatively small space. Also performing various arithmetic operations on the data and data manipulation is very simple when one has to do it on a computer rather than manually. Computer help is very important and it should be easily available to people so that they do not have any difficulty in coping with the changes that is enforced by the development in technology.

Computer maintenance is very important, as all our data is stored in the computer. We have come to a point in our lives where in we cannot do without the computer. When we are this dependent on the computer, we should make sure it is in proper working condition so as to lead a peaceful life. If our computer crashes, we should not be handicapped. We should be able to get computer help immediately and set the problem right.

When there is a problem with our computers, it is sometimes possible for us to set it right ourselves. This eliminates the need for a third person to come and fix our computer. Almost everything is available on the Internet today. If we just search for the problem online, we are sure to get a lot of results. But sometimes, we need the help of an expert to set the problem right. In such cases, we need to approach the right people to make sure we get the right computer maintenance service.

One can also register in forums that are available online. There are websites online that provide all kinds of computer help and service. All one has to do is register and he or she will be in a position to tackle most of the problems that might arise. The advantage of registering in such forums is that you will get to interact with others who might have had similar problems and so it will become easier for you to set it right. But if the problem persists for a while, then make sure you go to a computer maintenance guy as it is very important to set the problem right as soon as possible.

We can conclude by saying that it is not only important to own a computer but proper computer maintenance is very important. We should take all possible steps to ensure that our computer is not only working properly but also well maintained.

USB Storage

Restaurant Business Proposal

How important is a business proposal? For one, it gives you a head start in starting up your desired restaurant business. You see, before the bank or the lending company will give their nod of approval for your proposed loan, you have to actually convince them first that you deserve the money. Without it, you wouldn't have enough startup capital to buy the much needed equipment and supplies and pay your expenses, such as salary to your employees and advertising costs. Yet how do we exactly go about the business proposal? Consider the following suggestions:

1. If you are a novice in writing business proposals, then don't be afraid to get some extra help from the experts. You can ask for different strategies on how to write them, such as what clicks and what doesn't to the intended readers. Luckily, for those who are just too shy to approach anyone, there are numerous computer programs available on the market. Included in the package are some business templates that you need to slightly modify to suit your desired output. Also, these can be saved for future references, and changes are easy to implement.

2. One technique in writing a business proposal is to divide it into two parts. The first portion will focus on describing the different opportunities of your business as well as your plans on how to take advantage of them. The second part will show the current financial data, like the financial statements and tax returns.

3. When you have made your outline, you are then ready to write your restaurant business proposal. The keys here are conciseness and clarity. Thus, it is ideal that the first part will just be limited to 10 pages. Clear examples are also advisable especially when you are trying to give them a picture of the various marketing opportunities.

4. Even in your proposal, sell your business, that is, include the reasons why your company is totally different from your other competitors. You can highlight your special talents, experience, and achievements that give you the edge. Identify your target market. This will guide you in planning your marketing methods to gain market share in the industry. Surely, intended parties will be interested in such information.

It is important when writing business proposals to be realistic--never ever consider exaggerating things just so you can receive affirmation from the other party. Or else, you may find it hard to achieve them. As a result, your proposal is but an unrealized plan.

HP Wireless Printer free design software USB Storage

Saturday,Mar17,

Intranet

Introduction to Intranets

What exactly is an intranet? It's one of those terms that's more thrown around than understood, and has become more of a buzzword than a commonly understood idea. Simply put, an intranet is a private network with Internet technology used as the underlying architecture. An intranet is built using the Internet's TCP/IP protocols for communications. TCP/IP protocols can be run on many hardware platforms and cabling schemes. The underlying hardware is not what makes an intranet-it's the software protocols that matter.

Intranets can co-exist with other local area networking technology. In many companies, existing "legacy systems" including mainframes, Novell networks, minicomputers, and various databases, are being integrated into an intranet. A wide variety of tools allow this to happen. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an intranet. The Java programming language can be used to access legacy databases as well.

With the enormous growth of the Internet, an increasing number of people in corporations use the Internet for communicating with the outside world, for gathering information, and for doing business. It didn't take long for people to recognize that the components that worked so well on the Internet could be equally valuable internally and that is why intranets are becoming so popular. Some corporations do not have TCP/IP networks, the protocol required to access the resources of the Internet. Creating an intranet in which all the information and resources can be used seamlessly has many benefits. TCP/IP-based networks make it easy for people to access the network remotely, such as from home or while traveling. Dialing into an intranet in this way is much like connecting to the Internet, except that you're connecting to a private network instead of to a public Internet provider. Interoperability between networks is another substantial bonus.

Security systems separate an intranet from the Internet. A company's intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes.

Intranets can be used for anything that existing networks are used for-and more. The ease of publishing information on the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. Corporate databases with easy-to-build front-ends use the Web and programming languages such as Java.

Intranets allow people to work together more easily and more effectively. Software known as groupware is another important part of intranets. It allows people to collaborate on projects; to share information; to do videoconferencing; and to establish secure procedures for production work. Free server and client software and the multitude of services, like newsgroups, stimulated the Internet's growth. The consequence of that growth stimulated and fueled the growth of intranets. The ease with which information can be shared, and with which people can communicate with one another will continue to drive the building of intranets.

A Global View of an Intranet

An intranet is a private corporate or educational network that uses the Internet's TCP/IP protocols for its underlying transport. The protocols can run on a variety of network hardware, and can also co-exist with other network protocols, such as IPX. People from inside an intranet can get at the larger Internet resources, but those on the Internet cannot get into the intranet, which allows only restricted access from the Internet.


Videoconferencing is an important application that requires sending massive quantities of data. Intranets can be built using components that allow the extremely high bandwidths required for transferring such information.




Often an intranet is composed of a number of different networks inside a corporation that all communicate with one another via TCP/IP. These separate networks are often referred to as subnets.




Software that allows people to communicate with each other via e-mail and public message boards and to collaborate on work using workgroup software is among the most powerful intranet programs. Applications that allow different corporate departments to post information, and for people to fill out corporate forms, such as time sheets, and for tapping into corporate financial information are very popular.




Much of the software used on intranets is standard, off-the-shelf Internet software such as the Netscape Navigator and the Microsoft Explorer Web browsers. And customized programs are often built, using the Java programming language and CGI scripting.




Intranets can also be used to allow companies to do business-to-business transactions, such as ordering parts, sending invoices, and making payments. For extra security, these intranet-to-intranet transactions need never go out over the public Internet, but can travel over private leased lines instead.




Intranets are a powerful system for allowing a company to do business online, for example, to allow anyone on the Internet to order products. When someone orders a product on the Internet, information is sent in a secure manner from the public Internet to the company's intranet, where the order is processed and completed.




In order to protect sensitive corporate information, and to ensure that hackers don't damage computer systems and data, security barriers called firewalls protect an intranet from the Internet. Firewall technology uses a combination of routers, servers and other hardware and software to allow people on an intranet to use Internet resources, but blocks outsiders from getting into the intranet.




Many intranets have to connect to "legacy systems"-hardware and databases that were built before an intranet was constructed. Legacy systems often use older technology not based on the intranet's TPC/IP protocols. There are a variety of ways in which intranets can tie to legacy systems. A common way is to use CGI scripts to access the database information and pour that data into HTML formatted text, making it available to a Web browser.




Information sent across an intranet is sent to the proper destination by routers, which examine each TCP/IP packet for the IP address and determine the packet's destination. It then sends the packet to the next router closest to the destination. If the packet is to be delivered to an address on the same subnetwork of the intranet it was sent from, the packet may be able to be delivered directly without having to go through any other routers. If it is to be sent to another subnetwork on the intranet, it will be sent to another internal router address. If the packet is to be sent to a destination outside the intranet-in other words, to an Internet destination-the packet is sent to a router that connects to the Internet


How TCP/IP and IPX Work on Intranets

What distinguishes an intranet from any other kind of private network is that it is based on TCP/IP-the same protocols that apply to the Internet. TCP/IP refers to two protocols that work together to deliver data: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). When you send information across an intranet, the data is broken into small packets. The packets are sent independently through a series of switches called routers. Once all the packets arrive at their destination, they are recombined into their original form. The Transmission Control Protocol breaks the data into packets and recombines them on the receiving end. The Internet Protocol handles the routing of the data and makes sure it gets sent to the proper destination.


In some companies, there may be a mix of TCP/IP-based intranets and networks based on other networking technology, such as NetWare. In that instance, the TCP/IP technology of an intranet can be used to send data between NetWare or other networks, using a technique called IP tunneling. In this instance, we'll look at data being sent from one NetWare network to another, via an intranet. NetWare networks use the IPX (Internet Packet Exchange) protocol as a way to deliver data-and TCP/IP networks can't recognize that protocol. To get around this, when an IPX packet is to be sent across an intranet, it is first encapsulated inside an IP packet by a NetWare server specifically for and dedicated to providing the IP transport mechanism for IPX packets.




Data sent within an intranet must be broken up into packets of less than 1,500 characters each. TCP breaks the data into packets. As it creates each packet, it calculates and adds a checksum to the packet. The checksum is based on the byte values, that is, the precise amount of data in the packet.




Each packet, along with the checksum, is put into separate IP wrappers or "envelopes." These wrappers contain information that details exactly where on the intranet-or the Internet-the data is to be sent. All of the wrappers for a given piece of data have the same addressing information so that they can all be sent to the same location for reassembly.




The packets travel between networks by intranet routers. Routers examine all IP wrappers and look at their addresses. These routers determine the most efficient path for sending each packet to its final destination. Since the traffic load on an intranet often changes, the packets may be sent along different routes, and the packets may arrive out of order. If the router sees the address is one located inside the intranet, the packet may be sent directly to its destination, or it may instead be sent to another router. If the address is located out on the Internet, it will be sent to another router so it can be sent across the Internet.




As the packets arrive at their destination, TCP calculates a checksum for each packet. It then compares this checksum with the checksum that has been sent in the packet. If the checksums don't match, TCP knows that the data in the packet has been corrupted during transmission. It then discards the packet and asks that the original packet be retransmitted.




TCP includes the ability to check packets and to determine that all the packets have been received. When all the non-corrupt packets are received, TCP assembles them into their original, unified form. The header information of the packets relays the sequence of how to reassemble the packets.




An intranet treats the IP packet as it would any other, and routes the packet to the receiving NetWare network. On the receiving NetWare network, a NetWare TCP/IP server decapsulates the IP packet-it discards the IP packet, and reads the original IPX packet. It can now use the IPX protocol to deliver the data to the proper destination.


How the OSI Model Works

A group called the International Standards Organization (ISO) has put together the Open Systems Interconnect (OSI) Reference Model, which is a model that describes seven layers of protocols for computer communications. These layers don't know or care what is on adjacent layers. Each layer, essentially, only sees the reciprocal layer on the other side. The sending application layer sees and talks to the application layer on the destination side. That conversation takes place irrespective of, for example, what structure exists at the physical layer, such as Ethernet or Token Ring. TCP combines the OSI model's application, presentation, and session layers into one which is also called the application layer.


The application layer refers to application interfaces, not programs like word processing. MHS (Message Handling Service) is such an interface and it operates at this level of the OSI model. Again, this segmentation and interface approach means that a variety of email programs can be used on an intranet so long as they conform to the MHS standard at this application interface level.




The presentation layer typically simply provides a standard interface between the application layer and the network layers. This type of segmentation allows for the great flexibility of the OSI model since applications can vary endlessly, but, as long as the results conform to this standard interface, the applications need not be concerned with any of the other layers.




The session layer allows for the communication between sender and destination. These conversations avoid confusion by speaking in turn. A token is passed to control and to indicate which side is allowed to speak. This layer executes transactions, like saving a file. If something prevents it from completing the save, the session layer, which has a record of the original state, returns to the original state rather than allowing a corrupt or incomplete transaction to occur.




The transport layer segments the data into acceptable packet sizes and is responsible for data integrity of packet segments. There are several levels of service that can be implemented at this layer, including segmenting and reassembly, error recovery, flow control, and others.




The IP wrapper is put around the packet at the network or Internet layer. The header includes the source and destination addresses, the sequence order, and other data necessary for correct routing and rebuilding at the destination.




The data-link layer frames the packets-for example, for use with the PPP (Point to Point). It also includes the logical link portion of the MAC sublayer of the IEEE 802.2, 802.3 and other standards.




Ethernet and Token Ring are the two most common physical layer protocols. They function at the MAC (Media Access Control) level and move the data over the cables based on the physical address on each NIC (Network Interface Card). The physical layer includes the physical components of the IEEE 802.3 and other specifications.


How TCP/IP Packets Are Processed

Protocols such as TCP/IP determine how computers communicate with each other over networks such as the Internet. These protocols work in concert with each other, and are layered on top of one another in what is commonly referred to as a protocol stack. Each layer of the protocol is designed to accomplish a specific purpose on both the sending and receiving computers. The TCP stack combines the application, presentation, and the session layers into a single layer also called the application layer. Other than that change, it follows the OSI model. The illustration below shows the wrapping process that occurs to transmit data.


The TCP application layer formats the data being sent so that the layer below it, the transport layer, can send the data. The TCP application layer performs the equivalent actions that the top three layers of OSI perform: the application, presentation, and session layers.




The next layer down is the transport layer, which is responsible for transferring the data, and ensures that the data sent and the data received are in fact the same data-in other words, that there have been no errors introduced during the sending of the data. TCP divides the data it gets from the application layer into segments. It attaches a header to each segment. The header contains information that will be used on the receiving end to ensure that the data hasn't been altered en route, and that the segments can be properly recombined into their original form.




The third layer prepares the data for delivery by putting them into IP datagrams, and determining the proper Internet address for those datagrams. The IP protocol works in the Internet layer, also called the network layer. It puts an IP wrapper with a header onto each segment. The IP header includes information such as the IP address of the sending and receiving computers, and the length of the datagram, and the sequence order of the datagram. The sequence order is added because the datagram could conceivably exceed the size allowed for network packets, and so would need to be broken into smaller packets. Including the sequence order will allow them to be recombined properly.




The Internet layer checks the IP header and checks to see whether the packet is a fragment. If it is, it puts together fragments back into the original datagram. It strips off the IP header, and then sends the datagram to the transport layer.




The transport layer looks at the remaining header to decide which application layer protocol-TCP or UDP-should get the data. Then the proper protocol strips off the header and sends the data to the receiving application.




The application layer gets the data and performs, in this case, an HTTP request.




The next layer down, the data link layer, uses protocols such as the Point-to-Point Protocol (PPP) to put the IP datagram into a frame. This is done by putting a header-the third header, after the TCP header and the IP header-and a footer around the IP datagram to fra-me it. Included in the frame header is a CRC check that checks for errors in the data as the data travels over the network.




The data-link layer ensures that the CRC for the frame is right, and that the data hasn't been altered while it was sent. It strips off the frame header and the CRC, and sends the frame to the Internet layer.




On the receiving computer, the packet travels through the stack, but in the opposite order from which the packet was created. In other words, it starts at the bottom layer, and moves its way up through the protocol stack. As it moves up, each layer strips off the header information that was added by the TCP/IP stack of the sending computer.




The final layer is the physical network layer, which specifies the physical characteristics of the network being used to send data. It describes the actual hardware standards, such as the Ethernet specification. The layer receives the frames from the data link layer, and translates the IP addresses there into the hardware addresses required for the specific network being used. Finally, the layer sends the frame over the network.




The physical network layer receives the packet. It translates the hardware address of the sender and receiver into IP addresses. Then it sends the frame up to the data link layer.


How Bridges Work

Bridges are hardware and software combinations that connect different parts of a single network, such as different sections of an intranet. They connect local area networks (LANs) to each other. They are generally not used, however, for connecting entire networks to each other, for example, for connecting an intranet to the Internet, or an intranet to an intranet, or to connect an entire subnetwork to an entire subnetwork. To do that, more sophisticated pieces of technology called routers are used.


When there is a great amount of traffic on an Ethernet local area network, packets can collide with one another, reducing the efficiency of the network, and slowing down network traffic. Packets can collide because so much of the traffic is routed among all the workstations on the network.




In order to cut down on the collision rate, a single LAN can be subdivided into two or more LANs. For example, a single LAN can be subdivided into several departmental LANs. Most of the traffic in each departmental LAN stays within the department LAN, and so it needn't travel through all the workstations on all the LANs on the network. In this way, collisions are reduced. Bridges are used to link the LANs. The only traffic that needs to travel across bridges is traffic bound for another LAN. Any traffic within the LAN need not travel across a bridge.




Each packet of data on an intranet has more information in it than just the IP information. It also includes addressing information required for other underlying network architecture, such as for an Ethernet network. Bridges look at this outer network addressing information and deliver the packet to the proper address on a LAN




Bridges consult a learning table that has the addresses of all the network nodes in it. If a bridge finds that a packet belongs on its own LAN, it keeps the packet inside the LAN. If it finds that the workstation is on another LAN, it forwards the packet. The bridge constantly updates the learning table as it monitors and routes traffic.




Bridges can connect LANs in a variety of different ways. They can connect LANs using serial connections over traditional phone lines and modems, over ISDN lines, and over direct cable connections. CSU/DSU units are used to connect bridges to telephone lines for remote connectivity.




Bridges and routers are sometimes combined into a single product called a brouter. A brouter handles both bridging and routing tasks. If the data needs to be sent only to another LAN on the network or subnetwork, it will act only as a bridge delivering the data based on the Ethernet address. If the destination is another network entirely, it will act as a router, examining the IP packets and routing the data based on the IP address.


How Intranet Routers Work

Just as routers direct traffic on the Internet, sending information to its proper destination, and routers on an intranet perform the same function. Routers-equipment that is a combination of hardware and software-can send the data to a computer on the same sub network inside the intranet, to another network on the intranet, or outside to the Internet. They do this by examining header information in IP packets, and then sending the data on its way. Typically, a router will send the packet to the next router closest to the final destination, which in turn sends it to an even closer router, and so on, until the data reaches its intended recipient.


A router has input ports for receiving IP packets, and output ports for sending those packets toward their destination. When a packet comes to the input port, the router examines the packet header, and checks the destination in it against a routing table-a database that tells the router how to send packets to various destinations.




Based on the information in the routing table, the packet is sent to a particular output port, which sends the packet to the next closest router to the packet's destination.




If packets come to the input port more quickly than the router can process them, they are sent to a holding area called an input queue. The router then processes packets from the queue in the order they were received. If the number of packets received exceeds the capacity of the queue (called the length of the queue), packets may be lost. When this happens, the TCP protocol on the sending and receiving computers will have the packets re-sent.




In a simple intranet that is a single, completely self-contained network, and in which there are no connections to any other network or the intranet, only minimal routing need be done, and so the routing table in the router is exceedingly simple with very few entries, and is constructed automatically by a program called ifconfig.




In a slightly more complicated intranet which is composed of a number of TCP/IP-based networks, and connects to a limited number of TCP/IP-based networks, static routing will be required. In static routing, the routing table has specific ways of routing data to other networks. Only those pathways can be used. Intranet administrators can add routes to the routing table. Static routing is more flexible than minimal routing, but it can't change routes as network traffic changes, and so isn't suitable for many intranets.




In more complex intranets, dynamic routing will be required. Dynamic routing is used to permit multiple routes for a packet to reach its final destination. Dynamic routing also allows routers to change the way they route information based on the amount of network traffic on some paths and routers. In dynamic routing, the routing table is called a dynamic routing table and changes as network conditions change. The tables are built dynamically by routing protocols, and so constantly change according to network traffic and conditions.




There are two broad types of routing protocols: interior and exterior. Interior routing protocols are typically used on internal routers inside an intranet that routes traffic bound only for inside the intranet. A common interior routing protocol is the Routing Information Protocol (RIP). Exterior protocols are typically used for external routers on the Internet. AÊcommon exterior protocol is the Exterior Gateway Protocol (EGP).


Intranets come in different sizes. In a small company, an intranet can be composed of only a handful of computers. In a medium-sized business, it may include dozens or hundreds of computers. And in a large corporation, there may be thousands of computers spread across the globe, all connected to a single intranet. When intranets get large, they need to be subdivided into individual subnets or subnetworks.

To understand how subnetting works, you first need to understand IP addresses. Every IP address is a 32-bit numeric address that uniquely identifies a network and then a specific host on that network. The IP address is divided into two sections: the network section, called the netid, and the host section, called the hostid.

Each 32-bit IP address is handled differently, according to what class of network the address refers to. There are three main classes of network addresses: Class A, Class B, and Class C. In some classes, more of the 32-bit address space is devoted to the netid, while in others, more of the address space is devoted to the hostid. In a Class A network, the netid is composed of 8 bits, while the hostid is composed of 24 bits. In a Class B network, both the netid and the hostid are composed of 16 bits. In a Class C network, the netid is composed of 24 bits, while the hostid is composed of 8 bits. There's a simple way of knowing what class a network is in. If the first number of the IP address is less than 128, the network is a Class A address. If the first number is from 128 to 191, it's a Class B network. If the first number is from 192 to 223, it's a Class C network. Numbers above 223 are reserved for other purposes. The smaller the netid, the fewer number of networks that can be subnetted, but the larger number of hosts on the network. A Class A rating is best for large networks while a Class C is best for small ones.

To create a subnet, the demarcation line on the IP address is moved between the netid and the hostid, to give the netid more bits to work with and to take away bits from the hostid. To do this, a special number called a subnet mask is used.

Subnetting is used when intranets grow over a certain size and they begin to have problems. One problem is management of host IP addresses-making sure that every computer on the network has a proper, up-to-date host address, and that old host addresses are put out of use until needed in the future. In a corporation spread out over several locations-or across the world-it's difficult, if not impossible, to have one person responsible for managing the host addresses at every location and department in the company.

Another problem has to do with a variety of hardware limitations of networks. Dissimilar networks may all be part of an intranet. An intranet may have some sections that are Ethernet, other sections that are Token Ring networks, and conceivably other sections that use different networking technologies altogether. There is no easy way for an intranet router to link these dissimilar networks together and route the information to the proper places.

Another set of problems has to do with the physical limitations of network technology. In some kinds of networks, there are some strict limitations on how far cables can extend in the network. In other words, you can't go over a certain distance of cabling without using repeaters or routers. A "thick" Ethernet cable, for example, can only be extended to 500 meters, while a "thin" Ethernet cable can only go to 300 meters. Routers can be used to link these cables together, so that an intranet can be extended well beyond those distances. But when that is done, each length of wire is essentially considered its own subnetwork.

Yet one more set of problems has to do with the volume of traffic that travels across an intranet. Often in a corporation, in a given department, most of the traffic is intradepartmental traffic-in other words, mail and other data that people within a department send to each another. The volume of traffic outside to other departments is considerably less. What's called for is a way to confine intradepartmental traffic inside the departments, to cut down on the amount of data that needs to be routed and managed across the entire intranet.

Subnetting solves all these problems and more. When an intranet is divided into subnets, one central administrator doesn't have to manage every aspect of the entire intranet. Instead, each subnet can take care of its own administration. That means smaller organizations within the larger organization can take care of problems such as address management and a variety of troubleshooting chores. If an intranet is subnetted by divisions or departments, it means that each division or department can guide the development of its own network, while adhering to general intranet architecture. Doing this allows departments or divisions more freedom to use technology to pursue their business goals.

Subnets also get around problems that arise when an intranet has within it different kinds of network architecture, such as Ethernet and Token Ring technologies. Normally-if there is no subnetting-a router can't link these different networks together because they don't have their own addresses. However, if each of the different networks is its own subnet-and so has its own network address-routers can then link them together and properly route intranet traffic.

Subnetting can also cut down on the traffic traveling across the intranet and its routers. Since much network traffic may be confined within departments, having each department be its own subnet means that all that traffic need never cross an intranet router and cross the intranet-it will stay within its own subnet.

Subnetting can also increase the security on an intranet. If the payroll department, for example, were on its own subnet, then much of its traffic would not have to travel across an intranet. Having its data traveling across the intranet could mean that someone could conceivably hack into the data to read it. Confining the data to its own subnet makes that much less likely to happen.

Dividing an intranet into subnets can also make the entire intranet more stable. If an intranet is divided in this way, then if one subnet goes down or is often unstable, it won't affect the rest of the intranet.

This all may sound rather confusing. To see how it's done, let's take a look at a network, and see how to use the IP address to create subnets. Let's say we have a Class B network. That network is assigned the address of 130.97.0.0. When a network is given an address, it is assigned the netid numbers-in this case, the 130.97-and it can assign the host numbers (in this case, 0.0) in any way that it chooses.

The 130.97.0.0 network is a single intranet. It's getting too large to manage, though, and we've decided to divide it into two subnets. What we do is fairly straightforward. We take a number from the hostid field and use it to identify each of the subnets. So one subnet gets the address 130.97.1.0, and the other gets the address 130.97.2.0. Individual machines on the first subnet get addresses of 130.97.1.1, 130.97.1.2, and so on. Individual machines on the second subnet get addresses of 130.97.2.1, 130.97.2.2 and so on.

Sounds simple. But we have a problem. The Internet doesn't recognize 130.97.1.0 and 130.97.2.0 as separate networks. It treats them both as 130.97.0.0 since the "1" and "2" that we're using as a netid is only known to the Internet as a hostid. So our intranet router will not be able to route incoming traffic to the proper network.

To solve the problem, a subnet mask is used. A subnet mask is a 32-bit number in IP form used by intranet routers and hosts that will help routers understand how to route information to the proper subnet. To the outside Internet, there is still only one network, but the subnet mask allows routers inside the intranet to send traffic to the proper host.

A subnet mask is a number such as 255.255.255.0 (the built-in default for Class C addresses; the Class B default is 255.255.0.0 and the default for Class A is 255.0.0.0). A router takes the subnet mask and applies that number against the IP number of incoming mail to the network by using it to perform a calculation. Based on the resulting IP number, it will route mail to the proper subnet, and then to a particular computer on the subnet. For consistency, everyone in a particular intranet will use the same subnet mask.

Subnetting an Intranet

When intranets are over a certain size, or are spread over several geographical locations, it becomes difficult to manage them as a single network. To solve the problem, the single intranet can be subdivided into several subnets, subsections of an intranet that make them easier to manage. To the outside world, the intranet still looks as if it's a single network.


If you're building an intranet and want it to be connected to the Internet, you'll need a unique IP address for your intranet network, which the InterNIC Registration Services will handle. There are three classes of intranet you can have: Class A, Class B, or Class C. Generally, a Class A rating is best for the largest networks, while a Class C is best for the smallest. A Class A network can be composed of 127 networks, and a total of 16,777,214 nodes on the network. A Class B network can be composed of 16,383 networks, and a total of 65,534 nodes. A Class C network can be composed of 2,097,151 networks, and 254 nodes.




When an intranet is assigned an address, it is assigned the first two IP numbers of the Internet numeric address (called the netid field) and the remaining two numbers (called the hostid field) are left blank, so that the intranet itself can assign them, such as 147.106.0.0. The hostid field consists of a number for a subnet and a host number.




When an intranet is connected to the Internet, a router handles the job of sending packets into the intranet from the Internet. In our example, all incoming mail and data comes to a router for a network with the netid of 147.106.0.0.




When intranets grow-for example, if there is a department located in another building, city, or country-there needs to be some way to manage network traffic. It may be impractical and physically impossible to route all the data necessary among many different computers spread across a building or the world. A second network-called a subnetwork or subnet-needs to be created.




In order to have a router handle all incoming traffic for a subnetted intranet, the first byte of the hostid field is used. The bits that are used to distinguish among subnets are called subnet numbers. In our example, there are two subnets on the intranet. To the outside world, there appears to be only one network.




Each computer on each subnet gets its own IP address, as in a normal intranet. The combination of the netid field, the subnet number, and then finally a host number, forms the IP address.




The router must be informed that the hostid field in subnets must be treated differently than non-subnetted hostid fields, otherwise it won't be able to properly route data. In order to do this, a subnet mask is used. A subnet mask is a 32-bit number such as 255.255.0.0 that is used in concert with the numbers in the hostid field. When a calculation is performed using the subnet mask and the IP address, the router knows where to route the mail. The subnet mask is put in people's network configuration files.


Overview of an Intranet Security System

Any intranet is vulnerable to attack by people intent on destruction or on stealing corporate data. The open nature of the Internet and TCP/IP protocols expose a corporation to attack. Intranets require a variety of security measures, including hardware and software combinations that provide control of traffic; encryption and passwords to validate users; and software tools to prevent and cure viruses, block objectionable sites, and monitor traffic.


The generic term for a line of defense against intruders is a firewall. A firewall is a hardware/software combination that controls the type of services allowed to or from the intranet.




Proxy servers are another common tool used in building a firewall. A proxy server allows system administrators to track all traffic coming in and out of an intranet.




A bastion server firewall is configured to withstand and prevent unauthorized access or services. It is typically segmented from the rest of the intranet in its own subnet or perimeter network. In this way, if the server is broken into, the rest of the intranet won't be compromised.




Server-based virus-checking software can check every file coming into the intranet to make sure that it's virus-free.




Authentication systems are an important part of any intranet security scheme. Authentication systems are used to ensure that anyone trying to log into the intranet or any of its resources is the person they claim to be. Authentication systems typically use user names, passwords, and encryption systems.




Server-based site-blocking software can bar people on an intranet from getting objectionable material. Monitoring software tracks where people have gone and what services they have used, such as HTTP for Web access.




One way of ensuring that the wrong people or erroneous data can't get into the intranet is to use a filtering router. This is a special kind of router that examines the IP address and header information in every packet coming into the network, and allows in only those packets that have addresses or other data, like e-mail, that the system administrator has decided should be allowed into the intranet.


All intranets are vulnerable to attack. Their underlying TCP/IP architecture is identical to that of the Internet. Since the Internet was built for maximum openness and communication, there are countless techniques that can be used to attack intranets. Attacks can involve the theft of vital company information and even cash. Attacks can destroy or deny a company's computing resources and services. Attackers can break in or pose as a company employee to use the company's intranet resources.

Firewalls are hardware and software combinations that block intruders from access to an intranet while still allowing people on the intranet to access the resources of the Internet. Depending on how secure a site needs to be, and on how much time, money, and resources can be spent on a firewall, there are many kinds that can be built. Most of them, though, are built using only a few elements. Servers and routers are the primary components of firewalls.

Most firewalls use some kind of packet filtering. In packet filtering, a screening router or filtering router looks at every packet of data traveling between an intranet and the Internet.

Proxy servers on an intranet are used when someone from the intranet wants to access a server on the Internet. A request from the user's computer is sent to the proxy server instead of directly to the Internet. The proxy server contacts the server on the Internet, receives the information from the Internet, and then sends the information to the requester on the intranet. By acting as a go-between like this, proxy servers can filter traffic and maintain security as well as log all traffic between the Internet and the network.

Bastion hosts are heavily fortified servers that handle all incoming requests from the Internet, such as FTP requests. A single bastion host handling incoming requests makes it easier to maintain security and track attacks. In the event of a break in, only that single host has been compromised, instead of the entire network. In some firewalls, multiple bastion hosts can be used, one for each different kind of intranet service request.

How Firewalls Work

Firewalls protect intranets from any attacks launched against them from the Internet. They are designed to protect an intranet from unauthorized access to corporate information, and damaging or denying computer resources and services. They are also designed to stop people on the intranet from accessing Internet services that can be dangerous, such as FTP.


Intranet computers are allowed access to the Internet only after passing through a firewall. Requests have to pass through an internal screening router, also called an internal filtering routeror choke router. This router prevents packet traffic from being sniffed remotely. A choke router examines all pack-ets for information such as the source and destination of the packet.




The router compares the information it finds to rules in a filtering table, and passes or drops the packets based on those rules. For example, some services, such as rlogin, may not be allowed to run. The router also might not allow any packets to be sent to specific suspicious Internet locations. A router can also block every packet traveling between the Internet and the internal network, except for e-mail. System administrators set the rules for determining which packets to allow in and which to block.




When an intranet is protected by a firewall, the usual internal intranet services are available-such as e-mail, access to corporate databases and Web services, and the use of groupware.




Screened subnet firewalls have one more way to protect the intranet-an exterior screening router, also called an exterior filtering router or an access router. This router screens packets between the Internet and the perimeter network using the same kind of technology that the interior screening router uses. It can screen packets based on the same rules that apply to the internal screening router and can protect the network even if the internal router fails. It also, however, may have additional rules for screening packets specifically designed to protect the bastion host.




As a way to further protect an intranet from attack, the bastion host is placed in a perimeter network-a subnet-inside the firewall. If the bastion host was on the intranet instead of a perimeter network and was broken into, the intruder could gain access to the intranet.




A bastion host is the main point of contact for connections coming in from the Internet for all services such as e-mail, FTP access, and any other data and requests. The bastion host services all those requests-people on the intranet contact only this one server, and they don't directly contact any other intranet servers. In this way, intranet servers are protected from attack.


HP Wireless Printer android market free design software

Friday,Mar16,

What is Networking and Why is it Important in Business?

When I began my networking journey, I attended any and all networking events as time permitted. Every event was fair game! Today I am much more strategic in my networking endeavors. I discovered which events and organizations gave me the best return on my investment of time as well as how to be an effective, caring networker.

In order to know where to begin you must first understand what networking is and why it is important to grow your business. Networking in its purest form is simply talking to people, making connections and developing rapport to grow our circle of influence. Business networking is essentially the same except that our primary objective in business networking is to help us grow our businesses. For most of us, building a network means meeting people we can do business with or who will do business with us, or refer people who will do business with us, are our ultimate goals.

In fact, some of the best networks are those created by people who own and run their own businesses. When you create valuable networking relationships, you build them on a foundation of mutual trust, sharing knowledge, experiences and resources to help one another grow your businesses by either referring one another or doing business directly with one another.

It works like this: If you do a good job, one customer might tell three to five of her colleagues, family and friends about you. Whereas, when you build a network of say 10 to 20 strong advocates, they may each tell only one person about your, however your "exposure" is now more than doubled - With the right network, the ultimate in "word of mouth" marketing takes place. You promote your network, and your network promotes you.

Have you ever attended a BNI or Le Tip or other form of structured networking groups? Perhaps you are already a member of a similar group. If not, you might consider becoming involved in one to the fastest growing business networking concepts around. These groups invite business professionals to join on an exclusive basis. That means, that if you are a chiropractor and become a member of one of these groups, no other chiropractor will be invited or allowed to join.

These groups have regularly scheduled meetings (anywhere from monthly to weekly) with a list of rules and objectives to which you must abide. In some cases, a minimum number of referrals is required to participate. In others, simply doing business with one or more in the network is all that is asked of he members. However, keep in mind that for this type of networking to be worthwhile for all parties, each must make every effort to do business with other members of the group.

If this form of structured networking isn't for you, there are other options for finding potential networking venues and partners. Here are some ideas to help you on your way to networking success.

a. Develop a joiners mentality. By that I mean, don't just sign up to get our name on a roster. REALLY JOIN. Get involved. Participate in discussions, events and BE VISIBLE. The saying "out of sight, is out of mind," holds true when it comes to networking. I have been involved in groups and decided to take a hiatus from attending for 2 to 3 months (and sometimes more) only to have people come up to me and tell me they forgot the name of my business so they had to find someone else either through a friend or through the local phone book. BUMMER!

b. Attend networking functions. These can include Chambers of Commerce meetings, after hours socials, ad hoc committees and special events task forces.

c. Get involved in a community service group such as Kiwanis, Lions, Jaycees, etc.

d. Volunteer with a non-profit organization, whose mission you are passionate about and believe in. People who have similar passions will want to do business with you.

e. Host events - I started an event called Goddess Gatherings more than 2 years ago in my home. It is an intimate gathering of women (8 max.) who share a common interest and/or wish to expand their own circles. I invite women who do not yet know one another although they may be familiar with their names. These women are women in my circle of influence either directly or indirectly (they are either members of the 22 groups I belong to and attend regularly or they are part of a circle within these groups). I might invite a "surprise" guest who can entertain the women - such as a masseuse or tarot card reader- or feature a business such as a jeweler or make-up artist. This helps make for a memorable evening and the women either start their own Gathering or look forward to being invited to another gathering hosted by either myself of one of the women in attendance.

f. Look for ways to cross-promote with businesses that complement yours. For instance, a spa might join with a health food store or restaurant and promote their products and services for staying healthy. A salon might join a florist to promote weddings or proms and a realtor might join with a mortgage broker to promote a "one-stop" experience for home buyers.

g. Interview others. A great way for me to network is to interview women for projects I am working on. Since most people are flattered when you ask their opinion about something or experiences in life, this has been a great means of increasing my own circle for various reasons. I might interview a woman (or even a man) about an article or book I am writing, or a seminar I am developing. People love to share their stories. I tape the interview (with their permission, of course) and give them a copy afterwards. It helps to have a list of questions ready prior to the interview, however, unless they insist, I don't give them the questions ahead of time. I have done these interviews via phone, email as well as in person. Many of the women have since.

h. Join an online business or social networking community such as MeetUp, Ryze, Max-in-Common, Linkd In, Open BC, to name a few,. These groups have subgroups made up of people with a specific focus and similar interests. Or you can join a non-specific group to gain more knowledge, exposure and contacts.

Make a point of attending one new networking event a month just to "check it out." Make a list of the people you know, the organizations you have heard and read about and the companies who currently do business with you. These are all great resources to tap into to find new venues to network. Get the local newspaper and look at the organizations and businesses hosting events to which the public is invited. Attend them.

The best networking begins with planning and taking action. Being strategic in your planning is important to your ultimate success as an effective, caring networker.

If you are interested in sharing your networking success stories, drop me a note to heidi@speakingwithspirit.com. It would be an honor to interview you. Who knows, your story could be the subject of one of my articles, or you could even write your own.. Looking forward to hearing from you. Here's to your success in building your network.

USB Storage

How to Fix Runtime Error 7 - "Out of Memory"

Runtime error 7 is a common error which shows at random times on your PC. It shows the "Out Of Memory" message - and consequently stops your software / processes from running. The error itself is not actually caused by a general lack of memory, but a simple problem with one of the DLL files of your system - FM20.dll. This file is used on a number of Windows applications to help with a number of different functions on your PC, but is sometimes used in a continuous "loop", leading your PC to become unable to read the file as it loses too much memory.

This error will typically appear in this format:

Runtime Error "7″: Out of Memory

In order to fix Runtime Error 7, you need to be able to repair the various problems which are causing it to show up. Not many people know this - buy this error is predominantly caused by an issue with the FM20.dll file on your system being unable to run correctly. This causes the various applications which require the file to continually loop - using up more & more memory on your system. The steps to resolve this error are to first stop the FM20.dll file from running, and then correct any issues on your software / Windows system which may be contributing to the error.

The first step is to remove FM20.dll from your application (if you're a developer) or to stop using the application (if you're a user). This is vitally important as it means that if you're looking to get the most out of your PC, you need to ensure that everything is working as smoothly as possible. After you've done that, you should then remove the comctl32.ocx file from your PC, as this may also be causing some problems that could lead to the runtime 7 error. This file is used to control various aspects of your software, and is used by many programs on Windows. Unregistering & then replacing the file will refresh it and allow it to run properly again.

You also need to clean out the registry of your PC. This is a central database which stores vital settings & information for Windows, and is what allows your computer to "remember" a huge number of important details for your PC. Although this database is arguably one of the most important parts of all Windows systems, it's also causing many problems for your system - including DLL & runtime errors. In order to ensure the registry is 100% operational, you need to be able to use a registry cleaner program to automatically scan through your system and fix the various errors that are inside.

USB Storage

Thursday,Mar15,

Kinds of Computer Printers

Computer printers make the information in hard copy easily available. The processing of business transactions is made easier. These printers are one of the most important computer hardware parts. It connected to the computer to enable the printing of documents from your desktop.

Printers have become one of the necessities to any business to make the daily operations work smoothly. The kind of printer that a company should acquire depends on its requirement to accomplish the tasks.

Currently, there are different kinds of computer printer in the market. These are laser printer, ink jet printer, plotters printer, and dot matrix printer. Let me provide the description of each printer type.

Laser Printer

This is the most often purchased printer today. Its high quality print output outfoxes prints from other printer types. The text and graphics are printed with quality result. The reason why there are lots of people who choose lasers despite is comparatively higher price is that it is economical. Its LED technology helps reduce the use of toner from a cartridge. It takes small particles in minimal amount to give out quality prints.

Ink jet Printer

Before the advent of laser printers, ink jet printers are the most widely used printer type. They are cheaper than any other printer types and produces quality output. However, the only disadvantage is that the printing time would take longer. It is because such kind of printers uses variably-sized droplets of ink that is propelled onto the paper or various print media. This printing process takes time to perform the printing of the material. The advantage of using these printers aside from cheaper price is that they are capable of printing colored documents such as photos and with a glossy finish.

Plotters Printer

This type of printer is ideal for printing larger drawings. High quality print out is made out of having the pen plotters pen move across the surface of the medium. This is the most unique printer so far invented and available in the market.

Thermal Printer

This is very common among department stores and malls. Thermal printer are convenient to be used by cashiers because it allows the calculations and giving the print out at the same time in fast manner. Fax machines also have this kind of technology. This, however, works only on papers that are heat sensitive. It operates by having the heated pins pushed against the medium.

Dot-matrix Printer

Of all the printer types, this is the oldest type. Inspired from typewriter, this printer operates by having its pin strike against the ink ribbon. The print out from dot matrix is easily recognized because of the obvious lines and dots that you can see on the image or character it prints; hence it is called dot-matrix. Despite its obsolescence, dot-matrix printer is still used by some business establishments because its mechanical pressure enables the producing of carbon and carbon-less copies.

android market free design software