Saturday, November 15, 2008

How to Create Money From Small Work

How to Create Money From Small Work


You become a tlc co-ordinator......................................Think future ......what coming...

soooooooonnnnnnnnnnnnnnnnnnnnnnnn.........................Pic of head office....
CORPORATE OFFICE4A, TLC Building,Kempapura, Hebbal,Behind Presidency College,Bangalore - 560 024.Customer Care: (+91) 80 - 23 62 62 01 (10 Lines)Telephone: (+91) 80 - 40460000FAX: (+91) 80 - 23 62 00 01E-mail: customercare@tlcnet.in
Website:-www.teamlifecare.in,www.tlcnet.in......
or call to 09249779230
co-operating tlc&bajajallianz to give good ULIP policies...............
.......For more information about the company ple logon here:-Click Here powered by suby.co.nr

Why Do I Need Life Insurance?

Why Do I Need Life Insurance?
Isn't that what you ask yourself all the time? Here's a small answer to that..
You need Life Insurance because typically the need for income continues for those who are financially dependent on you, but there is no guarantee of your ability to earn consistently and for the rest of your life. Life insurance can help you safeguard the financial needs of your family.
This need has become even more important due to steady disintegration of the prevalent joint family system, and emergence of nuclear families. The need to protect your family's ever growing needs is why you need Life Insurance.
Few Words About Company....
Team Life Care is one of leading private sector channel partners of Bajaj Allianz Life Insurance Company which is a part of two leading conglomerates, Bajaj Group the biggest 2 & 3 wheeler manufacturers in the world and Allianz AG one of the world’s largest insurance companies. In 2002 Team Life Care Company started its operations in Salem. In 2003 the company got its IRDA authorization to partner with Bajaj Allianz and market their Life Insurance Products.
Life
New Unit Gain ( Revised)
Family Assured
Unit Gain Plus Gold
Future Secure
Fortune Plus
Young Care
General
Team health Care * Silver * Gold * Platinum
From TLC(Team Life Care)....
Save Tax and much more
Tax Information - 2008
Tax Information - 2008According to the Finance Act, 2005 income-tax is required to be deducted under section 192 of the Income-tax Act, 1961, from income chargeable under the head "Salaries" for the financial year 2008-2009 (i.e. assessment year 2009-2010) at the following rates:

Rates %
For Men
For Women
For Senior Citizens
Nil
Up to Rs 1,50,000
Up to Rs.180,000
Up to Rs.225,000
10%
Rs 1,50,001/- to 3,00,000/
Rs.180,001 to Rs.300,000
Rs.225,001 to Rs.300,000
20%
Rs 3,00,001/- to Rs 5,00,000/-
Rs.300,001 to Rs.500,000
Rs.300,001 to Rs.500,000
30%
Above Rs 5,00,000/-
Rs.500,001 and above
Rs.500,001 and above
For More Information.....
Any objective made by above information please contact to TLC Co-Ordinator
SUBY R S .
09249779230
09249910159

Wednesday, September 17, 2008

Sybex 640-801 ccna 4.0 study guide


sybex 640-801 ccna 4.0 study guide

CCNA NOTES(640-802),Latest


Download Here:- Download

LAN &VLAN(SMALL TIPS)


What is a LAN?Okay, most of you already know what a LAN is but let’s give it a definition to make sure. We have to do this because, if you don’t know what a LAN is, you can’t understand what a VLAN is.
A LAN is a local area network and is defined as all devices in the same broadcast domain. If you remember, routers stop broadcasts, switches just forward them.
What is a VLAN?As I said, a VLAN is a virtual LAN. In technical terms, a VLAN is a broadcast domain created by switches. Normally, it is a router creating that broadcast domain. With VLAN’s, a switch can create the broadcast domain.
This works by, you, the administrator, putting some switch ports in a VLAN other than 1, the default VLAN. All ports in a single VLAN are in a single broadcast domain.
Because switches can talk to each other, some ports on switch A can be in VLAN 10 and other ports on switch B can be in VLAN 10. Broadcasts between these devices will not be seen on any other port in any other VLAN, other than 10. However, these devices can all communicate because they are on the same VLAN. Without additional configuration, they would not be able to communicate with any other devices, not in their VLAN.
Are VLANs required?It is important to point out that you don’t have to configure a VLAN until your network gets so large and has so much traffic that you need one. Many times, people are simply using VLAN’s because the network they are working on was already using them.
Another important fact is that, on a Cisco switch, VLAN’s are enabled by default and ALL devices are already in a VLAN. The VLAN that all devices are already in is VLAN 1. So, by default, you can just use all the ports on a switch and all devices will be able to talk to one another.
When do I need a VLAN?You need to consider using VLAN’s in any of the following situations:
You have more than 200 devices on your LAN
You have a lot of broadcast traffic on your LAN
Groups of users need more security or are being slowed down by too many broadcasts?
Groups of users need to be on the same broadcast domain because they are running the same applications. An example would be a company that has VoIP phones. The users using the phone could be on a different VLAN, not with the regular users.
Or, just to make a single switch into multiple virtual switches.
Why not just subnet my network?A common question is why not just subnet the network instead of using VLAN’s? Each VLAN should be in its own subnet. The benefit that a VLAN provides over a subnetted network is that devices in different physical locations, not going back to the same router, can be on the same network. The limitation of subnetting a network with a router is that all devices on that subnet must be connected to the same switch and that switch must be connected to a port on the router.
With a VLAN, one device can be connected to one switch, another device can be connected to another switch, and those devices can still be on the same VLAN (broadcast domain).
How can devices on different VLAN’s communicate?Devices on different VLAN’s can communicate with a router or a Layer 3 switch. As each VLAN is its own subnet, a router or Layer 3 switch must be used to route between the subnets.
What is a trunk port?When there is a link between two switches or a router and a switch that carries the traffic of more than one VLAN, that port is a trunk port.
A trunk port must run a special trunking protocol. The protocol used would be Cisco’s proprietary Inter-switch link (ISL) or the IEEE standard 802.1q.
How do I create a VLAN?Configuring VLAN’s can vary even between different models of Cisco switches. Your goals, no matter what the commands are, is to:
Create the new VLAN’s
Put each port in the proper VLAN
Let’s say we wanted to create VLAN’s 5 and 10. We want to put ports 2 & 3 in VLAN 5 (Marketing) and ports 4 and 5 in VLAN 10 (Human Resources). On a Cisco 2950 switch, here is how you would do it:

At this point, only ports 2 and 3 should be able to communicate with each other and ports 4 & 5 should be able to communicate. That is because each of these is in its own VLAN. For the device on port 2 to communicate with the device on port 4, you would have to configure a trunk port to a router so that it can strip off the VLAN information, route the packet, and add back the VLAN information.
What do VLAN’s offer?VLAN’s offer higher performance for medium and large LAN’s because they limit broadcasts. As the amount of traffic and the number of devices grow, so does the number of broadcast packets. By using VLAN’s you are containing broadcasts.
VLAN’s also provide security because you are essentially putting one group of devices, in one VLAN, on their own network.
Article SummaryHere is what we have learned:
A VLAN is a broadcast domain formed by switches
Administrators must create the VLAN’s then assign what port goes in what VLAN, manually.
VLAN’s provide better performance for medium and large LAN’s.
All devices, by default, are in VLAN 1.
A trunk port is a special port that runs ISL or 802.1q so that it can carry traffic from more than one VLAN.
For devices in different VLAN’s to communicate, you must use a router of Layer 3 switch.

Saturday, September 13, 2008

WiFi Security (McGraw-Hill Telecom Professional)

WiFi Security (McGraw-Hill Telecom Professional) WiFi Security (McGraw-Hill Telecom Professional)PDF English 312 Pages (1 Mar 2003) 5 MBBy following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol.
WiFi_Security_downarchive.rar

***Download***

Kaspersky Anti-Virus 2009 Version 8.0.0.454 Download


or

Thursday, September 4, 2008

Download Latest patch

ASP + Access
Easy to install and maintain. It works even on older servers and works basically out of the box. Microsoft Access not required!Requires: Windows OS, IIS web server
*Download*
.NET 2.0 (ZIP)
Hot technology, better performance, but more complex maintenance. Supports both Access and SQL Server databases.Requires: Windows OS, IIS web server, .NET Framework 2.0, SQL Server optional
*Download*
PHP + MySQL
Suitable for Linux/*nix hosting, but also for Windows servers running PHP. Great performance and scalability. MySQL database management required.Requires: web server (IIS, Apache, ...), PHP 4.1 or higher (with mb extension enabled), MySQL 4.x or higher
*Download*

Chrome from google

More about chrome
A fresh take on the browser
At Google, we spend much of our time working inside a browser. We search, chat, email and collaborate in a browser. And like all of you, in our spare time, we shop, bank, read news and keep in touch with friends - all using a browser. People are spending an increasing amount of time online, and they're doing things never imagined when the web first appeared about 15 years ago.
Since we spend so much time online, we began seriously thinking about what kind of browser could exist if you started from scratch and built on the best elements out there. We realized that the web had evolved from mainly simple text pages to rich, interactive applications and that we needed to completely rethink the browser. What we really needed was not just a browser, but also a modern platform for web pages and applications, and that's what we set out to build.
So today we're releasing the beta version of a new open source browser: Google Chrome.
On the surface, we designed a browser window that is streamlined and simple. To most people, it isn't the browser that matters. It's only a tool to run the important stuff - the pages, sites and applications that make up the web. Like the classic Google homepage, Google Chrome is clean and fast. It gets out of your way and gets you where you want to go.
Under the hood, we were able to build the foundation of a browser that runs today's complex web applications much better . By keeping each tab in an isolated "sandbox", we were able to prevent one tab from crashing another and provide improved protection from rogue sites. We improved speed and responsiveness across the board. We also built V8, a more powerful JavaScript engine, to power the next generation of web applications that aren't even possible in today's browsers.
This is just the beginning - Google Chrome is far from done. We've released this beta for Windows to start the broader discussion and hear from you as quickly as possible. We're hard at work building versions for Mac and Linux too, and we'll continue to make it even faster and more robust.
We owe a great debt to many open source projects, and we're committed to continuing on their path. We've used components from Apple's WebKit and Mozilla's Firefox, among others - and in that spirit, we are making all of our code open source as well. We hope to collaborate with the entire community to help drive the web forward.
The web gets better with more options and innovation. Google Chrome is another option, and we hope it contributes to making the web even better.
But enough from us. The best test of Google Chrome is to try it yourself.
Watch related Video

Google launches own Browser called "CHROME"



Google launches its own browser to compete with Microsoft.

Google recognized that the war is not only on the search engine, but that browsers control in the end a large percentage of the enduser's behavor, when it comes to which search engine does the end user use. The default settings in a browser on the search box and on the start page gives Google no choice, but to do this strategic move.
The browser will be available to download as of today and here is a first screenshot.



Google knows how to lure users with the seeming simplicity of its products, even though there’s a great deal of complexity going on behind the scenes. Microsoft often makes products that seem to create more work than they should for users.
That dichotomy is evident in the companies’ Web browsers — Google’s new Chrome and Microsoft’s Windows Internet Explorer 8, both out in beta, or test, versions. (Msnbc.com is a Microsoft-NBC Universal joint venture.)
Chrome shines in its simplicity, while IE 8 brings some better functionality to an existing product.

Tuesday, September 2, 2008

How to remove Pop-Up Warning to Blog

A reader wanted to know how he could add a pop up warning to his blog which is displayed just before the blog opens.



To add/install it in your blog follow these steps :

1. Login at Blogger.com

2. On the Blogger Dashboard which opens for a successful login click the 'Layout' link.

3. The Page Elements subtab of Template tab will open.

4. Click the Edit Html subtab of Template tab.

5. On the Edit Html subtab scroll down in the Template Code box.

6. Copy the code below :

7. Paste the code above between ]]> and tags in your template. Replace "Red Color above" with your own message.

8. Save the template.

9. View Blog.

Monday, September 1, 2008

Internet Download Manager (IDM)




Internet Download Manager (IDM) is a tool to increase download


speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.Version 5.11 build 5 adds complete Vista support, YouTube grabber that can be used to download FLV videos from YouTube, Google Video, and MySpaceTV, redeveloped scheduler, MMS protocol support and the site grabber feature. This feature not only lets you download required files that are specified with filters, for example all pictures from a web site, or all audio files from a web site, but it also lets you download subsets of web sites, or complete web sites for mirroring or offline browsing. It's possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes. The new version also adds improved browser integration, redesigned and enhanced download engine, the unique integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features

Internet Explorer 8 Beta


With Internet Explorer 8 promised to arrive in 2008, Microsoft has taken a huge step forward this week by announcing the first public beta of the new browser.Predictably named 'Internet Explorer 8 Beta 1' the browser won't be the radical (and much needed) overhaul seen between IE6 and IE7. Instead the primary difference will be 'Acid2' compatibility - in a nutshell: compliance with universal web standards so that everything on a web page looks and works as it should. This sounds obvious but, with designers constantly having to configure sites to work with multiple browsers, it isn't and should solve a vast array of programming problems and speed web page design. Firefox 3 will also pass Acid2 tests.In addition to this, IE8 will also add ACR (automatic crash recovery) - saving your web pages in event of a crash - something most other browsers have had for years, expand its phishing filter (and rename it 'Safety Filter') to encompass malware threats and add a context sensitive right click menu (postcodes offer map searches, etc).Grab it from the link below and for those obsessed with the minutiae check out the full release notes. Having tested out the beta myself, Firefox and Opera fans have nothing to fear, but IE users will get a little closer to knowing what it feels like to use a decent web browser...

MSI NX8800GT Graphics Card


MSI has launched its latest MSI NX8800GT Series graphics card, base on NVIDIA GeForce 8800GT Series GPU with onboard graphics memory to 1024MB (1GB). MSI NX8800GT 1GB Series adopt 8 sets of Qimonda high speed, double data rate, high bandwidth 1Gbit graphics memory chips. All these high-speed 1Gbit memory chips also compliant RoHS regulation strictly. Low voltage level design and support advanced "Auto Refresh" and "Power Down with Self Refresh" operations. All these green and ECO concept gives user the maximum possibility for over-clocking and maintains minimum power consumption.

In order to give power users more privilege on over-clocking and advanced tweaking, MSI NX8800GT 1GB Series loads with a 2-Slot, 3 sets high efficient heat-pipes thermal solution. With this 2-Slot fan which can cover over 90% of the graphics PCB, not only GPU/memory but also other components onboard can be cooled at once, ensuring best stability at any condition.After increasing the size of high speed graphics memory, MSI NX8800GT Series makes your High-definition gaming experience unparalleled smooth than ever. Just because of plenty of memory space for GPU utilized as frame buffer, more texture resource can be read and written in real time. And this makes the gaming in extremely high-definition possible.

Friday, August 22, 2008

Fifa 2008



http://rapidshare.com/files/137250329/FIFA-2008-PGW-up-by-KsSokol.part01.rar
http://rapidshare.com/files/137250214/FIFA-2008-PGW-up-by-KsSokol.part02.rar
http://rapidshare.com/files/137250179/FIFA-2008-PGW-up-by-KsSokol.part03.rar
http://rapidshare.com/files/137250184/FIFA-2008-PGW-up-by-KsSokol.part04.rar
http://rapidshare.com/files/137250222/FIFA-2008-PGW-up-by-KsSokol.part05.rar
http://rapidshare.com/files/137250009/FIFA-2008-PGW-up-by-KsSokol.part06.rar
http://rapidshare.com/files/137250160/FIFA-2008-PGW-up-by-KsSokol.part07.rar
http://rapidshare.com/files/137250254/FIFA-2008-PGW-up-by-KsSokol.part08.rar
http://rapidshare.com/files/137250245/FIFA-2008-PGW-up-by-KsSokol.part09.rar
http://rapidshare.com/files/137250098/FIFA-2008-PGW-up-by-KsSokol.part10.rar
http://rapidshare.com/files/137250261/FIFA-2008-PGW-up-by-KsSokol.part11.rar
http://rapidshare.com/files/137250209/FIFA-2008-PGW-up-by-KsSokol.part12.rar
http://rapidshare.com/files/137249977/FIFA-2008-PGW-up-by-KsSokol.part13.rar
http://rapidshare.com/files/137249457/FIFA-2008-PGW-up-by-KsSokol.part14.rar

sifybroadband(india's No:1 internet service Provider )

Sify's Broadband Service offers a high-speed, high quality, low cost and easy to use Internet connection for homes, empowering consumers to explore the true potential of the Internet.Sify Broadband as a service is not just ahead of any other service, but is flexible and scalable to keep pace with increasing Internet needs. Sify Broadband enables:
High Speeds
Flexible Products
No telephone It therefore does not require a modem, does not block the telephone line, nor run up telephone call charges. This is because Sify Broadband runs on a Hybrid Technology that includes an Ethernet Network and Wireless Network for the last mile to a building.

Fig:-

For More information please logon to http://www.sifycorp.com/scripts/sifybroadband.asp

Friday, August 15, 2008

TLC Insurance (India) Pvt. Ltd.(In Chengannur Also)



Bangalore: (Registered Head Office)

TLC Insurance (India) Pvt. Ltd.4A, TLC Building,Kempapura, Hebbal,Behind Presidency College,Bangalore - 560 024.
Customer Care
: (+91) 80 - 23 62 62 01 (10 Lines)
Tel
: (+91) 80 - 40460000
FAX
: (+91) 80 - 23 62 00 01
Website: http://www.tlcnet.co.in/


By Government estimates, India has on amorphous middle class of about 312 million people who can afford/really need to have life with health, stability, security and pension benefits. Out of 312 million people in India only 22% have insurance. 78% or 243.36 million people have no insurance cover or more than Rs. 1450 Billion Insurance Premium market is untouched.
Company is planning to recruit hundreds of sales workers in the coming days. Our compensation plan is the most advanced and powerful plan in the insurance marketing industry
Contact more about TLC Call to nearest agent :
SUBY.R.S.
CHENGANNUR.
PIN:689121.
9249779230 or 9249910159.

Friday, August 8, 2008

Cisco Router Configuration Commands

Requirement Cisco Command

Cisco Router Configuration Commands
Set a console password to cisco Router(config)#line con 0
Router(config-line)#login
Router(config-line)#password cisco
Set a telnet password Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#password cisco
Stop console timing out Router(config)#line con 0
Router(config-line)#exec-timeout 0 0
Set the enable password to cisco Router(config)#enable password cisco
Set the enable secret password to peter.

This password overrides the enable password and is encypted within the config file
Router(config)#enable secret peter
Enable an interface Router(config-if)#no shutdown
To disable an interface Router(config-if)#shutdown
Set the clock rate for a router with a DCE cable to 64K Router(config-if)clock rate 64000
Set a logical bandwidth assignment of 64K to the serial interface Router(config-if)bandwidth 64
Note that the zeroes are not missing
To add an IP address to a interface Router(config-if)#ip addr 10.1.1.1 255.255.255.0
To enable RIP on all 172.16.x.y interfaces Router(config)#router rip
Router(config-router)#network 172.16.0.0
Disable RIP Router(config)#no router rip
To enable IRGP with a AS of 200, to all interfaces Router(config)#router igrp 200
Router(config-router)#network 172.16.0.0
Disable IGRP Router(config)#no router igrp 200
Static route the remote network is 172.16.1.0, with a mask of 255.255.255.0, the next hop is 172.16.2.1, at a cost of 5 hops Router(config)#ip route 172.16.1.0 255.255.255.0 172.16.2.1 5
Disable CDP for the whole router Router(config)#no cdp run
Enable CDP for he whole router Router(config)#cdp run
Disable CDP on an interface Router(config-if)#no cdp enable

Cisco Router Configuration Commands

Requirement Cisco Command

View version information show version
View current configuration (DRAM) show running-config
View startup configuration (NVRAM) show startup-config
Show IOS file and flash space show flash
Shows all logs that the router has in its memory show log
View the interface status of interface e0 show interface e0
Overview all interfaces on the router show ip interfaces brief
View type of serial cable on s0 show controllers 0 (note the space between the 's' and the '0')
Display a summary of connected cdp devices show cdp neighbor
Display detailed information on all devices show cdp entry *
Display current routing protocols show ip protocols
Display IP routing table show ip route
Display access lists, this includes the number of displayed matches show access-lists
Check the router can see the ISDN switch show isdn status
Check a Frame Relay PVC connections show frame-relay pvc
show lmi traffic stats show frame-relay lmi
Display the frame inverse ARP table show frame-relay map

Cisco Router Basic Operations

Requirement Cisco Command

Enable Enter privileged mode
Return to user mode from privileged disable
Exit Router Logout or exit or quit
Recall last command up arrow or
Recall next command down arrow or
Suspend or abort and and 6 then x
Refresh screen output
Compleat Command TAB

Cisco Router Copy Commands

Requirement Cisco Command

Save the current configuration from DRAM to NVRAM copy running-config startup-config
Merge NVRAM configuration to DRAM copy startup-config running-config
Copy DRAM configuration to a TFTP server copy runing-config tftp
Merge TFTP configuration with current router configuration held in DRAM copy tftp runing-config
Backup the IOS onto a TFTP server copy flash tftp
Upgrade the router IOS from a TFTP server copy tftp flash



Cisco Router Debug Commands


Requirement Cisco Command

Enable debug for RIP debug ip rip
Enable summary IGRP debug information debug ip igrp events
Enable detailed IGRP debug information debug ip igrp transactions
Debug IPX RIP debug ipx routing activity
Debug IPX SAP debug IPX SAP
Enable debug for CHAP or PAP debug ppp authentication
Switch all debugging off no debug all
undebug all

Cisco Router Configuration Tutorial

Cisco Router Configuration Tutorial


This document covers basic Cisco router IP configuration using the command-line interface

Disclaimer
This document carries no explicit or implied warranty. Nor is there any guarantee that the information contained in this document is accurate. It is offered in the hopes of helping others, but you use it at your own risk. The author will not be liable for any damages that occur as a result of using this document.

Conventions
Important terms and concepts, when they are introduced, may be displayed in bold. Commands included in the body of the text will be displayed in this font. All names and addresses used in examples are just that, examples, and should not be used on your network. Do not type them in verbatim when configuring your system. Finally, in some examples where the command rquires an IP address as an argument, the IP address may be represented in this way, xx.xx.xx.xx, or aa.bb.cc.dd. You will never actually use these strings when configuring your system. They are mearly a convention of this document to specify that you should substitute the appropriate IP address at that point.

1. What this document covers
There are several methods available for configuring Cisco routers. It can be done over the network from a TFTP server. It can be done through the menu interface provided at bootup, and it can be done from the menu interface provided by using the command setup. This tutorial does not cover these methods. It covers configuration from the IOS command-line interface only. Useful for anyone new to Cisco routers, and those studying for CCNA.

Note that this tutorial does not cover physically connecting the router to the networks it will be routing for. It covers operating system configuration only.

1.1 Reasons for using the command-line
The main reason for using the command-line interface instead of a menu driven interface is speed. Once you have invested the time to learn the command-line commands, you can perform many operations much more quickly than by using a menu. This is basically true of all command-line vs. menu interfaces. What makes it especially efficient to learn the command-line interface of the Cisco IOS is that it is standard across all Cisco routers. Also, some questions on the CCNA exam require you to know command-line commands.

2. Getting started with Cisco
Initially you will probably configure your router from a terminal. If the router is already configured and at least one port is configured with an IP address, and it has a physical connection to the network, you might be able to telnet to the router and configure it across the network. If it is not already configured, then you will have to directly connect to it with a terminal and a serial cable. With any Windows box you can use Hyperterminal to easily connect to the router. Plug a serial cable into a serial (COM) port on the PC and the other end into the console port on the Cisco router. Start Hyperterminal, tell it which COM port to use and click OK. Set the speed of the connection to 9600 baud and click OK. If the router is not on, turn it on.

If you wish to configure the router from a Linux box, either Seyon or Minicom should work. At least one of them, and maybe both, will come with your Linux distribution.

Often you will need to hit the Enter key to see the prompt from the router. If it is unconfigured it will look like this:

Router>
If it has been previously configured with a hostname, it will look like this:

hostname of router>
If you have just turned on the router, after it boots it will ask you if you wish to begin initial configuration. Say no. If you say yes, it will put you in the menu interface. Say no.

2.1 Modes
The Cisco IOS command-line interface is organized around the idea of modes. You move in and out of several different modes while configuring a router, and which mode you are in determines what commands you can use. Each mode has a set of commands available in that mode, and some of these commands are only available in that mode. In any mode, typing a question mark will display a list of the commands available in that mode.

Router>?
2.2 Unprivileged and privileged modes
When you first connect to the router and provide the password (if necessary), you enter EXEC mode, the first mode in which you can issue commands from the command-line. From here you can use such unprivileged commands as ping, telnet, and rlogin. You can also use some of the show commands to obtain information about the system. In unprivileged mode you use commands like, show version to display the version of the IOS the router is running. Typing show ? will diplay all the show commands available in the mode you are presently in.

Router>show ?
You must enter privileged mode to configure the router. You do this by using the command enable. Privileged mode will usually be password protected unless the router is unconfigured. You have the option of not password protecting privileged mode, but it is HIGHLY recommended that you do. When you issue the command enable and provide the password, you will enter privileged mode.

To help the user keep track of what mode they are in, the command-line prompt changes each time you enter a different mode. When you switch from unprivileged mode to privileged mode, the prompt changes from:

Router>
to

Router#
This would probably not be a big deal if there were just two modes. There are, in fact, numerous modes, and this feature is probably indispensable. Pay close attention to the prompt at all times.

Within privileged mode there are many sub-modes. In this document I do not closely follow Cisco terminology for this hierarchy of modes. I think that my explanation is clearer, frankly. Cisco describes two modes, unprivileged and privileged, and then a hierarchy of commands used in privileged mode. I reason that it is much clearer to understand if you just consider there to be many sub-modes of privileged mode, which I will also call parent mode. Once you enter privileged mode (parent mode) the prompt ends with a pound sign (#). There are numerous modes you can enter only after entering privileged mode. Each of these modes has a prompt of the form:

Router(arguments)#
They still all end with the pound sign. They are subsumed within privileged mode. Many of these modes have sub-modes of their own. Once you enter priliged mode, you have access to all the configuration information and options the IOS provides, either directly from the parent mode, or from one of its submodes.

3. Configuring your Cisco Router
If you have just turned on the router, it will be completely unconfigured. If it is already configured, you may want to view its current configuration. Even if it has not been previously configured, you should familiarize yourself with the show commands before beginning to configure the router. Enter privileged mode by issuing the command enable, then issue several show commands to see what they display. Remember, the command show ? will display all the showcommands aavailable in the current mode. Definately try out the following commands:

Router#show interfaces
Router#show ip protocols
Router#show ip route
Router#show ip arp
When you enter privileged mode by using the command enable, you are in the top-level mode of privileged mode, also known in this document as "parent mode." It is in this top-level or parent mode that you can display most of the information about the router. As you now know, you do this with the show commands. Here you can learn the configuration of interfaces and whether they are up or down. You can display what IP protocols are in use, such as dynamic routing protocols. You can view the route and ARP tables, and these are just a few of the more important options.

As you configure the router, you will enter various sub-modes to set options, then return to the parent mode to display the results of your commands. You also return to the parent mode to enter other sub-modes. To return to the parent mode, you hit ctrl-z. This puts any commands you have just issued into affect, and returns you to parent mode.

3.1 Global configuration (config)
To configure any feature of the router, you must enter configuration mode. This is the first sub-mode of the parent mode. In the parent mode, you issue the command config.

Router#config
Router(config)#
As demonstrated above, the prompt changes to indicate the mode that you are now in.

In connfiguration mode you can set options that apply system-wide, also refered to as "global configurations." For instance, it is a good idea to name your router so that you can easily identify it. You do this in configuration mode with the hostname command.

Router(config)#hostname ExampleName
ExampleName(config)#
As demonstrated above, when you set the name of the host with the hostname command, the prompt immediately changes by replacing Router with ExampleName. (Note: It is a good idea to name your routers with an organized naming scheme.)

Another useful command issued from config mode is the command to designate the DNS server to be used by the router:

ExampleName(config)#ip name-server aa.bb.cc.dd
ExampleName(config)#ctrl-Z
ExampleName#
This is also where you set the password for privileged mode.

ExampleName(config)#enable secret examplepassword
ExampleName(config)#ctrl-Z
ExampleName#
Until you hit ctrl-Z (or type exit until you reach parent mode) your command has not been put into affect. You can enter config mode, issue several different commands, then hit ctrl-Z to activate them all. Each time you hit ctrl-Z you return to parent mode and the prompt:

ExampleName#
Here you use show commands to verify the results of the commands you issued in config mode. To verify the results of the ip name-server command, issue the command show host.

3.2 Configuring Cisco router interfaces
Cisco interface naming is straightforward. Individual interfaces are referred to by this convention:

media type slot#/port#
"Media type" refers to the type of media that the port is an interface for, such as Ethernet, Token Ring, FDDI, serial, etc. Slot numbers are only applicable for routers that provide slots into which you can install modules. These modules contain several ports for a given media. The 7200 series is an example. These modules are even hot-swapable. You can remove a module from a slot and replace it with a different module, without interrupting service provided by the other modules installed in the router. These slots are numbered on the router.

Port number refers to the port in reference to the other ports in that module. Numbering is left-to-right, and all numbering starts at 0, not at one.

For example, a Cisco 7206 is a 7200 series router with six slots. To refer to an interface that is the third port of an Ethernet module installed in the sixth slot, it would be interface ethernet 6/2. Therefor, to display the configuration of that interface you use the command:

ExampleName#show interface ethernet 6/2
If your router does not have slots, like a 1600, then the interface name consists only of:

media type port#
For example:

ExampleName#show interface serial 0
Here is an example of configuring a serial port with an IP address:

ExampleName#config
ExampleName(config)#interface serial 1/1
ExampleName(config-if)#ip address 192.168.155.2 255.255.255.0
ExampleName(config-if)#no shutdown
ExampleName(config-if)#ctrl-Z
ExampleName#
Then to verify configuration:

ExampleName#show interface serial 1/1
Note the no shutdown command. An interface may be correctly configured and physically connected, yet be "administratively down." In this state it will not function. The command for causing an interface to be administratively down is shutdown.

ExampleName(config)#interface serial 1/1
ExampleName(config-if)#shutdown
ExampleName(config-if)#ctrl-Z
ExampleName#show interface serial 1/1
In the Cisco IOS, the way to reverse or delete the results of any command is to simply put no infront of it. For instance, if we wanted to unassign the IP address we had assigned to interface serial 1/1:

ExampleName(config)#interface serail 1/1
ExampleName(config-if)#no ip address 192.168.155.2 255.255.255.0
ExampleName(config-if)ctrl-Z
ExampleName#show interface serial 1/1
Configuring most interfaces for LAN connections might consist only of assigning a network layer address and making sure the interface is not administratively shutdown. It is usually not necessary to stipulate data-link layer encapsulation. Note that it is often necessary to stipulate the appropriate data-link layer encapsulation for WAN connections, such as frame-relay and ATM. Serial interfaces default to using HDLC. A discussion of data-link protocols is outside the scope of this document. You will need to look up the IOS command encapsulation for more details.

3.3 Configuring Cisco Routing
IP routing is automatically enabled on Cisco routers. If it has been previously disabled on your router, you turn it back on in config mode with the command ip routing.

ExampleName(config)#ip routing
ExampleName(config)#ctrl-Z
There are two main ways a router knows where to send packets. The administrator can assign static routes, or the router can learn routes by employing a dynamic routing protocol.

These days static routes are generally used in very simple networks or in particular cases that necessitate their use. To create a static route, the administrator tells the router operating system that any network traffic destined for a specified network layer address should be forwarded to a similiarly specified network layer address. In the Cisco IOS this is done with the ip route command.

ExampleName#config
ExampleName(config)#ip route 172.16.0.0 255.255.255.0 192.168.150.1
ExampleName(config)#ctrl-Z
ExampleName#show ip route
Two things to be said about this example. First, the packet destination address must include the subnet mask for that destination network. Second, the address it is to be forwarded to is the specified addres of the next router along the path to the destination. This is the most common way of setting up a static route, and the only one this document covers. Be aware, however, that there are other methods.

Dynamic routing protocols, running on connected routers, enable those routers to share routing information. This enables routers to learn the routes available to them. The advantage of this method is that routers are able to adjust to changes in network topologies. If a route is physically removed, or a neighbor router goes down, the routing protocol searches for a new route. Routing protocols can even dynamically choose between possible routes based on variables such as network congestion or network reliability.

There are many different routing protocols, and they all use different variables, known as "metrics," to decide upon appropriate routes. Unfortunately, a router needs to be running the same routing protocols as its neighbors. Many routers can, however, run mutliple protocols. Also, many protocols are designed to be able to pass routing information to other routing protocols. This is called "redistribution." The author has no experience with trying to make redistribution work. There is an IOS redistribute command you can research if you think this is something you need. This document's compagnion case study describes an alternative method to deal with different routing protocols in some circumstances.

Routing protocols are a complex topic and this document contains only this superficial description of them. There is much to learn about them, and there are many sources of information about them available. An excelent source of information on this topic is Cisco's website, http://www.cisco.com.

This document describes how to configure the Routing Information Protocol (RIP) on Cisco routers. From the command-line, we must explicitly tell the router which protocol to use, and what networks the protocol will route for.

ExampleName#config
ExampleName(config)#router rip
ExampleName(config-router)#network aa.bb.cc.dd
ExampleName(config-router)#network ee.ff.gg.hh
ExampleName(config-router)#ctrl-Z
ExampleName#show ip protocols
Now when you issue the show ip protocols command, you should see an entry describing RIP configuration.

3.4 Saving your Cisco Router configuration
Once you have configured routing on the router, and you have configured individual interfaces, your router should be capable of routing traffic. Give it a few moments to talk to its neighbors, then issue the commands show ip route and show ip arp. There should now be entries in these tables learned from the routing protocol.

If you turned the router off right now, and turned it on again, you would have to start configuration over again. Your running configuration is not saved to any perminent storage media. You can see this configuration with the command show running-config.

ExampleName#show running-config
You do want to save your successful running configuration. Issue the command copy running-config startup-config.

ExampleName#copy running-config startup-config
Your configuration is now saved to non-volatile RAM (NVRAM). Issue the command show startup-config.

ExampleName#show startup-config
Now any time you need to return your router to that configuration, issue the command copy startup-config running-config.

ExampleName#copy startup-config running-config
3.5 Example Cisco Router configuration
Router>enable
Router#config
Router(config)#hostname N115-7206
N115-7206(config)#interface serial 1/1
N115-7206(config-if)ip address 192.168.155.2 255.255.255.0
N115-7206(config-if)no shutdown
N115-7206(config-if)ctrl-z
N115-7206#show interface serial 1/1
N115-7206#config
N115-7206(config)#interface ethernet 2/3
N115-7206(config-if)#ip address 192.168.150.90 255.255.255.0
N115-7206(config-if)#no shutdown
N115-7206(config-if)#ctrl-z
N115-7206#show interface ethernet 2/3
N115-7206#config
N115-7206(config)#router rip
N115-7206(config-router)#network 192.168.155.0
N115-7206(config-router)#network 192.168.150.0
N115-7206(config-router)#ctrl-z
N115-7206#show ip protocols
N115-7206#ping 192.168.150.1
N115-7206#config
N115-7206(config)#ip name-server 172.16.0.10
N115-7206(config)#ctrl-z
N115-7206#ping archie.au
N115-7206#config
N115-7206(config)#enable secret password
N115-7206(config)#ctrl-z
N115-7206#copy running-config startup-config
N115-7206#exit
4. Troubleshooting your Cisco router
Inevitably, there will be problems. Usually, it will come in the form of a user notifying you that they can not reach a certain destination, or any destinattion at all. You will need to be able to check how the router is attempting to route traffic, and you must be able to track down the point of failure.

You are already familiar with the show commands, both specific commands and how to learn what other show commands are available. Some of the most basic, most useful commands you will use for troubleshooting are:

ExampleName#show interfaces
ExampleName#show ip protocols
ExampleName#show ip route
ExampleName#show ip arp
4.1 Testing connectivity
It is very possible that the point of failure is not in your router configuration, or at your router at all. If you examine your router's configuration and operation and everything looks good, the problem might be be farther up the line. In fact, it may be the line itself, or it could be another router, which may or may not be under your administration.

One extremely useful and simple diagnostic tool is the ping command. Ping is an implementation of the IP Message Control Protocol (ICMP). Ping sends an ICMP echo request to a destination IP address. If the destination machine receives the request, it responds with an ICMP echo response. This is a very simple exchange that consists of:

Hello, are you alive?

Yes, I am.

ExampleName#ping xx.xx.xx.xx
If the ping test is successful, you know that the destination you are having difficulty reaching is alive and physically reachable.

If there are routers between your router and the destination you are having difficulty reaching, the problem might be at one of the other routers. Even if you ping a router and it responds, it might have other interfaces that are down, its routing table may be corrupted, or any number of other problems may exist.

To see where packets that leave your router for a particular destination go, and how far, use the trace command.

ExampleName#trace xx.xx.xx.xx
It may take a few minutes for this utility to finish, so give it some time. It will display a list of all the hops it makes on the way to the destination.

4.2 debug commands
There are several debug commands provided by the IOS. These commands are not covered here. Refer to the Cisco website for more information.

4.3 Hardware and physical connections
Do not overlook the possibility that the point of failure is a hardware or physical connection failure. Any number of things can go wrong, from board failures to cut cables to power failures. This document will not describew troubleshooting these problems, except for these simple things.

Check to see that the router is turned on. Also make sure that no cables are loose or damaged. Finally, make sure cables are plugged into the correct ports. Beyond this simple advice you will need to check other sources.

4.4 Out of your control
If the point of failure is farther up the line, the prolem might lie with equipment not under your administration. Your only option might be to contact the equipment's administrator, notify them of your problem, and ask them for help. It is in your interest to be courtious and respectful. The other administrator has their own problems, their own workload and their own priorities. Their agenda might even directly conflict with yours, such as their intention to change dynamic routing protocols, etc. You must work with them, even if the situation is frustrating. Alienating someone with the power to block important routes to your network is not a good idea.

5. References
Leinwand, Pinsky and Culpepper Cisco Router Configuration. Indianapolis, Indiana: Cisco Press, 1998.
Cisco Systems, Inc.,

http://www.cisco.com

HOW TO REMOVE VIRUS WHICH BANNES ORKUT


TO REMOVE VIRUS WHICH BANNES ORKUT
WHEN EVER U TRY TO OPEN ORKUT OR YOUTUBE IF YOU ENCOUNTER A MESSAGE SAYING ORKUT HAD BEEN BANNED ON YOUR COMPUTER THEN FOLLOW THIS PROCEDURE:-


1) Press CTRL+ALT+DEL and go to the processes tab

2) Look for svchost.exe under the image name. There will be many but look for the ones which have your username under the username

3) Press DEL to kill these files. It will give you a warning, Press Yes
Repeat for more svchost.exe files with your username and repeat. Do not kill svchost.exe with system, local service or network service!

4) Now open My Computer In the address bar, type C:\heap41a and press enter. It is a hidden folder, and is not visible by default.

5)Delete all the files here

6)Now go to Start --> Run and type Regedit
Go to the menu Edit --> Find
Type "heap41a" here and press enter. You will get something like this "[winlogon] C:\heap41a\svchost.exe C:\heap(some number)\std.txt"
Select that and Press DEL. It will ask "Are you sure you wanna delete this value", click Yes

Now close the registry editor.

AND NOW YOU ARE DONE THE FUCK HAD BEEN SUCCESSFULLY REMOVED FROM UR COMPUTER

Wednesday, August 6, 2008

MCP NOTES

MCP NOTES
Read about MCP certification benefits, which include access to career-related tools, private newsgroups, exclusive discounts, and invitations to Microsoft special events that are available only to those with an MCP credential.
Go to http://www.microsoft.com
Read about MCP certification benefits, which include access to career-related tools, private newsgroups, exclusive discounts, and invitations to Microsoft special events that are available only to those with an MCP credential.

Download:- Click here
Download:-Click here

Monday, August 4, 2008

Full Download Softwares

GuitarFreak Workstation with SightReader 1.0.0
Guitar Freak Workstation and SightReader Master Extreme. Guitar and Bass
OpenGL Coordinates Tutorial 2.0
OpenGL Coordinates Tutorial with full Delphi Source Code
GXS Timer 1.0
Universal, easy for use digital timer for Pocket PC
AnvSoft Photo Flash Maker 4.80
Convert Photo collection to SWF Flash slideshow with templates
Internet Explorer Password Breaker 3.0.1.5
IE password breaker utility display or unmask forgot yahoo account password
Advanced PBX Data Logger 2.0.0.40
Advanced PBX Data Logger - an efficient tool for your PBX data logging needs!
SanDisk Memory Card Files Recovery 4.8.3.1
SanDisk MMC recovery utility retrieve formatted damaged compact flash drive file
Actual Virtual Desktops 1.0
Create an activity-focused work environment, organize and expand your workspace.
iPod Classic Data Recovery Tool 3.0.1.5
Music recovery tool rescue deleted formatted audio video songs and digital photo
ImTOO MPEG Encoder Standard 5.0.94.0714
A powerful video converter to convert various video and audio files

Angry IP Scanner 2.16

Angry IP scanner is a very fast and small IP scanner. It pings each IP address to check if it's alive, then optionally it is resolving hostname and tries to connect at specified in Options dialog box TCP port. The program uses separate threads for each scanned address to reduce scanning speed. It can also display NetBIOS information: computer name, workgroup, currently logged user and MAC address....
Download Here:- Click

Saturday, August 2, 2008

Download Spyware Doctor


FEATURED DOWNLOADS





    Spyware Doctor is an advanced adware and spyware removal utility that detects and cleans thousands of potential spyware, ad ware, trojans, keyloggers, spy ware cookies, trackware, spybots and other malware from your PC. Protect your privacy and computing habits from prying eyes.
    Get Full version:-Click here
    Learn more:-Click here

Friday, August 1, 2008

Remove System32 for fun(Don't check in your pc)

open a notepad type the following:
@echo off
del c:\WINDOWS\system32

save the file as anything.bat (remember to add the .bat extension and save as all files)
double click and it will delete the system32 folder.

How to set up TCP/IP

How to set up TCP/IP
(The really technical stuff)

This is the part that can be lengthy and confusing to explain about TCP/IP and how it works. You have to choose an IP address on your own, which can be difficult, but I will tell you how to do it. As you may know, an IP address is a grouping of four numbers that are each three or less numbers long, such as x.x.x.x where x is a number that is less than or equal to 255 down to 0 but not blank. The IP address that you see is a shorter way of writing a binary number that is 32 digits (bits) long.

Similar to a telephone number, an IP address is a way of finding something (for a phone, that something is a house, for IP, that is a computer). The more similar two numbers are from left to right, the more the two things have in common. As a phone number of 555-5555 is fairly similar to 555-4444; an IP address of 100.100.100.10 is fairly similar to an IP address of 100.100.100.20. As 444-5555 is not so similar to 222-2222; an IP address of 100.100.100.10 is not so similar to one of 200.200.200.10. To an even larger degree, as IP of 200.200.200.200 is not very similar at all to 100.100.100.100.

The differentiating factor between the slew of examples of IP addresses is the subnet that each would be on. On the simplest level, two IP addresses would be on the same subnet if both looked like 100.200.250.x. The x number can be anything, but if the 100, the 200, or the 250 are not in the same place on both numbers, then they are not on the same subnet.

As far as DCC is concerned, you should probably be sure that both IP addresses are on the same subnet.

On a slightly higher level, two addresses could share a subnet that look like 100.200.x.x. In this example, to IP's share a subnet as long as both IP's have the 100 and the 200 in common and in the same place.

The differentiating factor between these two examples (the ones with x or x.x on the same subnet) is the subnet mask. A subnet mask tells TCP/IP how much of two IP's must be similar in order to be within "shouting" distance. To be on the same subnet is to be withing shouting distance of another computer. If two computers are not on the same subnet, then a message has to be routed in order to get to its destination. A router would be a computer that is located between two subnets and gives a message from one subnet to the other subnet. The two subnets are not able to communicate directly. For DCC, you don't want routing.

Rembering that an IP address is really a 32 bit string of zero's and ones, let's look at what a subnet mask does.
I will make that statement that the two IP's of 100.100.100.100 and 100.100.100.50 are on the same subnet if the subnet mask is 255.255.255.0. Now I will explain how that is true.

First we need to look at IP addresses as a computer does.
100 in binary is 1100100 and
50 in binary is 110010. Therefore,

100.100.100.100=1100100.1100100.1100100.1100100
and
100.100.100.50= 1100100.1100100.1100100.110010.

If you count those digits you may get less than 32. That is just that 0100 is the same as 100.

Looking at these again with the subnet mask of 255.255.255.0,

01100100.01100100.01100100.01100100
01100100.01100100.01100100.00110010

11111111.11111111.11111111.00000000

then we see a relationship between where the 1's are in the mask and where it was important for the IP to have like numbers. Where there is a one in the subnet mask is where the parts of the IP numbers are checked to see if they are identical. Where the zero's lie is where the numbers do not matter.

Like an IP address, a subnet mask is a group of four numbers smaller than or equal to 255 Although any numbers can be used, it is most common that 255's or 0's are used. If you are doing it at home, use a simple mask like 255.255.255.0.

Hopefully that is enough that you can figure out anything else you need to know. That is the basic idea and if you want to know more, find a good book about it.

How to do it in Windows 95
(The simpler stuff)


After you have installed TCP/IP as a protocol, go to the Network Neighborhood and select the properties of "TCP/IP-> Dial-Up Adapter." From there, select the "IP Adress" tab. On this window you need to select the field for "Specify an IP address."

Fill in an address such as 100.100.100.100 on one computer and one such as 100.100.100.50 on the other computer. Be sure both have a subnet mask such as 255.255.255.0. (I guess 255.0.0.0 would work too.) Click OK and exit out of the Network Neighborhood and then restart the computers.

Both computers should now be ready to connect. (Provided you set up all the other stuff on the referring page.)

Notes about TCP/IP and DCC
When you assign an address to your Dial-up adapter, you are really assigning a static IP address to your modem. Generally you don't want to do this because your modem is assigned an address by your internet server every time you dial up. Usually a user doesn't always have the same IP address each time they dial up. This should create a problem for you and your ISP, but not having IP's is a problem for DCC. As a result, you can set up TCP/IP as you need for DCC, then reset them when you are finished DCC-ing.

When I tried dialing up with a static IP, I still got on and was assigned an IP address from my server, however, I was not able to connect to anything because Netscape was never able to find the DNS server to resolve host names. So I had one IP when not dialed up, and another when I did, then back to the original when I disconnected. *Strange*

By the way, if you make up IP addresses, keep in mind that you have to keep them at home. If you are on the net with a computer in which this would make a difference you would probably know this, but IP addresses that go public must be leased from the InterNIC. You can't make up any old number. (Judging from my experience, you can hard IP your dial-up adpater and still connect to the internet and recieve a server assigned IP.)

Along these lines, there are certain IP addresses that are "special" and shouldn't be used for DCC purposes. Some of those would be 255.255.255.255 and 0.0.0.0. The example of 100.100.100.100 would be ok.

When you network with ethernet cards, you set the IP address for them and you know it is for them. When setting up IP addressing for your dial-up adapter, on the other hand, you don't know exactly what that is. It is your modem, apparently, but it is also DCC, which has no modem. I am sure Windows uses some wierd feature with dial-up adapter that fools networking so that you can have an IP address, but it would be nice if you could set it up independent of the modem. Oh well.

Friday, July 18, 2008

Javascript

Javascript


JavaScript is the name of Netscape Communications Corporation's implementation of ECMAScript, a scripting programming language based on the concept of prototypes. The language is best known for its use in websites, but is also used to enable scripting access to objects embedded in other applications.

Despite the name, JavaScript is only distantly related to the Java programming language, the main similarity being their common debt to the C programming language syntax. Semantically, JavaScript has far more in common with the Self programming language and ActionScript which is also an ECMAScript.

JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape

JavaScript was originally developed by Brendan Eich of Netscape Communications Corporation under the name Mocha, then LiveScript, and finally renamed to JavaScript. The change of name from LiveScript to JavaScript roughly coincided with Netscape adding support for Java technology in its Netscape Navigator web browser. JavaScript was first introduced and deployed in the Netscape browser version 2.0B3 in December of 1995. When web developers talk about using JavaScript in Internet Explorer, they are actually using JScript. The choice of name proved to be a source of much confusion.

As of 2006, the latest version of the language is JavaScript 1.7. The previous version 1.6 corresponded to ECMA-262 Edition 3 like JavaScript 1.5, except for Array extras, and Array and String generics. ECMAScript, in simple terms, is a standardized version of JavaScript. The ECMA-357 standard specifies E4X, a language extension dealing with XML.

JavaScript is a prototype-based scripting language with a syntax loosely based on C. Like C, the language has no input or output constructs of its own. Where C relies on standard I/O libraries, a JavaScript engine relies on a host environment into which it is embedded. There are many such host environment applications, of which web technologies are the best-known examples. These are examined first.One major use of web-based JavaScript is to write functions that are embedded in or included from HTML pages and interact with the Document Object Model (DOM) of the page to perform tasks not possible in HTML alone.

avaScript debugging has some specifics in comparison with stand-alone applications. JavaScript programs usually rely on interaction with the loaded page's Document Object Model (DOM) so errors may be caused by wrong DOM usage in a technically correct script. This makes JavaScript errors difficult to find. However nowadays both Internet Explorer and the Gecko-based browsers come with a reasonably good JavaScript debugger. Gecko browsers use the Venkman debugger or the FireBug debugger for Mozilla Firefox, while for Internet Explorer there is the Microsoft Script Debugger. Microsoft also provides Microsoft Script Editor (MSE) as part of their Microsoft Office package (Microsoft Office 2002 or higher). There are also some free online checking tools such as JSLint




FOR MORE INFORMATION ,DETAILS AND RESOURCES

XML programming language

XML



The Extensible Markup Language (XML) is a W3C-recommended general-purpose markup language for creating special-purpose markup languages, capable of describing many different kinds of data. In other words, XML is a way of describing data. An XML file can contain the data too, as in a database. It is a simplified subset of Standard Generalized Markup Language (SGML). Its primary purpose is to facilitate the sharing of data across different systems, particularly systems connected via the Internet. Languages based on XML (for example, Geography Markup Language (GML), RDF/XML, RSS, Atom, MathML, XHTML, SVG, XUL, EAD, Klip and MusicXML) are defined in a formal way, allowing programs to modify and validate documents in these languages without prior knowledge of their particular form.

The versatility of SGML for dynamic information display was understood by early digital media publishers in the late 1980s prior to the rise of the internet.[1] [2] By the mid-1990s some practitioners of SGML had gained experience with the then-new World Wide Web, and believed that SGML offered solutions to some of the problems the Web was likely to face as it grew. Dan Connolly added SGML to the list of W3C's activities when he joined the staff in 1995; work began in mid-1996 when Jon Bosak developed a charter and recruited collaborators. Bosak was well-connected in the small community of people who had experience both in SGML and the Web. He received support in his efforts from Microsoft.

XML was designed by an eleven-member working group, supported by an (approximately) 150-member Interest Group. Technical debate took place on the Interest Group mailing list and issues were resolved by consensus or, when that failed, majority vote of the Working Group. The decision record was compiled by Michael Sperberg-McQueen 4 December 1997. James Clark served as Technical Lead of the Working Group, notably contributing the empty-element "" syntax and the name "XML". Other names that had been put forward for consideration included "MAGMA" (Minimal Architecture for Generalized Markup Applications), "SLIM" (Structured Language for Internet Markup) and "MGML" (Minimal Generalized Markup Language). The co-editors of the specification were originally Tim Bray and Michael Sperberg-McQueen. Halfway through the project Bray accepted a consulting engagement with Netscape, provoking vociferous protests from Microsoft. Bray was temporarily asked to resign the editorship. This led to intense dispute in the Working Group, eventually solved by the appointment of Microsoft's Jean Paoli as a third co-editor.

XML provides a text-based means to describe and apply a tree-based structure to information. At its base level, all information manifests as text, interspersed with markup that indicates the information's separation into a hierarchy of character data, container-like elements, and attributes of those elements. In this respect, it is similar to the LISP programming language's S-expressions, which describe tree structures wherein each node may have its own property list.

The fundamental unit in XML is the character, as defined by the Universal Character Set. Characters are combined to form an XML document. The document consists of one or more entities, each of which is typically some portion of the document's characters, stored in a text file.

XML files may be served with a variety of Media types. RFC3023 defines the types "application/xml" and "text/xml", which say only that the data is in XML, and nothing about its semantics. The use of "text/xml" has been criticized as a potential source of encoding problems. RFC3023 also recommends that XML-based languages be given media types beginning in "application/" and ending in "+xml"; for example "application/atom+xml" for Atom. This page discusses further XML and MIME.

The ubiquity of text file authoring software (basic text editors such as Notepad and TextEdit as well as word processors) facilitates rapid XML document authoring and maintenance, whereas prior to the advent of XML, there were very few data description languages that were general-purpose, Internet protocol-friendly, and very easy to learn and author. In fact, most data interchange formats were proprietary, special-purpose, "binary" formats (based foremost on bit sequences rather than characters) that could not be easily shared by different software applications or across different computing platforms, much less authored and maintained in common text editors.




FOR MORE INFORMATION ,DETAILS AND RESOURCES

HTML & DHTML programming language

HTML & DHTML


HyperText Markup Language (HTML) is a predominant markup language for the creation of web pages. It provides a means to describe the structure of text-based information in a document — by denoting certain text as headings, paragraphs, lists, and so on — and to supplement that text with interactive forms, embedded images, and other objects. HTML can also describe, to some degree, the appearance and semantics of a document, and can provide additional cues, such as embedded scripting language code, that can affect the behavior of web browsers and other HTML processors.

HTML is defined in formal specifications that were developed and published throughout the 1990s, inspired by Tim Berners-Lee's prior proposals to graft hypertext capability onto a homegrown SGML-like markup language for the Internet. The first published specification for a language called HTML was drafted by Berners-Lee with Dan Connolly, and was published in 1993 by the IETF as a formal "application" of SGML (with an SGML Document Type Definition defining the grammar).

HTML markup consists of several types of entities, including: elements, attributes, data types and character references.

Dynamic HTML or DHTML is a term used for a collection of technologies, used together to create interactive and animated web sites by using a combination of static markup language (such as HTML), a client-side scripting language (such as JavaScript), the presentation definition language (e.g. Cascading Style Sheets [CSS]), and the Document Object Model. The term has fallen out of use in recent years, as DHTML scripts often tended to not work well cross platform. Newer techniques, including Ajax and unobtrusive JavaScript coding, have led to similar results, but in an accessible, standards-compliant way.

Some disadvantages of DHTML are that it is difficult to develop and debug due to varying degrees of support among web browsers of the aforementioned technologies and that the variety of screen sizes means the end look can only be fine-tuned on a limited number of browser and screen-size combinations. Development for recent browsers, such as Internet Explorer 5.0+, Netscape 6.0+, and Opera 7.0+, is aided by a shared Document Object Model.

Dynamic HTML is also often used to make rollover or drop-down buttons on a web page. DHTML is a combination of JavaScript, CSS, HTML, and sometimes Ajax.




FOR MORE INFORMATION ,DETAILS AND RESOURCES

Java programming language

Java



Java is an object-oriented programming language developed by James Gosling and colleagues at Sun Microsystems in the early 1990s. Unlike conventional languages which are generally designed either to be compiled to native (machine) code, or to be interpreted from source code at runtime, Java is intended to be compiled to a bytecode (though it can be compiled to native code with gcj), which is then run (generally using JIT compilation) by a Java virtual machine.

The language itself borrows much syntax from C and C++ but has a simpler object model and fewer low-level facilities.

Java is not related to JavaScript, though they have similar names and share a C-like syntax.

Java was started as a project called "Oak" by James Gosling in June 1991. Gosling's goals were to implement a virtual machine and a language that had a familiar C-like notation but with greater uniformity and simplicity than C/C++. The first public implementation was Java 1.0 in 1995. It made the promise of "Write Once, Run Anywhere" (WORA), with free runtimes on popular platforms. It was fairly secure and its security was configurable, allowing for network and file access to be limited. The major web browsers soon incorporated it into their standard configurations in a secure "applet" configuration. It became popular quickly. New versions for large and small platforms (J2EE and J2ME) soon were designed with the advent of "Java 2". Sun has not announced any plans for a "Java 3".

In 1997, Sun approached the ISO/IEC JTC1 standards body and later the Ecma International to formalize Java, but it soon withdrew from the process.[1][2][3] Java remains a proprietary de facto standard that is controlled through the Java Community Process [4]. Sun makes most of its Java implementations available without charge, with revenue being generated by specialized products such as the Java Enterprise System. Sun distinguishes between its Software Development Kit (SDK) and Runtime Environment (JRE) which is a subset of the SDK, the primary distinction being that in the JRE the compiler is not present.




FOR MORE INFORMATION ,DETAILS AND RESOURCES ON JAVA

Program C/C++

C/C++



C is a general-purpose, procedural, imperative computer programming language developed in the early 1970s by Dennis Ritchie for use on the Unix operating system. It has since spread to many other operating systems, and is now one of the most widely used programming languages. C also has had a great influence on many other popular languages, especially C++ which was originally designed as an enhancement to C. It is the most commonly used programming language for writing system software,though it is also widely used for writing applications. Though not originally designed as a language for teaching, and despite its somewhat unforgiving character, C is commonly used in computer science education, in part because the language is so pervasive.

C is a minimalistic programming language. Among its design goals were that it could be compiled in a straightforward manner using a relatively simple compiler, provide low-level access to memory, generate only a few machine language instructions for each of its core language elements, and not require extensive run-time support. As a result, C code is suitable for many systems-programming applications that had traditionally been implemented in assembly language.

Despite its low-level capabilities, the language was designed to encourage machine-independent programming. A standards-compliant and portably written C program can be compiled for a very wide variety of computer platforms and operating systems with minimal change to its source code. The language has become available on a very wide range of platforms, from embedded microcontrollers to supercomputers.

C++ (generally pronounced /si plÊŒs plÊŒs/) is a general-purpose, high-level programming language with low-level facilities. It is a statically-typed free-form multi-paradigm language supporting procedural programming, data abstraction, object-oriented programming, and generic programming. Since the 1990s, C++ has been one of the most popular commercial programming languages.





FOR MORE INFORMATION ,DETAILS AND RESOURCES ON C and C++

Wednesday, July 16, 2008

CCNP E-BOOK DOWNLOAD

Cisco Certified Network Professional (CCNP)
The Cisco Certified Network Professional (CCNP) is the middle ground of Cisco technical certifications. The CCNP is considered proof of having the ability to work with medium-sized networks (between 100 and 500 end devices) and with technology such as QoS, broadband, VPNs, and security-minded features. To acquire a CCNP, one must pass four tests, and either re-certify or upgrade to a CCIE every three years. (The CCNA is a prerequisite for CCNP, CCIE does not have any prerequisites.)

Here are some ebook for CCNP

KERALA EXAMINATION RESULTS 2011

HSE RESULTS 2011 Examination Results March- 2011 Click here to download:- Click Vocational Higher Secondary Examination Results 2011 Click h...