Wednesday, September 17, 2008

Sybex 640-801 ccna 4.0 study guide


sybex 640-801 ccna 4.0 study guide

CCNA NOTES(640-802),Latest


Download Here:- Download

LAN &VLAN(SMALL TIPS)


What is a LAN?Okay, most of you already know what a LAN is but let’s give it a definition to make sure. We have to do this because, if you don’t know what a LAN is, you can’t understand what a VLAN is.
A LAN is a local area network and is defined as all devices in the same broadcast domain. If you remember, routers stop broadcasts, switches just forward them.
What is a VLAN?As I said, a VLAN is a virtual LAN. In technical terms, a VLAN is a broadcast domain created by switches. Normally, it is a router creating that broadcast domain. With VLAN’s, a switch can create the broadcast domain.
This works by, you, the administrator, putting some switch ports in a VLAN other than 1, the default VLAN. All ports in a single VLAN are in a single broadcast domain.
Because switches can talk to each other, some ports on switch A can be in VLAN 10 and other ports on switch B can be in VLAN 10. Broadcasts between these devices will not be seen on any other port in any other VLAN, other than 10. However, these devices can all communicate because they are on the same VLAN. Without additional configuration, they would not be able to communicate with any other devices, not in their VLAN.
Are VLANs required?It is important to point out that you don’t have to configure a VLAN until your network gets so large and has so much traffic that you need one. Many times, people are simply using VLAN’s because the network they are working on was already using them.
Another important fact is that, on a Cisco switch, VLAN’s are enabled by default and ALL devices are already in a VLAN. The VLAN that all devices are already in is VLAN 1. So, by default, you can just use all the ports on a switch and all devices will be able to talk to one another.
When do I need a VLAN?You need to consider using VLAN’s in any of the following situations:
You have more than 200 devices on your LAN
You have a lot of broadcast traffic on your LAN
Groups of users need more security or are being slowed down by too many broadcasts?
Groups of users need to be on the same broadcast domain because they are running the same applications. An example would be a company that has VoIP phones. The users using the phone could be on a different VLAN, not with the regular users.
Or, just to make a single switch into multiple virtual switches.
Why not just subnet my network?A common question is why not just subnet the network instead of using VLAN’s? Each VLAN should be in its own subnet. The benefit that a VLAN provides over a subnetted network is that devices in different physical locations, not going back to the same router, can be on the same network. The limitation of subnetting a network with a router is that all devices on that subnet must be connected to the same switch and that switch must be connected to a port on the router.
With a VLAN, one device can be connected to one switch, another device can be connected to another switch, and those devices can still be on the same VLAN (broadcast domain).
How can devices on different VLAN’s communicate?Devices on different VLAN’s can communicate with a router or a Layer 3 switch. As each VLAN is its own subnet, a router or Layer 3 switch must be used to route between the subnets.
What is a trunk port?When there is a link between two switches or a router and a switch that carries the traffic of more than one VLAN, that port is a trunk port.
A trunk port must run a special trunking protocol. The protocol used would be Cisco’s proprietary Inter-switch link (ISL) or the IEEE standard 802.1q.
How do I create a VLAN?Configuring VLAN’s can vary even between different models of Cisco switches. Your goals, no matter what the commands are, is to:
Create the new VLAN’s
Put each port in the proper VLAN
Let’s say we wanted to create VLAN’s 5 and 10. We want to put ports 2 & 3 in VLAN 5 (Marketing) and ports 4 and 5 in VLAN 10 (Human Resources). On a Cisco 2950 switch, here is how you would do it:

At this point, only ports 2 and 3 should be able to communicate with each other and ports 4 & 5 should be able to communicate. That is because each of these is in its own VLAN. For the device on port 2 to communicate with the device on port 4, you would have to configure a trunk port to a router so that it can strip off the VLAN information, route the packet, and add back the VLAN information.
What do VLAN’s offer?VLAN’s offer higher performance for medium and large LAN’s because they limit broadcasts. As the amount of traffic and the number of devices grow, so does the number of broadcast packets. By using VLAN’s you are containing broadcasts.
VLAN’s also provide security because you are essentially putting one group of devices, in one VLAN, on their own network.
Article SummaryHere is what we have learned:
A VLAN is a broadcast domain formed by switches
Administrators must create the VLAN’s then assign what port goes in what VLAN, manually.
VLAN’s provide better performance for medium and large LAN’s.
All devices, by default, are in VLAN 1.
A trunk port is a special port that runs ISL or 802.1q so that it can carry traffic from more than one VLAN.
For devices in different VLAN’s to communicate, you must use a router of Layer 3 switch.

Saturday, September 13, 2008

WiFi Security (McGraw-Hill Telecom Professional)

WiFi Security (McGraw-Hill Telecom Professional) WiFi Security (McGraw-Hill Telecom Professional)PDF English 312 Pages (1 Mar 2003) 5 MBBy following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol.
WiFi_Security_downarchive.rar

***Download***

Kaspersky Anti-Virus 2009 Version 8.0.0.454 Download


or

Thursday, September 4, 2008

Download Latest patch

ASP + Access
Easy to install and maintain. It works even on older servers and works basically out of the box. Microsoft Access not required!Requires: Windows OS, IIS web server
*Download*
.NET 2.0 (ZIP)
Hot technology, better performance, but more complex maintenance. Supports both Access and SQL Server databases.Requires: Windows OS, IIS web server, .NET Framework 2.0, SQL Server optional
*Download*
PHP + MySQL
Suitable for Linux/*nix hosting, but also for Windows servers running PHP. Great performance and scalability. MySQL database management required.Requires: web server (IIS, Apache, ...), PHP 4.1 or higher (with mb extension enabled), MySQL 4.x or higher
*Download*

Chrome from google

More about chrome
A fresh take on the browser
At Google, we spend much of our time working inside a browser. We search, chat, email and collaborate in a browser. And like all of you, in our spare time, we shop, bank, read news and keep in touch with friends - all using a browser. People are spending an increasing amount of time online, and they're doing things never imagined when the web first appeared about 15 years ago.
Since we spend so much time online, we began seriously thinking about what kind of browser could exist if you started from scratch and built on the best elements out there. We realized that the web had evolved from mainly simple text pages to rich, interactive applications and that we needed to completely rethink the browser. What we really needed was not just a browser, but also a modern platform for web pages and applications, and that's what we set out to build.
So today we're releasing the beta version of a new open source browser: Google Chrome.
On the surface, we designed a browser window that is streamlined and simple. To most people, it isn't the browser that matters. It's only a tool to run the important stuff - the pages, sites and applications that make up the web. Like the classic Google homepage, Google Chrome is clean and fast. It gets out of your way and gets you where you want to go.
Under the hood, we were able to build the foundation of a browser that runs today's complex web applications much better . By keeping each tab in an isolated "sandbox", we were able to prevent one tab from crashing another and provide improved protection from rogue sites. We improved speed and responsiveness across the board. We also built V8, a more powerful JavaScript engine, to power the next generation of web applications that aren't even possible in today's browsers.
This is just the beginning - Google Chrome is far from done. We've released this beta for Windows to start the broader discussion and hear from you as quickly as possible. We're hard at work building versions for Mac and Linux too, and we'll continue to make it even faster and more robust.
We owe a great debt to many open source projects, and we're committed to continuing on their path. We've used components from Apple's WebKit and Mozilla's Firefox, among others - and in that spirit, we are making all of our code open source as well. We hope to collaborate with the entire community to help drive the web forward.
The web gets better with more options and innovation. Google Chrome is another option, and we hope it contributes to making the web even better.
But enough from us. The best test of Google Chrome is to try it yourself.
Watch related Video

Google launches own Browser called "CHROME"



Google launches its own browser to compete with Microsoft.

Google recognized that the war is not only on the search engine, but that browsers control in the end a large percentage of the enduser's behavor, when it comes to which search engine does the end user use. The default settings in a browser on the search box and on the start page gives Google no choice, but to do this strategic move.
The browser will be available to download as of today and here is a first screenshot.



Google knows how to lure users with the seeming simplicity of its products, even though there’s a great deal of complexity going on behind the scenes. Microsoft often makes products that seem to create more work than they should for users.
That dichotomy is evident in the companies’ Web browsers — Google’s new Chrome and Microsoft’s Windows Internet Explorer 8, both out in beta, or test, versions. (Msnbc.com is a Microsoft-NBC Universal joint venture.)
Chrome shines in its simplicity, while IE 8 brings some better functionality to an existing product.

Tuesday, September 2, 2008

How to remove Pop-Up Warning to Blog

A reader wanted to know how he could add a pop up warning to his blog which is displayed just before the blog opens.



To add/install it in your blog follow these steps :

1. Login at Blogger.com

2. On the Blogger Dashboard which opens for a successful login click the 'Layout' link.

3. The Page Elements subtab of Template tab will open.

4. Click the Edit Html subtab of Template tab.

5. On the Edit Html subtab scroll down in the Template Code box.

6. Copy the code below :

7. Paste the code above between ]]> and tags in your template. Replace "Red Color above" with your own message.

8. Save the template.

9. View Blog.

Monday, September 1, 2008

Internet Download Manager (IDM)




Internet Download Manager (IDM) is a tool to increase download


speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.Version 5.11 build 5 adds complete Vista support, YouTube grabber that can be used to download FLV videos from YouTube, Google Video, and MySpaceTV, redeveloped scheduler, MMS protocol support and the site grabber feature. This feature not only lets you download required files that are specified with filters, for example all pictures from a web site, or all audio files from a web site, but it also lets you download subsets of web sites, or complete web sites for mirroring or offline browsing. It's possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes. The new version also adds improved browser integration, redesigned and enhanced download engine, the unique integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features

Internet Explorer 8 Beta


With Internet Explorer 8 promised to arrive in 2008, Microsoft has taken a huge step forward this week by announcing the first public beta of the new browser.Predictably named 'Internet Explorer 8 Beta 1' the browser won't be the radical (and much needed) overhaul seen between IE6 and IE7. Instead the primary difference will be 'Acid2' compatibility - in a nutshell: compliance with universal web standards so that everything on a web page looks and works as it should. This sounds obvious but, with designers constantly having to configure sites to work with multiple browsers, it isn't and should solve a vast array of programming problems and speed web page design. Firefox 3 will also pass Acid2 tests.In addition to this, IE8 will also add ACR (automatic crash recovery) - saving your web pages in event of a crash - something most other browsers have had for years, expand its phishing filter (and rename it 'Safety Filter') to encompass malware threats and add a context sensitive right click menu (postcodes offer map searches, etc).Grab it from the link below and for those obsessed with the minutiae check out the full release notes. Having tested out the beta myself, Firefox and Opera fans have nothing to fear, but IE users will get a little closer to knowing what it feels like to use a decent web browser...

MSI NX8800GT Graphics Card


MSI has launched its latest MSI NX8800GT Series graphics card, base on NVIDIA GeForce 8800GT Series GPU with onboard graphics memory to 1024MB (1GB). MSI NX8800GT 1GB Series adopt 8 sets of Qimonda high speed, double data rate, high bandwidth 1Gbit graphics memory chips. All these high-speed 1Gbit memory chips also compliant RoHS regulation strictly. Low voltage level design and support advanced "Auto Refresh" and "Power Down with Self Refresh" operations. All these green and ECO concept gives user the maximum possibility for over-clocking and maintains minimum power consumption.

In order to give power users more privilege on over-clocking and advanced tweaking, MSI NX8800GT 1GB Series loads with a 2-Slot, 3 sets high efficient heat-pipes thermal solution. With this 2-Slot fan which can cover over 90% of the graphics PCB, not only GPU/memory but also other components onboard can be cooled at once, ensuring best stability at any condition.After increasing the size of high speed graphics memory, MSI NX8800GT Series makes your High-definition gaming experience unparalleled smooth than ever. Just because of plenty of memory space for GPU utilized as frame buffer, more texture resource can be read and written in real time. And this makes the gaming in extremely high-definition possible.

KERALA EXAMINATION RESULTS 2011

HSE RESULTS 2011 Examination Results March- 2011 Click here to download:- Click Vocational Higher Secondary Examination Results 2011 Click h...