Tuesday, December 16, 2008

How a Registry Cleaner Can Eliminate the Blue Screen of Death

Computers are incredibly useful and they are constantly helping us streamline our lives. Without them, everything we do, from paying bills to ordering holiday gifts, would involve extra steps and extra time. But, computers can make our lives difficult as well—especially when they generate error messages we don’t understand. Even worse than error messages, the widely-feared Blue Screen of Death (BSOD) can abruptly change the way we see our computer, making it a burden in an instant. If you have ever been in the midst of working on a project for work or school on your computer, and have seen the feared BSOD, you know what this feels like. The operating system generates an error that says “fatal error” and you suddenly think your computer—and your project—are gone. While the “fatal error” sounds deadly, there’s no need to worry. Armed with the right information and the right tool, you can bring your system back to life. And, once you’ve revived it, the system will be running faster than ever. Knowing what the Blue Screen of Death is and how to avoid and repair it is key. Once armed with this knowledge, your operating system will be less overwhelming to you. The BSOD error is generally caused by errors in the Windows system registry. The registry is a directory within your Windows operating system that stores settings and options.

Holding an abundance of information, the registry acts as a closet. Imagine all the items you add to your closet over the course of a year. Over time, your closet becomes disorganized and you can’t find things you need. The process of finding things in your closet slows down dramatically. The same is true with the Windows system registry. Over time, the registry becomes cluttered with entries and begins to function poorly, sometimes even generating frightening errors. One common error in the system registry that leads to slowdowns and to the Blue Screen of Death is the DLL error. Before learning about the DLL error, it is important to understand what DLL files are. They are central to all applications and programs and they enable shared files to link up with each other. Without DLL files, a program’s files would not be able to communicate in order to execute the program. DLL files are easy to identify because they end in the .dll extension. Before you encountered the Blue Screen of Death, it is possible that your system generated an error regarding a DLL file. Whether your BSOD was caused by a DLL error or another issue, the answer lies within your system’s registry. There are two solutions then for the Blue Screen of Death.

First, you can manually investigate your system’s registry and manually repair any errors. This can be very time-consuming. There is a second, easier solution.

You can download a registry cleaning tool to scan and clean your Windows operating system registry. A popular and efficient registry cleaner is RegCure. This registry cleaner will scan your registry and remove any unneeded entries that are causing slowdowns and errors. The first step is visiting RegistryRepairProgram.com. There, you’ll be able to download a free scan of your system’s registry. From there, you can choose whether you want to use RegCure to clean your registry. If you elect to use RegCure, your BSOD errors will disappear. In addition, any other system errors you have experienced will disappear as well. Most important, your system will return to functioning like new, and you will notice the change in speed. Sorting through your registry manually takes time, but using a registry cleaner is the best thing you can do to fix annoying, or in the case of the Blue Screen of Death, overwhelming system errors. If you use RegCure on a regular basis, you will never experience a last minute BSOD crisis again.

Article Source: http://www.upublish.info
About the Author: Hamilton Hill
Ben Hamilton. RegCure uses the most sophisticated technology available to scan your Windows registry for corruptions and is the most effective registry cleaner on the market.

Network Camera Video Surveillance for Towns and Cities

Expansion of towns and cities is always a good thing, but it also brings with it potential problems such as increased crime. One way to help defend against increases in crime in your city or town is to employ the use of a network camera / IP camera video surveillance system. This can prove to be a vital part of your municipality's security infrastructure.

Benefits for Municipalities

Crime can be a horrible for a city, especially a growing one. The use of video surveillance can help cut down on crime, thus making the city safer and more attractive both for new residents and for new businesses. This is a good thing for everyone in town.

IP cameras used in public areas can also make these areas safer. In some cities, parks are known as havens of crime and many residents tend to avoid them, rendering these public areas almost useless. Through the proper use of a video surveillance system this problem can be curtailed, cutting down on the crime in these areas and making them safe for resident use once again.

Network Cameras for Video Surveillance

When dealing with a very large area, such as a town or city, network cameras can have a real advantage over traditional CCTV cameras. Network cameras, also known as IP (Internet Protocol) cameras come with built-in web servers and their video feeds are accessible via network. This means that no actual physical connection between IP cameras and monitoring stations need to exist: as long as the monitoring station is connected to the same network as the camera, then feeds can be viewed. This is an excellent way to handle a number of different cameras all from a single location, or at least allow a single location access to a number of different cameras, even if the cameras also have more local monitoring stations.

Another benefit of network cameras is enhanced quality. These cameras take video in a digital format, and depending on the camera resolution can often be much higher than that found in analog cameras. This gives your town's police force or security personnel a better image of the happenings on in the town, thus make it easier for them to perform their duties.

The use of advanced IP camera software can also be a great boon to a town's video surveillance system. With the use of this software, alarm systems can be set into place, or automatic notifications can be sent to officers on patrol, etc., based on certain parameters programmed into the software. This is a great tool which can be used in a number of different ways in various situations.

Installing a Municipal Video Surveillance System

It can often be tricky to install a municipal video surveillance system. Depending on property laws in the area, it will probably be best not to have it done by the town, but to work with local businesses and residents to have them set up their own cameras. For public areas such as parks, this will of course be done by the municipality itself, but for downtown and other areas where most if not all property is private, cooperation between town and businesses will be needed. You might wish to consider an incentive plan for businesses that cooperate with implement video surveillance systems

Obviously an entire town cannot be covered with cameras, so you will need to prioritize what areas should be covered. The busiest areas such as downtown or other shopping areas, public parks, etc. should definitely be considered. You should also look at the crime rates in town, see what areas are the most vulnerable to crime and concentrate on these areas as well.


Copyright (c) 2008 Wes Fernley
Article Source: http://www.upublish.info
About the Author: Wes Fernley
Network Camera Store is an online store that specializes in network cameras, network camera software and accessories. For information on purchasing, supporting or learning about IP Cameras, visit http://www.NetworkCameraStore.com

How to Choose Reliable CD DVD Replication Services

CD/DVD duplication service is a serious business that needs a serious solution, but must not be expensive. There are plenty of companies advertising their services over the Internet and through local store offering DVD replication and CD duplication, but only few can really deliver the quality and assurance one is looking for. Finding these companies is not hard. All you need is a little investigation and you’re good to go in outsourcing your needs.

What should be the criteria when choosing the right company to handle your CD/DVD duplication need? Doing these tasks on your end may sound impossible so we need to let experts do it for us. Companies with expertise on this field can provide a client with best results while spending the least amount.

First thing we need to consider is the company’s reputation. We must only entrust our business needs to reputable companies to get assurance of the quality of service and output we can get. A reputable company offering CD DVD replication services has everything to lose when it fails to provide a client with satisfactory level of service and an excellent quality output. A company’s reputation serves as our bargain when allowing them to do the job.

Fast turn around with high percentage of accuracy should also be among the company’s concerns. Numbers of companies in existence are offering DVD replication and CD duplication services providing clients with fast turn around time. This is a good indication that a company can handle task that needs immediate completion. These companies are also confident to make this assure because they have state-of-the-art technological equipment that can cater a client’s need.

The next important thing that a client should consider would be the price. With the tight competition on CD duplication or DVD replication services, prices are way affordable compared to those that were offered years ago. These services may require good quality result, but it should not be expensive. It is very important for a client to compare prices offered by companies offering CD/DVD duplication services before making the deal.

Support center should be available 24/7. Yes! As a client, you must look for a company’s support center. This will serve as the mediator between you and the company. In case there is a need for slight changes with your CD duplication requirements or any thing that you want to inform the company, you can easily do these things by contacting their support center.

Aside from the basic CD duplication or DVD replication services several companies offer added services to their clients. These include labeling and packaging. For promotional purposes, right labeling can boost a client’s business and may serve as additional promotional materials. Packaging services on the other hand lessen the burden of the client when thinking of how orders will be shipped.

DVD duplication service is a blessing to most of us especially musicians who do not have enough funds to support wide scale product of materials. This is the best alternative for companies in need of CD or DVD as informational materials for business promotion and employee awareness programs.

Article Source: http://www.upublish.info
About the Author: Roberta Groche
If you want to know more about CD duplication services then please feel free to visit CD DVD replication services offered by Corporate Disk Company. Disk.com has over 20 years experience in digital asset manufacturing

Things you should know when you take your Laptop on the road

You need to keep an eye on your laptop. If you take it out of the house, make sure the bag is closed all the way, zipped shut. It is easy for a thief to swipe your laptop out of your bag on the street or subway if they can see it. Then, as you go throughout your day make sure you keep the strap over your shoulder opposite the side of you body. This makes it much harder for a thief to snatch it from you. If you place it on the ground while paying for coffee or at the airport ticket counter make sure you place it between your legs and squeeze your ankles around it.

When go out to get some work done and you set your laptop up at a coffee shop. Be sure to use a laptop security cable. Attach it to anything you can. It doesn’t have to be attached to the building or floor, as long as it’s noticeable. A thief is not going to drag a chair out of the coffee shop and down the street.

You need to attach the lock as soon as you sit down as you don’t know when you are going to have to get up quickly to run to the bathroom, or to get more sugar or another coffee.

If you make it a habit of locking your laptop every time you take it out, you are much less likely to be a victim of theft.

This includes locking it at the office and at home. You would be surprised at how many laptops get swiped from desks in large office towers during lunch when there are not many people around. And if your house should happen to get broken into, the TV can be replaced, and you can live without it for a day or two, but if your laptop is taken, then all your work, documents and pictures etc.. are gone! Even if you are smart enough to back up, the odds are that you didn’t back up the minute before your laptop is stolen so you are going to be out some data. Then there is the downtime, now you have to spend half a day computer shopping, arguing with the insurance company buying and installing new software (the cost may not be covered by insurance) and not to mention that your deductible may be too high to even bother making a claim.

On top of that, you may end up struggling with a new operating system that you are not familiar with for weeks, and dealing with loosing all your settings and bookmarks.

A lot of people say “my laptop is old, I hope someone steals it!”… We all would like to get a newer faster laptop, but you don’t need to be “forced” into a new upgrade in the middle of working on a new project.

Then this all leads to the data on your laptop. You could have personal information on your laptop including names, address, Social Insurance Numbers or Social Security Numbers, credit card numbers, bank accounts, medical information, legal information etc…

The privacy laws will hold YOU responsible for the damages those people receive. If fraud is committed against someone because you lost your laptop with their information, if they lose money or their credit is damaged, then you are responsible for their loss.

Article Source: http://www.upublish.info
About the Author:
Ben Kayfetz
Ben Kayfetz is a expert security solutions provider specializing in laptop locks

How to Configure SSH (Secure Shell) for Remote Login on a Cisco Router

Prior to the introduction of SSH in the Cisco IOS, the only remote login protocol was Telnet. Although quite functional, Telnet is a non-secure protocol in which the entire session, including authentication, is in clear text and thus subject to snooping.

SSH is both a protocol and an application that replaces Telnet and provides an encrypted connection for remote administration of a Cisco network device such as a router, switch, or security appliance.

The Cisco IOS includes both an SSH server and an SSH client. This document is concerned only with the configuration of the SSH server component.

Prerequisites

Software

The SSH server component requires that you have an IPSec (DES or 3DES) encryption software image from Cisco IOS Release 12.1(1)T or later installed on your router. Advanced IP services images include the IPSec component. This document was written using c2800nm-advipservicesk9-mz.123-14.T5.bin.

Pre-configuration

You must configure a hostname and a domain name on your router. For example:

router#
router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
router01(config)#hostname router01
router01(config)#ip domain-name soundtraining.net

You must also generate an RSA keypair for your router which automatically enables SSH. In the following example, note how the keypair is named for the combination of hostname and domain name that were previously configured. The modulus represents the key length. Cisco recommends a minimum key length of 1024 bits (even though the default key length is 512 bits):

router01(config)#
router01(config)#crypto key generate rsa
The name for the keys will be: router01.soundtraining.net
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.

How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys ...[OK]

Finally, you must either use an AAA server such as a RADIUS or TACACS+ server or create a local user database to authenticate remote users and enable authentication on the terminal lines. For the purpose of this document, we'll create a local user database on the router. In the following example, the user "donc" was created with a privilege level of 15 (the maximum allowed) and given an encrypted password of "p@ss5678". (The command "secret" followed by "0" tells the router to encrypt the following plaintext password. In the router's running configuration, the password would not be human readable.) We also used line configuration mode to tell the router to use its local user database for authentication (login local) on terminals lines 0-4.

router01(config)#username donc privilege 15 secret 0 p@ss5678
router01(config)#line vty 0 4
router01(config-line)#login local

Enabling SSH

To enable SSH, you must tell the router which keypair to use. Optionally, you can configure the SSH version (it defaults to SSH version 1), authentication timeout values, and several other parameters. In the following example, we told the router to use the previously created keypair and to use SSH version 2:

router01(config)#
router01(config)#ip ssh version 2
router01(config)#ip ssh rsa keypair-name router01.soundtraining.net

You can now log on to your router securely using an SSH client such as TeraTerm.

Viewing SSH Configurations and Connections

You can use the privileged mode commands "view ssh" and "view ip ssh" to view SSH configurations and connections (if any). In the following example, the SSHv1 configuration from a Cisco 871 router is verified using "show ip ssh" and a single SSHv1 connection is displayed using the command "show ssh". Notice that we did not enable SSHv2 on this router, so it defaulted to SSH version 1.99. Also note in the output of the "show ssh" command that SSH version 1 defaults to 3DES. SSHv2 supports AES, a more robust and efficient encryption technology. SSHv2 is also not subject to the same security exploits as SSHv1. soundtraining.net recommends the use of SSHv2 and disabling a dropback to SSHv1. Enabling SSHv2 disables SSHv1. This example is included only to demonstrate backwards compatibility:

router04#
router04#show ip ssh
SSH Enabled - version 1.99
Authentication timeout: 120 secs; Authentication retries: 3
router04#
router04#show ssh
Connection Version Encryption State Username
2 1.5 3DES Session started donc
%No SSHv2 server connections running.
router04#

You can also use the command "debug ip ssh" to troubleshoot SSH configurations.

Copyright (c) 2008 Don R. Crawley
Article Source: http://www.upublish.info
About the Author:
Don R. Crawley
Don R. Crawley, Linux+ and CCNA-certified, is president and chief technologist at soundtraining.net, the Seattle training firm specializing in accelerated, task-oriented training for IT professionals. He works with IT pros to enhance their work, lives, and careers. For more information about learning opportunities with soundtraining.net, visit here.

Computer Support Services

With world of technology moving fast, computer users and companies depend on fast reliable tech support services. Every computer enthusiast might experience some computer problems; because the network system is fatal to encounter quite a few troubles during its entire life cycle. This creates a need for reliable IT resources.

These resources are said to have a full spectrum of IT solutions to cater your computer support requirements both at home and business. They have highly qualified technicians who provide professional, high-quality service at affordable rates in the comfort and convenience of your business or residential premises.

Although, you have to pay much money to computer tech support to get the answer you concerned, but it’s really worth your money. Most of these companies concentrate their efforts exclusively on home and small office computer users who require greater attention to detail and personalized service. Most of the times they maintain retail stores that allow them to keep costs low in order to provide competitive service prices.

There are number of companies that offer home computer repair services. These services include repairs, up-gradations, and installations for new system, virus removal, networking and more. Highly trained computer technicians perform all of these services. Many computer technicians will travel to your home or office to diagnosis, estimate and complete upgrades and repairs. In most cases, all work can be done in a single visit.

However, it can be an expensive choice as in home repair technicians charge on the basis of per hour. Whether you have got your system crashed or combating with pesky computer errors like blue screen of death or any other frustrating tech problems, these support resources will provide you with all the technical assistance that you need. Indeed, you can also avail professional advice in order to avoid future IT problems.

Troubleshooters at tech support resources answer all your telephone calls in order to analyze every IT problem that occurs in your computer. Even the most difficult and recurring difficulties are going to be handled and resolved in the easiest manner. The support workers also run the automatic diagnosis program to resolve all the technical issues that can occur in a particular system.

Apart from offering you with solutions for your PC blues, they will also maintain the proper functioning of the network. All the networks are going to be monitored in order to ensure their present and future availability when it comes to system users.

Data will be gathered in order to make out all the potential requirements coming from the customers and the information will be used for the network and system requirements to be assessed and interpreted. The technicians take up imitative to run the necessary network security measures in order to safeguard your computers. And, they don’t charge anything extra for it!

By availing services from these technical support resources, you can assure your computer’s protection and maintenance. The support technicians will also ensure the proper plan for every computer system, thus allowing all the IT components to work in an effective manner.
.
Article Source: http://www.upublish.info
About the Author: Joseph John
Joseph John is a technical associated with numerous tech firms including iYogi. iYogi is synergistic ally aligned to offer tech support, remote computer support, computer repair, PC help services computer support, online technical support, computer tech support to its clients in US, UK, Canada and Australia by Microsoft certified technician.

Of mp3 and Online games

There are two things in life that I am very passionate about: mp3s and online games. I absolutely begged for my father to buy me a brand new laptop and to subscribe to a fast internet connection so that I could have my fill of downloading and playing. “Pa, please I really need a brand new laptop!” “How can I do my research and homework and stuff?” This is the argument that would fill every dinner conversations. I always attack from this-is-for-my-school angle. I find that it is the most effective argument to use. (Take note of that guys! It may come in handy for you someday.) I had also added some puppy dog look to that to add some more convincing power. I knew that soon he’ll give in, but, of course, I did some extra chores around the house before that. If you saw some really shiny and spotless house back then, that was ours.

We finally bought this cool Lenovo laptop with fingerprint scanning, webcam, Dolby digital sound, wireless fidelity (wifi), Bluetooth, DVD combo writer and all the bells and whistles that would put the old Apollo spacecraft to shame. (Well, that is what the sales person told us. I really would not know for sure.) As long as that Laptop has speakers and can connect to the Internet, I really do not care if it contains the fastest Intel processor or the latest NVIDIA GeForce. (whatever those are) I remember that I pressured pa to drive faster on the way home so that I could finally use my new laptop. I got a long sermon from him about road safety and being a responsible driver because of that.

Ok now that I have told you the very boring story of how I got my laptop, let me tell you about my two passions. My family has always been music lovers. We have a huge collection of cds from different genre. Pa likes to listen to classical music. (you know, Mozart and stuff) Ma likes old songs especially The Carpenters, Bread and Abba. (I think these are 1970s groups.) Brother likes his noisy music while I like R and B and hiphop. To save money, I used to borrow my classmates’ cds, rip them and save them into mp3 format. I listen to them for hours and hours and hours.

But my main interests are online games. I have been a fan of those engrossing games at yahoo, but lately, I have been a Bratz games fanatic. Bratz games? Yes, you heard me right. Bratz games. Those games that are inspired by the hit dolls Bratz. Bratz games have over twenty games to choose from. They do not have as many as those found in yahoo but it does not mean that they are less interesting. I tried all the Bratz games in the site and everything there was very fun for me. The characters are so cute, I would have hug them if they were real toys.

Article Source: http://www.upublish.info
About the Author: Lea Smith
Lea Smith is a bratz dolls enthusiast and she loves to play various Bratz Games . She is also the webmaster of www.bratzgames.biz wherein you can find tons of great online flash games to play.

Know the Essential Skills to Become an Ethical hacker

Computer security has become a major cause of worry for businesses and governments all over the world. Though internet has made e-commerce possible, helped in advertising products and services to millions of people, it has also led to the rise of criminal hacking. Due to this, a growing number of companies and governments are turning to ethical or white-hat hackers to get them out of the problem.

A certified ethical hacker tests the security of the systems, look for viruses and rectify the problems pertaining to the network security. But in order to become en efficient ethical hacker, you need to have competent skills along with the right attitude.

Programming skills
The knowledge of programming languages is a mandatory. You should learn the technique of C, C++, Python, Java, Perl and Lisp.

As a beginner, you can start by learning Python which is less complicated as compared to other languages but at the same time challenging enough. It is well-documented and well-designed. Afterwards, you can learn C, Lisp, Perl and java.
It is important to learn Perl as it is used extensively for web pages and system administration.

All these languages have different approach to programming, and by acquiring the knowledge of each one of these would make you much more efficient hacker. Each language has its own significance and at the end of the day you would benefit by learning each one of them.

UNIX
You can’t become a hacker unless you learn and understand UNIX. After all UNIX is the platform on which the Internet is built upon. Though there are other platforms, it is not possible to read the code or modify them. However with UNIX you can read how the operating system is written and modify it. Hence, learn to hack on open-source UNIX by getting a Linux or BDS-UNIX installed on your personal computer and practice on it daily for hours.

HTML
To become a hacker, you should know how the World Wide Web functions. And having knowledge of web is not just restricted to how to use the browser. You should make efforts to learn and write HTML.

Usage of English
In order to become an efficient ethical hacker, you need to have a good command over the English language, as it is the English language which dominates the Internet. All the books on hacking come in English language. Hence concentrate to improve on this part too.

Apart from all this, read lots of books on hacking. The more you read; the better. Buy books or enrol in some libraries and take them on rent. And don’t hesitate in experimenting. To become a white-hat hacker, you need to have the curiosity to learn about new things.

In fact, you can also take up hacking course. There are several reputed institutes which offer certified hacking courses with theoretical as well practical training. Getting proper training from prestigious institutes would benefit you a lot and help you in becoming a professional, certified ethical hacker.

Article Source: http://www.upublish.info
About the Author: Mandira kumar
Maria Kilani is working as a consultant in a reputed IT firm in India. She is also an amateur writer who has contributed several insightful articles on ethical hacking and how to become white hat hackers and the future of IT jobs in India, the USA, or the UK.
Keywords: certified ethical hacker, white hat hackers, embedded system training, hacking

Configuring a Site-to-Site VPN Between Two Cisco Routers

A site-to-site virtual private network (VPN) allows you to maintain a secure "always-on" connection between two physically separate sites using an existing non-secure network such as the public Internet. Traffic between the two sites is transmitted over an encrypted tunnel to prevent snooping or other types of data attacks.

This configuration requires an IOS software image that supports cryptography. The one used in the examples is c870-advipservicesk9-mz.124-15.T6.bin.

There are several protocols used in creating the VPN including protocols used for a key exchange between the peers, those used to encrypt the tunnel, and hashing technologies which produce message digests.

VPN Protocols

IPSec: Internet Protocol Security (IPSec) is a suite of protocols that are used to secure IP communications. IPSec involves both key exchanges and tunnel encryption. You can think of IPSec as a framework for implementing security. When creating an IPSec VPN, you can choose from a variety of security technologies to implement the tunnel.

ISAKMP (IKE): Internet Security Association and Key Management Protocol (ISAKMP) provides a means for authenticating the peers in a secure communication. It typically uses Internet Key Exchange (IKE), but other technologies can also be used. Public keys or a pre-shared key are used to authenticate the parties to the communication.

MD5: Message-Digest algorithm 5 (MD5) is an often used, but partially insecure cryptographic hash function with a 128-bit hash value. A cryptographic hash function is a way of taking an arbitrary block of data and returning a fixed-size bit string, the hash value based on the original block of data. The hashing process is designed so that a change to the data will also change the hash value. The hash value is also called the message digest.

SHA: Secure Hash Algorithm (SHA) is a set of cryptographic hash functions designed by the National Security Agency (NSA). The three SHA algorithms are structured differently and are distinguished as SHA-0,SHA-1, and SHA-2. SHA-1 is a commonly used hashing algorithm with a standard key length of 160 bits.

ESP: Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite that provides origin authenticity, integrity, and confidentiality protection of packets. ESP also supports encryption-only and authentication-only configurations, but using encryption without authentication is strongly discouraged because it is insecure. Unlike the other IPsec protocol, Authentication Header (AH), ESP does not protect the IP packet header. This difference makes ESP preferred for use in a Network Address Translation configuration. ESP operates directly on top of IP, using IP protocol number 50.

DES: The Data Encryption Standard (DES) provides 56-bit encryption. It is no longer considered a secure protocol because its short key-length makes it vulnerable to brute-force attacks.

3DES: Three DES was designed to overcome the limitations and weaknesses of DES by using three different 56-bit keys in a encrypting, decrypting, and re-encrypting operation. 3DES keys are 168 bits in length. When using 3DES, the data is first encrypted with one 56-bit key, then decrypted with a different 56-bit key, the output of which is then re-encrypted with a third 56-bit key.

AES: The Advanced Encryption Standard (AES) was designed as a replacement for DES and 3DES. It is available in varying key lengths and is generally considered to be about six times faster than 3DES.

HMAC: The Hashing Message Authentication Code (HMAC) is a type of message authentication code (MAC). HMAC is calculated using a specific algorithm involving a cryptographic hash function in combination with a secret key.

Configuring a Site-to-Site VPN

The process of configuring a site-to-site VPN involves several steps:

Phase One configuration involves configuring the key exchange. This process uses ISAKMP to identify the hashing algorithm and authentication method. It is also one of two places where you must identify the peer at the opposite end of the tunnel. In this example, we chose SHA as the hashing algorithm due to its more robust nature, including its 160-bit key. The key "vpnkey" must be identical on both ends of the tunnel. The address "192.168.16.105" is the outside interface of the router at the opposite end of the tunnel.

Sample phase one configuration:
tukwila(config)#crypto isakmp policy 10
tukwila(config-isakmp)#hash sha
tukwila(config-isakmp)#authentication pre-share
tukwila(config-isakmp)#crypto isakmp key vpnkey address 192.168.16.105

Phase Two configuration involves configuring the encrypted tunnel. In Phase Two configuration, you create and name a transform set which identifies the encrypting protocols used to create the secure tunnel. You must also create a crypto map in which you identify the peer at the opposite end of the tunnel, specify the transform-set to be used, and specify which access control list will identify permitted traffic flows. In this example, we chose AES due to its heightened security and enhanced performance. The statement "set peer 192.168.16.25" identifies the outside interface of the router at the opposite end of the tunnel. The statement "set transform-set vpnset" tells the router to use the parameters specified in the transform-set vpnset in this tunnel. The "match address 100" statement is used to associate the tunnel with access-list 100 which will be defined later.

Sample phase two configuration:
tukwila(config)#crypto ipsec transform-set vpnset esp-aes esp-sha-hmac
tukwila(cfg-crypto-trans)#exit
tukwila(config)#crypto map vpnset 10 ipsec-isakmp
% NOTE: This new crypto map will remain disabled until a peer
and a valid access list have been configured.
tukwila(config-crypto-map)#set peer 192.168.16.105
tukwila(config-crypto-map)#set transform-set vpnset
tukwila(config-crypto-map)#match address 100

The crypto map must be applied to your outside interface (in this example, interface FastEthernet 4):

tukwila(config)#int f4
tukwila(config-if)#crypto map vpnset

You must create an access control list to explicitly allow traffic from the router's inside LAN across the tunnel to the other router's inside LAN (in this example, the router tukwila's inside LAN network address is 10.10.10.0/24 and the other router's inside LAN network address is 10.20.0.0/24):

tukwila(config)#access-list 100 permit ip 10.10.10.0 0.0.0.255 10.20.0.0 0.0.0.255

(For more information about the syntax of access-control lists, see my other articles on creating and managing Cisco router access-control lists.)

You must also create a default gateway (also known as the "gateway of last resort"). In this example, the default gateway is at 192.168.16.1:

tukwila(config)#ip route 0.0.0.0 0.0.0.0 192.168.16.1

Verifying VPN Connections

The following two commands can be used to verify VPN connections:

Router#show crypto ipsec sa
This command displays the settings used by the current Security Associations (SAs).

Router#show crypto isakmp sa
This command displays current IKE Security Associations.

Troubleshooting VPN Connections

After confirming physical connectivity, audit both ends of the VPN connection to ensure they mirror each other.

Use debugging to analyze VPN connection difficulties:

Router#debug crypto isakmp
This command allows you to observe Phase 1 ISAKMP negotiations.

Router#debug crypto ipsec
This command allows you to observe Phase 2 IPSec negotiations.


Copyright (c) 2008 Don R. Crawley
Article Source: http://www.upublish.info
About the Author: Don R. Crawley
Don R. Crawley, Linux+ and CCNA-certified, is president and chief technologist at soundtraining.net, the Seattle training firm specializing in accelerated, task-oriented training for IT professionals. He works with IT pros to enhance their work, lives, and careers. For more information about learning opportunities with soundtraining.net, visit here.

USB Flash Drives As a Sales Vehicles

Give Your Customers A Little Something Extra…

If I could sell you a brand new $50 note, for the bargain price of $20, you'd bite my hand off, wouldn't you?

Well, I can! Sort of...

You see, Promotional USB flash drives aren't just a way to keep your customers happy, to build or sustain your brand image or get a new product out there. They can also drive sales. And of course, more sales means more money.

Why not try offering a free USB drive with every order over $50 this month? Or a free USB Drive if you recommend a friend and they in turn spend over $50? Perhaps you could offer a range of incentives, matching memory size to the amount spent? Stand out from the crowd by using promotional gifts in a different way, to actually increase the bottom line now, rather than just building for the future.

Of course, the question has to be "Will offering a free USB Drive make my customer spend more than they usually would? Or spend money when they'd usually wouldn't?"

To answer the first part, I have four words for you. Amazon Super Saver Delivery. How often have you wanted a $5 book, but ended up spending $15 or more, just to qualify for the chance to have it delivered free? The answer for me has to be "More often than I'd admit". Now if they can make someone triple their spending to qualify for a $2 saving, what could a USB Drive make someone spend? Far more than it would cost you to buy it in, I'd wager.

As for the second part, how often have you been browsing through a catalogue, walking down the street or surfing the internet, not intent on buying anything, when the offer of a free muffin with every coffee, a free cookie with every sub of the day or free songs with the latest iPod has drawn you in?

Meanwhile, even the customers that would have bought enough to qualify for the free Promotional USB Drive aren't a loss. After all, it's still going to build their loyalty to you, make them feel appreciated, and acts as a brilliant way to deliver a new catalogue or showcase a new product launch to them by additionally preloading something onto the Drives

Imagine that once your valued customers have made a larger-than-expected purchase, received a complimentary flash drive, and whatever information you chose to pre-load onto it. Perhaps there is a contest or promotion you’ve been thinking about running. Utilizing USB flash drives as a means of information dissemination keeps your message at your customers fingertips…literally.
USB Drives really are Win-Win.

As for the second part, how often have you been browsing through a catalogue, walking down the street or surfing the internet, not intent on buying anything, when the offer of a free muffin with every coffee, a free cookie with every sub of the day or free songs with the latest iPod has drawn you in?

Meanwhile, even the customers that would have bought enough to qualify for the free Promotional USB Drive aren't a loss. After all, it's still going to build their loyalty to you, make them feel appreciated, and acts as a brilliant way to deliver a new catalogue or showcase a new product launch to them by additionally preloading something onto the Drives

Article Source: http://www.upublish.info
About the Author: Jesse Krieger
The USB Superstore offers a revolutionary way of promoting your products with their promotional USB . Log on to The USB Superstore and find out how you can take advantage of their wholesale USB .

USB Drives Make Medical Conference More Productive

Lecture materials provided to attendees on flash drives


Thanks to storage solutions from The USB Superstore, medical professionals got something extra at a recent conference in Orlando, Florida.
The seminar featured a roster of leading researchers who spoke on medical advances and cutting edge procedures. Instead of having to take detailed notes during the lectures, attendees were able to listen instead, knowing that all the presentations, notes and support materials were already on hand – preloaded on a flash drive that conference sponsors gave to each attendee.
As most conference, seminar and tradeshow planners know, attendees are often swamped with information that is hard to carry around. Lecture presentations, notes, sales materials and marketing collateral can really weigh a person down during a long day at an event. Not only is this information difficult to cart around, but it also has to be shipped home – and with some airlines charging for a second bag and in some cases the first bag – this can become very expensive.
In the case of this conference, professionals didn’t have to deal with packing around paper. Everything was stored neatly on a branded USB flash drive from The USB Superstore. Convenient and affordable, the drive not only provided attendees with the information they needed, but the drive itself could be used long after the meeting at the office, the lab or at home to transport and store data.
USB promotional items not only save space, but money as well. Compared to the reams of printed materials created for major conferences and tradeshows, a flash drive is inexpensive. Plus, they reduce the amount of paper that needs to be recycled, making them a green promotional giveaway at the same time. It is much more convenient to have all the pertinent information stored on a flash drive, than to carry around a large bag full of brochures and documents.

For conference organizers, flash drives provide a unique opportunity to entice premium sponsors for the conference. Often times, a conference organizer will offer a co-branding opportunity to a premium sponsor whereby the sponsor’s logo is co-branded flash drive with the name of the conference. So, when the attendees leave after the conference, they carry with them all the relevant information from the conference, as well as the premium sponsors logo, all on a functional promotional USB drive that can be used for years to come.

For more information on USB promotional products that can be customized for your next seminar, conference, tradeshow or event, contact The USB Superstore:

USB promotional items not only save space, but money as well. Compared to the reams of printed materials created for major conferences and tradeshows, a flash drive is inexpensive. Plus, they reduce the amount of paper that needs to be recycled, making them a green promotional giveaway at the same time. It is much more convenient to have all the pertinent information stored on a flash drive, than to carry around a large bag full of brochures and documents.

For conference organizers, flash drives provide a unique opportunity to entice premium sponsors for the conference. Often times, a conference organizer will offer a co-branding opportunity to a premium sponsor whereby the sponsor’s logo is co-branded flash drive with the name of the conference. So, when the attendees leave after the conference, they carry with them all the relevant information from the conference, as well as the premium sponsors logo, all on a functional promotional USB drive that can be used for years to come.

Article Source: http://www.upublish.info
About the Author: Jesse Krieger
Do away with printed materials for your seminars and use custom USB flash drives . By providing your pre-loaded promotional USB memory sticks , your attendees don’t have to take down notes and can just listen intently to your seminar.

Sharing Music and Video a Snap with USB drives

Portable drives store favorite songs or video for easy sharing and transfer


In a world filled with iPods and other MP3 players, the ability to store and share music, photos and video with family and friends has not only become fashionable, but commonplace as well.

But did you know that the venerable iPod uses the same storage technology as The USB Superstore’s line of innovative USB-compatible promotional products? If your clients are using their MP3 player to transfer their favorite tunes or videos with others, USB flash drives offer the same convenience at a fraction of the cost.

Perhaps that’s one of the reasons USB products have become such a popular choice among companies seeking to gain an edge in the marketplace. Not only are they finely engineered and affordable, but they are extremely convenient and easy to use.

Using a USB drive is as simple as plug and play. Insert the drive into the USB port on any PC or Macintosh and it will act as a regular storage drive on your system. Move any files you want to store, transfer or share to the drive. Then take your files with you, including your favorite songs, video files, documents and even movies. When you arrive at your destination, reverse the process and all your files are ready to enjoy and use within minutes. The drive is universally compatible, even with computers at an Internet café in a third world country.

As a promotional item, they are highly prized by recipients as well. Unlike a pen, flashlight or coffee mug, a USB flash drive has year-round use and will last for years, too. Recipients enjoy the ability to easily and quickly transfer files using a USB device so much that they continue to use them long after the tradeshow, conference or event they attended.

For businesses, that means effective use of marketing dollars, particularly in a tight economy. As most marketing professionals know, nothing’s worse than spending limited marketing dollars on a campaign, only to have your promotional items end up in a drawer somewhere, or worse, the trash.

A flash drive product never suffers this fate. It will be used day in and day out, putting your logo and marketing message front and center with your prospect or client as they transfer files between home and office or between coworkers, friends and family.

For more information on USB promotional products that can be customized for your next seminar, conference, tradeshow or event, contact The USB Superstore:

As a promotional item, they are highly prized by recipients as well. Unlike a pen, flashlight or coffee mug, a USB flash drive has year-round use and will last for years, too. Recipients enjoy the ability to easily and quickly transfer files using a USB device so much that they continue to use them long after the tradeshow, conference or event they attended.

For businesses, that means effective use of marketing dollars, particularly in a tight economy. As most marketing professionals know, nothing’s worse than spending limited marketing dollars on a campaign, only to have your promotional items end up in a drawer somewhere, or worse, the trash.

A flash drive product never suffers this fate. It will be used day in and day out, putting your logo and marketing message front and center with your prospect or client as they transfer files between home and office or between coworkers, friends and family.

Article Source: http://www.upublish.info
About the Author: Jesse Krieger
USB drives are popularly used for storing, sharing, and transferring files. Now you can use them as promotional USB gifts for your clients or as custom USB with your company logo for your tradeshows.

Toshiba Laptops And All-In-One Printers

Toshiba, a premier electronics manufacturer, has come out with some path breaking technologies in electronics. Its products are well appreciated throughout the globe. Toshiba laptops are also examples of innovative design combined with impeccable practicality.

Laptops are the convenient and user friendly alternatives to the traditional personal computers. The importance of PCs cannot be discounted still. But being portable and lighter in weight, they have become the best friend to everyone, including traveling executives and students alike.

Toshiba laptops have carved a place for themselves in the market. Some are cheaper and affordable but some are niche products meant for a select few. The company produces lightweight laptops, thin laptops and tablet PCs, and the range available in all categories is really vast.

Toshiba lightweights offer sleek and light-weight designs and can be carried easily. They can give you productive hours irrespective of whether you are inside your cabin or in a shop or flying in an aircraft. The Protege A600 series, the R400 series, the R500 series and the U400 are ultra light weight laptops designed for ultimate usefulness. Prices vary according to the specified configuration.

The Tecra R10 series is not only lightweight, but very thin too. They are very useful for a person who is always on the move. The Tecra R10 have all desirable features including webcam, advanced wireless and wide screen LED backlit display, which makes it truly desirable.

Toshiba tablet PCs are one step ahead of others in terms of portability. With all its advanced features like built in Ethernet, Bluetooth, finger print reader and the likes, they are not at all inferior in any count with other models available. For someone who would like to stay connected irrespective of where he is, the satellite pro series is a real gift from god.

No talk of Toshiba laptops can be complete without mentioning the Qosmio series. Often praised as the flagship series of the company, these laptops are veritable beauties but functionality is given an equal importance. They are superb for gaming too. However, they are not cheap by any count. Custom made accessories like battery charger adapter, keyboard protector, carrying case, tablet pen and leather portfolio makes Toshiba laptops easily serviceable and productive.

All-in-one printers are easily compatible with Toshiba laptops. Printing in color as well as black and white, sending faxes, photocopying and even scanning can be done over them. Printers differ in size, color, features and output speed. These factors determine the price. The market is being swamped by an influx of these all-in-one-printers because more and more people are opting to purchase them in order to ensure more productivity, albeit at a considerably lesser cost. Proper care and timely servicing can keep these delicate machines in perfect working conditions for many years.

Article Source: http://www.upublish.info
About the Author: Roberta Groche
Super Warehouse is an online source of Toshiba laptops and all in one printers and services for businesses, education and government customers internationally. More information can be found at Superwarehouse.com .

Apple Computers And Cheap Lcd Monitors

The computer revolution has reshaped our industries, our services and even our lives. The role Apple computers played and even play now is not second to that of any other manufacturer. The firm, after an initial struggle, has rose to unbelievable heights in recent years and commands a healthy share in the personal computer market.

When you talk of quality products in the information technology, the first name that may pass through your mind would be the Apple Mac series. They are beauties with equal quantity of brains. They are delicate, but strong in functions. They are exquisitely designed, but made for a purpose. With lesser number of software installed, they can perform your jobs faster than cluttered PCs. Apple prefers that you install only the required software and applications. The operating system is also more manageable and does not require registration.

A curious fact about Apple laptops is that they are designed in unusual soft colors while the entire industry are rooting for serious looking black and white colored ones. This added fun to functionality. They are also much versatile. While Mac computers can be run on windows too, other PCs cannot work on Mac Operating System. The use of dual operating systems aids in running more applications than others.

The laptops churned out by Apple are well known for their beauty. The second hand value of these computers is better than others too. But the most likeable feature of Mac series is that you need not change it every two years as in the case of others, because of its futuristic design and amalgamation of applications. They are designed with forethought and purpose.

Apple desktops match their smaller but smarter laptop counterparts in functionality and style. They are perfect options for offices and workstations. However, it is the lightweight, thin and exquisitely carved laptops that almost always hog the limelight.

LCD monitors are the toast of the masses these days. The days of the reliable, hardy, but bulky and harmful CRT screens are gone and the sleek, light weight and less space consuming LCD screens have taken their place. Performance and display quality is also far more superior to CRT monitors. In the course of time, LCD monitors have become impressively cheaper too.

Prices of LCD monitors vary according to the size, resolution, brand name and after sales service. Going for the cheapest with the least features and customer friendliness is not advisable. You have to scout around a little through internet stores and company websites in order to gain a clear real picture and then place your order. Intex, Acer and ViewSonic are renowned manufacturers of reliable and less expensive LCD monitors. You have to be sure about your requirements too. Otherwise you may end up buying a LCD monitor too large or too small to suit your need and available workspace.

Article Source: http://www.upublish.info
About the Author: Roberta Groche
Super Warehouse is an online source of Apple computers and cheap lcd monitors and technology products for businesses, education and government customers internationally. More information can be found at Superwarehouse.com .

LF Radio NTP Servers: How to Decode the DCF-77 Time Broadcast

The DCF-77 radio time and frequency transmission is broadcast from Mainflingen, Germany. The DCF-77 signal can be used by timing equipment to provide an accurate time reference. Computer systems, such as NTP time server systems, which provide a precise time reference for networks can utilise the broadcast as an accurate external source of time. This article describes how the DCF-77 signal can be decoded to provide an accurate time reference for NTP time servers and other computer applications.

Before describing the format of the transmission, it's worth mentioning a little about the history of the transmitter. The German National Standard time and frequency radio broadcast, call sign DCF-77, has been in operation since 1959. The broadcast is currently maintained by T-Systems, a sub-division of the German Telecoms company Deuche Telecom. Precise timing information for the broadcast is generated from caesium atomic clocks maintained by the German National Physics Laboratory. The transmittor has a power rating of 50W, which can be received up to 1900 km from Frankfurt. Reception can easily be obtained throughout much of central and northwestern Europe. The transmission is broadcast as an amplitude-modulated, pulse-width encoded data signal. Precise timing information is continuously broadcast, repeated each minute. Data is broadcast as 59 pulses, one pulse each second, each pulse representing a data bit. Each pulse represents a data bit, either a binary one or binary zero. A one hundred millisecond pulse represents a binary zero, while a two hundred millisecond pulse represents a binary one. The pulses can be decoded at the end of the minute into date and time information.

Time and date information is encoded in the DCF-77 transmission as Binary Coded Decimal format. Data bits are encoded into the transmission as follows. Data bits in the range 1 to 14 are reserved for future developments. Bit 15 indicates the transmitter in current operation - primary transmitter or backup transmitter. Bit 16 represents the announcement of daylight saving change. Bit 17 indicates whether daylight saving is currently in use. Bit 18 indicates standard time and is the inverse of bit 17. Bit 19 indicates that an imminent leap second is to be inserted. Bit 20 indicates the start of time and date information. Bits 21-27 represent BCD encoded minutes. Bits 29-34 represent BCD encoded hours. Bits 36-41 represent BCD encoded day of month Bits 42-44 represent BCD encoded day of week Bits 45-49 represent BCD encoded month of the year. Bits 50-57 represent BCD encoded year. Finally, parity bits are inserted into the encoded data as follows. Parity bit 28 covers bits 21-27. Parity bit 35 covers bits 29-34. Parity bit 58 covers bits 36-57.

To summarise, the DCF-77 time transmission is a reliable and accurate source of time from NTP server systems and other computer timing applications. The signal can be generally be received indoors close to the NTP time server itself, thus reducing installations costs. Additionally, the straight-forward encoding of timing date within the transmission enables simple implementation into NTP server software. Indeed, the Linux NTP software distribution for includes a standard reference clock driver for the DCF-77 transmission.

Article Source: http://www.upublish.info
About the Author: David Evans
Click here, if you would like to find out more about SNTP, GPS, MSF and DCF-77 NTP Server systems.

How to Decide Whether to Rent Lease or Buy a Computer

When most people hear talk about “buying” versus “leasing” they usually think of a car purchase or some sort of real estate agreement. However, small business owners have to think about, and decide between, these terms all the time, and relating to almost everything the work with – buildings, vehicles, equipment for the factory floors and computers for the office.

Considering the amazingly low prices for today’s powerful personal computers, one’s first instinct may be to buy a computer without even thinking about it. Of course, you know you are going to use the machine for several years (computers stay reasonable current for the first year, then start aging rapidly) and the fact that you own it can be somewhat reassuring. There are several factors, however, that should prompt you to consider leasing a computer or perhaps even renting one, as opposed to making that impulse buy.

One is never enough

Leasing computers can help a company avoid plunking down so much capital up front. Leasing makes sense when there is a need for an especially powerful, customized, expensive unit, or a number of computers for different departments. This decision can turn the computers into an operating expense, an especially helpful thing if the company is just getting started. Another advantage is that, when directly leasing from a vendor or a manufacturer, businesses do not need to obtain loans from banks – and deal with all the red tape and paperwork that comes with it.

From a financial planning standpoint, leasing makes sense for many businesses, and if the conditions are right, so does renting. Renting computer equipment can be just as good as leasing in the sense that you can always upgrade, fairly painlessly, to the highest quality, greatest power and newest software available. The company renting you the equipment makes their money also assumes the responsibility for repairs and maintenance. Although some leases may differ on service contracts and onsite repairs, if you rent the equipment the owner is still responsible for the technical difficulties occurring throughout the duration of your contract. That is what paying rent is all about. You pay to have predictable functionality and a working asset at all times.

Other factors

If you really want to know what the best course of action is for you business or your personal needs, then do the usual research. There are always plenty of websites that can provide all the facts, crunch all the various numbers and make it worth your while to investigate. Steer clear of the “rent-to-own” dealers, of course, as the offer of “no money down and no credit check” is insufficient to overcome the price you pay down the road. With rent-to-own, it is always bigger than you expect.

If you have special enhancements on your one of your present computers – special internal plug-in cards (PCI), upgraded graphics (AGP) – and have “maxed out” your RAM, you may wish to reconsider replacing that particular unit. It may be difficult to find a lease deal that will allow you to upgrade and replace computer components, and your rental dealer will probably not like that idea much. If you do need customizing, it is best to own your own equipment.

Ask the accountant

If you run a medium-sized or larger firm, and have various departments with various needs, you will have to do a study to determine the actual, real-world, real-time needs of the various personnel. Ask your department managers to research the matter, and then be specific about what they need in the PCs for their respective departments. You can then have your accountant look at the various options – buy, lease, rent – and calculate what mix of these will work for the company as a whole.

It may be that you need to lease new Macintosh computers for your art department, and on an annual basis to stay up with the “state of the art.” Secretaries, word processors and accounting personnel can easily run new, powerful Windows software on lower-cost PCs, and not need upgrading for several years at a time. Purchasing low-end computers would seem a workable solution. If you have engineers and others needing some real computational horsepower, of course, you may even need to leave the realm of PCs and step up to a mini-computer from IBM or Hewlett-Packard. (PCs are actually defined as “microcomputers.”)

The bottom line is different for different companies and their different needs. Often a mix of these methods – buying, leasing and renting – is the ultimate result of a careful study. If you have a small company with just a few employees, of course, your decision should be a bit easier to make. The fact is, with prices so low for power so great, computers are one of the less expensive expenses for companies today, and contribute to the business out of all proportion to their small cost. Whatever strategy you come up with, it should be an affordable one.

Article Source: http://www.upublish.info
About the Author: Wanda Pan
If you are looking for technology and computer rentals in the San Francisco or Las Vegas regions, SWA Computers should be your first call. Our extensive inventory will make your computer rental san Francisco a successful and painless experience.

A PC in the modern home

Computers have become an essential part of our day-to-day life. No longer are they just a tool we use when at work. Virtually every household in the UK now owns at least one PC or laptop and many homes now have more than one. With the introduction of wireless routers and broadband a few years ago ‘PC Recovery’ have found that many people would now rather be without their television than their computer. A spokesperson for ‘PC Recovery’ said “Typical PC users these days will use their computer for a wide variety of tasks. From emailing their friends and family to booking cheap flights online. We have found many people will store all their photographs and music on their computer as well as any important documents such as a CV or letter to their bank”

With the increase in home PC usage it stands to reason that more and more problems are going to arise. “It’s no longer a case of just removing a virus or upgrading someone’s RAM” said the spokesperson. “Many families now have home networks with several computers and laptops involved. As well as wireless printers and network storage devices and they want to make the most of their hardware whether it is a laptop or a desktop PC.”

As computers are able to take care of more and more tasks for us computer engineers are finding themselves doing a wider variety of tasks than in the past. Apart from the obvious things such as fixing a broadband problem or removing a virus from a computer, they now find themselves doing things such as setting up home games consoles on the internet i.e Xbox 360 or PS3, or installing a customer’s mobile phone or MP3 player. “Times are changing” said the spokesperson. “And with it our engineers are finding they have to adapt and keep abreast of new technology and new advancements.”

Without doubt the most popular advancement in recent years would be the wireless network. Throughout the United Kingdom and in particular southeast England there are hundreds upon thousands of wireless hotspots, many of which are free. “If you drive into any town center in Essex or Kent you are now able to access the internet from many available hotspots” revealed the spokesperson “Libraries, fast food restaurants, cafes and even hotels are now only too happy to offer this service free of charge in order to encourage potential customers to use their facilities” The problems arise when people access private wireless networks that have not been secured. “This can cause a great deal of problems and security issues for the owner of the private network. This can potentially be very damaging as in the wrong hands this access could lead to bank details and personal files be extorted from the owner’s computers.

So while the new age of wireless is incredibly useful and makes it much easier for us to keep in touch with each other and indeed our online pursuits we should all take care and if necessary have our home networks checked by someone professional before it is too late. “We have seen too many people fall foul of stolen identity just by leaving their home network unsecured” said the spokesperson “So it does pay to have your system and network checked by someone professional and reputable every so often, even just for your own peace of mind.”

Article Source: http://www.upublish.info
About the Author: Paul Orams
www.pcrec.co.uk PC Recovery is a home visiting pc repair business in the southeast of England who have been specialising in computers and networks for many years.

Unpublished Phone Number Lookup: How Can You Do It?

The telephone is considered to be the best tool invented for communication. With it, you will be able to communicate with your family, friends and loved ones easily and much more conveniently. However, what if you receive a phone call from someone who refuses to identify themselves? What if it is a call from a stalker or from your spouse's lover? Surely you want to know about their personal information in order to put a stop to the harassment or save your marriage.

If you suspect that your spouse is cheating on you or if you are becoming a victim of a stalker, it will help if you know who is calling your phone. You can easily do this by looking up the number on the public phone directories.

But, the problem is what if the number is unlisted or unpublished? It would definitely make it hard for you to trace the call.

So, the next question would be how will you be able to trace the call if the number of the caller is unlisted or unpublished?

Basically, there are quite a lot of ways to know who the number belongs to.

The first way is by searching it on the internet. If you are lucky enough, the caller may have an online business and like other businesses, they will post their phone numbers on their website in order for their clients to know how to reach them. Just type in the number on popular search engines, such as Google and if the number is placed in a website, the search engine will be able to find it.

Also, if you suspect that your cheating spouse got the number from an online dating website, you can easily find it by searching the number on some of the popular online dating websites.

If this doesn't work, you may want to try searching for the information that you need by hiring a private investigator. Private investigators have vast resources for looking up numbers and give you information. Most private investigators are former police officers who still have connection from the police which they can use to look up the numbers. However, be warned that a single phone number lookup using private investigators may cost you nearly a hundred dollars.

You can also try out the services of a reverse phone number lookup websites. This may also cost you some money but it is almost as good as hiring a private investigator and will cost not as much as hiring one. In fact, a search for a number can cost you as little as 20 dollars.

Just remember that you should go for reputable reverse phone number lookup websites as websites like this will give you money back guarantees and offer optimum and updated searches.

These are some of the things that you can do to search for unlisted or unpublished phone numbers. Through these methods, you can be sure that you will be able to find the owner of the number that you are looking for.

So, whether you are being stalked or harassed through the phone, or you are suspecting that your spouse is cheating on you, you might want to remember these tips as these tips will be able to help you out in stopping the harassment or save your marriage.

Article Source: http://www.upublish.info
About the Author: Chad Kiser
To Reverse Search a Cell Phone Number or an Unlisted Telephone Number Today, visit http://www.unlistedphonenumbers.biz

How to 'Download' Your Old Computer to the Highest Bidder

When you think trash, you surely don't think about your old, trusty personal computer. But that's exactly what will become of it when you make the inevitable move toward your next laptop or desktop. And, yes, buying a new computer is inevitable, considering the pace at which computer technology zips along. Just think-about a handful of years ago, a fast microprocessor for a laptop was at 233 MHz. Now you're looking at about at least 2 GHz! That's Giga, with a G.

So eventually, you will want a computer that can handle the latest software, the latest games, and the latest interactive Web sites, and then you'll have to throw away your old computer, right? Wrong. Try selling your used computer instead. Throwing out your computer is one of the worst things you can do. For one, your computer may be useful for someone out there, even if just for scraps.

Trashed computers and other digital equipment also make up one of the fastest growing, and most dangerous, new trash "categories" out there in your neighborhood landfill. On one hand, computers are generally bulky and made of plastic and other materials that won't be breaking down in a landfill for the next few million years. What's more, other materials in your old computer are highly toxic to the environment, like mercury, lead and cadmium. They're so toxic that their actually name in the waste-management field is "toxics."

You don't have to be a techie or a scientist to understand the danger in that-nor the benefits of selling your computer. On the Internet, there are a vast number of auction and classifieds sites, some better than others, where you can "download" you computer to a worthy buyer.

Before you boot up your replacement laptop or high-performance PC, however, be sure you read and compute the following tips. These tips will help you avoid the crashes and shutdowns that befall the computer seller who doesn't do his homework first.

Hold onto all of the operating system and software manuals that came with your old computer. This will add value to your sale, not to mention it will make you a trusted seller for offering up these helpful books to the buyer.

Erase all personal information from the hard drive. And we're not just talking about simply putting stuff in the "trash bin." It's extremely important to purge all data from your computer's memory repository, even from invisible backup files on the hard drive. If you're not sure how to do this, ask your IT expert at work or a techie friend for advice. You don't want the next user to have access to your bank accounts, old e-mails, and other private info, do you?

Uninstall any application from the hard drive that you'd like to use on your next computer, keeping the installation disk and the software serial number for yourself. When it comes to software, the manufacturers made sure that you never really own software, you license it. So you don't get free reign to keep software on multiple computers. You only get one license, so you need to bring your licensed version with you to your new computer.

Do your homework on your computer's worth. Just like you would for a car, check around at other classifieds and auction sites to see what other people are selling your make and model for.

Be sure you want to truly get rid of old faithful. You may be able to repair your old laptop rather than buy a new $2,000 Centrino model. Or you may be able to add RAM memory and a new hard drive to your four-year-old desktop rather than invest in a new $3,000 multimedia masterpiece. In other words, do a thorough cost-analysis of what it would take to rebuild your old computer, versus what it would cost to sell it and buy a new one. And check your heart too. You might be surprised just how attached you are to your old faithful.

Once you go through these steps, you are prepared to make your move and sell, sell, sell. And then, of course, you'll be ready to start on a whole new list of steps-for buying a new computer. But that's a topic for another article!

Author By: Donald Lee
Donald Lee is the public relations manager for Buysellcommunity.com. Buysellcommunity provides free classified listing services. Buy, Sell and trade: auto, computers, household items, real estate, pets and much more. For global and localized classifieds, please visit http://www.buysellcommunity.com - Free Buy & Sell Classifieds
Article Source: http://www.ArticleGeek.com

Sunday, November 30, 2008

Comparing Motherboards for the Upcoming Core i7 Processors

In the next few months, more and more buzz will be generated for new motherboards. That's because with the launch of Intel Core i7 processors, only new motherboards with the X58 chipset can be used. In other words, if an enthusiast wants to upgrade a CPU, the motherboard has to be upgraded as well.

A lot of information has been released by technology news websites on various motherboards such as the ASUS P6T Deluxe OC Palm,Intel DX58SO, MSI Eclipse and EVGA's X58 SLI motherboard. In order not to be overwhelmed by the plethora of articles on these motherboards, it may be a good idea to be clear headed and focus our attention on the crucial elements.

Crucial element 1: Speed

The overall speed of the computer system depends on the multiplier values of the system. For example, you can achieve higher performance if you tweak the multiplier values of the CPU or the memory. Overclocking enthusiasts will be most interested to know if the system can run reliability at the overclocked values.

In this area, the ASUS P6T motherboard offers an extra in the 2.5" LCD displays that presents system configuration information, overclocking data, etc. This is useful for overclockers who want to tweak and monitor the system while it runs.

Crucial element 2: Graphics

The graphics of a computer system is another major component to take into consideration. Many software applications require a lot of graphics processing power to run smoothly. This includes professional software, such as video and audio editing software that performs a lot of zooming, panning, modeling of 3D objects, etc. Many 3D games also require powerful graphic processing for best effects.

Enthusiasts should check whether the motherboard has SLI (Scalable Link Interface) support. SLI is a technology developed by nVidia, and it's used for multi-GPU processing. Not all motherboards support this feature because manufacturers are required to pay a royalty to nVidia if they want to offer support for SLI.

Since SLI is meant for intensive graphics processing, only those who need it for business applications or gaming need to consider having this feature.

Crucial element 3: Memory.

The memory on a system affects the overall speed of the computer. With powerful processors, enthusiasts have to make sure that there won't be a bottleneck when it comes to memory. Having insufficient memory could mean that the system will run at substandard performance.

Motherboards with the X58 chipset offer support for triple channel DDR3 memory kits. Various memory manufacturers from Taiwan and China have already released memory kits that are timed perfectly for the Core i7 processors.

Enthusiasts should pay attention to the number of slots available. For instance, the ASUS P6T motherboard has 6 memory slots, allowing a max memory of 12 GB. Other motherboard options may have only 3.

As far as the motherboard is concerned, there are various editions available. Of course, one can expect the high-end editions to be much more costly. However, enthusiasts can still enjoy the increased performance at an affordable price if options are selected wisely.

About Author: Gen Wright

For fresh technology newson the latest PC hardware, such as the ASUS P6T Deluxe
motherboard
, please visit the Gadget Advisor web site.
Article Source: http://www.upublish.info

Registry Needs Cleaning - Main Reason Computers Run Slowly

When using your computer and adding or removing files or programs,fragments of data are left on your hard drive in the Windows registry. Over a period of time this accumulates and causes the registry to become overloaded with unwanted data. This the most prominent cause for slow running,freezing and crashing problems.

Spyware or adware is installed unknown to you by third parties who want to track your computer usage and benefit from this knowledge.This also uses up your computer's resources and can be another cause of slow running. Free antispyware programs can be downloaded on the internet and do an excellent job.

Needless to say viruses are a major problem if they infect your machine. Every computer which is used on the internet must have an antivirus program installed or infection is certain. A firewall is good protection but is not enough on it's own. Free antivirus programs are readily available on the internet and do a very good job of protecting your computer.

When your computer registry accumulates a large amount of unwanted data entries it becomes bloated and clogged. The operating system finds it difficult to navigate through all the junk in order to find the data needed to run your computer. The result is a slow running computer,freezing,and the occasional complete crash. If not corrected this will steadily get worse.

Your computer registry is a databank of information which the operating system uses to run the computer and programs. All Windows operated computers since Windows 95 have a registry. This is the most common source for computer problems involving slow running,freezing and crashing.

If your registry has become corrupted by unwanted material the best solution is to remove these entries by cleaning the registry. You can use the regedit function which is installed on all Windows computers,for this purpose,to do this yourself. With the regedit function you can remove any unwanted entries from the registry. Use great caution here however as many registry files are absolutely necessary for running your machine. If you remove any of these entries you can cause problems.

Unless you are very knowledgeable about the contents of the registry,and can recognise the essential entries which must not be removed,you should not attempt to edit the registry yourself. It is better to be safe and to use an online application to clean your registry safely and easily.

Several register cleaner applications can be found online. The most popular applications will all clean your registry reasonably well. However as with most things some are better than others and there are considerable differences in ease of use,safety and availability of email help when you need it.

About the Author: John Mowatt

Want to end slow running,freezing and crashing? Want to know what the absolutelly best registry cleaner application is? Want a completely free online computer scan to determine whether or not you do have a registry problem? Complete answers are here: Registry repair information Registry repair information.

Article Source: http://www.upublish.info

Notebook Computer Displays

When it comes to laptop computers, the choice of display size is one of the most important considerations you have to make. It is just as important as ram size, hard drive size, and processor speed. The display size will also heavily factor into the overall weight of the notebook computer. A larger display size means a larger physical footprint, which is more or less desireable depending on whether you need an ultraportable, mainstream, or gaming style computer. The most important factor, however, is your comfort level. A smaller screen (ultraportable size) may mean great mobility, but none of that is helpful if text or pictures appear uncomfortably small.

Types Of Displays

Due to increasing demand, more and more manufacturers are making widescreen displays available as well as standard displays. Standard TV's and computer displays utilize a 4:3 (or 1.33:1) aspect ratio, including notebook computers.

Standard 4:3 Aspect Ratio

The standard 4:3 aspect ratio has been in use by notebook computer displays for a long time and is offered in several screen resolutions:

- 800 x 600 (SVGA) - 1024 x 768(XGA) - 1400 x 1050 (SXGA+) - 1600 x 1200 (UXGA)

Resolutions higher than 1024 x 768 can only be found in displays sized 14 inches and above. Ultraportable notebooks with displays sizes under 14 inches are unable to have high-resolution displays.

Widescreen Display

Using a 16:9 or 16:10 aspect ratio, widescreen displays can generally display about 25% more content than a standard display. Computer manufacturers offer several size displays from 8.9", 10.6", 11.1", 12.1", 13.3", 14", 15.4", to 17". These sizes are popular now with even larger sizes in the pipeline.

When used for entertainment, DVD movies in particular, a widescreen display is in its element as it shows widescreen movies in their intended 16:9 aspect ratio. This means a bigger picture, more comfort and thinner or no black bands on either side of the picture.

The widescreen display also makes it easier to edit and view panoramic images and may eliminate horizontal scrolling on your computer altogether. When editing images of normal 4:3 aspect ratio, you can simply place your GUI tools/utilities in the unused spaces on either side of an image. In any case, a widescreen display can help you increase work and play efficiency.

Another benefit of the widescreen display is evident when it comes to serious work - the ability to display two windows side by side and to drag and drop (or copy n' paste) data without having to switch windows is invaluable.

Common Widescreen Display Resolutions

Here are the common resolutions found in :

1280 x 768 And 1280 x 800

1280 x 768 (16:9.5) and 1280 x 800 (16:10) are the two most common resolutions used in 10.6, 12.1, 13.3, 14, and 15.4-inch entry-level widescreen notebook computers. They provide about a 25% more onscreen content than standard screens with 1024 x 768 resolution.

1366 x 768

This resolution provides a 16:9 aspect ratio and a great widescreen DVD movie experience without any black bands above and below the picture.

1440 x 900

This resolution 16:10 is found only in 17" notebooks and is positioned as entry level in 17" widescreen notebooks.

1680 x 1050

This is currently the mainstream resolution, also 16:10, for 17" widescreen notebook computer displays. There is a 35% increase in onscreen content compared to normal 17" screens using a standard display resolution of 1280 x 1024.

1920 x 1200

At this time this is the highest for 17" widescreen notebook displays, and provides a 75% increase in onscreen content when compared to a standard 17" screen of 1280 x 1024 resolution. A great display for movies and gaming, however this relatively heavy laptop computer has tradeoffs in mobility.

About the Author: Paul E Steinberg

Paul Steinberg is webmaster and owner of http://LaptopsComputers.com, a computer buyers website. With a degree in computer technology and over twenty years experience in hardware, software, and internet experience he guides you as an expert in the computer field. Visit his site for great buys on top computer brands, and helpful computer news articles.

Article Source: http://www.upublish.info

Create Your Audio CDs from MP3 Files

Digital files like music files are now popularly stored in digital systems like computers. The computer as a storage system requires a certain format from the music file that will be stored and mp3 format is the most widely used format. People choose to store database of music using the mp3 format in their computer. However, like any other file creating mp3 backup is also essential. Mp3 backup creation can prevent file crashing, file corruption and other troubles you wouldn't want to happen in the first place. So what needs to be done then? Back up your mp3 files by converting the files into audio CDs.

The Answer: Creation of Audio CDs from MP3 Files

Since converting your mp3 files or your music files into an audio CD is essential and the most convenient way and smartest way to do. Though the converted audio CD can serve as the backup files of your mp3 files, it is still more appropriate to say that the mp3 files converted into audio CDs is not exactly the real process of making backup files.

This is why there is a need for CD burning software that is being used to burn or create an audio CD along with the CD writer drive. How is CD burning or creation of audio CD from mp3 files done? To make it simple, you as the user just have to compile your mp3 playlist that contains the mp3 files or music of your choice. Then, you will store the music files with the help of the CD burning software.

What are the burning procedures in creating your audio CDs from mp3 files?

Before you even get disoriented, you should be aware first that the burning procedures are easy and undemanding. To start with the burning procedure, the mp3 files like your music need to be converted into another format file called compact disc audio or CDA. However, and for the record the CDA conversion process happens internally which means it is run by the software program. The display result of the CDA operation is not shown for the sake of the user, you just have to be aware of it.

Nero: the Most Popular CD Burning Program for MP3 to Audio CD Conversion

And for the most popular CD burning program, Nero is always on top of the list. Nero is always the choice of many users because of its capabilities to take over all burning procedures, including unknown conversion processes and options for customization intended for advances users. An example of the Nero customized options is its simplified audio editor. The audio editor can offer advanced options that consist of noise reduction, stereo widening, file splitting, and sound equalization.

For the record, not all CD burning software can offer the same advanced features since other situations require manual processing prior to CD burning. Other software is employed like the audio editing software to do the manual operation. But the good thing about this is that, software other than Nero burning program is made available online. In fact, beneficial editing functions for mp3 files actually lead to the so called normalization process.

The Normalization Process: Another Essential Procedure in Audio CD Creation

The normalization process involves the smoothening out of the volume spikes that exist in various tracks contained in the CD. Normalization guarantees the loudness and sound variation of music or mp3 files when played. The results of the editing procedure need to save in WAV format which in turn will be burned in the CD.

There are times that mp3 files can be stored or burned into another format known as compact disc recordable or the CD-R format. Though CD-R format can be applied by the users, certain digital systems, especially the advanced and modern CD players, do not support the form. The incompatibility of the CD-R format will not let the files like music files to be played at all.

MP3s Don't Necessarily Require Various CD Formats

Though it is not fundamental to convert mp3 files into a new and different format, the files can be burned directly to audio CDs without undergoing any conversion process. So if the WAV format will be executed, there will only be 10 songs as compared to 120 songs that will be saved when mp3 files will be stored and compressed in just a CD via CD burning. The stored files in the audio CD format can be played using other digital players because the CD format is compatible with both CD and DVD formats.

About the Author: Pawel Reszka
Discover how to start downloading free movies online 100% legally.
Article Source: http://www.upublish.info

Tips on Buying Desktop Computer

Whether your old computer is shot or you have never bought a computer on your own before, you may be feeling a little bit nervous about the whole thing. Buying a computer represents putting down a fair chunk of your hard earned money, and you may be nervous about getting a computer that isn’t a great fit for your needs.

The truth is, getting a good desktop computer that suits you is easier than you think, and by simply keeping the following tips in mind, you’ll be able to find the perfect computer that will keep you happy for years to come.

* Know what you want your computer for

Think about how you use your computer. Are you someone who only uses a computer for its word processing ability, or do you prefer to stay up to date on the latest games.

Maybe you are someone whose entertainment is largely focused around your computer; all of your communication and your movies are kept on your computer. By keeping a clear idea of what you need your computer for, you will be able to get the right machine.


* Know what RAM is

RAM stands for Random Access Memory, and you will find that what it does is affect the speed with which your computer “thinks,” that is, processes action. If you are only using your computer for things like surfing online or writing, you’ll find that a RAM of 512 MB is okay, though 1GB is ideal.

You’ll find that this size will give you room to expand or grow if you want to later on, but that it’s not so big that you are wasting your money. If you are going to be gaming, or doing advanced computer programming with your unit,, you will of course want more.

* Don’t worry so much about hard drive space

Your hard drive space generally refers to the amount of information that you can keep on your computer, ranging from written work to audio and visual media.

You’ll find that if you download a lot of videos that this can be eaten up fast, but in desktop, you’ll find that it is very easy to add some more. Remember that while you do have a finite amount of space that it is all in how you use it.

* Online or from the store?

You’ll find that ordering online is actually a lot cheaper, but keep in mind that you should have a clue about what you are looking it. If you choose to build a computer yourself, you’ll find that it is much easier to get the parts online.

At a store, though, you will find that you can often take the time to look over the specs, speak with a sales representative and take a look around to see what else is available. It really depends on what you are comfortable with.

If you are looking to buy a desktop computer, remember that you really need to think about what you want it for. Once you have the function decided upon, it is very easy to figure out what machine will be perfect for you.

Computer is a great technology. Edy is passionate about computer and technology. You can see his site at Cheapest Store.

About the Author: Marshal Pull

Marshall is an avid Internet Marketer, and enjoys connecting surfers with the products they are looking for and getting paid to do it. He has been running as a way to present various Desktop Computer in a new way.

Article Source: http://www.upublish.info

How Can I Fix ActiveX Errors?

There is nothing worse than browsing the web—researching airfare for your next vacation, buying tickets for tonight’s show, watching a news video—and then getting interrupted with an error message such as, “Your current security settings prohibit running ActiveX controls on this page. As a result, the page may not display correctly.” Or you could be checking your email or downloading music when an ActiveX error pops up. When these errors occur you may be left frustrated and asking yourself, “What is ActiveX, and how can I fix it?” It turns out that your Pc is not really in need of an ActiveX repair, but a registry repair.

What is the Registry?
The registry is like a low-level operators manual for your Windows operating system. It stores information and settings for basic functions—its almost like a dictionary. Every time you right click on your mouse for example, your computer accesses the registry, which will “define” the action and tell the computer what to do. The registry has information that is native to the operating system, but this dictionary can also be added to or overwritten. In the event you install a new mouse for example, new information might be added, or old settings might be replaced. An easy way to know if your registry has been altered in any way is if you are required to re-boot your computer (typically after installing new hardware or software).

What is Active X?
Computers allow us to do a lot more than just click a mouse however, and that’s where ActiveX comes in. Certain programs like Microsoft Office, Windows Media Player, or Internet Explorer require very advanced functions, and are constantly changing and upgrading. One way to look at it is that these programs have advanced so much beyond the basic building blocks, they no longer speak English. In order to access the basic information contained in the registry (which they need to function), they need a translator. ActiveX is that translator. ActiveX accesses information stored in the registry, and communicates it to these programs so they can function at the next level.

Problem:
ActiveX is often hard at work behind the scenes accessing the registry for information. These efforts usually go unnoticed and go off without a hitch, but you may be unlucky enough to experience an error. Some common errors are:

• When ‘Downloading ActiveX Control’ your Internet Explorer freezes
• Runtime Error ‘429′: ActiveX Component Can’t Create Object
• Your current security settings prohibit running ActiveX controls on this page. As a result, the page may not display correctly.

These errors are frustrating but one can see why they might occur. What’s happening is that ActiveX is trying to access the registry, or “dictionary.” But the dictionary has become overcrowded and altered beyond recognition. Picture this: There are now two or three different definitions listed instead of only one. Someone has pasted over sections with new information, and the original text can’t be found. Pages have gone missing, and information has been misfiled. The dictionary is now virtually useless. You are now in desperate need of registry repair.

Solution:
One solution would to go out and buy a new computer (i.e. purchase a new dictionary). Not only is this not a realistic solution financially, but all that new and valuable information would be lost. The ideal solution is to flip through and edit the entire dictionary, page by page. Fortunately, this solution is offered via a software called Reg Cure. Reg Cure is a registry cleaner that uses the most sophisticated technology available to analyze your registry for missing, obsolete, and corrupt entries. It is a safe, effective way to fix your PC registry errors. You can download Reg Cure and scan your computer for free at RegistryRepairProgram.

Don’t let ActiveX errors keep you from accessing your favorite programs. Reg Cure offers you an easy solution to a common problem. There is no need for ActiveX repair, simply use this comprehensive register cleaner and your ActiveX errors will be a thing of the past.

About the Author: Hamilton Hill

Ben Hamilton.To learn more about Registry repair and Reg Cure, visit RegistryRepairProgram.com.

Article Source: http://www.upublish.info