Thursday, June 30, 2011

A collaborative book about Linux

Hello Folks! Today I want to ask something with you, “is that really important to post article every time?” I didn’t think same that thus uploading old project did by me at the time of my college and got a nice response from my mates with me hoping that you will like too. Although this is project but I compiled whole in a book in a PDF Format named as “A collaborative book about Linux” because it a finding of many webpages that surfed during this Linux documentation project.






Download PDF

You can download the full PDF version for free at the following link.



Download XPS

You can download the full XPS version for free at the following link.










Read more »

Wednesday, June 22, 2011

Which memory cards are available?

Up to this date, there are thirteen basic types of storage media used in digital technology. The most common are several types of memory cards: Compact Flash, CompactFlash Type II, Microdrive, Secure Digital, miniSD, microSD (TransFlash), xD-Picture, SmartMedia, Memory Stick, MultiMedia Card, RS-MMC, DV-RS-MMC, microMMC, micro Memory Stick.



one of the new data storage formats. SD-card different from others is very small (32h24h2.1 mm) and the ability to protect information stored on them from being copied. The advantages of flash cards of this type can also include high-speed read / write, enhanced protection of information on the card from accidental erasure or destruction, mechanical strength and low power consumption. It should be noted that despite the volume indicated on the map of free space on it will be less, because a certain amount of memory needed to ensure the copy protection.



Flash Cards miniSD new standard differ from the standard Secure Digital cards smaller (21.5h20h1.4 mm). To ensure the card in devices with conventional SD-card slot, an adapter is provided.

Read more »

Sunday, June 19, 2011

GSM OPERATORS NAME WITH MCC, MNC

Today i am sharing the list of all GSM operators with their MCC and MNC code. These code are used for different purpose and places. Hoping this will help some users, i using only code name of GSM operators and country name. If you are editing this info then save the file as UNICODE, also remove first two bytes (FF FE). Sequenced as MCC, MNC, OPERATOR NAME.









Read more »

Tuesday, June 14, 2011

Different hot keys for your machine



Here is the list of hot keys to enter the BIOS menu. Many advanced users may want to use the BIOS menu to change the established by default, I / O functions of the computer hardware. In various PCs and laptops boot BIOS menu by using different combinations of keys.


•    Acer (Aspire, Power, Veriton, Extensa, Ferrari, TravelMate, Altos) - [F2] or [DEL]
•    Acer (Altos 600 Server) - [Ctrl] + [Alt] + [Esc] or [F1]
•    Acer (Older PC) - [F1] or [Ctrl] + [Alt] + [Esc]
•    AMI (American Megatrends AMIBIOS, AMI BIOS) - [Delete]
•    AMI (American Megatrends AMIBIOS, AMI BIOS) - Old Version - [F1] or [F2]
•    Award BIOS (AwardBIOS) - [Del]
•    Award BIOS (AwardBIOS) - Old Version - [Ctrl] + [Alt] + [Esc]
•    ALR - [Ctrl] + [Alt] + [Esc] or [Ctrl] + [Alt] + [Del]
•    ARI - [Ctrl] + [Alt] + [Esc] or [Ctrl] + [Alt] + [Del]
•    AST Advantage - [Ctrl] + [Alt] + [Esc]
•    Compaq (Presario, Prolinea, Deskpro, Systempro, Portable) - [F10] - when the cursor in the upper right corner
•    Compaq (Presario, Prolinea, Deskpro, Systempro, Portable) - [F10] - at the time of the show's logo
•    Compaq (Older Computers) - [F1], [F2], [F10], or [Del]
•    Cybermax - [Esc]
•    Dell (XPS, Dimension, Inspiron, Latitude. OptiPlex, Precision, Vostro) - [F2]
•    Dell (Older 486 Models) - [Ctrl] + [Alt] + [Enter]
•    Dell (Some Models) - Reset - press the button twice
•    Dell Dimension L566cx System - [Del]
•    Dell (Older Laptop Models) - [Fn] + [Esc] or [Fn] + [F1]
•    DTK (Datatech Enterprises) - [Esc]
•    eMachines (eMonster, eTower, eOne, S-Series, T-Series) - [Tab] or [Del]
•    eMachine (Some Older Computers) - [F2]
•    Fujitsu (LifeBook, Esprimo, Amilo, Tablet, DeskPower) - [F2] - when a logo
•    Gateway Using Phoenix BIOS (DX, FX, One, GM, GT, GX, Profile, Astro) [F1]
•    Gateway (Some Older PCs) - [F2]
•    Hewlett-Parkard (HP Pavilion, TouchSmart, Vectra, OmniBook, Tablet) - [F1]
•    Hewlett-Parkard (HP Alternative) - [F2] or [Esc]
•    Hewlett-Parkard (HP) Tablet PC - [F10] or [F12]
•    IBM ThinkPad using IBM BIOS (Early Models) - [Ctrl] + [Alt] + [Ins] - when the cursor in the upper right corner
•    IBM ThinkPad using IBM BIOS (Later Models) - [F1] - press and hold
•    IBM ThinkPad using Phoenix BIOS - [Ctrl] + [Alt] + [F11] - from the DOS prompt
•    IBM PS / 1 (Late Models), PS / ValuePoint and 330s - [Ctrl] + [Alt ]+[?]
•    IBM PS / 2 with Reference Partition - [Insert]
•    IBM PS / 2 - [Ctrl] + [Ins] - when the cursor in the upper right corner
•    IBM PS / 2 - 75 and 90 [Ctrl] + [Alt ]+[?]
•    IBM (PC, XT, AT) - [F1]
•    IBM (Older Computers or Notebooks) - [F2]
•    Lenovo (ThinkPad, IdeaPad, 3000 Series, ThinkCentre, ThinkStation) - [F1] or [F2]
•    Lenovo (Older Products) - [Ctrl] + [Alt] + [F3], [Ctrl] + [Alt] + [Ins] or [Fn] + [F1]
•    Microid Research MR BIOS - [F1]
•    Micron (MPC Computers ClientPro, TransPort) - [F1], [F2] or [Del]
•    NEC (PowerMate, Versa, W-Series) - [F2]
•    NEC Versa Notebook - [F1] - press and hold
•    Olivetti PC Pro - [Ctrl] + [Alt] + [Shift] + [Del] - on the numeric keypad
•    Packard Bell (8900 Series, 9000 Series, Pulsar, Platinum, EasyNote, imedia, iextreme) - [F1], [F2] or [Del]
•    Packard Bell (Early 386 and 486 Dodels) - [Ctrl] + [Alt] + [S] - consistently
•    Phoenix BIOS (Phoenix-Award BIOS) - [Del]
•    Phoenix BIOS (Phoenix-Award BIOS) - Old Version - [Ctrl] + [Alt] + [S], [Ctrl] + [Alt] + [Esc], [Ctrl] + [Alt] + [Ins] or [Ctrl ] + [S]
•    Sharp (Notebook Laptops, Actius UltraLite) - [F2]
•    Sharp (Old PCs) - required disk diagnostics to enter the BIOS
•    Shuttle (Glamor G-Series, D'vo, Prima P2-Series, Workstation, X Mini XPC, Surveillance) - [F2] or [Del]
•    Sony (VAIO, PCG-Series, VGN-Series) - [F1], [F2] or [F3]
•    Sony Vaio 320 Series - [F2]
•    Tandon 386 - [Ctrl] + [Shift] + [Esc]
•    Tandon - [Ctrl] + [Shift] + [Esc]
•    Toshiba (Portégé, Satellite, Tecra) - [Esc]
•    Toshiba (Portégé, Satellite, Tecra with Phoenix BIOS) - [F1]
•    Zenith, Phoenix - [Ctrl] + [Alt] + [Ins]




Read more »

Monday, June 13, 2011

Those Who Still Love Xp

Hello there! After a lot of boring article about system admin, i am going to share some windows xp tools and these tool are really very nice to use that. Thus without waiting giving you description and download links



















Read more »

Saturday, June 11, 2011

Control bandwidth with ISA Server


An important measure in controlling the
Internet access is to limit the bandwidth usage. This is needed so, that no
single user can hog all the bandwidth by running something like a download accelerator. 





You can use Microsoft’s ISA Server to limit the amount of bandwidth. We’ll
demonstrate how you can do so. Installing the server is a simple wizard driven process,
so we’ll not get into that. Once installed, go to Start>Programs to access
the Management console. Then double click on the server icon located on the left
side of the window. Next double click on Policy Elements and right click on Bandwidth
Priorities. Then choose New>Bandwidth Priority from the menu and enter low,
medium or high (depending on what you want) and give a description in the description
box. After this you will find two text boxes for specifying outgoing and
incoming value ranging from one to 200. Fill these text boxes with the value. A
higher value means higher priority. Finally, click on OK to finish. 





You can allocate and prioritize bandwidth for different applications using ISA Server


Read more »

Friday, June 10, 2011

Take Control of Internet Access Part 5




Finally, you need to take action based on the reports generated.
The action may include informal warnings, publishing lists of frequent abusers
and using tools to control or limit access. There are tools available to control
specific types of applications, such as chat clients, Kazaa and download accelerators.
Also, there are tools that can perform multiple functions, such as control Web
access and chat simultaneously. Then there are tools that can do application
prioritization to help provide the QoS (Quality of Server) to applications that
really need it. Let’s talk about how to control these applications using various
tools.







For blocking sites, you can use a tool called SurfControl that
needs to be installed on a gateway machine (which in our case was Windows 2000
Advance Server). You can buy SurfControl for Rs 99,000 for 50 users from www.foresightho.com.









During installation, Surf- Control will prompt you to select the
network segment that you want to monitor and control. After installing it,
install MSDE (Microsoft’s SQL Data Engine). SurfControl provides its own
version of MSDE, which contains SurfControl’s rules database as well. The
software uses SQL database to store Web filters and polices.







Create access rules to restrict unwanted Web content,

using SurfControl
Read more »

Wednesday, June 8, 2011

Make Sense of Data Analyze The Reports Part 4





Data Analyze The Reports



Once the reports are made, you need to analyze them periodically
to understand the usage patterns. For instance, you would find that the first
thing all employees do in the morning is check their mail. Hence, you’ll find
heavy Internet usage in the morning. However, if you notice that the usage is
becoming heavy throughout the day then you would need to investigate further.
For all you know, it might be heavy downloads such as movies or music or mass
mailing that’s causing the load. If it’s genuine work that is happening, then you
need to consider purchasing more bandwidth. The same logic applies to other
applications as well, such as ERP applications over your WAN.


Read more »

Tuesday, June 7, 2011

Be Big Brother Monitor Bandwidth And Internet Activity




Now that you have your policy in place, it is time to get your
hands dirty and start implementing the monitoring and controlling measures. You
can monitor everything from Web access, e-mail and websites providing
audio / video streaming to e-commerce transactions and even VPN connectivity
between your various offices.









To check if you are getting the right amount of bandwidth, you need to monitor to see if your ISP is providing you the promised bandwidth and check for other internal bottlenecks, such as any misconfigured or overloaded proxy server.









Many tools are available for this. Some of the better known ones are MRTG, PRTG, PRTG Pro and Ntop. MRTG (Multi-Router Traffic Grapher) is widely used by most ISPs and is available for Windows and Linux. PRTG (Paessler Router Traffic Grapher), a variant of MRTG, is a freeware Windows based tool that lets you monitor only a single network port. Once PRTG is installed, you
need to add a sensor for the network ports you want to monitor. A sensor is
nothing but the IP address of the network card you want to monitor. You also
need to ensure that SNMP is enabled on the machine you are Monitoring, as PRTG uses it for polling and gathering data. The tool provides real-time graphs of the traffic moving in and out of the network port. It can create detailed HTML reports of the bandwidth on a daily, weekly or monthly basis. You should use it to monitor the network port of your Internet Gateway.


Read more »

Sunday, June 5, 2011

First Things First Set a Policy Part 2


Before choosing a tool to manage Internet access, you need to plan its deployment. For example, you need to determine which user or group needs or does not need access to particular sites or service (e-mail, Web, file transfer), which applications consume how much bandwidth and during what time of the day is the maximum traffic flow. On the basis of this information, you need to create an acceptable Internet usage policy. The policy should clearly state:











Read more »

Case Study on Internet Management Part 1


Internet connectivity is one of the most used and abused services
in any organization. Though its usability has been extolled enough, it’s the abusive
that most system administrators pull their hair out over. Most of them know
that their users visit prohibited websites, download music and movies using P2P
applications and chat online. Such activities not only cause network congestion
and deprive other users of bandwidth, but also open connections to unknown
resources on the Net that can bring in viruses and spam. So what can they do about
it?








Case Study on Internet Management








Read more »

Wednesday, June 1, 2011

Delete or Deactivate Google Application






Hello There! I have been using internet for past 10 years and my finding about any service offering website is that sign up or registration process is very easy and user friendly but if you want to deactivate or delete the services its not easily accessible or a little non user friendly. Well this is what i do as Business Development Manager at LIT, New Delhi. At this label i can't change the rule of those companies but what i can do is show you easiest path delete or deactivate those services which not easily accessible thus i start today with Google & Their Services.





Though Google provides a better help service if you got stuck anywhere while using any of its product in-spite of that we can see that there a lot users asking how to delete or deactivate gmail, How to delete a product without having to pay for extra fees?, How do I remove/delete/deactivate a forwarded cell number on GV, How to Deactivate google voice account?, How about deactivate account instead of Delete account option?, I want to delete google voice but apparently that is not an option?, How do I delete or deactivate Google Voice?, Deleting a Google App Engine application?, I don't want to delete my whole Google account?, How To Permanently Delete Gmail, Orkut, Youtube, Google Accounts?, How do I delete, or deactivate my Gmail account? How to Delete a Google or Gmail Account, Canceling your Gmail address?



Read more »